National Research and Education Network
Education Cloud Data Center
Government Service and Infrastructure
Multi-Channel HD Telemedicine
Over The Top/Multi-Tenant Data Center (OTT/MTDC)
Internet Exchange Point (IXP)
Internet Access Provider (IAP)
Design & Simulation
Planning & Analytics
Oil & Gas IoT
HPC & Operations Management
Digital Urban Rail
Enterprise Data Center
Server - Intelligent Computing
Enterprise Cloud Communications
Network Management System
Tackling the Emergency Together
Letting technology help in a time of need
Ubiquitous Connectivity Makes Digital Transformation Possible
Economical and Powerful AI Computing
Horizon Digital Platform
Connecting the Physical and Digital Worlds to Help Customers Achieve Successful Digital Transformation
Leading New ICT
228 Fortune Global 500 Companies Choose Huawei as Digital Transformation Partner
Secure And Resilient Solutions
Buy from Huawei
If you want to get more information about your project, you can submit your information and we will contact you as soon as possible.
If your company has signed an eDeal contract with Huawei, please buy your required product/solution via the link below.
Buy from resellers
Search for a nearby reseller and get direct contact information.
Become a Partner
Resources and Support
Huawei Authorized Learning Partner
Huawei ICT Academy
Huawei ICT Competition
Enterprise Training Service
Huawei HiSecEngine USG6600E series next-generation firewalls are designed for medium- and large-sized enterprises, institutions, and next-generation data centers. USG6600E firewalls provide NGFW capabilities and collaborate with other security devices to proactively defend against network threats, enhance border detection capabilities, and resolve performance deterioration problems. They provide pattern matching and encryption/decryption service processing acceleration capabilities, which greatly improve the performance of firewalls, security detection, and IPSec services.
Fully unleashing firewalls‘ defense capabilities，5x the unknown threat detection performance
Real-time threat processing at the network edge，unknown threat detection accuracy: > 99%
Security O&M based on service deployment and change policies, reducing OPEX by 80%+
|Fixed Interfaces||2 x 40G (QSFP+) + 12 x 10 GE (SFP+) + 12 x GE + 1 x USB 3.0||4 x 40 GE (QSFP+) + 28 x 10 GE (SFP+) + 2 x 10 GE (SFP+) HA + 1 x USB 3.0||6 x 10GE (SFP+) + 6 x GE (SFP) + 16 x GE||2 x 40GE (QSFP+) + 12 x 10GE (SFP+) + 16 x GE|
|Local Storage||Optional, SSD (1 x 2.5-inch) supported, 240 GB/HDD (1 x 2.5-inch supported, 1 TB)|
|Integrated Protection||Provides firewall, VPN, intrusion prevention, antivirus, data leak prevention, bandwidth management, anti-DDoS, URL filtering, and anti-spam functions.|
|Application Identification and Control||Identifies more than 6,000 applications with the access control granularity to application functions, for example, distinguishing between WeChat text and voice. Combines application identification with intrusion detection, antivirus, and data filtering, improving detection performance and accuracy.|
|Bandwidth Management||Manages per-user and per-IP bandwidth in addition to identifying service applications to ensure the network access experiences of key services and users. Control methods include limiting the maximum bandwidth, ensuring the minimum bandwidth, applying PBR, and changing application forwarding priorities.|
|Intrusion Prevention and Web Protection||Obtains the latest threat information in a timely manner for accurate detection and defense against vulnerability-based attacks. The device can defend against web-specific attacks, including SQL injection and XSS attacks.|
|AAPT||Collaborates with the local or cloud sandbox to detect and block malicious files.
Supports the flow probe information collection function to collect traffic information and send the collected information to the Cybersecurity Intelligence System (CIS) for analysis, evaluation, and identification of threats and APT attacks.
Encrypted traffic does not need to be decrypted. The firewall can work with the CIS to detect threats in encrypted traffic.
The firewall can proactively respond to malicious scanning behavior and work with the CIS to analyze behavior, quickly detect and record malicious behavior, and protect enterprises against threats in real time.
|Cloud Management Mode||Initiates authentication and registration to the cloud management platform to implement plug-and-play and simplify network creation and deployment.
Remote service configuration management, device monitoring, and fault management are used to implement cloud-based management of massive numbers of devices.
|Cloud Application Security Awareness||Controls enterprise cloud applications in a refined and differentiated manner to meet enterprises’ requirements for cloud application management.|