No ACF gallery field data found

Huawei USG6600 Next Generation Firewall USG6670-AC 16GE RJ45 8GE SFP 4*10GE SFP 16GB Memory 2 AC Power

Brand Name: Huawei
Model Number: USG6670-AC
Minimum Order Quantity: 1 pc
Price: 
Delivery Time: 3-5 days
Warranty Time: 
Place of Origin: China
Payment Terms: 

Description

Huawei USG6600 Next-Generation Firewall USG6670-AC 16GE(RJ45)+8GE(SFP)+4*10GE(SFP),16GB Memory,2 AC Power USG6670-AC Overview Huawei USG6650/6660/6670/6680 next-generation firewalls are designed for small data centers and large or medium-sized enterprises. The firewalls provide full-fledged application identification and application-layer threat and attack defense capabilities, and deliver high performance even when multiple security functions are enabled. The firewalls also offer multiple interface card slots that support various interface cards, such as GE electrical/optical and 10 GE interface cards. These cards allow users to flexibly expand services and enable the firewalls to evolve with enterprise networks, making USG6650/6660/6670/6680 firewalls highly cost-effective and protecting customer investment. USG6670-AC Specification USG6670-AC Specification Fixed port 4 x 10 GE + 16 GE + 8 SFP Height 3 U Dimensions (H x W x D) 130.5 mm x 442 mm x 415 mm Weight (full configuration) 24 kg HDD Optional. Supports 300 GB hard disks (RAID1 and hot swappable). Redundant Power Supply Standard configuration AC Power Supply 100V to 240V Maximum Power 700W Features NAT, application-specific access control, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam Functions Context Awareness *Application, Content, Time, User, Attack, Location (ACTUAL)based awareness capabilities *Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security) Application Security *Fine-grained identification of over 6000 application protocols, application-specific action, and online update of protocol databases *Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in applications *Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks Intrusion Prevention *Provides over 5,000 signatures for attack identification. *Provides protocol identification to defend against abnormal protocol behaviors. *Supports user-defined IPS signatures. Web Security *Cloud-based URL filtering with a URL category database that contains over 85 million URLs in over 80 categories *Defense against web application attacks, such as cross-site scripting and SQL injection attacks HTTP/HTTPS/FTP-based content awareness to defend against web viruses *URL blacklist and whitelist and keyword filtering Email Security *Real-time anti-spam to detect and filter out phishing emails *Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity *Virus scanning and notification for POP3/SMTP/IMAP email attachments Data Security *Data leak prevention based on content awareness *File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types Security Virtualization Virtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions) Network Security *Defense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks *VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE Routing IPv4: static routing, RIP, OSPF, BGP, and IS-IS IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and ACL6 Working Mode and Availability Transparent, routing, or hybrid working mode and High Availability (HA), including the Active-Active and Active-Standby mode Intelligent Management *Evaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management. *Provides a global configuration view and integrated policy management. The configurations can be completed in one page. *Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL. Business

Tags

magnifier