Shenzhen How does Electronic Commerce Co., Ltd. |
|
USG6500 Next-Generation Firewall (Box)
Key characteristics
Fully integrated protection makes safety easier
For SMEs and branches:
Full-featured, multi-purpose, low overall cost of ownership;
6000+ application identification, fine management and optimization
of key business experiences;
Pre-set protection scenario templates, intelligent strategy
optimization, quick start, easy to use;
Fine online behavior management to prevent data leakage through
documents;
Enrich and highly reliable VPN features to ensure efficient and
secure interconnection between corporate headquarters and branches.
Technical specifications
model
USG6507
USG6530
USG6550
USG6570
Interface extension
Scalable Gigabit Ethernet / Gigabit optical port / 10 Gigabit
optical port, support BYPASS card
Integrated protection
Integrate traditional firewall, VPN, intrusion prevention,
anti-virus, data leakage prevention, bandwidth management,
Anti-DDoS, URL filtering, anti-spam and other functions, global
configuration view and integrated policy management
Support virtualization of multiple security services, including
firewalls, intrusion prevention, anti-virus, VPN, and more.
Individualized management of different users on the same physical
device
Application identification and control
It can identify 6000+ applications, access control precision to
application functions, such as text and voice that distinguish
WeChat. Application identification combined with intrusion
detection, anti-virus, and content filtering to improve detection
performance and accuracy
Intrusion Prevention and Web Protection
Get the latest threat information in the first place, accurately
detect and defend against attacks against vulnerabilities. Protects
against a variety of web-based attacks, including SQL injection
attacks and cross-site scripting attacks
anti-virus
The virus database is updated daily, and more than 5 million
viruses can be quickly detected.
Data leakage prevention
Identify and filter the transmitted files and content to accurately
identify the real types of common files, such as Word, Excel, PPT,
PDF, etc., and filter sensitive content.
Bandwidth management and QoS optimization
Based on the identification of business applications, the bandwidth
used by each user/IP can be managed to ensure the network
experience of key businesses and key users. Control methods
include: limiting the maximum bandwidth or guaranteeing the minimum
bandwidth, applying policy routing, modifying the application
forwarding priority, etc.
VPN encryption
Supports high-reliability VPN features such as IPSec VPN, SSL VPN,
L2TP VPN, MPLS VPN, GRE, etc.
Intelligent management
Preset common protection scenario templates to quickly deploy
security policies and reduce learning costs.
Automatically assess the risk of security policies, and give
optimization recommendations
Support policy conflicts and redundancy detection, discover
redundant and long-term unused policies, and effectively control
the size of the strategy