Product Details
Place of Origin: China
Brand Name: Huawei
Model Number: USG6305E USG6309E USG6325E USG6335E USG6365E
Payment & Shipping Terms
Minimum Order Quantity: 1 pieces
Price: $1000.00 - $3000.00/pieces
Packaging Details: Carton Packing
Delivery Time: 1-2months
Payment Terms: T/T
Supply Ability: 100 Piece/Pieces per Month
Products Status: |
Stock |
Port: |
Shenzhen/Beijing |
Fixed Interface: |
2*10GE(SFP+)+8*GE Combo+2*GE WAN |
Product Pattern: |
1U |
Products Status: |
Stock |
Port: |
Shenzhen/Beijing |
Fixed Interface: |
2*10GE(SFP+)+8*GE Combo+2*GE WAN |
Product Pattern: |
1U |
model number | Huawei USG6305E USG6309E USG6325E USG6335E USG6365E |
fixed interface | 2*10GE(SFP+)+8*GE Combo+2*GE WAN |
product pattern | 1U |
local storage |
Optional, M.2 card support, 240G |
Integration Protection | Integrates traditional firewall, VPN, intrusion prevention, anti-virus, data leakage prevention, bandwidth management, Anti-DDoS, URL filtering, anti-spam, etc., with global configuration view and integrated policy management. |
Application Identification and Control | Recognize 6000+ applications, access control precision to application functions, e.g., differentiate between text and voice of WeChat.Application recognition is combined with intrusion detection, anti-virus and content filtering to improve detection performance and accuracy. |
bandwidth management | Based on the identification of business applications, the bandwidth used per user/IP can be managed to ensure the network experience of key services and key users.Control methods include: limiting maximum bandwidth or guaranteeing minimum bandwidth, applying policy routing, modifying application forwarding priority, etc. |
Intrusion Prevention and Web Protection | Get the latest threat information in the first time, accurately detect and defend against attacks against vulnerabilities.Protect against a variety of attacks against the web, including SQL injection attacks and cross-site scripting attacks. |
APT defense | Linkage with local/cloud sandbox to detect and block malicious files Encrypted traffic does not need to be decrypted, linkage with HiSec Insight, a big data analytics platform, to realize the threat detection of encrypted traffic Actively respond to malicious scanning behavior, and through the linkage with the big data analytics platform HiSec Insight to conduct behavioral analysis, rapid discovery, recording of malicious behavior, and to realize real-time threat to the enterprise.Protection |
Cloud Management Model | The device initiates authentication and registration to the cloud management platform by itself, realizing plug-and-play, simplifying network creation and opening Remote service configuration management, device monitoring and fault management, realizing cloud management of massive devices. |
Cloud Applications Security Awareness | It allows for fine-grained and differentiated control of enterprise cloud applications and meets the needs of enterprises to control the use of cloud applications by users. |