性能
散热 |
1730 BTU/h |
并发连接 |
28000 |
内置处理器 |
Y |
数据传输
虚拟专用网通过 |
17000 Mbit/s |
IPS / IDS的吞吐量 |
5700 Mbit/s |
防火墙通过 |
23600 Mbit/s |
每秒最大防火墙连接 |
190000 |
存储介质
硬盘容量 |
500 GB |
安装的硬盘驱动器的数量 |
2 |
总存储容量 |
1000 GB |
RAID支持 |
Y |
存储介质类型 |
HDD |
另外
以太网路(RJ-45)连接接口数量 |
2 |
连接方式 |
Wired |
13500, 2U, Next Generation Threat Extraction, Lifecycle Management Service
Data centers and large enterprises need full-featured, scalable security performance that administrators can manage with ease. The Check Point 13000 Appliances are designed from the ground up for high data center cyber-security performance. Its modular architecture fits easily into complex environments, and it offers a low total cost of ownership.
Superior security and performance
Get maximum availability of business-critical applications.
- Up to 23.6 Gbps or 27.2 Gbps of firewall throughput
- Up to 5.7 Gbps or 6.4 Gbps of IPS throughput
- Comes in compact 2-rack unit chassis
- Comes with acceleration and clustering technologies
Unified and secure operating system
Check Point GAiA is the next-generation secure operating system for all Check Point appliances, open servers and virtual gateways. GAiA delivers maximum management efficiency and robust security performance.
- Improved appliance connection capacity
- Support for IPv4 and IPv6 networks utilizing Check Point Acceleration and Clustering technology
- Dynamic routing protocols such as RIP, OSPF, BGP, PIM and IGMP
- Role-based administrative access for greater segmentation of duties
- Automatic software updates
- Intuitive and feature-rich web interface
Reliability and high serviceability
Meet the uncompromising high availability standards of modern data centers; the 13000 Appliances are designed to be highly serviceable, even when deployed in customer networks.
Hot-swappable redundant power supplies, hard disk drives and fans
An advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location
Prevent unknown threats
Check Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats.