High performance The firewall throughput starts at 40Gbps and supports firewall throughput above 320Gbps, with concurrent connections exceeding 50 million and new connections exceeding 500000 per second It has strong expansion capability, with a maximum of 8 expansion slots, and can support interface types such as gigabit optical interface, 10GE optical interface, 40G optical interface, etc. access control Access control can be carried out based on the user's access source and destination address, combined with access interfaces and service ports. It can support Address Translation (NAT) and Reverse Address Translation (DNAT), and can be queried and managed based on the concurrency of each policy to confirm the matching status of each policy. For virus prone environments, restrictions can be placed on the number of new and concurrent connections per IP to prevent a single host from occupying all network resources during a virus outbreak. Protocol control For HTTP, FTP, SMTP, and POP3 protocols, detailed protection up to the command primitive level can be implemented. For the HTTP protocol, restrictions can be imposed on POST and GET, as well as content control can be applied to transmitted content. If the content matches pre made sensitive vocabulary, the access connection can be blocked. Support industrial protocol control, including modbus, OPC, etc., support protocol integrity checks, and support protocol sharding control. Support NAT and access control for industrial dynamic protocols. Global Resource Definition Support defining countries and regions as address objects for unified management. By default, it has an address in Chinese Mainland, which is convenient for blocking access to non Chinese Mainland regions. Sensitive information leakage prevention In response to numerous leakage incidents, data anti leakage functions are necessary, and firewalls, as exit devices, can become the last barrier for data to escape from the network. The NetEase firewall supports sensitive identification of data. When sensitive data (such as bank cards, phone numbers, etc.) is protected in and out of network devices, the data can be blocked and logged according to preset conditions. Virus protection