huge-inventory.webp
free-shipping.webp
extended-replacement.webp
  • USG6620-BDL-AC

    USG6620 AC Host(8GE(RJ45)+4GE(SFP),8GB Memory,1 AC Power,with IPS-AV-URL Function Group Update Service Subscribe 12 Months)
  • Condition:

    New Factory Sealed
  • IN STOCK Delivery within 48 hours

  • Warranty:  3 Years *

  • USG6620-BDL-AC Specification

    USG6620 Specifications

    Fixed port

    8 GE + 4 SFP

    Height

    1U

    Dimensions (H x W x D)

    442 mm x 421 mm x 43.6 mm

    Weight (full configuration)

    10 kg

    HDD

    Optional. Supports single 300 GB hard disks (hot swappable).

    Redundant Power Supply

    Optional

    AC Power Supply

    100V to 240V

    Maximum Power

    170W

    Features

    NAT, application-specific access control, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam

    Functions

    Context Awareness

    Application, Content, Time, User, Attack, Location (ACTUAL)–based awareness capabilities

    Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security)

    Application Security

    Fine-grained identification of over 6000 application protocols, application-specific action, and online update of protocol databases

    Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in applications

    Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks

    Intrusion Prevention

    Provides over 5,000 signatures for attack identification.

    Provides protocol identification to defend against abnormal protocol behaviors.

    Supports user-defined IPS signatures.

    Web Security

    Cloud-based URL filtering with a URL category database that contains over 85 million URLs in over 80 categories

    Defense against web application attacks, such as cross-site scripting and SQL injection attacks

    HTTP/HTTPS/FTP-based content awareness to defend against web viruses

    URL blacklist and whitelist and keyword filtering

    Email Security

    Real-time anti-spam to detect and filter out phishing emails

    Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity

    Virus scanning and notification for POP3/SMTP/IMAP email attachments

    Data Security

    Data leak prevention based on content awareness

    File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types

    Security Virtualization

    Virtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions)

    Network Security

    Defense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks

    VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE

    Routing

    IPv4: static routing, RIP, OSPF, BGP, and IS-IS

    IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and ACL6

    Working Mode and Availability

    Transparent, routing, or hybrid working mode and High Availability (HA), including the Active-Active and Active-Standby mode

    Intelligent Management

    Evaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management.

    Provides a global configuration view and integrated policy management. The configurations can be completed in one page.

    Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL.

  • View full specification...

  • 3 Years Extended Warranty 100% Ready Stock Best Price Match
    100% Genuine Products 24/7 Technical Support
USG6620-BDL-AC

USG6620 AC Host(8GE(RJ45)+4GE(SFP),8GB Mem...

Overview Specification Support Warranty

Overview Of USG6620-BDL-AC

No Data Found

Specification Of USG6620-BDL-AC

USG6620-BDL-AC Datasheet

USG6620-BDL-AC Specification

USG6620 Specifications

Fixed port

8 GE + 4 SFP

Height

1U

Dimensions (H x W x D)

442 mm x 421 mm x 43.6 mm

Weight (full configuration)

10 kg

HDD

Optional. Supports single 300 GB hard disks (hot swappable).

Redundant Power Supply

Optional

AC Power Supply

100V to 240V

Maximum Power

170W

Features

NAT, application-specific access control, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam

Functions

Context Awareness

Application, Content, Time, User, Attack, Location (ACTUAL)–based awareness capabilities

Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security)

Application Security

Fine-grained identification of over 6000 application protocols, application-specific action, and online update of protocol databases

Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in applications

Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks

Intrusion Prevention

Provides over 5,000 signatures for attack identification.

Provides protocol identification to defend against abnormal protocol behaviors.

Supports user-defined IPS signatures.

Web Security

Cloud-based URL filtering with a URL category database that contains over 85 million URLs in over 80 categories

Defense against web application attacks, such as cross-site scripting and SQL injection attacks

HTTP/HTTPS/FTP-based content awareness to defend against web viruses

URL blacklist and whitelist and keyword filtering

Email Security

Real-time anti-spam to detect and filter out phishing emails

Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity

Virus scanning and notification for POP3/SMTP/IMAP email attachments

Data Security

Data leak prevention based on content awareness

File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types

Security Virtualization

Virtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions)

Network Security

Defense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks

VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE

Routing

IPv4: static routing, RIP, OSPF, BGP, and IS-IS

IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and ACL6

Working Mode and Availability

Transparent, routing, or hybrid working mode and High Availability (HA), including the Active-Active and Active-Standby mode

Intelligent Management

Evaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management.

Provides a global configuration view and integrated policy management. The configurations can be completed in one page.

Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL.

Our Trusted Clientele Worldwide
Esr-Connect
Johnson-and-Johnson
Exon
Novartis
Siemens-Healthineers
Sheraton
Sk-Telecom
ASDA
DHL
UPS
Lezzat-ltd
Electrotechnical-certification-scheme
WHY ORM SYSTEMS
why orm system image
why orm system image
Technical Support

ORM Systems offers reliable and scalable renowned products that allow seamless expansion to performance and adaptability to network enterprises. Our professional team of highly skilled engineers provides 360 technical support to help you with presale and after-sales journeys to enable customers with features and capabilities of the products.

We strive to deliver a seamless experience that guarantees complete satisfaction along with guidance and support in service settings to promptly resolve issues.

Standard Services
Standard Services image
Standard Services image
Get Quote
Get a free quote!
× Thank you! your form has been submitted successfully. Our expert will be in touch with you shortly.
×
ORM Registered Companies