huge-inventory.webp
free-shipping.webp
extended-replacement.webp
  • USG6670 AC Host(16GE(RJ45)+8GE(SFP)+4*10GE(SFP),16GB Memory,2 AC Power,with IPS-AV-URL Function Group Update Service Subscribe 12 Months)

    Part Number:

    USG6670-BDL-AC

  • Condition:

    New Factory Sealed

  • IN STOCK Delivery within 48 hours

  • Warranty:  3 Years *

  • USG6670-BDL-AC Specification

    USG6670-BDL-AC Specification

    Bundle Function

    IPS-AV-URL Function Group Update Service Subscribe 12 Months

    Fixed port

    4 x 10 GE + 16 GE + 8 SFP

    Height

    3 U

    Dimensions (H x W x D)

    130.5 mm x 442 mm x 415 mm

    Weight (full configuration)

    24 kg

    HDD

    Optional. Supports 300 GB hard disks (RAID1 and hot swappable).

    Redundant Power Supply

    Standard configuration

    AC Power Supply

    100V to 240V

    Maximum Power

    700W

    Features

    NAT, application-specific access control, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam

    Functions

    Context Awareness

    *Application, Content, Time, User, Attack, Location (ACTUAL)–based awareness capabilities

    *Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security)

    Application Security

    *Fine-grained identification of over 6000 application protocols, application-specific action, and online update of protocol databases

    *Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in applications

    *Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks

    Intrusion Prevention

    *Provides over 5,000 signatures for attack identification.

    *Provides protocol identification to defend against abnormal protocol behaviors.

    *Supports user-defined IPS signatures.

    Web Security

    *Cloud-based URL filtering with a URL category database that contains over 85 million URLs in over 80 categories

    *Defense against web application attacks, such as cross-site scripting and SQL injection attacks

    HTTP/HTTPS/FTP-based content awareness to defend against web viruses

    *URL blacklist and whitelist and keyword filtering

    Email Security

    *Real-time anti-spam to detect and filter out phishing emails

    *Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity

    *Virus scanning and notification for POP3/SMTP/IMAP email attachments

    Data Security

    *Data leak prevention based on content awareness

    *File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types

    Security Virtualization

    Virtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions)

    Network Security

    *Defense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks

    *VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE

    Routing

    IPv4: static routing, RIP, OSPF, BGP, and IS-IS

    IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and ACL6

    Working Mode and Availability

    Transparent, routing, or hybrid working mode and High Availability (HA), including the Active-Active and Active-Standby mode

    Intelligent Management

    *Evaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management.

    *Provides a global configuration view and integrated policy management. The configurations can be completed in one page.

    *Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL.

  • View full specification...

  • 3 Years Extended Warranty 100% Ready Stock Best Price Match
    100% Genuine Products 24/7 Technical Support
USG6670-BDL-AC

USG6670 AC Host(16GE(RJ45)+8GE(SFP)+4*10GE...

Overview Specification Support Warranty

Overview

No Data Found

Specification

USG6670-BDL-AC Specification

USG6670-BDL-AC Specification

Bundle Function

IPS-AV-URL Function Group Update Service Subscribe 12 Months

Fixed port

4 x 10 GE + 16 GE + 8 SFP

Height

3 U

Dimensions (H x W x D)

130.5 mm x 442 mm x 415 mm

Weight (full configuration)

24 kg

HDD

Optional. Supports 300 GB hard disks (RAID1 and hot swappable).

Redundant Power Supply

Standard configuration

AC Power Supply

100V to 240V

Maximum Power

700W

Features

NAT, application-specific access control, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam

Functions

Context Awareness

*Application, Content, Time, User, Attack, Location (ACTUAL)–based awareness capabilities

*Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security)

Application Security

*Fine-grained identification of over 6000 application protocols, application-specific action, and online update of protocol databases

*Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in applications

*Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks

Intrusion Prevention

*Provides over 5,000 signatures for attack identification.

*Provides protocol identification to defend against abnormal protocol behaviors.

*Supports user-defined IPS signatures.

Web Security

*Cloud-based URL filtering with a URL category database that contains over 85 million URLs in over 80 categories

*Defense against web application attacks, such as cross-site scripting and SQL injection attacks

HTTP/HTTPS/FTP-based content awareness to defend against web viruses

*URL blacklist and whitelist and keyword filtering

Email Security

*Real-time anti-spam to detect and filter out phishing emails

*Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity

*Virus scanning and notification for POP3/SMTP/IMAP email attachments

Data Security

*Data leak prevention based on content awareness

*File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types

Security Virtualization

Virtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions)

Network Security

*Defense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks

*VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE

Routing

IPv4: static routing, RIP, OSPF, BGP, and IS-IS

IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and ACL6

Working Mode and Availability

Transparent, routing, or hybrid working mode and High Availability (HA), including the Active-Active and Active-Standby mode

Intelligent Management

*Evaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management.

*Provides a global configuration view and integrated policy management. The configurations can be completed in one page.

*Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL.

Our Trusted Clientele Worldwide
Esr-Connect
Johnson-and-Johnson
Exon
Novartis
Siemens-Healthineers
Sheraton
Sk-Telecom
ASDA
DHL
UPS
Lezzat-ltd
Electrotechnical-certification-scheme
WHY ORM SYSTEMS
why orm system image
Technical Support

ORM Systems offers reliable and scalable renowned products that allow seamless expansion to performance and adaptability to network enterprises. Our professional team of highly skilled engineers provides 360 technical support to help you with presale and after-sales journeys to enable customers with features and capabilities of the products.

We strive to deliver a seamless experience that guarantees complete satisfaction along with guidance and support in service settings to promptly resolve issues.

Standard Services
Standard Services image
Get Quote
Get a free quote!
× Thank you! your form has been submitted successfully. Our expert will be in touch with you shortly.
×
ORM Registered Companies