Home > Computer Products > Network Hardware & Parts > Router > Huawei USG6680-BDL-AC NGFW AC

Huawei USG6680-BDL-AC NGFW AC

Huawei USG6680-BDL-AC NGFW AC photo-1
US$ 46,792 - 46,792 MOQ: 1 Unit
Key Specifications
Get Latest Price
Products Status:
Stock
Type:
Wired & Wireless
VPN Support:
Yes
Payment & Shipping
Payment Methods:
Port of Shipment:
HongKong
Delivery Detail:
Delivery time depends on order quantity.
Products Status Stock
VPN Support Yes
Throughput 40G
Simultaneous Sessions 12,000,000
Brand Name Huawei
Model Number USG6680-BDL-AC
Place of Origin Guangdong, China

USG6680 AC Host(16GE(RJ45)+8GE(SFP)+4*10GE(SFP+),16G Memory,2 AC Power,with IPS-AV-URL Function Group Update Service Subscribe 12 Months)

  • 3U, 16GE(RJ45)+8GE(SFP)+4*10GE(SFP+),5 slots extend,
  • 40Gbps throughput(FW+APP)
  • Default 10 vSys and 100 SSL users,
  • Support Applications awareness, IPS, Anti-Virus, URL filter, DLP, Anti-DDoS, Anti-Spam, IPSec VPN, SSL VPN and Virtualization features etc.

 

Features

Granular Application Access Control

  • Identifies the application-layer attacks and their application, content, time, user, and location information.
  • Provides all-round visibility into service status, network environment, security postures, and user behaviors.
  • Provides an analysis engine that integrates application identification and security functions, such as IPS, AV, and data leak prevention, to prevent application-based malicious code injections, network intrusions, data interceptions, and Advanced Persistent Threat (APT) attacks.

Easy Security Management

  • Classifies 6000+ applications into 5 categories and 33 subcategories and supports application access control based on the subcategories.
  • Complies with the minimum permission control principle and automatically generates policy tuning suggestions based on network traffic and application risks.
  • Analyzes the policy matching ratio and discovers redundant and invalid policies to remove policies and simplify policy management.

Excellent Performance

  • Provides an Intelligent Aware Engine (IAE) capable of parallel processing with all security functions enabled after intelligent application identification.
  • Improves application-layer protection efficiency and ensures the 10G+ performance with all security functions enabled.

Prevention of Unknown Threats

  • Provide samples of worldwide suspicious threats. Executing suspicious samples within the sandbox in the cloud to monitor the activities of the samples and identifies unknown threats.
  • Automatically extracts threat signatures and rapidly synchronizes the signatures to the devices to defend against zero-day attacks.
  • Prevent Advanced Persistent Threat (APT) attacks using a reputation system.

 

Specifications

 

Model USG6620 USG6630 USG6650 USG6660 USG6670 USG6680
Firewall throughput 12 Gbit/s 16 Gbit/s 20 Gbit/s 25 Gbit/s 35 Gbit/s 40 Gbit/s
IPS throughput 5.8Gbit/s 5.8Gbit/s 8.8Gbit/s 8.8Gbit/s 8.8Gbit/s 15Gbit/s
IPS+AV throughput 5Gbit/s 5Gbit/s 8Gbit/s 8Gbit/s 8Gbit/s 13Gbit/s
Concurrent sessions 6,000,000 6,000,000 8,000,000 10,000,000 10,000,000 12,000,000
New sessions per second 200,000 250,000 300,000 350,000 400,000 400,000
VPN Throughput (IPSec) 12 Gbit/s 12 Gbit/s 15 Gbit/s 18 Gbit/s 18Gbit/s 18 Gbit/s
Virtual firewalls 200 200 500 500 500 1,000
Fixed port 8GE+4SFP 2 x 10GE+8GE+8SFP 4 x 10GE+16GE+8SFP
Expansion Slots 2 x WSIC 6 x WSIC 5 x WSIC
Interface module WSIC:
2 x 10GE (SFP+)+8 x GE (RJ45), 8 x GE (RJ45), 8 x GE (SFP) ,4 x GE (RJ45) BYPASS
Height 1U 3 U
Dimensions (H x W x D) 442 mm x 421 mm x 43.6 mm 130.5 mm x 442 mm x 415 mm
Weight (full configuration) 10 kg 24 kg
HDD Optional. Supports single 300 GB hard disks ( hot swappable). Optional. Supports 300 GB hard disks (RAID1 and hot swappable).
Redundant power supply Optional Standard configuration
AC power supply 100 V to 240 V 100 V to 240 V
Maximum power 170W 350W 700W
Operating environment Temperature: 0℃ to 40℃/5℃ to 40℃(with optional HDD)
Humidity: 10% to 90%
Non-operating environment Temperature: -40℃ to 70℃
Humidity: 5% to 95%
Functions
Context awareness ACTUAL (Application, Content, Time, User, Attack, Location)–based awareness capabilities
Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security)
Application security Fine-grained identification of over 6000 application protocols, application-specific action, and online update of protocol databases
Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in applications
Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks
Intrusion prevention Provides over 5000 signatures for attack identification.
Provides protocol identification to defend against abnormal protocol behaviors.
Supports user-defined IPS signatures.
Web security Cloud-based URL filtering with a URL category database that contains over 85 million URLs in over 80 categories
Defense against web application attacks, such as cross-site scripting and SQL injection attacks
HTTP/HTTPS/FTP-based content awareness to defend against web viruses
URL blacklist and whitelist and keyword filtering
Email security Real-time anti-spam to detect and filter out phishing emails
Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity
Virus scanning and notification for POP3/SMTP/IMAP email attachments
Data security Data leak prevention based on content awareness
File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types
Security virtualization Virtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions)
Network security Defense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks
VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE
Routing IPv4: static routing, RIP, OSPF, BGP, and IS-IS
IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and ACL6
Working mode and availability Transparent, routing, or hybrid working mode and high availability (HA), including the Active/Active and Active/Standby mode
Intelligent management Evaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management.
Provides a global configuration view and integrated policy management. The configurations can be completed in one page.
Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL.

 

Comparison

Vendor Product Description Huawei Advantages
HUAWEI USG6680 3U, 16GE(RJ45)+8GE(SFP)+4*10GE(SFP+)
Six-dimensional perspective control, 6000+ Application Identification
 
CISCO ASA 5585-X(SSP60) ASA 5585-X(SSP60), 6GE+4*10GE, 1SSP  
FORTINET 3240C 3240C,2GE+16SFP+12*10GE  

 

Send Inquiry to This Supplier

Message
0/5000

Want the best price? Post an RFQ now!
Business Type
Trading Company
Year Established
2013
Factory Size
Below 1,000 square meters
Total Employees
11 - 50 People

Recommended Categories

Explore top categories and find suppliers for your specific needs