item_image_1
item_image_2
item_image_3

☆ファイアウォール/FORTINET FORTIGATE-200E [FG-200E]!(#F3-920)「120サイズ」☆

Seller: jumboplanet2010(9159 99.7% positive)

Current Price

14,800 JPY

1 bids Ends in ・May/01/2025 22:12:48(Tokyo)

Condition: A little damaged/dirty

Domestic Shipping (Japan) Paid By: The shipping mentioned here pertains to the delivery from the seller to the BuyJapon warehouse. You will still be responsible for the shipping fee to have the package sent from the BuyJapon warehouse to your address. Buyer
Early Finish: If this option is set to "Yes," the seller has the ability to end the auction before the scheduled closing time. The highest bidder at the moment of termination will be declared the winner. Yes
Automatic Extension: If this option is set to "Yes," and a higher bid is placed within the last 5 minutes of the auction, the original ending time will be extended by an additional 5 minutes. This extension will occur each time the highest bid is updated. No
Auction ID: d1179639499
Original Japanese name: ☆ファイアウォール/FORTINET FORTIGATE-200E [FG-200E]!(#F3-920)「120サイズ」☆
View on Yahoo! Auction

Item Description

Translation is provided as a convenience. You agree that you understand the original auction details written in Japanese and are fully responsible to bid on this item.


商品の説明
●商品名:FORTINET FORTIGATE-200E [FG-200E] です(#F3-920)。
●写真の通りの商品です。
●login: admin/Password: pass。多少の擦り傷あり。
●機器起動時は次の状態です。
FortiGate-200E (15:34-01.24.2017)
Ver:05000003
Serial number:FG200E4Q1790****
RAM activation
CPU(00:000306c3 bfebfbff): MP initialization
CPU(02:000306c3 bfebfbff): MP initialization
Total RAM: 4096MB
Enabling cache...Done.
Scanning PCI bus...Done.
Allocating PCI resources...Done.
Enabling PCI resources...Done.
Zeroing IRQ settings...Done.
Verifying PIRQ tables...Done.
Boot up, boot device capacity: 15272MB.
Press any key to display configuration menu...
.............................
Reading boot image 3016705 bytes.
Initializing firewall...
System is starting...

FortiGate-200E login: admin
Password:
You are forced to change your password, please input a new password.
New Password:****
Confirm Password:****
Welcome!

FortiGate-200E # get system status
Version: FortiGate-200E v6.2.12,build1319,221102 (GA)
Virus-DB: 91.03071(2023-05-08 05:20)
Extended DB: 91.02207(2023-04-09 17:19)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 23.00506(2023-03-04 01:33)
APP-DB: 23.00505(2023-03-02 01:13)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
Serial-Number: FG200E4Q1790****
IPS Malicious URL Database: 4.00640(2023-03-06 06:33)
Botnet DB: 4.00796(2023-02-24 01:08)
BIOS version: 05000003
System Part-Number: P19082-03
Log hard disk: Not available
Hostname: FortiGate-200E
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 1319
Release Version Information: GA
FortiOS x86-64: Yes
System time: Wed Apr  2 00:18:58 2025

FortiGate-200E # get system fortiguard-service status
NAME               VERSION LAST UPDATE          METHOD    EXPIRE
AV Engine           6.165  2018-07-24 16:41:44  scheduled 2023-04-10 23:59:59
Virus Definitions   91.3071  2023-05-08 05:20:00  manual    n/a
Extended set        91.2207  2023-03-07 04:44:17  scheduled 2023-04-10 23:59:59
Flow-based Virus Definitions  91.1201  2023-03-07 04:44:17  scheduled 2023-04-10 23:59:59
Attack Definitions  6.741  2015-12-01 02:30:00  manual    2023-04-10 23:59:59
Attack Extended Definitions  23.506  2023-03-06 12:44:23  scheduled 2023-04-10 23:59:59
IPS Malicious URL Database  4.640  2023-03-06 08:44:23  scheduled 2023-04-10 23:59:59
Botnet Definitions  4.796  2023-03-02 12:44:27  scheduled 2023-04-10 23:59:59
IPS/FlowAV Engine   5.267  2019-11-19 18:58:26  scheduled 2023-04-10 23:59:59
IPS Config Script   1.009  2019-06-06 14:02:00  manual    2023-04-10 23:59:59
Application Definitions  23.505  2023-03-02 12:44:27  scheduled 2023-04-10 23:59:59
Industrial Attack Definitions  6.741  2015-12-01 02:30:00  manual    n/a        

FortiGate-200E # get hardware status
Model name: FortiGate-200E
ASIC version: CP9
ASIC SRAM: 64M
CPU: Intel(R) Celeron(R) CPU G1820 @ 2.70GHz
Number of CPUs: 2
RAM: 3962 MB
Compact Flash: 15331 MB /dev/sda
Hard disk: not available
USB Flash: not available
Network Card chipset: Intel(R) Gigabit Ethernet Network Driver (rev.0003)
Network Card chipset: FortiASIC NP6LITE Adapter (rev.)

FortiGate-200E # get system interface
== [ mgmt ]
name: mgmt   ip: 192.168.1.99 255.255.255.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ ha ]
name: ha   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ wan1 ]
name: wan1   mode: dhcp    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ wan2 ]
name: wan2   mode: dhcp    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port1 ]
name: port1   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port2 ]
name: port2   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port3 ]
name: port3   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port4 ]
name: port4   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port5 ]
name: port5   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port6 ]
name: port6   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port7 ]
name: port7   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port8 ]
name: port8   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port9 ]
name: port9   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port10 ]
name: port10   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port11 ]
name: port11   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port12 ]
name: port12   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port13 ]
name: port13   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port14 ]
name: port14   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port15 ]
name: port15   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port16 ]
name: port16   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port17 ]
name: port17   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port18 ]
name: port18   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ modem ]
name: modem   mode: pppoe    ip: 0.0.0.0 0.0.0.0   netbios-forward: disable
    type: physical   netflow-sampler: disable    sflow-sampler: disable
    src-check: enable    proxy-captive-portal: disable    mtu-override: disable
    wccp: disable    drop-overlapped-fragment: disable    drop-fragment: disable
== [ ssl.root ]
name: ssl.root   ip: 0.0.0.0 0.0.0.0   status: up    netbios-forward: disable
    type: tunnel   netflow-sampler: disable    sflow-sampler: disable
    src-check: enable    explicit-web-proxy: disable    explicit-ftp-proxy: disable
    proxy-captive-portal: disable    wccp: disable
== [ fortilink ]
name: fortilink   mode: static    ip: 169.254.1.1 255.255.255.0   status: up
    netbios-forward: disable    type: aggregate   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable   

FortiGate-200E #
●使用されていた商品ですが、全機能を検証する環境が無い為、それ以上の動作は未確認です。
●「電源が入らない」以外は、現状・ノークレーム扱いでの出品とさせて頂きます。
●電源ケーブル等、付属品は一切ありません。
●写真をご参照の上、ご入札のほど、宜しくお願いします。
●送料は下記の「120サイズ」となります。
●運輸業者は当方で決めさせていただきます。
●上記の発送サイズは1台の場合です。複数同時発送の場合の送料はこちらからご連絡いたします。
●中古のダンボールを使用する事より実際の発送サイズが異なる場合がございます。ご了承下さいませ。
●東京都江戸川区西一之江の倉庫にてのお渡しも可能です。
●その場合は、無梱包お渡しとなります。
●営業時間は月曜日~金曜日、AM10:00~PM18:00となります。
●第1.3.5土曜日のみ、11:00~15:00に限り、営業致します。
●第2.4土曜日・日曜日・祝日は休みになります。
●こちらからのご連絡は平日昼間のみとなります。
●また、お取引後の評価ですが不要のお客様が多い為にこちらからは入れておりま せん。
●評価が必要なお客様は取引メッセージにてのご連絡をお願い致します。
●特定商取法の表示


【送料料金表】
北海道 北東北 南東北 関東 信越 北陸 中部 関西 中国 四国 九州 沖縄
地域詳細 北海道 青森
岩手
秋田
宮城
山形
福島
茨城
栃木
群馬
埼玉
千葉
東京
神奈川
山梨
新潟
長野
富山
石川
福井
静岡
愛知
三重
岐阜
滋賀
京都
大阪
兵庫
奈良
和歌山
鳥取
島根
岡山
広島
山口
徳島
香川
愛媛
高知
福岡
佐賀
長崎
熊本
大分
宮崎
鹿児島
沖縄
離島
60サイズ・2kgまで 1,460円 1,060円 940円 940円 940円 940円 940円 1,060円 1,190円 1,190円 1,460円 1,460円
80サイズ・5kgまで 1,740円 1,350円 1,230円 1,230円 1,230円 1,230円 1,230円 1,350円 1,480円 1,480円 1,740円 2,070円
100サイズ・10kg まで 2,050円 1,650円 1,530円 1,530円 1,530円 1,530円 1,530円 1,650円 1,790円 1,790円 2,050円 2,710円
120サイズ・15kgまで 2,370円 1,970円 1,850円 1,850円 1,850円 1,850円 1,850円 1,970円 2,110円 2,110円 2,370円 3,360円
140サイズ・20kgまで 2,710円 2,310円 2,190円 2,190円 2,190円 2,190円 2,190円 2,310円 2,450円 2,450円 2,710円 4,030円
160サイズ・25kgまで 3,030円 2,630円 2,510円 2,510円 2,510円 2,510円 2,510円 2,630円 2,770円 2,770円 3,030円 4,680円
令和5年4月3日よりのヤマト運輸送料です。

Similar Category Items

×

Home

Watchlist

bidding

Bidding

package_info

Package

My Page