Fortinet FG-TRAN-QSFP+LR Datasheet Page 2

  • Download
  • Add to my manuals
  • Print
  • Page
    / 6
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 1
2 www.fortinet.com
DATA SHEET: FortiGate
®
3700D
FortiGate 3700DX
STATUS
POWER
ALARM
HA
MGMT 1
MGMT 2USB
CONSOLE
USB MGMT 1 4
5 7 9 11 13 15 17 19 21 25 27 29 31
26 28 30 3218 20 22 2410 12 14 16
23
6 832
SFP+
QSFP+
7
6
5
4
3
2
1
HARDWARE
Network Processor
Fortinet’s new, breakthrough FortiASIC NP6 network processor
works inline with FortiOS functions delivering:
§ Superior firewall performance for IPv4/IPv6, SCTP and multicast
traffic with ultra-low latency down to 2 microseconds
§ VPN, CAPWAP and IP tunnel acceleration
§ Anomaly-based intrusion prevention, checksum offload and
packet defragmentation
§ Traffic shaping and priority queuing
Content Processor
The FortiASIC CP8 content processor works outside of the direct
flow of traffic, providing high-speed cryptography and content
inspection services including:
§ Signature-based content inspection acceleration
§ Encryption and decryption offloading
40 GE Connectivity for Core Infrastructure
High speed connectivity is essential for network security
segmentation at the core of data networks. The FortiGate 3700D
provides one of the highest 40 GE and 10 GE port densities in the
market, simplifying network designs without relying on additional
devices to bridge desired connectivity.
Interfaces
1. USB Management Port
2. USB Port
3. Console Port
4. 2x GE RJ45 Management Ports
5. 4x 40 GE QSFP Slots
6. 20x 10 GE SFP+ / GE SFP Slots
7. 8x 10 GE SFP+ Slots (Ultra-low latency)
Powered by FortiASICs
§ Custom FortiASIC™ processors deliver the power you
need to detect malicious content at multi-Gigabit speeds
§ Other security technologies cannot protect against
today’s wide range of content- and connection-based
threats because they rely on general-purpose CPUs,
causing a dangerous performance gap
§ FortiASIC processors provide the performance needed
to block emerging threats, meet rigorous third-party
certifications, and ensure that your network security
solution does not become a network bottleneck
Page view 1
1 2 3 4 5 6

Comments to this Manuals

No comments