Guangzhou Mingguan Information Technology Co., Ltd
Home>Products>Deeply convinced of FW-100-BN120 firewall
Deeply convinced of FW-100-BN120 firewall
The next generation high-performance firewall product launched by Shenzhen Shenxin Service FW-100-BN120 firewall for small and medium-sized enterprise
Product details

Deeply convinced of FW-100-BN120 firewall
product overview
The FW-1000-BN series firewall of SZSS is a next-generation high-performance firewall product for small and medium-sized enterprises, campus network Internet exports and WAN branch markets. The FW-1000-BN series firewall adds multiple dimensions such as user, application, and time on the basis of the five tuple, providing visual and refined business access control. Meanwhile, the FW-1000-BN series firewall integrates traditional firewalls IPS、 Integrating antivirus, bandwidth management, IPSec VPN and other functions, simplifying deployment, improving user management efficiency, and achieving comprehensive and integrated network security protection. The product adopts single resolution multi-core parallel processing technology, which can achieve high-performance data forwarding even with multiple security features enabled, ensuring the continuity of user networks


Product model FW-1000-BN120 FW-1000-BN130 FW-1000-BN150 FW-1000-BN180
Network interface 6GE 4GE+4SFP 6GE+2SFP 6GE+2 × 10SFP+
Expansion slots NA NA 1 universal expansion slot 2 universal expansion slots
Local storage SSD 64G SSD 64G SSD 64G SSD 128G
Product Form: 1U 1U 1U 1U 1U
Working environment temperature: 0-45 ° C humidity: 5% -95%
Product advantages
Comprehensive security protection capability
Multi purpose: including traditional network firewall, intrusion prevention system, internet behavior management VPN、 Integrating antivirus and other functions, simplifying network deployment and daily management, fully meeting security and compliance requirements;
Refined security control: Based on precise detection and identification of multiple dimensions such as traditional quintuples, users, services/applications, and time, we provide you with rich and flexible security control strategies to ensure trusted access;
Deep content detection and recognition: intrusion defense technology based on deep application and protocol detection, effectively filtering security threats such as viruses, Trojans, worms, spyware, vulnerability attacks, etc., providing you with advanced network attack threat protection capabilities;
High performance software and hardware processing platform
High performance hardware architecture: The product adopts the X86 multi-core hardware platform and runs the independently developed parallel operating system Sangfor OS, fully utilizing the computing resources of multi-core CPUs and multi plane concurrent processing technology, greatly improving the security processing performance of network packets, while also having strong application layer processing performance;
Single parsing processing technology: Using a single parsing architecture to achieve one-time parsing and matching of messages, achieving a separation between the network layer and the application layer. The product utilizes zero copy technology to reduce redundant packet encapsulation and achieve high-performance data processing;
Deep application recognition and intelligent flow control
Massive application recognition library: Built in millions of level URL classification library, including illegal and harmful websites, adult content, online shopping, Weibo forums, etc., to achieve comprehensive and efficient filtering of harmful websites and daily healthy internet access;
Multi dimensional traffic control: massive P2P IM、 Identifying and controlling games, stock trading software, online banking, streaming media, commonly used emails, and remote control software, and ensuring core user core business bandwidth based on multiple dimensions such as IP/user/application/website type/file type/region/time, preventing bandwidth abuse, and improving online experience;
Dynamic allocation and P2P intelligent recognition: supports "free competition" and "dynamic allocation" of bandwidth, restricts unrelated applications from occupying bandwidth, maximizes resource utilization in idle bandwidth state, and suppresses P2P traffic from the source end, releasing external network link bandwidth to ensure the normal use of your core business;
Simple and fast delivery
Scenario Configuration Wizard: Built in scenario based configuration wizard, enabling quick device access and ensuring network continuity;
Integrated strategy deployment: The product comes with built-in security strategy templates and supports integrated strategy configuration, allowing you to quickly deploy daily security protection strategies without the need for extensive security operation experience;
Intelligent strategy optimization: The product automatically detects whether the deployed security policies are effective, simplifies the scale of policies, and helps you continuously optimize and improve the existing level of network security protection;
Application scenarios

Product specifications
Product Function Description
The firewall function deploys flexible application control policies based on dimensions such as IP, ports, users, services/applications, and time, continuously testing and optimizing the effectiveness of security policies.
DoS/DDoS attack protection supports SYN Flood, ICMP Flood, UDP Flood, DNS Flood, ARP Flood and other DoS/DDoS attack protection to prevent external network attacks on the intranet.
The intrusion defense function deeply detects and identifies various attacks launched against vulnerabilities, resisting common threats such as worms, Trojans, malicious code, spyware, etc.
Internet behavior management has a built-in database of millions of URLs to prevent threats from employees accessing malicious websites; Identify thousands of common applications and accurately detect common P2P (Thunder) IM(QQ)、 Games (QQ games), stock trading software, online banking, online TV and other applications can improve employee office efficiency.
Bandwidth management is based on line, IP address, and upstream and downstream channels for bandwidth allocation and traffic control, ensuring the normal use of core business bandwidth.
The antivirus innovation adopts a cloud based antivirus mode to quickly detect and kill virus files in daily emails, web downloads, and file server downloads, reducing the performance degradation of local security devices caused by enabling antivirus functions.
The VPN function supports IPSec VPN to meet users' remote access needs.
User authentication supports a variety of user authentication methods, including local authentication, AD domain, Radius, LDAP, POP3, etc.
NAT supports powerful NAT address translation functions, including IPv4/v6 NAT address translation, mapping various internal addresses to public network addresses to meet various daily internet and office needs.
High reliability supports dual machine main/backup and main/main working modes, enhancing the reliability of security protection capabilities.
The network features fully support various static routing, policy routing, and dynamic routing protocols, such as RIP, OSPF, BGP, etc.
The deployment mode supports various deployment modes such as routing mode, transparent mode, mirror mode, and hybrid mode, to meet the complex and diverse network environments of users.

Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!