huge-inventory.webp
free-shipping.webp
extended-replacement.webp
  • USG6000V

    Huawei USG6000V Basic Software License(per vCPU, 1 vCPU indicates V1, 2 vCPUs indicate V2, 4 vCPUs indicate V4, 8 vCPUs indicate V8)
  • List Price:

      $3,600 (56% OFF)

  • $1,584
  • Condition:

    New Factory Sealed
  • IN STOCK Delivery within 48 hours

  • Warranty:  3 Years *

  • USG6000V Specification

    USG6000V Specification

    Description

    USG6000V Basic Software License(per vCPU, 1 vCPU indicates V1, 2 vCPUs

    indicate V2, 4 vCPUs indicate V4, 8 vCPUs indicate V8)

    Model

    USG6000V1

    USG6000V2

    USG6000V4

    USG6000V8

    Virtual Machine Resource Requirements1

    Hypervisor

     

    Xen 4.5 and above

    VMware ESXi 5.5 and above

    Linux KVM, kernel 2.6.32 and above

    Hyper-V windows server 2012 and above

    Huawei FusionSphere 6.0 and above

    vCPU2 

    1

    2

    4

    8

    Memory (GB)

    2 GB

    4 GB

    8 GB

    12 GB

    Storage(min/max)

    4 GB/2 TB

    4 GB/2 TB

    4 GB/2 TB

    4 GB/2 TB

    Interface number of vNICs (min/max)

    2/11

    2/11

    2/11

    2/11

    Main Performance3

    [SR-IOV mode]4 Firewall throughput5 (1518-byte)

    10 Gbit/s

    20 Gbit/s

    40 Gbit/s

    80 Gbit/s

    [SR-IOV mode] Number of new connections per second

    15,000

    30,000

    100,000

    280,000

    [SR-IOV mode] Maximum number of concurrent connections

    500,000

    2,000,000

    4,000,000

    8,000,000

    [vSwitch mode]4 Firewall throughput5 (1518-byte)

    8 Gbit/s

    8 Gbit/s

    8 Gbit/s

    8 Gbit/s

    vSwitch mode] Number of new connections per second

    15,000

    30,000

    50,000

    60,000

    [vSwitch mode] Maximum number of concurrent connections

    500,000

    2,000,000

    4,000,000

    8,000,000

    [SR-IOV mode] IPSec throughput5 (AES, 1420-byte)

    1.5 Gbit/s

    2 Gbit/s

    4 Gbit/s

    7 Gbit/s

    [vSwitch mode] IPSec throughput5 (AES, 1420-byte)

    1 Gbit/s

    1.5 Gbit/s

    3 Gbit/s

    5 Gbit/s

    Maximum number of IPSec connections

    1,000

    2,000

    3,000

    5,000

    Maximum number of security

    policies

    3,000

    6,000

    12,000

    24,000

    Number of virtual firewalls

    20

    50

    200

    500

    Functions

    Integrated protection

    Integrates traditional firewall, VPN, intrusion prevention, antivirus, bandwidth management, and anti-DdoS functions

    Application identification and control

     

    Identifies more than 6000 applications with the access control granularity to application functions, for example, distinguishing between WeChat text and voice. The USG6000V combines application identification with intrusion detection, antivirus, and data filtering, improving detection performance and accuracy.

    Intrusion prevention and web attack defense

    Accurately detects and defends against vulnerability-specific attacks based on up-to-date threat information. The USG6000V can defend against web-specific attacks, including SQL injection and XSS attacks.

    Antivirus

     

    Updates the antivirus signature database every day. The USG6000V can rapidly detect more than 5,000,000 types of viruses based on the signature database

    Bandwidth management and QoS optimization

     

    Provides per-user or per-IP bandwidth management based on application identification, ensuring network quality for key services and users. The management and control can be implemented by maximum bandwidth, guaranteed bandwidth, application-specific PBR, and changing the forwarding priority of application traffic.

    Load balancing

    Layer-7 service and link load balancing and fully uses computing resources based on abundant load balancing algorithms

    Intelligent uplink selection

     

    Supports service-specific PBR and intelligently selects the optimal link based on multiple types of load balancing algorithms (such as the bandwidth ratio and link health status) in multi-ISP scenarios.

    VPN encryption

    Provides various reliable VPN features, such as IPsec VPN, L2TP VPN, MPLS VPN, and GRE.

    Anti-DDoS

    Implements anti-DDoS to defense against over 10 types of DDoS attacks, such as SYN flood and UDP flood.

    User authentication

    Supports multiple authentication methods, including local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security authentication.

    Security virtualization

     

    Supports virtualization of multiple types of security services, including firewall, intrusion prevention, antivirus, and VPN services. Users can enjoy isolated and tailor-made management on one physical device.

    Diversified reports

    Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, or URL

    Routing

     

    Supports IPv4 static routes, policy-based routing, routing policies, multicast, RIP, OSPF, BGP, and IS-IS.

    Supports IPv6 static routes, policy-based routing, routing policies, RIPng, OSPFv3, BGP4+, and IPv6 IS-IS.

    HA

    Supports the active/active and active/standby working modes.

    Virtual network

    Supports VXLAN Layer-3 gateways and Agile Controller VM awareness.

    Platform compatibility

    Supports mainstream virtualization platforms, including VMware, Linux KVM, XEN, Hyper-V and Huawei FusionSphere

    Software package format

    Supports software packages in .vmdk, .iso, .qcow2, and .ovf formats for simple deployment.

    1. VM resources refer to resources provided by deployed VMs, including vCPUs, memory, hard disks, and virtual interfaces.

    2. The vCPU indicates the logical CPU virtualized by the Intel x86 64-bit CPU that supports VT. One core corresponds to two vCPUs.

    3. All performance indicators are tested under the specified hardware environment, namely, RH2288, V3, X86 series-3200MHz-1.8V-64bit-135000mW-Haswell EP Xeon E5-2667 v3-8Core-with heatsink.

    4. In SR-IOV mode, the SR-IOV technology is used, and the test environment is the KVM platform. In vSwitch mode, the USG6000V is connected to the vSwitch, and the test environment is the VMware platform.

    5. The maximum throughput is obtained by testing 1518-byte or 1420-byte packets in ideal conditions. The specifications may vary depending on live network environments.

  • View full specification...

  • 3 Years Extended Warranty 100% Ready Stock Best Price Match
    100% Genuine Products 24/7 Technical Support
USG6000V

Huawei USG6000V Basic Software License(per...

Price: $1,584
List Price: $3,600 (56% OFF)
Overview Specification Support Warranty

Overview Of USG6000V

No Data Found

Specification Of USG6000V

USG6000V Datasheet

USG6000V Specification

USG6000V Specification

Description

USG6000V Basic Software License(per vCPU, 1 vCPU indicates V1, 2 vCPUs

indicate V2, 4 vCPUs indicate V4, 8 vCPUs indicate V8)

Model

USG6000V1

USG6000V2

USG6000V4

USG6000V8

Virtual Machine Resource Requirements1

Hypervisor

 

Xen 4.5 and above

VMware ESXi 5.5 and above

Linux KVM, kernel 2.6.32 and above

Hyper-V windows server 2012 and above

Huawei FusionSphere 6.0 and above

vCPU2 

1

2

4

8

Memory (GB)

2 GB

4 GB

8 GB

12 GB

Storage(min/max)

4 GB/2 TB

4 GB/2 TB

4 GB/2 TB

4 GB/2 TB

Interface number of vNICs (min/max)

2/11

2/11

2/11

2/11

Main Performance3

[SR-IOV mode]4 Firewall throughput5 (1518-byte)

10 Gbit/s

20 Gbit/s

40 Gbit/s

80 Gbit/s

[SR-IOV mode] Number of new connections per second

15,000

30,000

100,000

280,000

[SR-IOV mode] Maximum number of concurrent connections

500,000

2,000,000

4,000,000

8,000,000

[vSwitch mode]4 Firewall throughput5 (1518-byte)

8 Gbit/s

8 Gbit/s

8 Gbit/s

8 Gbit/s

vSwitch mode] Number of new connections per second

15,000

30,000

50,000

60,000

[vSwitch mode] Maximum number of concurrent connections

500,000

2,000,000

4,000,000

8,000,000

[SR-IOV mode] IPSec throughput5 (AES, 1420-byte)

1.5 Gbit/s

2 Gbit/s

4 Gbit/s

7 Gbit/s

[vSwitch mode] IPSec throughput5 (AES, 1420-byte)

1 Gbit/s

1.5 Gbit/s

3 Gbit/s

5 Gbit/s

Maximum number of IPSec connections

1,000

2,000

3,000

5,000

Maximum number of security

policies

3,000

6,000

12,000

24,000

Number of virtual firewalls

20

50

200

500

Functions

Integrated protection

Integrates traditional firewall, VPN, intrusion prevention, antivirus, bandwidth management, and anti-DdoS functions

Application identification and control

 

Identifies more than 6000 applications with the access control granularity to application functions, for example, distinguishing between WeChat text and voice. The USG6000V combines application identification with intrusion detection, antivirus, and data filtering, improving detection performance and accuracy.

Intrusion prevention and web attack defense

Accurately detects and defends against vulnerability-specific attacks based on up-to-date threat information. The USG6000V can defend against web-specific attacks, including SQL injection and XSS attacks.

Antivirus

 

Updates the antivirus signature database every day. The USG6000V can rapidly detect more than 5,000,000 types of viruses based on the signature database

Bandwidth management and QoS optimization

 

Provides per-user or per-IP bandwidth management based on application identification, ensuring network quality for key services and users. The management and control can be implemented by maximum bandwidth, guaranteed bandwidth, application-specific PBR, and changing the forwarding priority of application traffic.

Load balancing

Layer-7 service and link load balancing and fully uses computing resources based on abundant load balancing algorithms

Intelligent uplink selection

 

Supports service-specific PBR and intelligently selects the optimal link based on multiple types of load balancing algorithms (such as the bandwidth ratio and link health status) in multi-ISP scenarios.

VPN encryption

Provides various reliable VPN features, such as IPsec VPN, L2TP VPN, MPLS VPN, and GRE.

Anti-DDoS

Implements anti-DDoS to defense against over 10 types of DDoS attacks, such as SYN flood and UDP flood.

User authentication

Supports multiple authentication methods, including local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security authentication.

Security virtualization

 

Supports virtualization of multiple types of security services, including firewall, intrusion prevention, antivirus, and VPN services. Users can enjoy isolated and tailor-made management on one physical device.

Diversified reports

Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, or URL

Routing

 

Supports IPv4 static routes, policy-based routing, routing policies, multicast, RIP, OSPF, BGP, and IS-IS.

Supports IPv6 static routes, policy-based routing, routing policies, RIPng, OSPFv3, BGP4+, and IPv6 IS-IS.

HA

Supports the active/active and active/standby working modes.

Virtual network

Supports VXLAN Layer-3 gateways and Agile Controller VM awareness.

Platform compatibility

Supports mainstream virtualization platforms, including VMware, Linux KVM, XEN, Hyper-V and Huawei FusionSphere

Software package format

Supports software packages in .vmdk, .iso, .qcow2, and .ovf formats for simple deployment.

1. VM resources refer to resources provided by deployed VMs, including vCPUs, memory, hard disks, and virtual interfaces.

2. The vCPU indicates the logical CPU virtualized by the Intel x86 64-bit CPU that supports VT. One core corresponds to two vCPUs.

3. All performance indicators are tested under the specified hardware environment, namely, RH2288, V3, X86 series-3200MHz-1.8V-64bit-135000mW-Haswell EP Xeon E5-2667 v3-8Core-with heatsink.

4. In SR-IOV mode, the SR-IOV technology is used, and the test environment is the KVM platform. In vSwitch mode, the USG6000V is connected to the vSwitch, and the test environment is the VMware platform.

5. The maximum throughput is obtained by testing 1518-byte or 1420-byte packets in ideal conditions. The specifications may vary depending on live network environments.

Our Trusted Clientele Worldwide
Esr-Connect
Johnson-and-Johnson
Exon
Novartis
Siemens-Healthineers
Sheraton
Sk-Telecom
ASDA
DHL
UPS
Lezzat-ltd
Electrotechnical-certification-scheme
WHY ORM SYSTEMS
why orm system image
why orm system image
Technical Support

ORM Systems offers reliable and scalable renowned products that allow seamless expansion to performance and adaptability to network enterprises. Our professional team of highly skilled engineers provides 360 technical support to help you with presale and after-sales journeys to enable customers with features and capabilities of the products.

We strive to deliver a seamless experience that guarantees complete satisfaction along with guidance and support in service settings to promptly resolve issues.

Standard Services
Standard Services image
Standard Services image
Get Quote
Get a free quote!
× Thank you! your form has been submitted successfully. Our expert will be in touch with you shortly.
×
ORM Registered Companies