Grand opening, up to 15% off all items. Only 3 days left
  • Contact Us
  • Order Tracking
  • hotline

    920012778

VAT Number: 300050889300003

Sale Off

USG6680-BDL-AC

Brands: Huawei
(0 reviews)
157028.62 174476.25 10% Off

Model: USG6680-BDL-AC 02358057 Huawei USG6600 Next-Generation Firewall

Detail: USG6680 AC Host(16GE(RJ45)+8GE(SFP)+4*10GE(SFP+),16G Memory,2 AC Power,with IPS-AV-URL Function Group Update Service Subscribe 12 Months)

Huawei USG6680 next-generation firewall is designed for small data centers and large or medium-sized enterprises. The USG6680-DL-AC offers 16GE (RJ-45) ports, 8GE SFP ports, four 10GE (SFP+) ports, 16GB memory and 2 AC power supply. It includes IPS-AV-URL Function Group Update Service Subscribe 12 Months.

Quick Spec

Figure 1 shows the appearance of Huawei USG6680-BDL-AC firewall.

USG6680-BDL-AC Appearance

Table 1 shows the Quick Specs.

Product Code

USG6680-BDL-A

Bundle Function

IPS-AV-URL Function Group Update Service Subscribe 12 Months

Fixed Interfaces

4 x 10 GE (SFP+) + 16 x GE (RJ45) + 8 x GE (SFP)

Expansion slot

5 x WSIC

Firewall Throughput

(Packets Per Second)

12 Mpps

IPv4 Firewall Throughput

(1518/512/64-byte, UDP)

40 Gbit/s, 35 Gbit/s, 8 Gbit/s

IPv6 Firewall Throughput

(1518/512/84-byte, UDP)

40 Gbit/s, 35 Gbit/s, 8 Gbit/s

Height

3U

Dimensions (W x D x H)

130.5 mm x 442 mm x 470 mm

Weight (full configuration)

26 kg

Product Details

Figure 2 shows the front panel of Huawei USG6680-BDL-AC firewall.

Note:

16 x GE (RJ45) and 4 x 10 GE (SFP+) Ports

8 x GE (SFP) Ports

Expansions slots

Figure 3 shows the back panel of Huawei USG6680-BDL-AC firewall.

USG6680-BDL-AC Back Panel

Note:

Power Modules

SPUA

SPUB

Fan Module

The Modules, Cards, Licenses

Table 2 shows the recommended elements for the Huawei USG6680-BDL-AC firewall.

Category

Model

Description

Business Module Group

WSIC-8GE

Huawei WSIC-8GE SVN5800 Secure Access Gateways 8GE Electric Ports Interface Card

WSIC-8GEF

Huawei WSIC-8GEF 8GE Optical Ports Interface Card for USG6600 Next-Generation Firewall.

Hard disk Group

SM-HDD-SAS300G-A

Huawei 300GB 10K RPM SAS Hard Disk Unit SM-HDD-SAS300G-A

Function License

LIC-VSYS-10-USG6000

Huawei LIC-VSYS-10-USG6000 Quantity of Virtual Firewall (10 Vsys) Software/License

LIC-SSL-100-USG6000

Huawei LIC-SSL-100-USG6000 Software/License: Quantity of SSL VPN Concurrent Users License (100 Users)

Basic License

LIC-CONTENT

Huawei LIC-CONTENT Content Filtering Function Software/License

Compare to Similar Items

Table 3 shows the comparison of Huawei USG6680-AC and USG6680-BDL-AC firewalls.

Models

USG6680-AC

USG6680-BDL-AC

Bundle Function

None

IPS-AV-URL Function Group Update Service Subscribe 12 Months

Fixed Interfaces

4 x 10 GE (SFP+) + 16 x GE (RJ45) + 8 x GE (SFP)

4 x 10 GE (SFP+) + 16 x GE (RJ45) + 8 x GE (SFP)

Expansion slot

5 x WSIC

5 x WSIC

Get more information

Do you have any question about the Huawei USG6680-BDL-AC firewall?

Contact us now via Live Chat or [email protected].

USG6680-BDL-AC Specification

USG6680-BDL-AC Specification

Bundle Function

IPS-AV-URL Function Group Update Service Subscribe 12 Months

Fixed port

4 x 10 GE + 16 GE + 8 SFP

Height

3 U

Dimensions (H x W x D)

130.5 mm x 442 mm x 415 mm

Weight (full configuration)

24 kg

HDD

Optional. Supports 300 GB hard disks (RAID1 and hot swappable).

Redundant Power Supply

Standard configuration

AC Power Supply

100V to 240V

Maximum Power

700W

Features

NAT, application-specific access control, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam

Functions

Context Awareness

*Application, Content, Time, User, Attack, Location (ACTUAL)–based awareness capabilities

*Eight authentication methods (local, RADIUS, HWTACACS, SecureID, AD, CA, LDAP, and Endpoint Security)

Application Security

*Fine-grained identification of over 6000 application protocols, application-specific action, and online update of protocol databases

*Combination of application identification and virus scanning to recognize the viruses (more than 5 millions), Trojan horses, and malware hidden in applications

*Combination of application identification and content detection to identify file types and sensitive information to prevent information leaks

Intrusion Prevention

*Provides over 5,000 signatures for attack identification.

*Provides protocol identification to defend against abnormal protocol behaviors.

*Supports user-defined IPS signatures.

Web Security

*Cloud-based URL filtering with a URL category database that contains over 85 million URLs in over 80 categories

*Defense against web application attacks, such as cross-site scripting and SQL injection attacks

HTTP/HTTPS/FTP-based content awareness to defend against web viruses

*URL blacklist and whitelist and keyword filtering

Email Security

*Real-time anti-spam to detect and filter out phishing emails

*Local whitelist and blacklist, remote real-time blacklist, content filtering, keyword filtering, and mail filtering by attachment type, size, and quantity

*Virus scanning and notification for POP3/SMTP/IMAP email attachments

Data Security

*Data leak prevention based on content awareness

*File reassembly and data filtering for more than 30 file types (including Word, Excel, PPT, and PDF), and file blocking for more than 120 file types

Security Virtualization

Virtualization of security features, forwarding statistics, users, management operations, views, and resources (such as bandwidths and sessions)

Network Security

*Defense against more than 10 types of DDoS attacks, such as the SYN flood and UDP flood attacks

*VPN technologies: IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, and GRE

Routing

IPv4: static routing, RIP, OSPF, BGP, and IS-IS

IPv6: RIPng, OSPFv3, BGP4+, IPv6 IS-IS, IPv6 RD, and ACL6

Working Mode and Availability

Transparent, routing, or hybrid working mode and High Availability (HA), including the Active-Active and Active-Standby mode

Intelligent Management

*Evaluates the network risks based on the passed traffic and intelligently generates policies based on the evaluation to automatically optimize security policies. Supports policy matching ratio analysis and the detection of conflict and redundant policies to remove them, simplifying policy management.

*Provides a global configuration view and integrated policy management. The configurations can be completed in one page.

*Provides visualized and multi-dimensional report display by user, application, content, time, traffic, threat, and URL.

Customer questions & answers

Customer reviews

0 out of 5
5 star
0%
4 star
0%
3 star
0%
2 star
0%
1 star
0%

No reviews yet

Related products