Compare Products

Hide

Clear All

VS

RG-WALL 1600-Z5100-S Security - 1
RG-WALL 1600-Z5100-S Security - 2
RG-WALL 1600-Z5100-S Security - 3
RG-WALL 1600-Z5100-S Security - 4
RG-WALL 1600-Z5100-S Security - 5
RG-WALL 1600-Z5100-S Security - 6
RG-WALL 1600-Z5100-S Security - 7
RG-WALL 1600-Z5100-S Security - 8
RG-WALL 1600-Z5100-S Security - 9
RG-WALL 1600-Z5100-S Security - 10
RG-WALL 1600-Z5100-S Security - 11
RG-WALL 1600-Z5100-S Security - 12
RG-WALL 1600-Z5100-S Security - 1
RG-WALL 1600-Z5100-S Security - 2
RG-WALL 1600-Z5100-S Security - 3
RG-WALL 1600-Z5100-S Security - 4
RG-WALL 1600-Z5100-S Security - 5
RG-WALL 1600-Z5100-S Security - 6
RG-WALL 1600-Z5100-S Security - 7
RG-WALL 1600-Z5100-S Security - 8
RG-WALL 1600-Z5100-S Security - 9
RG-WALL 1600-Z5100-S Security - 10
RG-WALL 1600-Z5100-S Security - 11
RG-WALL 1600-Z5100-S Security - 12
Picture

RG-WALL 1600-Z5100-S, Next-Generation Z Series Firewall

NGFW with flexible scalability, high security performance, simple configuration, cloud management, fit for network egresses of schools, SMBs, hospitals, governments, and data centers

Models
Series
Highlight Features
  • License-based scalability, firewall throughput scaling up to 10 Gbps
  • Five-in-one firewall license, comprehensive network security defense capability
  • Cloud, make your business easy
  • Intelligent policy manager (port scan + traffic learning), simple firewall deployment
  • Policy simulation lab, policy optimization and execution after simulation, seamlessly protect your live networks
  • Intelligent diagnostic center, one-click fault locating, saving time and effort
Sales Enquiry
Features

RG-WALL 1600-Z5100-S
New-Generation Z Series Enterprise-Level Firewalls

Flexible expansion, simplified deployment, and cloud O&M, fully unleashing security defense capability

Flexible Firewall Performance Scalability, Satisfying Service Upgrade and Development Demands

By adding software licenses, you can increase network throughput of RG-WALL 1600-Z5100-S by 3-10 Gbps. Each software license increases the throughput by 1 Gbps.
In addition, the high-performance free SSL VPN is provided, allowing up to 1000 users at no extra cost.

Five-in-One Firewall License for
Comprehensive Network Security Defense

The five-in-one license for intrusion prevention (IPS), antivirus (AV), threat intelligence, URL filtering, and application identification enhances the network defense capabilities of your organization in an all-round way, dramatically improving the security of data and systems.

Intrusion Prevention System (IPS):
Antivirus (AV):
Threat Intelligence (TI):
Application Control:
URL Filtering:
  • Unmatched Protection: Ruijie's IPS signature library covers over 15,000 entries for detecting various cyber threats.

  • Stay Ahead of Attacks: With more than 90 classifications, including mining and ransomware, our IPS is at the forefront of security technology.

  • Continuous Improvement: Weekly updates and a leading number of monthly additions ensure that your network security is always one step ahead.

  • Millions of Signatures:  Ruijie TIANMU Security Lab cooperates with a leading antivirus company and has developed over 10 million AV signatures for the Z series firewalls.

  • Accurate Detection:  With an accuracy rate of 99.97% and a zero false positive rate, Ruijie's AV technology is widely recognized for its high precision.

  • TI is an important concept in cyber security and involves the collection, analysis, and dissemination of information on potential security threats from various sources. Ruijie Z series firewalls leverage a local TI signature library and employ TI for threat hunting to identify undetected threats or attackers on a network.

  • Comprehensive Traffic Management: Our NGFW's application control signature library can recognize 7200+ applications. With Deep Packet Inspection (DPI), the NGFW can accurately identify and control P2P traffic.

  • Granular Access Control: The NGFW categorizes and manages application traffic with high precision, allowing for tailored access control policies that align with your business needs.

  • Proactive Threat Prevention: The NGFW automatically detects and blocks malicious applications and attack payloads, safeguarding your network against emerging threats.

  • URL Identification: Ruijie firewall's URL signature library can precisely categorize web traffic in real time.

  • Secure Web Access: You can configure custom security policies to permit or deny web resource access.

  • Threat Interception: The NGFW detects and blocks malicious websites to prevent phishing and malware.

Cloud, Make Your Business Easy

Self-Organizing Network

Self-Organizing Network

Remote Policy Configuration

Remote Policy Configuration

Remote Firmware Upgrade

Remote Firmware Upgrade

License Activation on Mobile App

License Activation on Mobile App

Port Scan + Traffic Learning, Simple Firewall Onboarding

During deployment, use Port Scan to automatically identify the IP address and port number of a service system, and then enable Traffic Learning to automatically detect the service access relationship on the live network. You can also generate access control policies based on ports with one click, and complete firewall onboarding without professional knowledge.

Port Scan
Traffic Learning
Policy Generation

Policy Execution After Simulation,
Policy Optimization Anytime

Verify policies using real traffic in Policy Simulation Space without affecting actual services or compromising network performance.
Apply policies to the live network with one click after verification.

One-Click Fault Locating
in the Intelligent Diagnostic Center

The intelligent diagnostic center supports automated analysis of network faults and provides a one-stop troubleshooting wizard for O&M personnel to quickly locate and resolve faults.

Comparison
Firewall throughput of IPv4 packets (1518-byte UDP packets)
Firewall throughput (packets per second)
Concurrent sessions (TCP)
New sessions/second (TCP)
Firewall policies
SSL VPN throughput (1392-byte)
Concurrent SSL VPN users (recommended maximum, tunnel mode)
Application control throughput (HTTP 64K)2
IPsec VPN Throughput (512-byte)
Gateway-to-Gateway IPsec VPN Tunnels
Dimensions (W x D x H)
Warranty
Specifications

Product Performance

Firewall Throughput4

Firewall (Traffic Mix)

IPS1

NGFW1,2

Threat Protection1,3

15 Gbps

3 Gbps

1.8 Gbps

1.6 Gbps

1 Gbps

15 Gbps

4 Gbps

2.1 Gbps

1.7 Gbps

1.14 Gbps

15 Gbps

5 Gbps

2.4 Gbps

1.8 Gbps

1.28 Gbps

15 Gbps

6 Gbps

2.7 Gbps

1.9 Gbps

1.42 Gbps

15 Gbps

7 Gbps

3 Gbps

2.1 Gbps

1.56 Gbps

15 Gbps

8 Gbps

3.3 Gbps

2.2 Gbps

1.7 Gbps

15 Gbps

9 Gbps

3.6 Gbps

2.3 Gbps

1.8 Gbps

15 Gbps

10 Gbps

4 Gbps

3.5 Gbps

2 Gbps

Combination of product and performance licenses:

3G: RG-WALL 1600-Z5100-S chassis

4G: RG-WALL 1600-Z5100-S chassis + 1 RG-WALL 1600-Z5100-S-1G-LIC performance license

5G: RG-WALL 1600-Z5100-S chassis + 2 RG-WALL 1600-Z5100-S-1G-LIC performance licenses

6G: RG-WALL 1600-Z5100-S chassis + 3 RG-WALL 1600-Z5100-S-1G-LIC performance licenses

7G: RG-WALL 1600-Z5100-S chassis + 4 RG-WALL 1600-Z5100-S-1G-LIC performance licenses

8G: RG-WALL 1600-Z5100-S chassis + 5 RG-WALL 1600-Z5100-S-1G-LIC performance licenses

9G: RG-WALL 1600-Z5100-S chassis + 6 RG-WALL 1600-Z5100-S-1G-LIC performance licenses

10G: RG-WALL 1600-Z5100-S chassis + 7 RG-WALL 1600-Z5100-S-1G-LIC performance licenses

 

System Performance and Capacity

RG-WALL 1600-Z5100-S

Firewall throughput of IPv4 packets (1518-byte UDP packets)4

15 Gbps

Firewall throughput (packets per second)

2.3 Mpps

Concurrent sessions (TCP)

1000000

New sessions/second (TCP)

134000

Firewall policies

4000

SSL VPN throughput (1392-byte)

3 Gbps

Concurrent SSL VPN users (recommended maximum, tunnel mode)

1000

Application control throughput (HTTP 64K) 2

10 Gbps

IPsec VPN throughput (512-byte)

4 Gbps

Gateway-to-Gateway IPsec VPN Tunnels

1000

Note:

All performance values are the maximum values and may vary depending on system configuration.

  1. The performance values of IPS (mixed traffic), application control, NGFW, and threat protection are measured with logging enabled.

  2. NGFW performance is measured with firewall, IPS, and application control enabled.

  3. Threat protection performance is measured with firewall, IPS, application control, and malware protection enabled.

  4. Firewall throughput is the maximum forwarding performance (1518-byte UDP packets) of hardware.


Hardware Specifications

Dimensions and Weight

RG-WALL 1600-Z5100-S

Product dimensions (W x D x H)

440 mm x 300 mm x 43.6 mm (17.32 in. x 11.81 in. x 1.72 in.)

Shipping dimensions (W x D x H)

545 mm x 450 mm x 130 mm (21.46 in. x 17.72 in. x 5.12 in.)

Product weight

4.44 kg (9.79 lbs)

Shipping weight

5.7 kg (12.57 lbs)

Form factor

1 RU rack

 

Port Specifications

RG-WALL 1600-Z5100-S

Fixed service port

8 x 10/100/1000BASE-T ports

2 x 1GE SFP ports

4 x 10GE SFP+ ports

Fixed management port

1 x RJ45 MGMT port (reusing Ge0/0)

1 x RJ45 console port (RS-232)

USB port

2 x USB 2.0 ports

 

Storage

RG-WALL 1600-Z5100-S

Hard disk

No hard disk for factory delivery. A 1 TB SATA hard drive can be added.

 

Power Supply and Consumption

RG-WALL 1600-Z5100-S

Power supply

2 x pluggable power modules (one power module for factory delivery)

l Rated input voltage: 100–240 V; 50–60 Hz

l Rated input current: 2 A (maximum)

Max. Power Consumption

< 60 W

 

Environment and Reliability

RG-WALL 1600-Z5100-S

Operating temperature

0°C to 45°C (32°F to 113°F)

Storage temperature

–40°C to +70°C (–40°F to +158°F)

Operating humidity

40% RH to 65% RH (non-condensing)

Storage humidity

10% RH to 90% RH (non-condensing)

Noise level

36 dB

Operating altitude

0–5000 m (0–16404 ft.)

Compliance

EMC SZEM2404002506ATV

LVD SZES2404002242AT

 

Software Specifications

Network

RG-WALL 1600-Z-S Series

Physical interface

Configuring interfaces as LAN/WAN interfaces; three modes for WAN interfaces: PPPoE, DHCP, and static IP; configuring the routing, transparent, or bypass mode for interfaces

Sub-interface

Configuring sub-interfaces and VLAN IDs

Bridge interface

Configuring interfaces in transparent mode as bridge interfaces

Aggregate interface

Configuring aggregate interfaces

Routing

IPv4/IPv6 static and dynamic routing, routing policy, Policy-based Routing (PBR), ISP address library-based routing, application-based routing, and egress load balancing

DHCP server

DHCP server functions

DNS server

Configuring DNS addresses for devices

DDNS

Multiple DDNS service providers supported

Link detection

Link detection and link detection logs

VPN

SSL VPN and IPsec VPN

VRRP

VRRP functions



Object

RG-WALL 1600-Z-S Series

Address and address group

Configuring IPv4/IPv6 address objects in IP address/range format

Zone

Configuring security zones

Application and application group

Configuring application types in application/application group mode

Service and service group

Configuring service objects; common default port services supported

Time plan

Configuring time objects; one-off time plans and cyclic time plans supported

ISP address library

Default ISP address libraries: China Telecom (CHN), China Mobile (CHN), China Unicom (CHN), CERNET (CHN), and Beijing Teletron (CHN); customizing, importing, and exporting ISP address libraries

Virus protection template

Configuring content object templates; antivirus (AV) templates supported; configuring quick scan or deep scan; configuring templates based on protocols and directions; setting excluded viruses

Intrusion prevention template

Configuring content object templates; predefined Intrusion Prevention System (IPS) templates supported; customizing IPS templates; configuring rule filters based on objects, severity, protocols, and threat types; setting excluded rules

File filtering

Configuring content object templates; file filter templates (filtering by file type) supported

URL filtering

URL filtering

SSL proxy certificate

Adding, importing, deleting, viewing, and downloading SSL proxy certificates; configuring a global SSL proxy certificate

Server certificate

Importing, deleting, viewing, and downloading server certificates

Security rule base

Viewing default security rules in the IPS security library

Content identification

URL category and keyword configuration

User authentication

User management, user import, authentication server configuration, real-name user information synchronization, and authentication policy configuration



Policy

RG-WALL 1600-Z-S Series

Traffic learning

Traffic learning to record destination IP addresses and port numbers as well as abnormal traffic; exporting traffic learning logs

Network address translation (NAT)

NAT; configuring NAT policies; importing NAT policies in a batch; common NAT application-level gateway (ALG) services; server port mapping; viewing NAT address pool status

Security policy

Configuring security policies; customizing policies based on parameters including objects, contents, and zones; viewing the policy list; importing security policies in a batch

Policy simulation

Simulating policy execution in the simulation space to check whether uncertain security policies can achieve expected effects

Policy configuration wizard

Security policy configuration wizard for conducting port scan, performing configurations, testing configurations, and other steps to generate security policies

Policy optimization

Sorting out configured security policies and analyzing policies to identify redundant, expired, and conflicting policies

Policy lifecycle

Full lifecycle display of security policies, including detailed records of policy changes

Port scan

Port scan of configured IP ranges for all ports or selected ports; policy creation prompt for scan results

DoS/DDoS attack defense

Different DDoS attack defense policies in security defense

ARP attack defense

Preventing ARP attacks including ARP spoofing and ARP flooding in security defense

Local defense

Configuring local defense policies in security defense

Threat intelligence

Enabling or disabling threat intelligence; customizing threat intelligence; managing excluded threats

Blocklist and allowlist

Configuring global blocklists and allowlists

SSL proxy policy

Configuring SSL proxy policies; customizing policies based on parameters including objects, contents, and zones; viewing the policy list

SSL proxy template

Configuring SSL proxy templates; setting the template type to protecting client or server

Allowlist

Configuring domain name allowlists and application allowlists

Behavior analysis

Configuring analysis policies, templates, and allowlists



System

RG-WALL 1600-Z-S Series

Simple Network Management Protocol (SNMP)

Connecting to third-party platforms for management through SNMPv1/v2/v3

Patch installation

Downloading and installing patches for upgrade

Cloud management platform

Enabling or disabling unified management on the cloud management platform; log upload to the cloud

One-click collection

Collecting fault information with one click

Device health

Device health diagnosis

Service diagnosis

Service continuity diagnosis

System upgrade

System upgrade and rollback

Database backup

System database backup and restoration

Factory settings restoration

Restoring factory settings on the web UI

Show More
Resources All Resources
Order Information
Model Description
RG-WALL 1600-Z5100-S The RG-WALL 1600-Z5100-S cloud-managed firewall provides 8 x 1GE ports, 2 x 1GE SFP ports, 4 x 10GE SFP+ ports, and one power module (for factory delivery). The firewall is 1 RU high and supports expansion of 1 TB enterprise-class SATA hard drive.
RG-WALL 1600-Z5100-S-1G-LIC Performance expansion license for the RG-WALL 1600-Z5100-S cloud-managed firewall: One license provides expansion of 1 Gbps network throughput. For each device, up to seven licenses can be added to achieve 10 Gbps network throughput.
RG-WALL 1600-Z1500-S-LIS-E-1Y Five-in-one license for the firewall: One license provides one-year upgrade services for IPS, AV, APP, and URL signature libraries and one-year threat intelligence services.
RG-NSEC-HDD-1T 1 TB enterprise-class SATA hard drive can be added on the Z series firewall to meet hard disk configuration requirements.
RG-PA70I Power module, which can be added as required to provide power redundancy.
Show More
How would you rate your experience on this page?
Very disatisfying
Very satisfying
If you would like to offer more comment, please type in the textbox below, that would be helpful for the improvement of this page.
Submit
Thank you for your feedback!

Ruijie Networks websites use cookies to deliver and improve the website experience.

See our cookie policy for further details on how we use cookies and how to change your cookie settings.

Cookie Manager

When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.

  • Performance cookies

    Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.

  • Essential cookies

    This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.

Accept All

View Cookie Policy Details

Contact Us

Contact Us

How can we help you?

Contact Us

Get an Order help

Contact Us

Get a tech support