Overview Of USG6530E-AC
No Data FoundSpecification Of USG6530E-AC
USG6530E-AC Datasheet
USG6530E-AC Specification
USG6530E-ACÂ Specification |
|
Description |
USG6530E AC Host (2*10GE (SFP+) + 10*GE, with AC/DCÂ Adapter) |
Dimensions (H x W x D) mm |
43.6 x 250 x 210 |
Form Factor/Height |
Desktop |
Fixed Interface |
2 x 10GE (SFP+) + 10 x GE |
USB Port |
1 x USB 3.0 |
Weight (Full Configuration) |
1.5 kg |
External Storage |
Optional, Micro-SD card supported, 64 GB/128 GB |
AC Power Supply |
100V to 240V |
Power |
36 W |
Power Supplies |
External power adapter |
Operating Environment (Temperature/Humidity) |
Temperature: 0°C to 45°C; Humidity: 5% to 95%, non-condensing; |
Non-operating Environment |
Temperature: -40°C to +70°C Humidity: 5% to 95%, non-condensing; |
Firewall Throughput1Â (1518/512/64-byte, UDP) |
4/4/3.6Â Gbit/s |
Firewall Latency (64-byte, UDP) |
18 µs |
FW + SA + IPS Throughput2Â |
1.5Â Gbit/s |
FW + SA + IPS + Antivirus Throughput2Â |
1.5Â Gbit/s |
Concurrent Sessions (HTTP1.1)1Â |
500,000 |
New Sessions/Second (HTTP1.1)1Â |
30,000 |
Maximum IPsec VPN Tunnels (GW to GW) |
2,000 |
Maximum IPsec VPN Tunnels (Client to GW) |
2,000 |
IPsec VPN Throughput1Â (AES-256 + SHA256, 1420-byte) |
3Â Gbit/s |
SSL Inspection Throughput3 |
300 Mbit/s |
Concurrent SSL VPN Users (Default/Maximum) |
100/500 |
Security Policies (Maximum) |
3,000 |
Virtual Firewalls |
20 |
URL Filtering: Categories |
More than 130 |
URL Filtering: URLs |
A database of over 120 million URLs in the cloud |
Automated Threat Feedback and IPSÂ Signature Updates |
Yes |
Third-Party and Open-Source Ecosystem  |
Open API for integration with third-party products, providing RESTful and NetConf interfaces Other third-party management software based on SNMP, SSH, and Syslog Cooperation with third-party tools, such as Tufin, AlgoSec, and FireMon Collaboration with anti-APT solution |
Centralized Management |
Centralized configuration, logging, monitoring, and reporting is performed by Huawei eSight and eLog. |
VLANs (Maximum) |
4094 |
VLANIF Interfaces (Maximum) |
1024 |
1. The performance is tested under ideal conditions based on RFC2544 and RFC3511. The actual result may vary with deployment environments. 2. The Antivirus, IPS, and SA performance is measured using 100 KB HTTP files. 3. SSL inspection throughput is measured with IPS enabled and HTTPS traffic using TLS v1.2 with AES128-GCM-SHA256. *SA: indicates service awareness. |
|
Local Storage |
Optional, expandable 128 GB Micro-SD card |
Integrated Protection |
Integrates firewall, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam functions, and provides a global configuration view and integrated policy management. |
Application Identification and Control |
Identifies over 500 applications with access control granularity for application functions, for example, distinguishing between WeChat text and voice. Combines application identification with intrusion detection, antivirus, and data filtering, improving detection performance and accuracy. |
Bandwidth Management |
Manages per-user and per-IP bandwidth in addition to identifying service applications. This ensures the network access experience of key services and users. Management and control can be implemented by maximum bandwidth, guaranteed bandwidth, and application-specific PBR. This changes the forwarding priority of application traffic. |
Intrusion Prevention and Web Protection |
Rapidly obtains the latest threat information for accurate detection and defense against vulnerability-based attacks. The device can defend against web-specific attacks, including SQL injection and XSS attacks. |
Cloud Management Mode |
Initiates authentication and registration to the cloud management platform to implement plug-and-play and simplify network creation and deployment. Remote service configuration management, device monitoring, and fault management are used to implement cloud-based management of mass devices. |
Cloud Application Security Awareness |
Controls enterprise cloud applications in a refined and differentiated method. This matches enterprises’ requirements for cloud application management. |