huge-inventory.webp
free-shipping.webp
extended-replacement.webp
  • USG6615E-AC

    Huawei USG6615E AC Host (6*10GE (SFP+) + 6*GE (SFP) + 16*GE, 1 AC power supply)
  • Condition:

    New Factory Sealed
  • IN STOCK Delivery within 48 hours

  • Warranty:  3 Years *

  • USG6615E-AC Specification

    USG6615E-AC Specification

    Description

    USG6615E AC Host (6*10GE (SFP+) + 6*GE (SFP) + 16*GE, 1 AC power supply)

    Dimensions (H x W x D) mm

    43.6 x 442 x 420

    Form Factor/Height

    1U

    Fixed Interface

    6 x 10GE (SFP+) + 6 x GE (SFP) + 16 x GE

    USB Port

    1 x USB 2.0

    Weight (Full Configuration)

    7.6 kg

    External Storage

    Optional, SSD (1 x 2.5 inch) supported, 240 GB/HDD 1TB

    Power Supply

    100 V to 240 V

    Typical power consumption of the machine

    104.5 W

    Power Supplies

    Optional dual AC power supplies

    Operating Environment (Temperature/Humidity)

    Temperature: 0°C to 45°C

    Humidity: 5% to 95%, non-condensing

    Non-operating Environment Temperature

    -40°C to +70°C

    Humidity: 5% to 95%, non-condensing

    Firewall Throughput1 (1518/512/64-byte, UDP)

    12/12/12 Gbit/s

    Firewall Latency (64-byte, UDP)

    15 µs

    FW + SA + IPS Throughput2 

    10 Gbit/s

    FW + SA + IPS + Antivirus Throughput2 

    10 Gbit/s

    Concurrent Sessions (HTTP1.1)1

    6,000,000

    New Sessions/Second (HTTP1.1)1 

    200,000

    IPsec VPN Throughput1 (AES-256 + SHA256, 1420-byte)

    10 Gbit/s

    SSL Inspection Throughput3

    3 Gbit/s

    Concurrent SSL VPN Users (Default/Maximum)

    100/2000

    Security Policies (Maximum)

    40,000

    Virtual Firewalls

    200

    URL Filtering: Categories

    More than 130

    URL Filtering: URLs

    A database of over 120 million URLs in the cloud

    Automated Threat Feedback and IPS

    Signature Updates

    Yes

    Third-Party and Open-Source Ecosystem

     

    Open API for integration with third-party products, providing

    RESTful and NetConf interfaces

    Other third-part management software based on SNMP, SSH, and Syslog

    Co-operation with third-party tools, such as Tufin, AlgoSec, and FireMmon

    Collaboration with anti-APT solution

    Centralized Management

     

    Centralized configuration, logging, monitoring, and reporting is performed by Huawei eSight and eLog

    VLANs (Maximum)

    4094

    VLANIF Interfaces (Maximum)

    1024

    1. The performance is tested under ideal conditions based on RFC2544 and RFC3511. The actual result may vary with deployment environments.

    2. The Antivirus, IPS, and SA performance is measured using 100 KB HTTP files.

    3. SSL inspection throughput is measured with IPS enabled and HTTPS traffic using TLS v1.2 with AES128-GCM-SHA256.

    *SA: indicates service awareness.

    Local Storage

    Optional, SSD (1 x 2.5-inch) supported, 240 GB/HDD (1 x 2.5-inch supported, 1 TB)

    Integrated Protection

    Provides firewall, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam functions.

    Application Identification and Control

    Identifies more than 6,000 applications with the access control granularity to application functions, for example, distinguishing between WeChat text and voice. Combines application identification with intrusion detection, antivirus, and data filtering, improving detection performance and accuracy.

    Bandwidth Management

    Manages per-user and per-IP bandwidth in addition to identifying service applications to ensure the network access experiences of key services and users. Control methods include limiting the maximum bandwidth, ensuring the minimum bandwidth, applying PBR, and changing application forwarding priorities.

    Intrusion Prevention and Web Protection

    Obtains the latest threat information in a timely manner for accurate detection and defense against vulnerability-based attacks. The device can defend against web-specific attacks, including SQL injection and XSS attacks.

    AAPT

    Collaborates with the local or cloud sandbox to detect and block malicious files.
    Supports the flow probe information collection function to collect traffic information and send the collected information to the Cybersecurity Intelligence System (CIS) for analysis, evaluation, and identification of threats and APT attacks.
    Encrypted traffic does not need to be decrypted. The firewall can work with the CIS to detect threats in encrypted traffic.
    The firewall can proactively respond to malicious scanning behavior and work with the CIS to analyze behavior, quickly detect and record malicious behavior, and protect enterprises against threats in real time.

    Cloud Management Mode

    Initiates authentication and registration to the cloud management platform to implement plug-and-play and simplify network creation and deployment.
    Remote service configuration management, device monitoring, and fault management are used to implement cloud-based management of massive numbers of devices.

    Cloud Application Security Awareness

    Controls enterprise cloud applications in a refined and differentiated manner to meet enterprises’ requirements for cloud application management.

  • View full specification...

  • 3 Years Extended Warranty 100% Ready Stock Best Price Match
    100% Genuine Products 24/7 Technical Support
USG6615E-AC

Huawei USG6615E AC Host (6*10GE (SFP+) + 6...

Overview Specification Support Warranty

Overview Of USG6615E-AC

No Data Found

Specification Of USG6615E-AC

USG6615E-AC Datasheet

USG6615E-AC Specification

USG6615E-AC Specification

Description

USG6615E AC Host (6*10GE (SFP+) + 6*GE (SFP) + 16*GE, 1 AC power supply)

Dimensions (H x W x D) mm

43.6 x 442 x 420

Form Factor/Height

1U

Fixed Interface

6 x 10GE (SFP+) + 6 x GE (SFP) + 16 x GE

USB Port

1 x USB 2.0

Weight (Full Configuration)

7.6 kg

External Storage

Optional, SSD (1 x 2.5 inch) supported, 240 GB/HDD 1TB

Power Supply

100 V to 240 V

Typical power consumption of the machine

104.5 W

Power Supplies

Optional dual AC power supplies

Operating Environment (Temperature/Humidity)

Temperature: 0°C to 45°C

Humidity: 5% to 95%, non-condensing

Non-operating Environment Temperature

-40°C to +70°C

Humidity: 5% to 95%, non-condensing

Firewall Throughput1 (1518/512/64-byte, UDP)

12/12/12 Gbit/s

Firewall Latency (64-byte, UDP)

15 µs

FW + SA + IPS Throughput2 

10 Gbit/s

FW + SA + IPS + Antivirus Throughput2 

10 Gbit/s

Concurrent Sessions (HTTP1.1)1

6,000,000

New Sessions/Second (HTTP1.1)1 

200,000

IPsec VPN Throughput1 (AES-256 + SHA256, 1420-byte)

10 Gbit/s

SSL Inspection Throughput3

3 Gbit/s

Concurrent SSL VPN Users (Default/Maximum)

100/2000

Security Policies (Maximum)

40,000

Virtual Firewalls

200

URL Filtering: Categories

More than 130

URL Filtering: URLs

A database of over 120 million URLs in the cloud

Automated Threat Feedback and IPS

Signature Updates

Yes

Third-Party and Open-Source Ecosystem

 

Open API for integration with third-party products, providing

RESTful and NetConf interfaces

Other third-part management software based on SNMP, SSH, and Syslog

Co-operation with third-party tools, such as Tufin, AlgoSec, and FireMmon

Collaboration with anti-APT solution

Centralized Management

 

Centralized configuration, logging, monitoring, and reporting is performed by Huawei eSight and eLog

VLANs (Maximum)

4094

VLANIF Interfaces (Maximum)

1024

1. The performance is tested under ideal conditions based on RFC2544 and RFC3511. The actual result may vary with deployment environments.

2. The Antivirus, IPS, and SA performance is measured using 100 KB HTTP files.

3. SSL inspection throughput is measured with IPS enabled and HTTPS traffic using TLS v1.2 with AES128-GCM-SHA256.

*SA: indicates service awareness.

Local Storage

Optional, SSD (1 x 2.5-inch) supported, 240 GB/HDD (1 x 2.5-inch supported, 1 TB)

Integrated Protection

Provides firewall, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam functions.

Application Identification and Control

Identifies more than 6,000 applications with the access control granularity to application functions, for example, distinguishing between WeChat text and voice. Combines application identification with intrusion detection, antivirus, and data filtering, improving detection performance and accuracy.

Bandwidth Management

Manages per-user and per-IP bandwidth in addition to identifying service applications to ensure the network access experiences of key services and users. Control methods include limiting the maximum bandwidth, ensuring the minimum bandwidth, applying PBR, and changing application forwarding priorities.

Intrusion Prevention and Web Protection

Obtains the latest threat information in a timely manner for accurate detection and defense against vulnerability-based attacks. The device can defend against web-specific attacks, including SQL injection and XSS attacks.

AAPT

Collaborates with the local or cloud sandbox to detect and block malicious files.
Supports the flow probe information collection function to collect traffic information and send the collected information to the Cybersecurity Intelligence System (CIS) for analysis, evaluation, and identification of threats and APT attacks.
Encrypted traffic does not need to be decrypted. The firewall can work with the CIS to detect threats in encrypted traffic.
The firewall can proactively respond to malicious scanning behavior and work with the CIS to analyze behavior, quickly detect and record malicious behavior, and protect enterprises against threats in real time.

Cloud Management Mode

Initiates authentication and registration to the cloud management platform to implement plug-and-play and simplify network creation and deployment.
Remote service configuration management, device monitoring, and fault management are used to implement cloud-based management of massive numbers of devices.

Cloud Application Security Awareness

Controls enterprise cloud applications in a refined and differentiated manner to meet enterprises’ requirements for cloud application management.

Our Trusted Clientele Worldwide
Esr-Connect
Johnson-and-Johnson
Exon
Novartis
Siemens-Healthineers
Sheraton
Sk-Telecom
ASDA
DHL
UPS
Lezzat-ltd
Electrotechnical-certification-scheme
WHY ORM SYSTEMS
why orm system image
why orm system image
Technical Support

ORM Systems offers reliable and scalable renowned products that allow seamless expansion to performance and adaptability to network enterprises. Our professional team of highly skilled engineers provides 360 technical support to help you with presale and after-sales journeys to enable customers with features and capabilities of the products.

We strive to deliver a seamless experience that guarantees complete satisfaction along with guidance and support in service settings to promptly resolve issues.

Standard Services
Standard Services image
Standard Services image
Get Quote
Get a free quote!
× Thank you! your form has been submitted successfully. Our expert will be in touch with you shortly.
×
ORM Registered Companies