Check Point Quantum 28000 Security Gateway in Cary, NC, USA
New
Doubleclick to zoom in
Contact the seller for
additional photos and information.
Specifications
- Condition
- new
- Threat prevention1 (gbps)
- 30
- Ngfw2 (gbps)
- 51.5
- Ips throughput (gbps)
- 52.2
- Firewall throughput (gbps)
- 145
- Firewall 1518b udp (gbps)
- 316.5
- Vpn aes-128 (gbps)
- 49
- Connections per second
- 615,000
- Concurennt connections3
- 10/20/32M
- Highlights
- 2x CPUs, 36 physical cores, 72 virtual cores (total) • 1x 480GB SSD, (2x in Plus package) 3x AC power supplies (DC option) 64, 96 and 128 GB memory options Lights-Out-Management card (optional in Base package) Virtual Systems (base/PLUS/max mem): 125/250/250
- Network expansion slot options (1 of 1 slots open)
- 8x 10/100/1000Base-T RJ45 port card, up to 66 ports 4x 1000Base-F SFP port card, up to 32 ports 4x 10GBase-F SFP+ port card, up to 32 ports 2x 40G QSFP+ port card, up to 16 ports 2x 100/25G QSFP28 port card, up to 16 ports
- First time prevention capabilities
- CPU-level, OS-level and static file analysis File disarm and reconstruction via Threat Extraction Average emulation time for unknown files that require full sandbox evaluation is under 100 seconds Maximal file size for Emulation is 100 MB Emulation OS Support: Windows XP, 7, 8.1, 10
- Applications
- Use 8,000+ pre-defined or customize your own applications Accept, prevent, schedule, and apply traffic-shaping
- Data loss prevention
- Classify 700+ pre-defined data types End user and data owner incident handling
- Dynamic user-based policy
- Integrates with Microsoft AD, LDAP, RADIUS, Cisco pxGrid, Terminal Servers and with 3rd parties via a Web API Enforce consistent policy for local and remote users on Windows, macOS, Linux, Android and Apple iOS platforms
- Network connectivity
- Total physical and virtual (VLAN) interfaces per appliance: 1024/4096 (single gateway/with virtual systems) 802.3ad passive and active link aggregation Layer 2 (transparent) and Layer 3 (routing) mode
- High availability
- Active/Active L2, Active/Passive L2 and L3 Session failover for routing change, device and link failure ClusterXL or VRRP
- Ipv6
- NAT66, NAT64, NAT46 CoreXL, SecureXL, HA with VRRPv3
- Unicast and multicast routing (see sk98226)
- OSPFv2 and v3, BGP, RIP Static routes, Multicast routes Policy-based routing PIM-SM, PIM-SSM, PIM-DM, IGMP v2, and v3
- Single power supply rating
- AC: 850W, DC: 1300W
- Ac power input
- 100 to 240V (47-63Hz), 40~-72VDC
- Power consumption avg/max
- AC359/443W
- Maximum thermal output ac
- 1509 BTU/hr.
- Enclosure
- 3RU
- Dimensions (wxdxh)
- 17.4 x 24 x 5.2 in. (442 x 610 x 132mm)
- Weight
- 46.3 lbs. (21 kg)
- Operating
- 0° to 40°C, humidity 5% to 95%
- Storage
- –20° to 70°C, humidity 5% to 95% at 60°C
- Safety
- UL, CB, CE, TUV GS
- Emissions
- FCC, CE, VCCI, RCM/C-Tick
- Environmental
- RoHS, WEEE, REACH, ISO14001
- Security appliance (wired, wi-fi or wi-fi with xdsl or embedded lte)
- ✓
- Premium support (24x7 response, software upgrades and more)
- ✓
- Pro support option (proactive health monitoring service)
- ✓
- Firewall
- ✓
- Vpn
- ✓
- Mobile access (includes 100 concurrent users in the 1530, 1550, or 200 in the 1570, 1590)
- ✓
- Application control
- ✓
- Intrusion prevention system
- ✓
- Category
- IT Infrastructure in USA
- Subcategory
- Machinery
- Subcategory 2
- Check point equipment
- Listing ID
- 106541244
Description
Contact us for lower pricing!
Download Datasheet
Click here to jump to more pricing!
Protecting the modern data center against GenV attacks requires high performance scalable security gateways that go beyond the NGFW to deliver the best threat prevention and optimization for hybrid cloud environments. Check Point 26000 and 28000 Quantum Security Gateways include award-winning SandBlast Network threat prevention, telco-grade reliability, and hyperscale threat prevention performance up to 1.5 Tera bps.
Check Point Quantum 28000 Next Generation Firewalls enables enterprises to deploy the industry’s leading threat prevention capabilities at all points of their infrastructure, scaling security almost infinitely according to their changing business needs. It also dramatically accelerates the efficiency of their security operations. This enables enterprises to prevent and block even the most advanced attacks, before they can disrupt business.