Place of Origin: | China |
Brand Name: | Dell |
Model Number: | USG6500 |
Minimum Order Quantity: | Negotiable |
---|---|
Price: | Negotiable |
Packaging Details: | Standard Carton Box With Foam |
Payment Terms: | T/T |
Product Name: | USG6500 Next-Generation Firewall (Desktop) | Fixed Interface: | 8GE |
---|---|---|---|
USB2.0 Interface: | Stand By | Product Form: | Desktop |
High Light: | network security firewall devices,firewall security devices |
USG6500 Next-Generation Firewall (Desktop)
Key characteristics
Comprehensive protection, centralized network management
It has 9 major professional protection capabilities such as firewall, VPN and online behavior management, and fully meets the requirements of security compliance;
Scalable 64GB SD card local storage, record user access logs (such as NAT before and after addresses, URLs, etc.) for compliance auditing;
The 120 million URL classification library prevents malicious and illegal websites from harming and meets compliance requirements. Support URL black and white list to block/release access to specific websites;
The eSight network management system can manage multiple devices.
Support U disk zero configuration deployment to improve deployment efficiency.
Technical Parameters
model
USG6510
Fixed interface
8GE
USB2.0 interface
stand by
Product form
desktop
Local storage
Optional, expandable 64GB Micro-SD card
Integrated protection
It combines traditional firewall, VPN, intrusion prevention, anti-virus, data leakage prevention, bandwidth management, URL filtering and other functions in one, global configuration view and integrated policy management.
Application identification and control
It can identify common applications, access control precision to application functions, such as: distinguish between WeChat text and voice. Application identification combined with intrusion detection, anti-virus, and content filtering to improve detection performance and accuracy.
Intrusion Prevention and Web Protection
Get the latest threat information in the first place, accurately detect and defend against attacks against vulnerabilities. Protect against a variety of web-based attacks, including SQL injection attacks and cross-site scripting attacks.
Data leakage prevention
Identify and filter the transmitted files and content to accurately identify the real types of common files, such as Word, Excel, PPT, PDF, etc., and filter sensitive content.
Bandwidth management
Based on the identification of business applications, the bandwidth used by each user/IP can be managed to ensure the network experience of key businesses and key users. The management and control methods include: limiting the maximum bandwidth or guaranteeing the minimum bandwidth, applying the policy routing, and modifying the application forwarding priority.
Contact Person: sales
Versatile Computer Server Equipment , PowerEdge R730 Rack Mount Server
Powerful PowerEdge R730xd Computer Rack Server With Auto - Update Feature
2U Rack Form Factor Computer Server Equipment PowerEdge R830 For Mainstream Data Centers
Enterprise Class Servers , Dell PowerEdge R930 Business Computer Server
Ultra High Density Network Attached Storage Device Dell MD1280 Storage Enclosure
2U Rack Mount NAS Storage Devices For Business , Dell SC8000 Array Controller
Expandable Network Storage Appliance , EqualLogic FS7610 NAS Storage Device
EqualLogic FS7610 Network Attached Storage NAS Devices With FluidFS V4
Dual QHD Dell UltraSharp Curved Computer Monitor 49 Inch For Professionals
30 Inch Desktop Computer Monitor With PremierColor Dell UltraSharp UP3017 Model
Full HD 24" Desktop Computer Monitor Anti - Glare For Video Conferencing
LED - Backlit LCD Flat Screen Computer Monitor , Dell 22 Inch PC Monitor