Review TP-Link VIGI C540-4G กล้องใส่ SIM แบบ Outdoor รองรับการดู Video ผ่าน Cloud, Events Detection ได้หลายรูปแบบ
- ใหม่
Review TP-Link VIGI C540-4G กล้องใส่ SIM แบบ Outdoor รองรับการดู Video ผ่าน Cloud, Events Detection ได้หลายรูปแบบ
Ruijie RG-WALL 1600-Z5100-S Next-Generation Z Series Firewall รองรับ Intrusion Prevention, Antivirus, Port Scan, Traffic Learning, Application Control, DoS/DDoS attacks.
ตัวแทนจำหน่าย Ruijie อย่างเป็นทางการ สอบถามราคาส่วนลดพิเศษ
Support / ติดตั้งด้วยทีมงาน Certificate
สอบถามรายละเอียดสินค้าเพิ่มเติม LINE: @sysnet
Click ขอใบเสนอราคา
RG-WALL 1600-Z5100-S Ruijie Cloud-Managed Firewall Datasheet
Ruijie RG-WALL 1600-Z5100-S Cloud-Managed Firewall Hardware Installation and Reference Guide
Ruijie RG-WALL 1600-Z-S Series Cloud-Managed Firewalls Cookbook
RG-WALL 1600-Z-S Cloud-Managed Firewall IPsec VPN Typical Configuration Examples
Ruijie RG-WALL 1600-Z-S Cloud-Managed Firewall NAT Typical Configuration Examples
รองรับ Intrusion Prevention, Antivirus, Port Scan, Traffic Learning, Application Control, DoS/DDoS attacks รองรับ HDD 1TB สำหรับเก็บ Log.
Ruijie RG-WALL 1600-Z5100-S Product Specification |
|
Overview |
Ruijie RG-WALL 1600-Z5100-S Next-Generation Z Series Firewall รองรับ Intrusion Prevention, Antivirus, Port Scan, Traffic Learning, Application Control, DoS/DDoS attacks. |
System Performance and Capacity |
|
Firewall throughput of IPv4 packets (1518-byte UDP packets)4 |
15 Gbps |
Firewall throughput (packets per second) |
2.3 Mpps |
Concurrent sessions (TCP) |
1000000 |
New sessions/second (TCP) |
134000 |
Firewall policies |
4000 |
SSL VPN throughput (1392-byte) |
3 Gbps |
Concurrent SSL VPN users (recommended maximum, tunnel mode) |
1000 |
Application control throughput (HTTP 64K) 2 |
10 Gbps |
IPsec VPN throughput (512-byte) |
4 Gbps |
Gateway-to-Gateway IPsec VPN Tunnels |
1000 |
Dimensions and Weight |
|
Product dimensions (W x D x H) |
440 mm x 300 mm x 43.6 mm (17.32 in. x 11.81 in. x 1.72 in.) |
Shipping dimensions (W x D x H) |
545 mm x 450 mm x 130 mm (21.46 in. x 17.72 in. x 5.12 in.) |
Product weight |
4.44 kg (9.79 lbs) |
Shipping weight |
5.7 kg (12.57 lbs) |
Form factor |
1 RU rack |
Port Specifications |
|
Fixed service port |
8 x 10/100/1000BASE-T ports |
Fixed management port |
1 x RJ45 MGMT port (reusing Ge0/0) |
USB port |
2 x USB 2.0 ports |
Storage |
|
Hard disk |
No hard disk for factory delivery. A 1 TB SATA hard drive can be added. |
Power Supply and Consumption |
|
Power supply |
2 x pluggable power modules (one power module for factory delivery) l Rated input voltage: 100-240 V; 50-60 Hz l Rated input current: 2 A (maximum) |
Max. Power Consumption |
< 60 W |
Environment and Reliability |
|
Operating temperature |
0°C to 45°C (32°F to 113°F) |
Storage temperature |
-40°C to +70°C (-40°F to +158°F) |
Operating humidity |
40% RH to 65% RH (non-condensing) |
Storage humidity |
10% RH to 90% RH (non-condensing) |
Noise level |
36 dB |
Operating altitude |
0-5000 m (0-16404 ft.) |
Compliance |
EMC SZEM2404002506ATV LVD SZES2404002242AT |
Network |
|
Physical interface |
Configuring interfaces as LAN/WAN interfaces; three modes for WAN interfaces: PPPoE, DHCP, and static IP; configuring the routing, transparent, or bypass mode for interfaces |
Sub-interface |
Configuring sub-interfaces and VLAN IDs |
Bridge interface |
Configuring interfaces in transparent mode as bridge interfaces |
Aggregate interface |
Configuring aggregate interfaces |
Routing |
IPv4/IPv6 static and dynamic routing, routing policy, Policy-based Routing (PBR), ISP address library-based routing, application-based routing, and egress load balancing |
DHCP server |
DHCP server functions |
DNS server |
Configuring DNS addresses for devices |
DDNS |
Multiple DDNS service providers supported |
Link detection |
Link detection and link detection logs |
VPN |
SSL VPN and IPsec VPN |
VRRP |
VRRP functions |
Object |
|
Address and address group |
Configuring IPv4/IPv6 address objects in IP address/range format |
Zone |
Configuring security zones |
Application and application group |
Configuring application types in application/application group mode |
Service and service group |
Configuring service objects; common default port services supported |
Time plan |
Configuring time objects; one-off time plans and cyclic time plans supported |
ISP address library |
Default ISP address libraries: China Telecom (CHN), China Mobile (CHN), China Unicom (CHN), CERNET (CHN), and Beijing Teletron (CHN); customizing, importing, and exporting ISP address libraries |
Virus protection template |
Configuring content object templates; antivirus (AV) templates supported; configuring quick scan or deep scan; configuring templates based on protocols and directions; setting excluded viruses |
Intrusion prevention template |
Configuring content object templates; predefined Intrusion Prevention System (IPS) templates supported; customizing IPS templates; configuring rule filters based on objects, severity, protocols, and threat types; setting excluded rules |
File filtering |
Configuring content object templates; file filter templates (filtering by file type) supported |
URL filtering |
URL filtering |
SSL proxy certificate |
Adding, importing, deleting, viewing, and downloading SSL proxy certificates; configuring a global SSL proxy certificate |
Server certificate |
Importing, deleting, viewing, and downloading server certificates |
Security rule base |
Viewing default security rules in the IPS security library |
Content identification |
URL category and keyword configuration |
User authentication |
User management, user import, authentication server configuration, real-name user information synchronization, and authentication policy configuration |
Policy |
|
Traffic learning |
Traffic learning to record destination IP addresses and port numbers as well as abnormal traffic; exporting traffic learning logs |
Network address translation (NAT) |
NAT; configuring NAT policies; importing NAT policies in a batch; common NAT application-level gateway (ALG) services; server port mapping; viewing NAT address pool status |
Security policy |
Configuring security policies; customizing policies based on parameters including objects, contents, and zones; viewing the policy list; importing security policies in a batch |
Policy simulation |
Simulating policy execution in the simulation space to check whether uncertain security policies can achieve expected effects |
Policy configuration wizard |
Security policy configuration wizard for conducting port scan, performing configurations, testing configurations, and other steps to generate security policies |
Policy optimization |
Sorting out configured security policies and analyzing policies to identify redundant, expired, and conflicting policies |
Policy lifecycle |
Full lifecycle display of security policies, including detailed records of policy changes |
Port scan |
Port scan of configured IP ranges for all ports or selected ports; policy creation prompt for scan results |
DoS/DDoS attack defense |
Different DDoS attack defense policies in security defense |
ARP attack defense |
Preventing ARP attacks including ARP spoofing and ARP flooding in security defense |
Local defense |
Configuring local defense policies in security defense |
Threat intelligence |
Enabling or disabling threat intelligence; customizing threat intelligence; managing excluded threats |
Blocklist and allowlist |
Configuring global blocklists and allowlists |
SSL proxy policy |
Configuring SSL proxy policies; customizing policies based on parameters including objects, contents, and zones; viewing the policy list |
SSL proxy template |
Configuring SSL proxy templates; setting the template type to protecting client or server |
Allowlist |
Configuring domain name allowlists and application allowlists |
Behavior analysis |
Configuring analysis policies, templates, and allowlists |
System |
|
Simple Network Management Protocol (SNMP) |
Connecting to third-party platforms for management through SNMPv1/v2/v3 |
Patch installation |
Downloading and installing patches for upgrade |
Cloud management platform |
Enabling or disabling unified management on the cloud management platform; log upload to the cloud |
One-click collection |
Collecting fault information with one click |
Device health |
Device health diagnosis |
Service diagnosis |
Service continuity diagnosis |
System upgrade |
System upgrade and rollback |
Database backup |
System database backup and restoration |
Factory settings restoration |
Restoring factory settings on the web UI |
รับประกัน |
3 ปี |
ยังไม่มีการ review กรุณาเขียน review
ไม่มีคำถามที่ใช้ได้ ถามคำถามของคุณ
check_circle
check_circle