WatchGuard XCS 770 WG770061 数据表
产品代码
WG770061
Address:
505 Fifth Avenue South, Suite 500, Seattle, WA 98104 •
Web:
www.watchguard.com •
U.S. Sales:
1.800.734.9905 •
International Sales:
+1.206.613.0895
No express or implied warranties are provided for herein. All specifi cations are subject to change and expected future products, features or functionality will be provided on an if and when available basis. ®2010 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard
logo, WatchGuard ReputationAuthority, and LiveSecurity are either trademarks or registered trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE66665_010610
logo, WatchGuard ReputationAuthority, and LiveSecurity are either trademarks or registered trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE66665_010610
WatchGuard® Technologies, Inc.
Block 98% of Unwanted Traffi c at the Perimeter
XCS utilizes WatchGuard ReputationAuthority™ to identify
malicious senders and block over 98% of threats based on real-time
behavior. This goes beyond simple sender reputation, providing an
all-encompassing view of the behavior of an IP address in real time.
By cross-referencing and analyzing data across multiple protocols, it
ensures malicious and unwanted traffi c never enters your network.
malicious senders and block over 98% of threats based on real-time
behavior. This goes beyond simple sender reputation, providing an
all-encompassing view of the behavior of an IP address in real time.
By cross-referencing and analyzing data across multiple protocols, it
ensures malicious and unwanted traffi c never enters your network.
XCS 770
XCS 970
XCS 1170
Mid-Size Enterprise
Large Enterprise
Fortune 500 / Global
2000 Enterprise
Chassis/Processor
Form Factor
1U Shallow,
Rack-Mountable
1U Deep,
Rack-Mountable
1U Deep,
Rack-Mountable
Dimensions
1.7” x 16.8” x 14”
1.7” x 17.2” x 25.6”
1.7” x 17.2” x 25.6”
Weight
17 lbs.
42 lbs.
42 lbs.
CPU
Intel Xeon Quad-Core
Processor
Intel Xeon Quad-Core
Processor
2 Intel Xeon Quad-Core
Processors
Power
Fixed, 200W, universal
100/240V
2 redundant hot-plug,
650W, universal 100/240V
2 redundant hot-plug,
650W, universal 100/240V
Storage
RAID
–
RAID 1
RAID 10
Memory
4GB (2 x 2GB) DDR2
667MHz
4GB (2 x 2GB) DDR3
1066MHz
4GB (2 x 2GB) DDR3
1066MHz
HDD
160GB SATA, 7.2K RPM
2 x 160GB SATA-II, 7.2K RPM
4 x 146GB SAS, 15K RPM
Connectivity
Ethernet
3 Intel Gigabit Ethernet
4 Intel Gigabit Ethernet
4 Intel Gigabit Ethernet
Serial Port
1 RS-232 (DB-9)
1 RS-232 (DB-9)
1 RS-232 (DB-9)
Temperature
Operating
32°F to 113°F /
0°C to 45°C
32°F to 113°F /
0°C to 45°C
32°F to 113°F /
0°C to 45°C
Storage
-40°F to 158°F /
-40°C to 70°C
-40°F to 158°F /
-40°C to 70°C
-40°F to 158°F /
-40°C to 70°C
Relative Humidity
Operating
10% to 85%
non-condensing
10% to 85%
non-condensing
10% to 85%
non-condensing
Storage
5% to 95% non-
condensing
10% to 95% non-
condensing
10% to 95% non-
condensing
Altitude
Operating
0–9,843 ft (3,000 m)
0–9,843 ft (3,000 m)
0–9,843 ft (3,000 m)
Storage
0–15,000 ft (4,570 m)
0–15,000 ft (4,570 m)
0 –15,000 ft (4,570 m)
Defense-in-Depth Content Filtering
Inbound and outbound email and web traffi c undergo multiple
layers of deep inspection. Content, images, and sender information
is inspected and examined thoroughly to provide a context-based,
weighted score, determined by who is sending it, what is contained in
the message, how the message is structured, and where it is directing
the recipient to take action. This establishes the threat suspect level –
ensuring only safe communications pass through your network.
layers of deep inspection. Content, images, and sender information
is inspected and examined thoroughly to provide a context-based,
weighted score, determined by who is sending it, what is contained in
the message, how the message is structured, and where it is directing
the recipient to take action. This establishes the threat suspect level –
ensuring only safe communications pass through your network.
Real-Time Data Loss Prevention
XCS off ers a real-time solution that can block, quarantine, allow,
encrypt, or reroute data-in-motion over multiple protocols based
on policies you set. It provides an extensive risk management and
policy enforcement boundary, eliminating the need for multiple point
products and ensuring privacy and compliance.
encrypt, or reroute data-in-motion over multiple protocols based
on policies you set. It provides an extensive risk management and
policy enforcement boundary, eliminating the need for multiple point
products and ensuring privacy and compliance.
Elimination of Security Gaps for Total Security
XCS allows IT administrators to create, manage, and enforce policies
across multiple protocols from one view. Comprehensive reporting
across all messaging mediums – email and web – provides an all-
encompassing look at what is entering and exiting your networks.
across multiple protocols from one view. Comprehensive reporting
across all messaging mediums – email and web – provides an all-
encompassing look at what is entering and exiting your networks.
Centralized Management and Reporting
Set-it-and-forget-it administration allows you to apply a single policy across
multiple protocols to control inbound and outbound traffi c so you spend
less time defending your messaging borders and more time focusing on
higher business value IT projects.
A holistic view of what is entering and exiting your network across multiple
protocols allows you to eliminate security gaps and reduce administration
eff orts required for point solutions.
Integrated system reports can be accessed with one-click administration for
customizable reports at specifi ed intervals and in varying fi le formats. Meet
audit requirements with easily exported or locally saved time-, feature-, and
group-based reports.
multiple protocols to control inbound and outbound traffi c so you spend
less time defending your messaging borders and more time focusing on
higher business value IT projects.
A holistic view of what is entering and exiting your network across multiple
protocols allows you to eliminate security gaps and reduce administration
eff orts required for point solutions.
Integrated system reports can be accessed with one-click administration for
customizable reports at specifi ed intervals and in varying fi le formats. Meet
audit requirements with easily exported or locally saved time-, feature-, and
group-based reports.
Expert Guidance and Support
Every XCS appliance comes with a subscription* to LiveSecurity Service, a
comprehensive support and maintenance program that provides:
comprehensive support and maintenance program that provides:
Hardware warranty with advance hardware replacement
Technical support with a 4-hour response time
Software updates
Threat alerts
Learn more at www.watchguard.com/livesecurity.
*1-year, 2-year, and 3-year subscriptions available
*1-year, 2-year, and 3-year subscriptions available
WatchGuard XCS Platform
Company/Customer
Wikis
Social Networks Blogs
Crimeware
Email
Threats
WatchGuard ReputationAuthority
Content Filtering
W
S
B