Sign In | Join Free | My insurersguide.com |
|
Categories | Huawei Core Network |
---|---|
Products Status: | Stock |
Type: | Wired |
VPN Support: | Yes |
Throughput: | 1Gbps |
Simultaneous Sessions: | 750000 |
Certification: | CE FCC RoHS |
Brand Name: | Huawei |
Model Number: | USG6000v |
Place of Origin: | China |
Packaging Details: | Export carton package |
Port: | SHENZHEN |
Supply Ability: | 200 Piece/Pieces per Week |
Price: | Negotiable |
MOQ: | Negotiable |
Delivery Time: | 7-15 days |
Payment Terms: | L/C, D/A, D/P, T/T, Western Union, MoneyGram |
Company Info. |
Uonel Co.Limtied |
View Contact Details |
Product List |
Huawei USG6000V (Universal Service Gateway) is based on NFV virtualization architecture as an integrated services gateway to provide high-performance data forwarding capabilities, support for multi-tenancy, and an extensive network of value-added service capabilities, such as router, FW, VPN, IPS, AV , LB, etc., according to the networked business needs, on-demand usage, and flexibility of deployment.
Huawei USG6000V | ||||
Model | USG6000V1 | USG6000V2 | USG6000V4 | USG6000V8 |
VCPU | 1 | 2 | 4 | 8 |
Functions | ||||
User Bandwidth Management and QoS Optimization | Manages each user’s/IP’s use of bandwidth to ensure high quality for critical business and key user Web experience. Control methods include: limiting the maximum bandwidth or guaranteeing minimum bandwidth, modifying the application forwarding priority, application-based policy routing. | |||
Intelligent Management | Uses pre-defined templates for common attack defense scenarios to rapidly deploy security policies, reducing learning costs. Automatically evaluates risks in security policies and intelligently provides optimization suggestions. Detects policy conflicts and redundancy to identify redundant policies and policies that have not been used for a long time. This implementation effectively controls the policy quantity. | |||
Application Identification and Control | Recognizes 6,000+ applications and access control accuracy to applications, such as distinguishing WEIXIN words and voice. | |||
User Authentication | Supports multiple user authentication methods, including local authentication, RADIUS, Hwtacacs, SecureID, AD, CA, LDAP, EndPoint Security, and more. | |||
Rich Reporting | Visualization of multi-dimensional report rendering and support for multi-dimensional user, application, content, time, traffic, threats, and URL. | |||
Routing Features | Fully supports IPV4/IPV6 under multiple routing protocols such as RIP, OSPF, BGP, IS-IS, etc. | |||
Secure Virtualization | Supports virtualization of multiple types of security services, including firewall, intrusion prevention, antivirus, and VPN services. Users can enjoy isolated and tailor-made management on one physical device. | |||
Deployment and Reliability | Supports active/active, active/standby HA features. |
![]() |