RG-WALL 1600 Series
Next-Generation Firewall
The advanced CPU + ASIC hardware chip convergence technology is adopted, removing the performance bottleneck of application layer data detection in the x86 architecture.
The RG-WALL 1600 series supports not only conventional security functions, such as NAT, ACL, and DDoS prevention, but also comprehensive application-level security functions, including anti-virus, intrusion detection, App detection, file filtering, and malicious URL filtering.
Multi-dimensional security monitoring and analysis are provided, helping users understand and control risks and giving accurate early warnings.
Association with the cloud security center is supported, and an effective 3D protection solution to unknown threats is provided.
Convergent Hardware Architecture,
Ensuring High-Performance Application Layer Security Protection
The CPU + ASIC convergent hardware architecture is adopted. The CPU processes connection setup and maintenance, while multiple sets of ASIC chips process application identification and security checks.
When all application layer protection functions are enabled, the CPU usage is within the normal range and the security processing performance of the network layer is not affected.
The powerful convergent architecture improves the data forwarding efficiency and ensures the security protection performance of the application layer.
Visual Network,
Ensuring Risk Control and Accurate Early Warnings
More than 3000 Internet applications and 250 million URLs can be identified.
For potential security risks, associated analysis can be performed by application, user, and content, and event logs across the whole network can be audited. The event logs can be categorized and combined after data analysis and processing, to provide early warnings.
Multi-dimensional security monitoring and analysis are provided, helping users understand and control risks and giving accurate early warnings.
Rich Services Features,
Simplifying Deployment and Reducing Investment
Basic network functions and security protection functions are provided, as well as networking capabilities such as virtual firewall, PBR, WAN optimization, and load-sharing. In addition, content-level security protection functions, including DDoS prevention, Botnet detection, anti-virus, intrusion protection, and data leakage prevention are provided.
All functions can be configured on one page, reducing the security O&M workload and preventing network faults caused by policy conflicts.
Association with the Cloud Security Center,
Effectively Coping with Unknown Threats
Association with the cloud security center is supported, and an effective and comprehensive solution to unknown threats is provided. When a suspicious file appears on a network, the file can be uploaded to the cloud sandbox of the cloud security center for running. If any exception occurs, the process stops in the sandbox. The fault will not affect any host or system on the network. This helps enterprises prevent threats and attacks that can pass through conventional defense means.
Model | RG-WALL 1600-S3100 | RG-WALL1600-S3200 | RG-WALL 1600-S3600 | RG-WALL 1600-M5100 | RG-WALL 1600-M6600 | RG-WALL 1600-X9300 |
|
Hardware Specifications | Fixed Ports | 10 GE ports (RJ45) | 10 GE ports (RJ45) | 16 GE ports (RJ45) | 42 GE ports (RJ45), | 10 GE ports (RJ45), | 18 GE ports (RJ45), |
Console Port | 1 | 1 | 1 | 1 | 1 | 1 |
|
USB Port | 1 for client, 1 for server | 1 | 1 for client, 2 for server | 1 for client, 1 for server | 1 for client, 2 for server | 1 for client, 1 for server |
|
Flash & Storage | Flash:4GB Storage: NA | Flash:8GB Storage: NA | Flash:2GB HD:32GB | Flash:16GB HD:64GB | Flash:16GB Storage: NA | Flash:32GB HD:240GB |
|
Memory | DDR3 2GB | DDR3 2GB | DDR3 2GB | DDR3 4GB | DDR3 8GB | DDR3 16GB |
|
Performance and Capacity | Firewall Throughput (64/ 512/ 1518 bytes) | Up to 1.5Gbps | Up to 3.5Gbps | Up to 3.5Gbps | Up to 4Gbps | Up to 16Gbps | Up to 80Gbps |
Firewall Latency | 4μs | 4μs | 4μs | 6μs | 3μs | 3μs |
|
Maximum Concurrent Sessions | 500K | 1Mil | 1.5Mil | 3.2Mil | 6Mil | 12Mil |
|
New Sessions/Sec | Up to 4K | Up to 10K | Up to 4K | Up to 77K | Up to 200K | Up to 250K |
|
IPsec VPN Throughput | 1Gbps | 2Gbps | 1Gbps | 1.3Gbps | 14Gbps | 50Gbps |
|
IPsec Tunnels | 200 | 200 | 200 | 2K | 2K | 10K |
|
IPS Throughput | 200Mbps | 500Mbps | 275Mbps | 2.1Gbps | 2.8Gbps | 11Gbps |
|
Deployment Mode | Transparent Mode |
| Support |
||||
Routing Mode |
| Support |
|||||
Hybrid Mode |
| Support |
|||||
NAT (Network Address Translation) |
| Support |
|||||
Firewall Features | MAC/IP Binding |
| Support |
||||
Routing Features | OSPF Dynamic Routing |
| Support |
||||
RIP Dynamic Routing |
| RIPv1/v2 support |
|||||
Static Routing |
| Support |
|||||
H.323 over NAT |
| Support |
|||||
Policy-Based Routing, Rule-based Routing |
| Support |
|||||
DHCP |
| Support DHCP Server, DHCP Client, DHCP Relay |
|||||
PPPoE |
| Support |
|||||
VPN Features | VPN Tunnels |
| Flexible on-demand configuration |
||||
Types of VPN Supported |
| GRE, L2TP, PPTP, IPsec |
|||||
Encryption Standard |
| DES, 3DES, AES |
|||||
Authentication Algorithm |
| SHA1, MD5 |
|||||
Perfect Forward Secrecy (PFS) |
| Support |
|||||
IPsec Protocol |
| Support |
|||||
Manual Key, IKE |
| Support |
|||||
Peer Authentication |
| Extensible Authentication Protocol Support |
|||||
IPsec NAT Traversal |
| Support |
|||||
Dynamic VPN Access |
| Support |
|||||
QoS |
| Support |
|||||
Collaboration With Other Mainstream VPN Devices |
| Support |
|||||
Content Filtering | URL Filtering |
| Support |
||||
Web Content Filtering |
| Support |
|||||
Script, Cookie Filtering |
| Support |
|||||
Web Proxy Filtering |
| Support |
|||||
Anti-Spam |
| Support |
|||||
Email Address Filtering |
| Support |
|||||
Email Attachments Shield |
| Support |
|||||
Email Size Filtering |
| Support |
|||||
Policy-Based Content Filtering |
| Support |
|||||
Anti-Virus | Virus Filtering Based on HTTP\FTP\SMTP\POP3\IMAP Protocol |
| Support |
||||
Virus Filtering for IM File Transfers |
| Support |
|||||
VPN Traffic Virus Filtering |
| Support |
|||||
Blocking Specific File Types |
| Support |
|||||
Online Virus Database Updates |
| Support |
|||||
Intrusion Detection and Prevention | Self-Recognition Protocol |
| Support |
||||
Attack Signature Database |
| Support |
|||||
Anti Worms, Backdoor Trojans, Phishing and Other Attacks |
| Support |
|||||
Multiple Policy Sets |
| Support |
|||||
Signature Database Upgrade |
| Support |
|||||
Customized Signature Database |
| Support |
|||||
IPv6 | IPv6 Ready Certificate |
| Support |
||||
IPv4/IPv6 Dual Stack |
| Support |
|||||
Policy/Content Filtering/IPS Inspection/Traffic Control/VPN |
| Support |
|||||
Static Route/RIPng/OSPFv3 |
| Support |
|||||
IP-based Traffic Control |
| Support |
|||||
DHCPv6 Server and Relay |
| Support |
|||||
Internet Behavior Management | IM Software Login and File Transfer Control |
| Support |
||||
Speed Control of P2P Software |
| Support |
|||||
Streaming Media Software Speed Control |
| Support |
|||||
Online Game Control |
| Support |
|||||
Stock Software Control |
| Support |
|||||
System Management | Local Administrator Database |
| Support |
||||
Restrictive Management Network |
| Support |
|||||
Administrators Classification |
| Support |
|||||
Software and Signature Updates |
| Support |
|||||
Time Synchronization |
| Support |
|||||
Configuration Changes |
| Support web, command line |
|||||
Certificate Authentication |
| Support |
|||||
Management Methods |
| Support web, command line |
|||||
Standard MIB or Private MIB |
| Support |
|||||
SNMP |
| Support SNMPv1/v2/v3 |
|||||
Centralized Management |
| Support |
|||||
Local Management |
| Support |
|||||
Remote Management |
| Support |
|||||
Shell Session |
| Support |
|||||
Virus Database Updates |
| Support |
|||||
Logs Monitoring | Internal Log Database |
| Support |
||||
External Log Server |
| Support |
|||||
Remote System Log Server |
| Support |
|||||
Real-Time Statistics |
| Support |
|||||
Log Level |
| Support |
|||||
Log Backup |
| Support |
|||||
System Status Display |
| Support |
|||||
Alarm Mode |
| Support |
|||||
High Availability | HA Mode |
| Support routing mode and transparent mode HA |
||||
Configuration File / Change Synchronization |
| Support configuration and status synchronization |
|||||
Signature Database Synchronization |
| Support |
|||||
HA Device Authentication |
| Support |
|||||
HA Data Encryption |
| Support |
|||||
Dimensions (W x D x H) (mm) | 216 x 148 x 38 | 432 x 252 x 44 | 216 x 223 x 44 | 432 x 298 x 44 | 432 x 322 x 44 | 438 x 554 x 89 |
|
Weight | 0.9kg | 3.3kg | 1.6kg | 4.2kg | 4.9kg | 14.7kg |
|
Power Redundancy | N/A | N/A | N/A | Support (External FRPS-100) | Support (External FRPS-100) | Support (built-in) |
|
Power Consumption | 14W | 25.5W | 22W | 98W | 202W | 406W |
|
Temperature |
| Operating Temperature: 0℃ to 40℃ |
|||||
| Storage Temperature: -25℃ to 70℃ |
||||||
Humidity |
| Storage Humidity: 20% to 95% |
The Ruijie RG-WALL 1600 Firewall Series offers strengthened security protection with integrated features such as the built-in anti-virus, intrusion detection and prevention. The advanced firewall with high-performance hardware platform achieves fast safety inspection and control, enhancing access efficiency of key services. Business-based security policies are also available to guarantee the legitimacy of business access and to enhance the accuracy of safety logs. The Ruijie RG-WALL 1600 Firewall Series allows unified management features such as real-time monitoring of device operation status, integrated log reports and centralized distribution of policies for comprehensive network protection.
Data Center Edge Security
The next-generation firewall can be deployed with data center switches through Gigabit or 10 Gigabit ports to achieve a fully non-blocking data center network, ensuring network security and flexible service deployment. The following values can be achieved:
●High-performance packet inspection ensures the access performance of the data center
●The virtual firewall enables server resources migration protection
●Fine-grained application protection against security threats such as viruses and attacks
Campus Network Gateway Security
The firewall can be deployed as the campus network gateway to meet the application requirements of the campus network, enhance information security and offer protection for the campus network services. The following values can be achieved:
●Effectively protect key services from intrusion and viruses
●Auto switching of multiple links to achieve high resiliency and operation continuity
●Real-time surveillance for transparent security management
University Campus Network Gateway
The next-generation high-performance data center firewall provides better support for IPv6 to meet the university campus network requirements and enhance information security for the campus network, thereby offering the following values:
●Deliver up to 80Gbps high-performance throughput to better meet the university campus network requirement of large number of users
●Support IPv6 features including IPv6 traffic control and security policies to provide security protection for the IPv6 services and applications of the university
●Enable virtualized firewall for enforcing security policies for different services
Model | Description |
RG-WALL 1600-S3100 | RG-WALL 1600-S3100 Next-Gen Firewall (10 GE ports, 1U) |
RG-WALL 1600-S3200 | RG-WALL 1600-S3200 Next-Gen Firewall (10 GE ports, 1U) |
RG-WALL 1600-S3600 | RG-WALL 1600-S3600 Next-Gen Firewall (16 GE ports, 1U) |
RG-WALL 1600-M5100 | RG-WALL 1600-M5100 Next-Gen Firewall (42 GE ports, 2 SFP ports, 1U) |
RG-WALL 1600-M6600 | RG-WALL 1600-M6600 Next-Gen Firewall (10 GE ports, 8 SFP ports, 1U) |
RG-WALL 1600-X9300 | RG-WALL 1600-X9300 Next-Gen Firewall (18 GE ports, 8 SFP+ ports, 16 SFP ports, 2U) |
License |
|
RG-WALL 1600-S3100-LIS-1Y | RG-WALL 1600-S3100 Anti-Virus Signature Database, IPS Signature Database, Application Signature Database, Spam Database and Website Classification Database 1-Year License |
RG-WALL 1600-S3200-LIS-1Y | RG-WALL 1600-S3200 Anti-Virus Signature Database, IPS Signature Database, Application Signature Database, Spam Database and Website Classification Database 1-Year License |
RG-WALL 1600-S3600-LIS-1Y | RG-WALL 1600-S3600 Anti-Virus Signature Database, IPS Signature Database, Application Signature Database, Spam Database and Website Classification Database 1-Year License |
RG-WALL 1600-M5100-LIS-1Y | RG-WALL 1600-M5100 Anti-Virus Signature Database, IPS Signature Database, Application Signature Database, Spam Database and Website Classification Database 1-Year License |
RG-WALL 1600-M6600-LIS-1Y | RG-WALL 1600-M6600 Anti-Virus Signature Database, IPS Signature Database, Application Signature Database, Spam Database and Website Classification Database 1-Year License |
RG-WALL 1600-X9300-LIS-1Y | RG-WALL 1600-X9300 Anti-Virus Signature Database, IPS Signature Database, Application Signature Database, Spam Database and Website Classification Database 1-Year License |
Optional Accessories |
|
RG-RPS 100M
| External Redundant Power System (RPS) System for RG-Wall 1600-M5100 and M6600 series firewall |
Ruijie Networks websites use cookies to deliver and improve the website experience.
See our cookie policy for further details on how we use cookies and how to change your cookie settings.
Cookie Manager
When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.
Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.
This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.
Contact Us
How can we help you?