Check Point Quantum Maestro 16600 Network Security Appliance - Content Security - 2 Port - 1000Base-T, 100GBase-X - 100 Gigabit Ethernet - 14.63 GB/s Firewall Throughput - 2 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable CPAPSG16600HSMHSSNBT
CPAPSG16600HSMHSSNBT | Check Point®
Part Number: CPAPSG16600HSMHSSNBT
Condition: New
In Stock:
Out of stock
Real time availability
Notify Me
Product Specifications
Check Point Quantum Maestro 16600 Network Security Appliance - Content Security - 2 Port - 1000Base-T, 100GBase-X - 100 Gigabit Ethernet - 14.63 GB/s Firewall Throughput - 2 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable CPAPSG16600HSMHSSNBT
1YR 16600 APPL FOR MAESTRO W 2 - 100 GBE ATTACH CABLES W SANDBLAST
Manufacturer Part Number: CPAPSG16600HSMHSSNBT
MANUFACTURER NAME: Check Point
MANUFACTURER PART NUMBER: CPAPSG16600HSMHSSNBT
UPC EAN CODE:
LANGUAGE: EN
MARKET:US
General Information: | |
Check Point Maestro brings scale, agility and elasticity of the cloud on premise with efficient N+1 clustering based on Check Point HyperSync technology, maximizing the capabilities of your existing security gateways. Create your own virtualized private-cloud premise by stacking multiple Check Point security gateways together. Group them by security feature set, policy or the assets they protect and further virtualize them with virtual systems technology. With the Maestro Hyperscale Orchestrator, businesses of all sizes can have cloudlevel security on premise. Add compute to meet your needs using Maestro Web UI or RESTful APIs - all while minimizing the risk of downtime and maximizing your cost efficiency. Security at Hyperscale On demand expansion available to gateways of all sizes Operational Supremacy Opening up new simple ways to architect and manage cyber security Cloud-Level Resiliency Delivering the highest standard of resiliency with Telco-Grade Technology The Hyperscale Orchestrator 140 is a mid-range model with 48x 10GbE and 8x 100 GbE ports with a total fabric capacity of 1.28 Tbps. The Hyperscale Orchestrator 175 is a high-end model with 32x 100 GbE ports and a total fabric capacity of 3.2 Tbps. For redundancy, deploy two Orchestrators of the same model together. Security Group members connect to the Orchestrator via Direct Attached Copper (DAC) cables, either 10, 40 or 100 GbE depending upon the gateway and Orchestrator models deployed. The Orchestrator's 300-nanosecond port-to-port latency deliver predictable wire speed performance with no packet loss for any packet size. SPOTLIGHT ON MANAGEMENT | Security Groups With Maestro, you can dynamically allocate or deallocate compute resources within and between Security Groups to meet your needs. Security Groups are logical groups of appliances providing active/active cluster functionally segregated from other Security Groups. Each Security Group has dedicated internal and external interfaces and may have a different configuration set and policy, e.g. Next Generation Firewall protecting a data center or Next Generation Threat Prevention providing perimeter protection. Single Management Object (SMO) Externally a Security Group is seen as one security gateway or VSX gateway object in the Check Point security management GUI client, SmartConsole. A single IP address per Security Group for management communications and policy install simplifies Security Group management. All configurations, e.g. interfaces or IP addresses and routes are mirrored on gateways in the Security Group. Prior to becoming an online member and actively handling traffic each new member of the Security Group synchronizes its image, software configuration and security policy with the SMO of the Security Group. Security Software Maestro members run R80 SP, the latest version of the field-tested and proven software that was first introduced in 2012 on our Check Point chassis security systems and now integrated into our R80 main train release. The security feature set includes Next Generation Threat Prevention (NGTP) to protect you from known threats and SandBlast Zero-day Threat Protection to protect you from the unknown and zero-day threats. All Check Point Quantum security appliances in the Maestro solution include zero-day threat prevention for one year. | |
Manufacturer | Check Point Software Technologies, Ltd |
Manufacturer Part Number | CPAPSG16600HSMHSSNBT |
Manufacturer Website Address | http://www.checkpoint.com |
Brand Name | Check Point |
Product Line | Quantum |
Product Model | 16600 |
Product Name | Quantum Maestro 16600 Network Security Appliance |
Product Type | Network Security Appliance |
Technical Information: | |
Functionality | Content Security |
Firewall Protection Supported | Threat Protection
Zero Day Event Application Control Content Inspection URL Filtering AntiBot Antivirus Anti-spam SandBlast Threat Emulation |
Firewall Throughput | 117 Gbit/s |
Connectivity Technology | Wired |
Interfaces/Ports: | |
Total Number of Ports | 2 |
Number of Network (RJ-45) Ports | 2 |
Media & Performance: | |
VPN Throughput | 2.13 GB/s |
Network & Communication: | |
Ethernet Technology | 100 Gigabit Ethernet |
Network Standard | 1000Base-T
100GBase-X |
I/O Expansions: | |
Total Number of Expansion Slots | 2.0 |
Expansion Slot Type | QSFP28 |
Physical Characteristics: | |
Compatible Rack Unit | 1U |
Form Factor | Rack-mountable |
Miscellaneous: | |
What's in the box |
|
Questions and Answers
Questions and Answers | Ask CompSource |
Shipping / Returns
Shipping
Ground =
FREE
(Delivery within 2-7 business days)
Two Day Air = $25.00
(Delivery within 2 business days)
Standard One Day = $35.00
(Delivery within next business day)
Priority = $45.00
(Delivery within next business morning)
U.S Mail Priority (AA,AE,AP only) = $30.00
FedEx International Economy (Canada only) = $85.00
Typically out of stock items are filled within 1 to 14 business days but can and may take longer.
Shipping dates are best estimates based on product location and may vary with holidays.
If product requires trucking, additional fees may apply.
* Some destinations are subject to Applicable State/Duty Taxes
Returns
CompSource realizes that every product may have different return guidelines. Please see the policy below regarding this item.
This Product Has Limited Exchange Privileges.
Please call for return guidelines.
For support on this product, please contact Check Point. 800-429-4391 www.checkpoint.com
Check Point Company's Information
Click Check Point for all products
Local #: (650)628-2000
Toll Free #: 800-429-4391
Tech Support #: 800-429-4391
Site: www.checkpoint.com
Product Reviews
Overall Rating | Write a Review
|
Best Sellers
More Best Sellers
Recently Viewed
Learn more about Network Security & Firewalls
Switches, routers, and wireless access points
Switches, routers, and wireless access points perform very different functions in a network.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.Switches
Switches are the foundation of most business networks. A switch acts as a controller, connecting computers, printers, and servers to a network in a building or a campus.
Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.
There are two basic types of switches to choose from as part of your networking basics: managed and unmanaged.
- An unmanaged switch works out of the box but can't be configured. Home-networking equipment typically offers unmanaged switches.
- A managed switch can be configured. You can monitor and adjust a managed switch locally or remotely, giving you greater control over network traffic and access.
Routers
Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money.
A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way.
Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others.
Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system.
Access points
An access point* allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers.
An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away.
But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes.
*Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.
Wireless networking
Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.Firewall
And possibly the most important aspect of networking is security and Firewall!What is a Firewall?
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.
A firewall can be hardware, software, or both.
CompSource will educate and help make this process enjoyable and easy.
Whether you're planning on using your network for basic home tasks or enterprise level security. You can tell our trained sales professionals your needs, and we�ll make custom recommendations to suit your specifications and budget. Our reps have extensive knowledge and love to share. We educate, not sell, CompSource makes sure you buy what you need and not waste money on what you don't. As with every decision we never push, it's up to you when, and if you make a purchase.
CompSource has a great technical staff that can help with a solution for your exact needs.
Chat with us or give our professionals a quick phone call (800)-413-7361.
My product came promptly, packaged well and communication was excellent. I will definitely be ordering from you again. Thank you for your professional customer service and a product that is outstanding! mizwizMore Reviews