HILL-BDL-A2000-IN60

On Request

This product is currently not in stock, but can be ordered upon request.

We will be happy to handle the request directly with the manufacturer. Please contact us for more information.

  • License services Hillstone Networks
  • 5 License year
  • Enterprise Hillstone Service
  • Electronic license
  • Upgrades during 5 years
  • 1 License enables service to 1 equipment - 5 years
  • Description
  • Specifications
  • Contents
  • Downloads

The HILL-BDL-A2000-IN60 is an annual subscription license that enables a set of advanced security services on the Hillstone A2000 Series firewalls. This bundle usually includes several protection functions, such as Antivirus, IPS (intrusion prevention system), URL filtering, IP reputation, signature updates and access to the threat database, among others.


This license is designed to provide comprehensive protection, allowing the Hillstone A2000 device to take advantage of all defense capabilities against known and unknown threats, zero-day attacks and malicious traffic in real time. The BDL package is especially recommended when multiple advanced security services are required, as it is more cost-effective than purchasing each function separately.


Main advantages

Enables multiple security services (Antivirus, IPS, URL filtering, IP reputation, etc.) with one single license.

Automatic and continuous updates of signatures and threat databases during the subscription period.

Simplifies license management and renewal, centralizing protection in a single package.

Improves network security posture by combining several layers of defense in the firewall.

Recommended applications

Comprehensive protection of small and medium-sized enterprise networks equipped with Hillstone Series A2000.

Strengthening perimeter security and regulatory compliance by activating all available defense services.

Cost and management optimization by consolidating security services into a single subscription.

Purchase note It is necessary to send an email to your commercial reference to process the registration of the license (BASE or ADDITIONAL) with the order number and the serial number of the equipment. The license is activated once this process is completed and not when it is installed on the device. Once the license has been transferred to you, no returns of this product will be accepted.
License1 License enables 1 device service for 5 year through Hillstone Networks' Enterprise subscription services platform
Number of Pack Licenses1 for 1 device
Compatible devicesCompatible with the 2000 series of Hillstone Networks NGFWs
UpdatesKeeps all included services up to date for 1 year since installation
IPS (Intrusion Prevention System)- Protocol anomaly detection, protocol anomaly detection, protocol anomaly detection, protocol anomaly detection, protocol anomaly detection, protocol anomaly detection, protocol anomaly detection
rate-based, customizable signatures, manual or automatic signature update, integrated threat encyclopedia
- IPS shares: default, monitoring, blocked,
reboot (attacker's or victim's IP),
input interface) with expiry time
- Package registration option
- Filter-based selection: gravity, fate,
operating system, application or protocol
- IP exemption of specific IPS signatures
- IDS tracking mode
- Predefined prevention settings
- IPS threat packet capture (only with
expansion storage)
Anti-Virus- Manual or automatic signature updates
- Manually add or remove MD5 signatures in AV database
- Signatures MD5 can be uploaded to the cloud
sandbox, and manually add or remove in local database
- Flow-based antivirus: protocols include HTTP,
SMTP, POP3, IMAP, FTP/SFTP, SMB
- Virus scanning of compressed files
URL (URL Filtering)- Flow-based web filtering inspection
- Manually defined web filtering based on
URL, web content and by MIME header
- Cloud based dynamic web filtering for
databases with real-time categorization:
more than 140 millions of URLs with 64 categories
(8 of which are related to the
security)
- Additional web filtering features:
- Filtering of Java Applets, ActiveX or
cookies
- Blocking HTTP Posts
- Search keyword registration
- For privacy, encrypted connections exempt from
exploration in certain categories
- Overriding the filtering web profile: allows the
administrator to temporarily assign different
user/group/IP profiles
- Web filtering for local categories and override of
qualified categories
- Supports URL Allow List and URL Allow List
blocking
Cloud-SandboxUploading malicious files to the cloud in a sandbox for analysis
- The following protocols are supported
HTTP/HTTPS, POP3, IMAP, SMTP, FTP and SMB
- Supported file types, including PE, ZIP,
RAR, Office, PDF, APK, JAR, SWF and script
- File Transfer and File Control Support
File Size
- Provides a complete report on the analysis
of the behavior of malicious files
- Sharing real threat intelligence.
Real-time threat blocking
- Unique support detection mode without climbing
files
- Block list / permissions configuration
URL
C2 (Botnet C&C Prevention)Discover botnet on the intranet by monitoring C&C connections and blocking advanced botnet and ransomware threats
- Constantly updates botnet server addresses
- Prevention for C&C by IP, domain name and
URL
- Support for TCP, HTTP and DNS traffic detection
- Allowed and blocked list based on
iP address, domain name and URL
- Supports DGA and DNS tunnel detection
- DNS sinkhole
QoS (Quality of Service)Maximum number of guaranteed tunnels/bandwidth or per IP/user
- Domain-based tunnel assignment of
security, interface, address, user/group,
server/group of servers, app/group of apps,
TOS, VLAN
- Allocated bandwidth per hour, priority, or
equitable distribution of bandwidth
- Type of Service (TOS), Differentiated Services
(DiffServ) and traffic class support
- Bandwidth prioritization
remaining
- Maximum number of simultaneous connections per
IP
- Bandwidth allocation by category
of URL
- Bandwidth limiting when access is delayed
per user or IP
- Automatic and manual cleaning of expired traffic
used by the user
IPR (IP Reputation)Identifies and filters risky IP traffic, such as botnet hosts, spammers, TOR nodes, compromised hosts and brute-force attacks
- Logs, packet drops, or blocking for the
different types of risk in IP traffic
- Continuous updating of the IP database by
reputation and signatures
Anti-SpamThe Anti-Spam function is not supported in the A200 series

    alt