To have a better experience, please upgrade your IE browser.upgrade
National Research and Education Network
Education Cloud Data Center
Over The Top/Multi-Tenant Data Center (OTT/MTDC)
Internet Exchange Point (IXP)
Internet Access Provider (IAP)
Design e simulazioni
Pianificazione e analisi
IoT per il settore petrolio e gas
Oleodotti e gasdotti digitali
Gestione operazioni e HPC
Trasporti pubblici intelligenti
Piattaforma cloud per la vendita al dettaglio
Logistics & Warehousing
Data Center aziendale
Comunicazioni cloud aziendali
Sistema di gestione della rete
Connettività sempre e ovunque
La connettività rende possibile la trasformazione digitale
Il computing AI economico e potente
Soluzioni sicure e resilienti
Leading New ICT
211 aziende Fortune Global 500 hanno scelto Huawei come partner per la trasformazione digitale
Buy from Huawei
Se hai bisogno di avere informazioni sul tuo progetto, invia le tue richieste e ti contatteremo appena possibile.
Se la tua azienda ha firmato un contratto eDeal con Huawei, ti preghiamo di acquistare il prodotto/la soluzione richiesta tramite il link sottostante.
Acquista da un rivenditore
Cerca un rivenditore nelle vicinanze e ottieni informazioni dirette.
Risorse e supporto
Huawei Authorized Learning Partner
Huawei Authorized Information and Network Academy
Huawei USG6700E series next-generation firewalls are designed for next-generation data centers and large enterprise campuses. USG6700E firewalls provide NGFW capabilities and collaborate with other security devices to proactively defend against network threats, enhance border detection capabilities, and resolve performance deterioration problems. It provides pattern matching and encryption/decryption service processing acceleration capabilities, which greatly improve the performance of firewalls and IPSec services.
New dedicated security chip and built-in acceleration engine improve processing performance to double the industry average.
Advanced threat detection based on AI technology associated with the cloud provides accuracy greater than 99%.
High integration doubles the number of interfaces and allows flexible access at a low cost.
|Fixed Interfaces||2 x 100G (QSFP28) + 2 x 40G (QSFP+) + 20 x 10 GE (SFP+) + 2 x 10 GE (SFP+) HA + 1 x USB 3.0|
|Local Storage||Optional, SSD (1 x 2.5-inch) supported, 240 GB/HDD (1 x 2.5-inch) supported, 1 TB|
|Integrated Protection||Provides firewall, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam functions.|
|Application Identification and Control||Identifies more than 6,000 applications with the access control granularity to application functions, for example, distinguishing between WeChat text and voice. Combines application identification with intrusion detection, antivirus, and data filtering, improving detection performance and accuracy.|
|Bandwidth Management||Manages per-user and per-IP bandwidth in addition to identifying service applications to ensure the network access experience of key services and users. Control methods include limiting the maximum bandwidth, ensuring the minimum bandwidth, applying PBR, and changing application forwarding priorities.|
|Intrusion Prevention and Web Protection||Obtains the latest threat information in a timely manner for accurate detection and defense against vulnerability-based attacks. The device can defend against web-specific attacks, including SQL injection and XSS attacks.|
|AAPT||Collaborates with the local or cloud sandbox to detect and block malicious files.
Supports the flow probe information collection function to collect traffic information and send the collected information to the Cybersecurity Intelligence System (CIS) for analysis, evaluation, and identification of threats and APT attacks.
Encrypted traffic does not need to be decrypted. The firewall can work with the CIS to detect threats in encrypted traffic.
The firewall can proactively respond to malicious scanning behavior and work with the CIS to analyze behavior, quickly detect and record malicious behavior, and protect enterprises against threats in real time.
|Cloud Management Mode||Initiates authentication and registration to the cloud management platform to implement plug-and-play and simplify network creation and deployment.
Remote service configuration management, device monitoring, and fault management are used to implement cloud-based management of mass devices.
|Cloud Application Security Awareness||Controls enterprise cloud applications in a refined and differentiated manner to meet enterprises’ requirements for cloud application management.|