<< Назад на страницу выбора модели

Firewall throughput (1518bytes)35 Gbit/s
IPS throughput8.8 Gbit/s
IPS+AV throughput8 Gbit/s
Concurrent sessions10,000,000
New sessions per second400,000
VPN Throughput (IPSec, AES, 1420 byte)18 Gbit/s
Virtual firewalls500
MTBF23.67 years
MTTR2.53 min
Maximum power350W
DC power supply-48 V to -60 V
AC power supply100 V to 240 V
Fixed port4 x 10GE+16GE+8SFP
Expansion Slots5 x WSIC
Interface moduleWSIC: 2 x 10GE (SFP+)+8 x GE (RJ45), 8 x GE (RJ45), 8 x GE (SFP), 4 x GE (RJ45) BYPASS
Height3U
Dimensions (W×D×H)442mm×470mm×130.5mm
Weight (full configuration)24 kg
HDDOptional. Supports 300 GB hard disks (RAID1 and hot swappable).
Redundant power supplyStandard configuration
Operating environmentTemperature: 0°C to 40°C/5°C to 40°C (with optional HDD)
Humidity: 10% to 90%
Non-operating environmentTemperature: -40°C to 70°C
Humidity: 5% to 95%
Software certificationsICSA Labs: Firewall, IPS, IPSec, SSL VPN
CC: EAL4+
NSS Labs: Recommended Rating
Hardware cerificationsCB, CCC, CE-SDOC, ROHS, REACH&WEEE(EU), C-TICK, ETL, FCC&IC, VCCI, BSMI

 

FunctionDescription
Context awarenessACTUAL (Application, Content, Time, User, Attack, Location)–based awareness capabilities
Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security)
Application securityFine-grained identification of over 6000 application protocols, application specific action, and online update of protocol databases
Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in  applications
Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks
Intrusion preventionProvides over 5000 signatures for attack identification.
Provides protocol identification to defend against abnormal protocol behaviors.
Supports user-defined IPS signatures.
Supports APT defense. Interworking with the Sandbox to detect and block the malicious files in the network.
Web securityCloud-based URL filtering with a URL category database that contains over 130 million URLs in over 80 categories
Defense against web application attacks, such as cross-site scripting and SQL injection attacks
HTTP/HTTPS/FTP-based content awareness to defend against web viruses
URL blacklist and whitelist and keyword filtering
Email securityReal-time anti-spam to detect and filter out phishing emails
Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity
Virus scanning and notification for POP3/SMTP/IMAP email attachments
Data securityData leak prevention based on content awareness
File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types
Security virtualizationVirtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions)
Network securityDefense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks
VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE
RoutingIPv4: static routing, RIP, OSPF, BGP, and IS-IS
IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and A CL6
Working mode and availabilityTransparent, routing, or hybrid working mode and high availability (HA), including the Active/Active and Active/Standby mode
Intelligent managementEvaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management.
Provides a global configuration view and integrated policy management. The configurations can be completed in one page.
Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL.
Enterprise administrators can perform assessment over the current network security status by the network security report and providing the related optimization suggestions.