





☆ファイアウォール/FORTINET FORTIGATE-200E [FG-200E]!(#F3-920)「120サイズ」☆
Seller: jumboplanet2010
Current Price
14,800 JPY
1 bids Ends in ・May/01/2025 22:12:48(Tokyo)
Condition: A little damaged/dirty
Domestic Shipping (Japan) Paid By: The shipping mentioned here pertains to the delivery from the seller to the BuyJapon warehouse. You will still be responsible for the shipping fee to have the package sent from the BuyJapon warehouse to your address. | Buyer |
---|---|
Early Finish: If this option is set to "Yes," the seller has the ability to end the auction before the scheduled closing time. The highest bidder at the moment of termination will be declared the winner. | Yes |
Automatic Extension: If this option is set to "Yes," and a higher bid is placed within the last 5 minutes of the auction, the original ending time will be extended by an additional 5 minutes. This extension will occur each time the highest bid is updated. | No |
Auction ID: | d1179639499 |
Original Japanese name: | ☆ファイアウォール/FORTINET FORTIGATE-200E [FG-200E]!(#F3-920)「120サイズ」☆ |
Item Description
Translation is provided as a convenience. You agree that you understand the original auction details written in Japanese and are fully responsible to bid on this item.
商品の説明 | |
---|---|
●商品名:FORTINET FORTIGATE-200E [FG-200E] です(#F3-920)。 ●写真の通りの商品です。 ●login: admin/Password: pass。多少の擦り傷あり。 ●機器起動時は次の状態です。 FortiGate-200E (15:34-01.24.2017) Ver:05000003 Serial number:FG200E4Q1790**** RAM activation CPU(00:000306c3 bfebfbff): MP initialization CPU(02:000306c3 bfebfbff): MP initialization Total RAM: 4096MB Enabling cache...Done. Scanning PCI bus...Done. Allocating PCI resources...Done. Enabling PCI resources...Done. Zeroing IRQ settings...Done. Verifying PIRQ tables...Done. Boot up, boot device capacity: 15272MB. Press any key to display configuration menu... ............................. Reading boot image 3016705 bytes. Initializing firewall... System is starting... FortiGate-200E login: admin Password: You are forced to change your password, please input a new password. New Password:**** Confirm Password:**** Welcome! FortiGate-200E # get system status Version: FortiGate-200E v6.2.12,build1319,221102 (GA) Virus-DB: 91.03071(2023-05-08 05:20) Extended DB: 91.02207(2023-04-09 17:19) IPS-DB: 6.00741(2015-12-01 02:30) IPS-ETDB: 23.00506(2023-03-04 01:33) APP-DB: 23.00505(2023-03-02 01:13) INDUSTRIAL-DB: 6.00741(2015-12-01 02:30) Serial-Number: FG200E4Q1790**** IPS Malicious URL Database: 4.00640(2023-03-06 06:33) Botnet DB: 4.00796(2023-02-24 01:08) BIOS version: 05000003 System Part-Number: P19082-03 Log hard disk: Not available Hostname: FortiGate-200E Private Encryption: Disable Operation Mode: NAT Current virtual domain: root Max number of virtual domains: 10 Virtual domains status: 1 in NAT mode, 0 in TP mode Virtual domain configuration: disable FIPS-CC mode: disable Current HA mode: standalone Branch point: 1319 Release Version Information: GA FortiOS x86-64: Yes System time: Wed Apr 2 00:18:58 2025 FortiGate-200E # get system fortiguard-service status NAME VERSION LAST UPDATE METHOD EXPIRE AV Engine 6.165 2018-07-24 16:41:44 scheduled 2023-04-10 23:59:59 Virus Definitions 91.3071 2023-05-08 05:20:00 manual n/a Extended set 91.2207 2023-03-07 04:44:17 scheduled 2023-04-10 23:59:59 Flow-based Virus Definitions 91.1201 2023-03-07 04:44:17 scheduled 2023-04-10 23:59:59 Attack Definitions 6.741 2015-12-01 02:30:00 manual 2023-04-10 23:59:59 Attack Extended Definitions 23.506 2023-03-06 12:44:23 scheduled 2023-04-10 23:59:59 IPS Malicious URL Database 4.640 2023-03-06 08:44:23 scheduled 2023-04-10 23:59:59 Botnet Definitions 4.796 2023-03-02 12:44:27 scheduled 2023-04-10 23:59:59 IPS/FlowAV Engine 5.267 2019-11-19 18:58:26 scheduled 2023-04-10 23:59:59 IPS Config Script 1.009 2019-06-06 14:02:00 manual 2023-04-10 23:59:59 Application Definitions 23.505 2023-03-02 12:44:27 scheduled 2023-04-10 23:59:59 Industrial Attack Definitions 6.741 2015-12-01 02:30:00 manual n/a FortiGate-200E # get hardware status Model name: FortiGate-200E ASIC version: CP9 ASIC SRAM: 64M CPU: Intel(R) Celeron(R) CPU G1820 @ 2.70GHz Number of CPUs: 2 RAM: 3962 MB Compact Flash: 15331 MB /dev/sda Hard disk: not available USB Flash: not available Network Card chipset: Intel(R) Gigabit Ethernet Network Driver (rev.0003) Network Card chipset: FortiASIC NP6LITE Adapter (rev.) FortiGate-200E # get system interface == [ mgmt ] name: mgmt ip: 192.168.1.99 255.255.255.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ ha ] name: ha mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ wan1 ] name: wan1 mode: dhcp ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ wan2 ] name: wan2 mode: dhcp ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port1 ] name: port1 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port2 ] name: port2 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port3 ] name: port3 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port4 ] name: port4 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port5 ] name: port5 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port6 ] name: port6 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port7 ] name: port7 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port8 ] name: port8 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port9 ] name: port9 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port10 ] name: port10 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port11 ] name: port11 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port12 ] name: port12 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port13 ] name: port13 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port14 ] name: port14 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port15 ] name: port15 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port16 ] name: port16 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port17 ] name: port17 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ port18 ] name: port18 mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ modem ] name: modem mode: pppoe ip: 0.0.0.0 0.0.0.0 netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable == [ ssl.root ] name: ssl.root ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable == [ fortilink ] name: fortilink mode: static ip: 169.254.1.1 255.255.255.0 status: up netbios-forward: disable type: aggregate netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable FortiGate-200E #●使用されていた商品ですが、全機能を検証する環境が無い為、それ以上の動作は未確認です。 ●「電源が入らない」以外は、現状・ノークレーム扱いでの出品とさせて頂きます。 ●電源ケーブル等、付属品は一切ありません。 ●写真をご参照の上、ご入札のほど、宜しくお願いします。 ●送料は下記の「120サイズ」となります。 ●運輸業者は当方で決めさせていただきます。 ●上記の発送サイズは1台の場合です。複数同時発送の場合の送料はこちらからご連絡いたします。 ●中古のダンボールを使用する事より実際の発送サイズが異なる場合がございます。ご了承下さいませ。 ●東京都江戸川区西一之江の倉庫にてのお渡しも可能です。 ●その場合は、無梱包お渡しとなります。 ●営業時間は月曜日~金曜日、AM10:00~PM18:00となります。 ●第1.3.5土曜日のみ、11:00~15:00に限り、営業致します。 ●第2.4土曜日・日曜日・祝日は休みになります。 ●こちらからのご連絡は平日昼間のみとなります。 ●また、お取引後の評価ですが不要のお客様が多い為にこちらからは入れておりま せん。 ●評価が必要なお客様は取引メッセージにてのご連絡をお願い致します。
|
北海道 | 北東北 | 南東北 | 関東 | 信越 | 北陸 | 中部 | 関西 | 中国 | 四国 | 九州 | 沖縄 | ||
地域詳細 | 北海道 | 青森 岩手 秋田 |
宮城 山形 福島 |
茨城 栃木 群馬 埼玉 千葉 東京 神奈川 山梨 |
新潟 長野 |
富山 石川 福井 |
静岡 愛知 三重 岐阜 |
滋賀 京都 大阪 兵庫 奈良 和歌山 |
鳥取 島根 岡山 広島 山口 |
徳島 香川 愛媛 高知 |
福岡 佐賀 長崎 熊本 大分 宮崎 鹿児島 |
沖縄 離島 |
|
60サイズ・2kgまで | 1,460円 | 1,060円 | 940円 | 940円 | 940円 | 940円 | 940円 | 1,060円 | 1,190円 | 1,190円 | 1,460円 | 1,460円 | |
80サイズ・5kgまで | 1,740円 | 1,350円 | 1,230円 | 1,230円 | 1,230円 | 1,230円 | 1,230円 | 1,350円 | 1,480円 | 1,480円 | 1,740円 | 2,070円 | |
100サイズ・10kg まで | 2,050円 | 1,650円 | 1,530円 | 1,530円 | 1,530円 | 1,530円 | 1,530円 | 1,650円 | 1,790円 | 1,790円 | 2,050円 | 2,710円 | |
120サイズ・15kgまで | 2,370円 | 1,970円 | 1,850円 | 1,850円 | 1,850円 | 1,850円 | 1,850円 | 1,970円 | 2,110円 | 2,110円 | 2,370円 | 3,360円 | |
140サイズ・20kgまで | 2,710円 | 2,310円 | 2,190円 | 2,190円 | 2,190円 | 2,190円 | 2,190円 | 2,310円 | 2,450円 | 2,450円 | 2,710円 | 4,030円 | |
160サイズ・25kgまで | 3,030円 | 2,630円 | 2,510円 | 2,510円 | 2,510円 | 2,510円 | 2,510円 | 2,630円 | 2,770円 | 2,770円 | 3,030円 | 4,680円 |
令和5年4月3日よりのヤマト運輸送料です。 |
Similar Category Items

Fortinet/フォーティーネット ファイアウォール Fortigate-60F 5台セット(ライセンス期限詳細本文にて)●FG-60F 中古●送料
Current Price
88,000 JPY

FG-100F FORTINET/UTM ライセンス:2025/05/17 初期化済/FortiGate-100F 電源コード付き R07UTM063
Current Price
50,000 JPY

●中古 BUFFALO DWR-PG クレードル DWR-CR01 (光ポータブル BF-01B PWR-100D PWR-100F用) 12個セット
Buy Now Price
15,000 JPY