New Products ON China Market Hillstone Firewall Hardware SG-6000-T5060
Negotiable /Set
Min.Order:1 Set
Shanghai Chu Cheng Information Technology Co., Ltd.
Hillstone Security System Application-Aware Firewall Hardware SG-6000-T5060
Hillstone Security Next-Generation iMVP Firewall Hardware SG-6000-T5060
Hillstone Security Next-Generation iMVP Firewall Hardware SG-6000-T5860
Hillstone Security Application-Aware Firewall Hardware SG-6000-T5860
Hillstone Application-Aware Firewall Hardware SG-6000-T5860 Made in China
New Products ON China Market Hillstone Firewall Hardware SG-6000-T5060
Advanced persistent threats, zero-day exploits, and polymorphic attacks routinely bypass traditional signature-based security. Hillstone’s Intelligent Next-Generation Firewall is an application-aware firewall that continuously monitorsthe network and exposes elusive malware at every stage of the attack. It provides real-time detection and reporting that provide multiple opportunities to stop an attack. It also provides real-time insight into network operations and overall network health. Hillstone’s Intelligent Next-Generation Firewallis designed for mid to large-sized enterprises. It enhances enterprise security, continuity, and visibility while reducing operational cost.
Behavior Reputation Index for Proactive Threat Protection
Network Health Index for Security Risk Management
Hillstone’s patented Network Health Index quantifies the health status of your network. It monitors threat information, application utilization, Internet access, device utilization, network nodes and associated services to calculate the overall health of the network. It provides a multi-dimensional real-time assessment of your network’ s availability, risk factors, and developing threats. An intuitive dashboard allows IT to make timely security policy adjustments to mitigate threats and maintain network uptime.
Superior User Experience
Hillstone’ s Intelligent Next-Generation Firewall provides visibility and control of: network applications, network traffic, users and groups, bandwidth utilization, network health, malicious activity, abnormal behavior, risk factors, developing threats and many more network and security attributes. It provides extensive tools for monitoring, reporting, logging, provisioning, and operations management.
Intelligent Multi-Vector Processor Architecture (iMVP)
Hillstone’ s Intelligent Multi-Vector Processor Architecture (iMVP) employs multi-dimensional parallel processing via a multi-core security processor running in parallel with Intel x86 processors. Multi-core processors handle data forwarding, next generation security and related functions. Intel x86 processors handle data mining and correlation for intelligent analysis and presentation of Behavior Risk and Network Health indices. The system delivers superior performance for data transfer, threat protection, data analysis, device management and visibility into security anomalies.
Network
•Supports three modes: transparent, routing and hybrid
•Supports source routing, destination routing, source interface routing, ISP routing and policy routing
•Supports Static,RIP,RIPv2,OSPF,BGP,
Firewall
• Supports NAT and PAT
• Supports VLAN, Vswitch, Vrouter and Virtual-Wire
• Security policies based on security zone,IP address,user,groups,ports, service, applications, objects and time
Application Identification and User Identification
• Application identification based on signature,behavior and associated information
• Application signature database can be updated online in real-time
• Supports user identification through Local,AD,LDAP and Radius authentication servers
• Application identification enhanced by Hillstone Stone Cloud services
• User visibility and management based on user role and organization
• Single Sign-on
Network Health Index (NHI)
Actively monitors CPU utilization, memory utilization, storage,chassis temperature, CPU temperature, new session per second, concurrent sessions, interface traffic, SNAT port utilization and other resources
Actively monitor the connectivity and availability of service links and nodes
Actively monitor key services, e.g., Web, Mail, FTP, LDAP, DNS, etc.
Threat Prevention
• Network layer attack prevention
• Application layer attack prevention
• Malware download prevention
• Trojan prevention
• Web attack prevention
• Malicious web site access control
VPN
• Supports standard IPSec VPN protocols
• Supports SSL VPN (Optional USB-key)
• Creative PnP VPN®(plug-and-play VPN)
• Supports L2TP over IPSec VPN
• Supports IOS and Android SSL VPN
Load Balancing
• Supports bidirectional load balancing
• Supports proximity detection and SmartDNS
Intelligent Quality of Service (iQoS)
• Tunnel allocation based on security domain, interface,address, user/user group, service/Srvice group, application/application group, TOS, VLAN
• Supports embedded two layers and eight tunnels
• Supports maximum bandwidth cap and minimum bandwidth guarantee on multi-level tunnels or on a per IP/user basis
• Supports differentiated service according to priority
• Flexible allocation of remaining bandwidth according to priority
Analysis and Diagnostic
• Multi-vector full-scale threat detection based on security domain, interface, service, application, user and timeframe
• Package path detection tool graphically depicts packet flow in every module, based on inline inspection, simulated inspection and import detection
• Supports inline packet capture
Visibility
• Real-time and historical views of CPU, memory, traffic,sessions and other system resources
• Real-time user traffic, concurrent sessions and new sessions displayed in pie chart, histogram or trend line
• Business link connectivity and service availability
• Real-time tunnel traffic in pie chart, histogram or trend line
• Real-time warning information
• Historical data comparison and analysis based on user, application and other dimensions
• Real-time visibility of known and unknown threats
• Supports geographic location of threats
• Real-time monitor and chart visibility for risky host and server
• Host and server behavior baseline monitor
Log Auditing
• Logging and auditing of system events, warnings, network traffic and configuration
• Logs may be exported to the console, log server, email, files or terminals
Reporting
• Report on demand or generate periodic reports by date, week and month
• Supports summarized reports of application, traffic, threat and behavior
• Support HTML and PDF report format
• Upload reports automatically or by email and FTP
Shanghai Chucheng Information Technology Co., Ltd. is mainly in the service of broadband communications and information technology industry.
We are now the agent of well known international brands such as HUAWEI, ZTE, CISCO, ZYXEL, Grandstream, Hillstone etc. Research and development, production, sales, service and so on combined on the high-tech enterprises company.Our main products include optical signal transmission and access, signal transmission and access, photoelectric signal conversion and photoelectric signal amplification, etc.Our mainly customers include each the national big telecommunication operators,as well as radio and television, electric power, mining and other private network users;and established long-term friendly relations of cooperation with them.
In addition, we have been expand foreign markets actively,the products are exported to Europe, America,southeast Asia, the Middle East and neighbours such as Japan and Korea;and many foreign customers consistent high praise.We will feedback from all walks of life partners with high quality products, considerate service in the process of constantly improve themselves, and then get a win-win situation.
Any questions above information can contact me !My Pleasure!
MY SKYPE:lemon lemon