fbpx

Search Results for "firewall"

  • DELL PowerEdge M630 Server

    Condition : Used/Refurbished

    • Product Code: M630
    • Processors: 2 x Intel Xeon E5-2620 2.3GHz (8-4MB)
    • Processor Family: Intel Xeon E5-2600 v3 and E5-2600 v4 product family
    • Internal Interconnect: Intel QuickPath Interconnect (QPI) with speeds of 6.4 GT/s, 8.0 GT/s, and 9.6 GT/s
    • Cache: 2.5MB per core
    • Core Options: Available options for the number of cores are 4, 6, 8, 10, 12, 16, 18, 22
  • DELL PowerEdge M620 Server

    Condition : Used/Refurbished

    • Product Code: M620
    • Processors: 2 x Intel Xeon E5-2609 2.4GHz (8-4MB)
    • Compatible Enclosures: Dell PowerEdge M1000e
    • Processors: Supports up to 2x E5-2600 v2 Series Processors
    • Memory: Up to 768GB PC3-10600R DDR3 ECC Registered Memory (24 DIMM Slots), PC3-12800R, PC3-14900R; Up to 96GB PC3-12800E
    • Hard Drives: Supports up to 2x 2.5″ SAS or SATA hard drives (*Requires SAS backplane for SAS drives)
  • DELL PowerEdge M610 Server

    Condition : Used/Refurbished

    • Product Code: M610
    • Processor: Intel Xeon X5550 (2 x 2.6GHz)
    • Processors: Supports up to 2x 5500 or 5600 Series Intel Xeon Processors
    • Memory: Up to 192GB PC3-10600R DDR3 ECC Registered Memory (12 DIMM Slots)
    • Hard Drives: Supports up to 2x 2.5″ SAS hard drives
    • RAID Options: Multiple RAID controller options available, including PERC H200, PERC H700, SAS 6/iR, PERC 6/i with 256MB cache
  • DELL PowerEdge M600 Blade Server

    Condition : Used/Refurbished

    • Product Code: M600
    • Memory: Supports up to 64 GB of RAM.
    • Processors: Capable of accommodating Dual-Core Intel Xeon 5000 series processors.
    • Hard Drives: Provides flexibility with options for two 2.5″ Hot Swap SAS or SATA drive trays, or a single Solid State Drive (SSD), such as the 2.5″ 500GB SATA.
  • CISCO 3415 Network Server

    Condition : Used/Refurbished

    • Firewall Functionality: Provides essential firewall capabilities, including stateful packet inspection, access control lists (ACLs), and NAT (Network Address Translation).
    • Intrusion Prevention System (IPS): Offers intrusion detection and prevention capabilities to identify and mitigate network threats and vulnerabilities.
    • Application Visibility and Control: Allows you to identify and control applications running on your network, enabling you to enforce policies based on application types.
    • URL Filtering: Provides web filtering capabilities to block access to malicious or undesirable websites and content categories.
    • Advanced Malware Protection: Incorporates threat intelligence and sandboxing to detect and prevent advanced malware and zero-day threats.
    • Secure Sockets Layer (SSL) Inspection: Decrypts and inspects encrypted SSL/TLS traffic to detect and prevent threats hidden within encrypted connections.
    • Virtual Private Network (VPN): Offers VPN functionality, including site-to-site VPN and remote access VPN (SSL and IPsec), for secure communication over the internet.
    • Identity-Based Policies: Allows you to create policies based on user identities, not just IP addresses, improving security and access control.
    • High Availability: Supports high availability configurations to ensure uninterrupted security services.
    • Scalability: Designed to scale to meet the performance and throughput requirements of various network sizes and traffic loads.
    • Threat Intelligence Integration: Integrates with threat intelligence feeds to provide up-to-date threat information and protection.
    • Centralized Management: Can be managed centrally using Cisco’s Firepower Management Center (FMC) for simplified policy management and reporting.
    • Flexible Deployment Options: Can be deployed as a physical appliance or as a virtual appliance in virtualized environments.
    • Multi-Context Mode: Allows you to create multiple security contexts for different departments or customers on a single device.
    • Logging and Reporting: Provides detailed logging and reporting capabilities for security events, allowing for forensic analysis and compliance reporting.

Main Menu

Live Chat
1
Live Chat
Whatsapp
Hello
How can i help you?