RG-WALL 1600-Z3200-S, Next-Generation Z Series Firewall

Price:

₨ 96,900.00


RG-WALL 1600-Z3200-S, Next-Generation Z Series Firewall

Port scan + traffic learning, intelligent policy recommendation, simple deployment
Policy execution after simulation, policy optimization anytime
One-click fault locating in the intelligent diagnostic center
Cloud, make your business easy
Suitable for hotels, enterprises, schools, factories, and hospitals for security defense
1 Year Warranty

₨ 96,900.00 96900.0 NPR ₨ 96,900.00

₨ 96,900.00


  • Brand

This combination does not exist.

Add to Cart


100% Original
15KM Free Delivery
Products over 5k

Share :

Product Specification

Fixed 1G Ethernet port8
Fixed 1G SFP port1
Fixed 10G SFP+ port1
Management port1 data multiplex port
Console port1
Warranty period3 years
USB2 x USB 2.0 ports
Hard diskNo hard disk for factory delivery, expansion cards supported
Hard disk expansion card1 TB HDD
Expansion slotNone
Power supply1 for factory delivery
Listing timeMay 2022

Software Specifications

To-do itemsTo-do items on the home page
Security overviewSecurity overview on the home page
Device informationDevice information on the home page
Quick onboardingQuick onboarding solution (network configuration+license activation) in rapid deployment

Monitoring center

Attack statistics displayAttack statistics display on the monitor page
System logLogs related to systems in log monitoring
Security logLogs related to security in log monitoring
Operation logLogs related to user operations on the web UI in log monitoring
Syslog serverSystem logs sent to a third-party server
Session monitoringSession information (new sessions and concurrent sessions) in traffic monitoring
User session count statistics and query
Traffic monitoringTraffic information on different interfaces in traffic monitoring
Traffic information on different applications on the entire network in traffic monitoring
Device health statusDevice health status information (overall score of resources, licenses, and configurations) in device monitoring
Hardware healthHardware information (including CPU, memory, and hard disk information) in device monitoring
Service continuity detection navigationService continuity detection navigation on the web UI
Packet tracingPacket tracing on the web UI
Flow log queryFlow log query on the web UI
Packet obtaining for analysisPacket obtaining for analysis on the web UI

Network

Physical interfaceConfiguring interfaces as LAN/WAN interfaces; three modes for WAN interfaces: PPPoE, DHCP, and static IP modes
Configuring routing or transparent mode for interfaces
Sub-interfaceConfiguring sub-interfaces and VLAN IDs
Bridge interfaceConfiguring interfaces in transparent mode as bridge interfaces
Aggregate interfaceConfiguring aggregate interfaces
Static routeConfiguring IPv4 and IPv6 static routes
PBRConfiguring policy-based routing (PBR)
Routing tableOverall routing information of a device; configuring ISP address library routes
DHCP serverDHCP server; configuring DHCP address pools
Address management listAssigned DHCP address list
DNS serverConfiguring DNS addresses for devices

Object

Address/Address groupConfiguring address objects in IP address/range format
ZoneConfiguring security zones
Application/Application groupConfiguring application types in application/application group format
Service/Service groupConfiguring service objects; common default port services supported
Time planConfiguring time objects; one-off time plans and cyclic time plans supported
ISP address libraryDefault ISP address libraries: China Telecom (CHN), China Mobile (CHN), China Unicom (CHN), CERNET (CHN), and Beijing Teletron (CHN); customizing, importing, and exporting ISP address libraries
Virus protection templateConfiguring content object templates; antivirus (AV) templates supported
Configuring virus protection templates; configuring quick scan or deep scan; configuring templates based on protocols and directions;setting excluded viruses
Intrusion prevention templateConfiguring content object templates; intrusion prevention (IPS) templates supported
Configuring intrusion prevention (IPS) templates; configuring rule filters based on objects, severity, protocols, threat types; setting excluded rules
SSL proxy certificateAdding, importing, deleting, viewing, and downloading SSL proxy certificates; configuring a global SSL proxy certificate
Server certificateImporting, deleting, viewing, and downloading server certificates
Security rule baseViewing default security rules in the IPS library

Policy

Traffic learningTraffic learning to record destination IP addresses and port numbers as well as abnormal traffic
Export of traffic learning logs
NATNAT and NAT policies
Policy importBatch import of NAT policies
ALGCommon NAT ALG services in NAT policy
Server mappingServer port mapping in NAT policy
Address poolNAT address pool status display in NAT policy
Security policyConfiguring security policies; customizing policies based on parameters including objects, contents, and zones; policy list
Batch import of security policies
Simulation policySimulating policy execution in the simulation space to check whether uncertain security policies can achieve expected effects
Policy configuration wizardSecurity policy configuration wizard for conducting port scan, performing configurations, testing configurations, and other steps to generate security policies
Policy optimizationSorting out configured security policies and analyzing policies to identify redundant, expired, and conflicting policies
Policy lifecycleFull lifecycle display of security policies, including detailed records of policy changes
Port scanPort scan of configured IP ranges for all ports or selected ports; policy creation prompt for scan results
DoS/DDoS attack defenseDifferent DDoS attack defense policies in security defense
ARP attack defenseAnti-ARP spoofing, ARP flooding suppression, and other functions in security defense
Local defenseConfiguring local defense policies in security defense
Threat intelligenceEnabling or disabling threat intelligence; customizing threat intelligence; managing excluded threats
Blocklist and allowlistConfiguring global blocklists and allowlists
SSL proxy policyConfiguring SSL proxy policies; customizing policies based on parameters including objects, contents, and zones; policy list
SSL proxy templateConfiguring SSL proxy templates; setting the template type to protecting client or server
AllowlistConfiguring domain name allowlists and application allowlists

System

AdministratorCreating device administrators, including account names, passwords, and description
Administrator roleSetting multiple administrator roles and assigning different permissions
Clock configurationConfiguring system time; NTP service configuration supported
SNMPConnecting to third-party platforms for management through SNMPv1/v2/v3
Service parameterConfiguring service ports for a device, including web (HTTPS), SSH, and other ports
Authorization managementManaging licenses of devices, including license import and activation
Device informationViewing device information, including the product name, SN, and MAC address, version information, running time, and license information
System restartRestarting the system on the web UI
System upgradeUpgrading the system
Patch installationDownloading and installing patches for upgrade
Configuration backupImport and export of devices configurations
Factory settings restorationRestoring factory settings on the web UI
Signature library upgradeAutomatic signature library upgrades based on the latest versions on the cloud
Cloud management platformEnabling or disabling unified management on the cloud management platform
Device bindingAdding devices to the cloud management platform by scanning a QR code
PingPing for troubleshooting
TracertTracert for troubleshooting
Packet obtaining toolTool for obtaining packets and exporting results
One-click collectionCollecting fault information with one click
Device healthDevice health diagnosis
Service diagnosisService continuity diagnosis
Breakdown recordBreakdown information records
Device log retentionDevice log retention
External APIsRESTful APIs for third-party interconnection

Brand Ruijie Reyee