HUAWEI HiSecEngine USG6500E Series Firewalls (Fixed-Configuration) Datasheet (00000002)
HUAWEI HiSecEngine USG6500E Series Firewalls (Fixed-Configuration) Datasheet (00000002)
HUAWEI HiSecEngine USG6500E Series Firewalls (Fixed-Configuration) Datasheet (00000002)
Firewalls (Fixed-Configuration)
With the continuous digitalization and cloudification of enterprise services, networks play an
important role in enterprise operations, and must be protected. Network attackers use various
methods, such as identity spoofing, website Trojan horses, and malware, to initiate network
penetration and attacks, affecting the normal use of enterprise networks.
Deploying firewalls on network borders is a common way to protect enterprise network
security. However, firewalls can only analyze and block threats based on signatures. This
method cannot effectively handle unknown threats and may deteriorate device performance.
This single-point and passive method does not pre-empt or effectively defend against unknown
threat attacks. Threats hidden in encrypted traffic in particular cannot be effectively identified
without breaching user privacy.
Huawei's next-generation firewalls provide the latest capabilities and work with other security
devices to proactively defend against network threats, enhance border detection capabilities,
effectively defend against advanced threats, and resolve performance deterioration problems.
The product provides pattern matching and encryption/decryption service processing
acceleration functions, which greatly improve the firewall ability to process content security
detection and IPSec services.
Product Appearances
High performance
• Enables pattern matching and accelerates encryption/decryption, improving the performance for
processing IPS, antivirus, and IPSec services.
Deployment
Cloud-based management
• Firewalls can proactively register with and be quickly incorporated into the cloud-based
management platform to implement quick device deployment without manual attendance.
• Remote service configuration management, device monitoring, and fault management are used
to implement cloud-based management of mass devices and simplify O&M.
Internet
......
Enterprise border protection
• Firewalls are deployed at the network border. The built-in traffic probe can extract packets of
encrypted traffic to monitor threats in encrypted traffic in real time.
• The deception function is enabled on the firewalls to proactively respond to malicious scanning
behavior, protecting enterprises against threats in real time.
• The policy control, data filtering, and audit functions of the firewalls are used to monitor social
network applications to prevent data breach and protect enterprise networks.
Software Features
Feature Description
Identifies over 6000 applications and supports the access control granularity
Application identification down to application functions; combines application identification with intrusion
and control detection, antivirus, and data filtering, improving detection performance and
accuracy.
Cloud application security Controls enterprise cloud applications in a refined and differentiated manner to
awareness meet enterprises' requirements for cloud application management.
Rapidly detects over 5 million types of viruses based on the daily-updated virus
Antivirus
signature database.
Data leak prevention Inspects files to identify the file types, such as WORD, EXCEL, POWERPOINT, and
(DLP) PDF, based on file content, and filters the file content.
Provides a URL category database with over 120 million URLs and accelerates access
to specific categories of websites, improving access experience of high-priority websites.
Supports DNS filtering, in which accessed web pages are filtered based on domain
URL filtering
names.
Supports the SafeSearch function to filter resources of search engines, such as
Google, to guarantee access to only healthy network resources.
Supports server load balancing and link load balancing, fully utilizing existing
Load balancing
network resources.
Supports multiple highly available VPN features, such as IPSec VPN, SSL VPN,
VPN encryption L2TP VPN, MPLS VPN, and GRE, and provides the Huawei-proprietary VPN client
SecoClient for SSL VPN, L2TP VPN, and L2TP over IPSec VPN remote access.
Dynamic smart VPN (DSVPN) establishes VPN tunnels between branches whose
DSVPN public addresses are dynamically changed, reducing the networking and O&M
costs of the branches.
Defends against more than 10 types of common DDoS attacks, including SYN
Anti-DDoS
flood and UDP flood attacks.
Manages and controls traffic based on VLAN IDs, quintuples, security zones,
regions, applications, URL categories, and time ranges, and implements integrated
content security detection.
Security policy
Provides predefined common-scenario defense templates to facilitate security
management
policy deployment.
Provides security policy management solutions in partnership with FireMon and
AlgoSec to reduce O&M costs and potential faults.
Supports multiple types of routing protocols and features, such as RIP, OSPF, BGP,
Routing
IS-IS, RIPng, OSPFv3, BGP4+, and IPv6 IS-IS.
Deployment and Supports transparent, routing, and hybrid working modes and high availability (HA),
reliability including the Active/Active and Active/Standby modes.
Specifications
System Performance and Capacity
Firewall Throughput1
2/2/2 Gbit/s 4/4/3.6 Gbit/s 6/6/3.6 Gbit/s 9/8/4 Gbit/s
(1518/512/64-byte, UDP)
FW + SA + IPS Throughput2 1.5 Gbit/s 2.1 Gbit/s 2.2 Gbit/s 2.2 Gbit/s
2
FW + SA + IPS + Antivirus Throughput 1.5 Gbit/s 2.0 Gbit/s 2.2 Gbit/s 2.2 Gbit/s
Maximum IPsec VPN Tunnels (GW to GW) 4,000 4,000 4,000 4,000
Maximum IPsec VPN Tunnels (Client to GW) 4,000 4,000 4,000 4,000
SSL Inspection Throughput3 300 Mbit/s 450 Mbit/s 500 Mbit/s 550 Mbit/s
URL Filtering: URLs A database of over 120 million URLs in the cloud
Automated Threat Feedback and IPS Yes, an industry-leading security center from Huawei
Signature Updates (http://sec.huawei.com/sec/web/index.do)
Model USG6525E USG6555E USG6565E USG6585E
1. The performance is tested under ideal conditions based on RFC2544 and RFC3511. The actual result may vary with deployment
environments.
2. The Antivirus, IPS, and SA performance is measured using 100 KB HTTP files.
3. SSL inspection throughput is measured with IPS enabled and HTTPS traffic using TLS v1.2 with AES128-GCM-SHA256.
*SA: indicates service awareness.
Hardware Specifications
Form Factor/Height 1U
Optional, SSD
(M.2) card
External Storage Optional, SSD (M.2) card supported, 240 GB
supported, 64
GB/240 GB
Function License
SSL VPN LIC-USG6KE-SSLVPN-200 Quantity of SSL VPN Concurrent Users (200 Users)
Concurrent Users LIC-USG6KE-SSLVPN-500 Quantity of SSL VPN Concurrent Users (500 Users)
NGFW License
N1 License
Note: Some parts of this table list the sales strategies in different regions. For more information, please contact your Huawei
representative.
GENERAL DISCLAIMER
The information in this document may contain predictive statement including, without limitation, statements regarding the future
financial and operating results, future product portfolios, new technologies, etc. There are a number of factors that could cause
actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore,
such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change
the information at any time without notice.
Copyright © 2020 HUAWEI TECHNOLOGIES CO., LTD. All Rights Reserved.