Check Point Quantum QLS800 Lightspeed Firewall - 2 Port - 10/100/1000Base-T, 10GBase-X, 100GBase-X - 100 Gigabit Ethernet - 100 GB/s Firewall Throughput - AES (128-bit) - 2 x RJ-45 - 8 Total Expansion Slots - 1 Year 5 virtual system (VS) licenses - 3 CPAP-SG-QLS800
CPAP-SG-QLS800 | Check Point®
Part Number: CPAP-SG-QLS800
Condition: New
In Stock:
Out of stock
Real time availability
Notify Me
Product Specifications
Check Point Quantum QLS800 Lightspeed Firewall - 2 Port - 10/100/1000Base-T, 10GBase-X, 100GBase-X - 100 Gigabit Ethernet - 100 GB/s Firewall Throughput - AES (128-bit) - 2 x RJ-45 - 8 Total Expansion Slots - 1 Year 5 virtual system (VS) licenses - 3 CPAP-SG-QLS800
QUANTUM LIGHTSPEED 800 APPL - W/ 5 VIRTUAL SYSTEMS FOR 1YR
Manufacturer Part Number: CPAP-SG-QLS800
MANUFACTURER NAME: Check Point
MANUFACTURER PART NUMBER: CPAP-SG-QLS800
UPC EAN CODE:
LANGUAGE: EN
MARKET:US
General Information: | |
Check Point Quantum Lightspeed Next Generation Firewalls redefine security price performance - enabling enterprises to deploy network security that performs at the speed of business to accelerate large file transfers and provide low latency for high frequency applications. Secure Hi-speed Data Transfers 800 Gbps line-rate in a single firewall Protect Hi-frequency Trading Apps 3µSec ultra low latency Resilient Data Center Security Eliminate failure with a robust clustering technology Low Latency, High Throughput Firewall Quantum QLS800 firewalls are equipped with four NVIDIA ConnectX network interface cards (NIC), each with 2x 100G QSFP28 ports. NVIDIA ConnectX NICs offload network processing from the host CPUs, providing substantial performance gains of up to nearly 800 Gbps for trusted firewall traffic. In addition, firewall latency is significantly reduced to a low 3µSec at nearly line rate ensuring access to data and higher throughput with minimal delay. All-inclusive Security Check Point QLS650 firewalls include the Check Point stateful inspection firewall and are also available in all-inclusive security packages such as NGFW (Application Control with IPS), NGTP (NGFW with URL filtering, antivirus and anti-bot) or SandBlast (NGTP with sandboxing and Threat Extraction, a Content Disarm & Reconstruction technology). Resilient Security Modern organizations need robust cyber security to protect their critical systems. High Availability (HA) firewall clusters are designed to minimize downtime for critical systems using redundant systems. If an organization wants to implement a simple HA firewall cluster with up to 5 nodes, this can be accomplished using Check Point's built-in HA and load sharing functionality: ClusterXL. Check Point ClusterXL is a software-based clustering solution for firewall redundancy and load sharing which uses state synchronization to keep active connections alive and prevent data loss if a cluster member fails. This ensures critical systems are always connected and secure. In addition, each QLS650 has redundancy built-in with two SSD drives in a RAID1 array and hot-swappable redundant power supplies, ensuring continuity when one component fails. Remote Management and Monitoring A Lights-Out-Management (LOM) card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location. Also use LOM for remote installs of the GAiA OS. More is demanded of today's network devices. There are simply more connected devices. Apps and connected applications are more content-heavy. For instance, workloads and data sets move from on-premises data centers to the cloud and back again, encapsulated in VXLAN, GRE and VPN packets. Furthermore, some apps require pure speed. For High Frequency Trading apps, profit or loss is determined by nanosecond differences in network latency. Check Point Quantum Lightspeed firewalls deliver on these demands for high throughput with low latency by securely offloading network processing to NVIDIA ConnectX NICs. NVIDIA ConnectX The eight single-width slots in the QLS800 support four NVIDIA ConnectX dual-width network cards, each with 2x 100G QSFP28 ports, supporting an aggregate throughput of close to 200G of firewall throughput through each ConnectX NIC. The dual-width cards maximizes the PCIe bandwidth beyond a single slot limit. With the four ConnectX NICs in the QLS800 access to data and higher throughput with minimal delay is ensured for trusted traffic. | |
Manufacturer | Check Point Software Technologies, Ltd |
Manufacturer Part Number | CPAP-SG-QLS800 |
Manufacturer Website Address | http://www.checkpoint.com |
Brand Name | Check Point |
Product Line | Lightspeed |
Product Model | QLS800 |
Product Name | Quantum QLS800 Lightspeed Firewall |
Product Type | Network Security/Firewall Appliance |
Technical Information: | |
Firewall Protection Supported | Application Control
URL Filtering Antivirus AntiBot SandBlast Threat Emulation Anti-spam |
Firewall Throughput | 800 Gbit/s |
Encryption Standard | AES (128-bit) |
Connectivity Technology | Wired |
Interfaces/Ports: | |
Total Number of Ports | 2 |
Number of Network (RJ-45) Ports | 2 |
Media & Performance: | |
VPN Throughput | 5.63 GB/s |
Network & Communication: | |
Ethernet Technology | 100 Gigabit Ethernet |
Network Standard | 10/100/1000Base-T
10GBase-X 100GBase-X |
I/O Expansions: | |
Total Number of Expansion Slots | 8.0 |
Expansion Slot Type | QSFP28 |
Management & Protocols: | |
Manageable | Yes |
Power Description: | |
Frequency | 50 Hz
60 Hz |
Power Consumption | 826 W |
Physical Characteristics: | |
Compatible Rack Unit | 3U |
Form Factor | Rack-mountable
Rail-mountable |
Height | 5.2" |
Width | 17.4" |
Depth | 24" |
Weight (Approximate) | 46.30 lb |
Miscellaneous: | |
Environmentally Friendly | Yes |
Environmental Compliance | Restriction of Hazardous Substances (RoHS)
Waste Electrical and Electronic Equipment Directive (WEEE) Registration, Evaluation, Authorization and Restriction of Chemicals (REACH) |
Warranty: | |
Support/Service Duration | 1 Year |
Support/Service Type | 5 virtual system (VS) licenses |
Questions and Answers
Questions and Answers | Ask CompSource |
Shipping / Returns
Shipping
Ground =
FREE
(Delivery within 2-7 business days)
Two Day Air = $25.00
(Delivery within 2 business days)
Standard One Day = $35.00
(Delivery within next business day)
Priority = $45.00
(Delivery within next business morning)
U.S Mail Priority (AA,AE,AP only) = $30.00
FedEx International Economy (Canada only) = $85.00
Typically out of stock items are filled within 1 to 14 business days but can and may take longer.
Shipping dates are best estimates based on product location and may vary with holidays.
If product requires trucking, additional fees may apply.
* Some destinations are subject to Applicable State/Duty Taxes
Returns
CompSource realizes that every product may have different return guidelines. Please see the policy below regarding this item.
This Product Has Limited Exchange Privileges.
Please call for return guidelines.
For support on this product, please contact Check Point. 800-429-4391 www.checkpoint.com
Check Point Company's Information
Click Check Point for all products
Local #: (650)628-2000
Toll Free #: 800-429-4391
Tech Support #: 800-429-4391
Site: www.checkpoint.com
Product Reviews
Overall Rating | Write a Review
|
Best Sellers
More Best Sellers
Learn more about Network Security & Firewalls
Switches, routers, and wireless access points
Switches, routers, and wireless access points perform very different functions in a network.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.Switches
Switches are the foundation of most business networks. A switch acts as a controller, connecting computers, printers, and servers to a network in a building or a campus.
Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.
There are two basic types of switches to choose from as part of your networking basics: managed and unmanaged.
- An unmanaged switch works out of the box but can't be configured. Home-networking equipment typically offers unmanaged switches.
- A managed switch can be configured. You can monitor and adjust a managed switch locally or remotely, giving you greater control over network traffic and access.
Routers
Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money.
A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way.
Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others.
Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system.
Access points
An access point* allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers.
An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away.
But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes.
*Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.
Wireless networking
Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.Firewall
And possibly the most important aspect of networking is security and Firewall!What is a Firewall?
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.
A firewall can be hardware, software, or both.
CompSource will educate and help make this process enjoyable and easy.
Whether you're planning on using your network for basic home tasks or enterprise level security. You can tell our trained sales professionals your needs, and we�ll make custom recommendations to suit your specifications and budget. Our reps have extensive knowledge and love to share. We educate, not sell, CompSource makes sure you buy what you need and not waste money on what you don't. As with every decision we never push, it's up to you when, and if you make a purchase.
CompSource has a great technical staff that can help with a solution for your exact needs.
Chat with us or give our professionals a quick phone call (800)-413-7361.
This company has competitive prices. They also offer quick shipping and great customer service. I ordered a complete computer system and they shipped everything to me in 6 days. The 4x buyer protection from Trust Guard is a real plus too. J944More Reviews