Customization: | Available |
---|---|
Usage: | POS Terminal |
Certification: | CE |
Still deciding? Get samples of US$ 608/Piece
Order Sample
|
Shipping Cost: | Contact the supplier about freight and estimated delivery time. |
---|
Payment Methods: |
|
---|---|
Support payments in USD |
Secure payments: | Every payment you make on Made-in-China.com is protected by the platform. |
---|
Refund policy: | Claim a refund if your order doesn't ship, is missing, or arrives with product issues. |
---|
Suppliers with verified business licenses
Audited by an independent third-party inspection agency
HiSecEngine USG6300E
|
||||||
Modle
|
USG6305E-AC / USG6309E-AC
|
USG6315E-AC / USG6325E-AC
|
USG6335E-AC / USG6355E-AC
|
USG6365E-AC / USG6385E-AC
|
USG6391E-AC
|
USG6395E-AC
|
Fixed Interfaces
|
2*10GE(SFP+)+8*GE Combo+2*GE WAN
|
12×GE (RJ45) +8GE (SFP) + 4×10GE (SFP+)
|
6*10GE(SFP+)+ 6*GE(SFP)+ 16*GE |
|||
Product Model
|
1U
|
|||||
Local Storage
|
Optional, support M.2 card, 64g/240g
|
Optional 2.5-inch hard disk, supporting 240GB/960GB SSD and 1TB HDD
|
||||
Integrated Protection
|
Provides firewall, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam functions |
|||||
Application identification and control
|
Identifies more than 6,000 applications with the access control granularity to application functions, for example, distinguishing between WeChat text and voice. Combines application identification with intrusion detection, antivirus, and data filtering,improving detection performance and accuracy. |
|||||
Bandwidth Management
|
Manages per-user and per-IP bandwidth in addition to identifying service applications to ensure the network access experience of key services and users. Control methods include limiting the maximum bandwidth, ensuring the minimum bandwidth, applying PBR, and changing application forwarding priorities.
|
|||||
Intrusion prevention and Web protection
|
Obtains the latest threat information in a timely manner for accurate detection and defense against vulnerability-based attacks. The device can defend against web-specific attacks, including SQL injection and XSS attacks. |
|||||
AAPT
|
Interact with local and cloud sandboxes to detect and block malicious files Encrypted traffic does not need to be decrypted, and is linked to the big data analysis platform HiSec Insight to detect encrypted traffic threats. Actively respond to malicious scanning behaviors, and conduct behavior analysis by linking the big data analysis platform HiSec Insight to quickly discover and record malicious behaviors, thus realizing real-time protection against enterprise threats. |
|||||
Cloud management mode
|
Initiates authentication and registration to the cloud management platform to implement plug-and-play and simplify network creation and deployment. Remote service configuration management, device monitoring, and fault management are used to implement cloud-based management of mass devices. |
|||||
More information Products Contact Us>>
|