☆2台セット!FORTINET FORTIGATE-600D [FG-600D]!(#J1-219)「120サイズ」☆

☆2台セット!FORTINET FORTIGATE-600D [FG-600D]!(#J1-219)「120サイズ」☆ 收藏

当前价格: 27800 日元(合 1317.72 人民币)
剩余时间:32673.3671497

商品原始页面

成为包月会员,竞拍更便捷

出价竞拍

一口价

预约出价

收藏商品

收藏卖家

费用估算

拍卖号:c1214350030

开始时间:02/02/2026 08:24:12

个 数:1

结束时间:02/05/2026 21:23:54

商品成色:二手

可否退货:不可

提前结束:可

日本邮费:买家承担

自动延长:不可

最高出价:

出价次数:0

卖家账号:jumboplanet**** 收藏卖家

店铺卖家:不是

发货地:東京都

店家评价:好评:9864 差评:26 拉黑卖家

卖家其他商品: 查看

  • 1、【自动延长】:如果在结束前5分钟内有人出价,为了让其他竞拍者有时间思考,结束时间可延长5分钟。
  • 2、【提前结束】:卖家觉得达到了心理价位,即使未到结束时间,也可以提前结束。
  • 3、参考翻译由网络自动提供,仅供参考,不保证翻译内容的正确性。如有不明,请咨询客服。
  • 4、本站为日拍、代拍平台,商品的品质和卖家的信誉需要您自己判断。请谨慎出价,竞价成功后订单将不能取消。
  • 5、违反中国法律、无法邮寄的商品(注:象牙是违禁品,受《濒临绝种野生动植物国际贸易公约》保护),本站不予代购。
  • 6、邮政国际包裹禁运的危险品,邮政渠道不能发送到日本境外(详情请点击), 如需发送到日本境外请自行联系渠道。

商品の説明
●商品名:FORTINET FORTIGATE-600D [FG-600D]×2台セット!(#J1-219)です。
●写真の通りの商品です。
●login: admin/Password: pass。
●2台共にDisk未搭載です。Disk Mounter/Carrier無し。
●開封歴あり。Sealed Stickerに破損あり。
●留めネジ不足で、一部のネジで固定されています。
●多少の擦り傷あり。機器起動時は次の状態です。
FortiGate-600D (16:35-04.27.2016)
Ver:05000005
Serial number:FGT6HD391680****
RAM activation
CPU(00:000306a9 bfebfbff): MP initialization
CPU(01:000306a9 bfebfbff): MP initialization
CPU(02:000306a9 bfebfbff): MP initialization
CPU(03:000306a9 bfebfbff): MP initialization
CPU(04:000306a9 bfebfbff): MP initialization
CPU(05:000306a9 bfebfbff): MP initialization
CPU(06:000306a9 bfebfbff): MP initialization
CPU(07:000306a9 bfebfbff): MP initialization
Total RAM: 8192MB
Enabling cache...Done.
Scanning PCI bus...Done.
Allocating PCI resources...Done.
Enabling PCI resources...Done.
Zeroing IRQ settings...Done.
Verifying PIRQ tables...Done.
Boot up, boot device capacity: 15272MB.
Press any key to display configuration menu...
.............................

Reading boot image 2914227 bytes.
Initializing firewall...
System is starting...

FortiGate-600D login: admin
Password: ---- N/A
You are forced to change your password. Please input a new password.
New Password: ---- pass
Confirm Password: ---- pass
Welcome!

FortiGate-600D # get system status
Version: FortiGate-600D v6.4.15,build2095,240129 (GA.M)
Security Level: 1
Virus-DB: 1.00000(2018-04-09 18:07)
Extended DB: 1.00000(2018-04-09 18:07)
Extreme DB: 1.00000(2018-04-09 18:07)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 6.00741(2015-12-01 02:30)
APP-DB: 6.00741(2015-12-01 02:30)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
IPS Malicious URL Database: 1.00001(2015-01-01 01:01)
Serial-Number: FGT6HD391680****
BIOS version: 05000005
System Part-Number: P18736-03
Log hard disk: Not available
Hostname: FortiGate-600D
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 2095
Release Version Information: GA
FortiOS x86-64: Yes
System time: Wed Dec 24 01:04:11 2025

FortiGate-600D # get system fortiguard-service status
NAME               VERSION LAST UPDATE          METHOD    EXPIRE
AV Engine           6.176  2023-05-17 21:45:00  manual    2024-09-10 23:59:59
Virus Definitions   1.000  2018-04-09 18:07:00  manual    n/a
Extended set        1.000  2018-04-09 18:07:00  manual    2024-09-10 23:59:59
Extreme set         1.000  2018-04-09 18:07:00  manual    2024-09-10 23:59:59
Flow-based Virus Definitions  1.000  2018-04-09 18:07:00  manual    2024-09-10 23:59:59
Attack Definitions  6.741  2015-12-01 02:30:00  manual    2024-09-10 23:59:59
Attack Extended Definitions  6.741  2015-12-01 02:30:00  manual    2024-09-10 23:59:59
IPS Malicious URL Database  1.001  2015-01-01 01:01:00  manual    2024-09-10 23:59:59
IPS/FlowAV Engine   6.160  2023-05-12 21:24:00  manual    2024-09-10 23:59:59
IPS Config Script   1.009  2019-06-06 14:02:00  manual    2024-09-10 23:59:59
Application Definitions  6.741  2015-12-01 02:30:00  manual    n/a              
Industrial Attack Definitions  6.741  2015-12-01 02:30:00  manual    n/a        

FortiGate-600D # get hardware status
Model name: FortiGate-600D
ASIC version: CP8
ASIC SRAM: 64M
CPU: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz
Number of CPUs: 8
RAM: 7995 MB
Compact Flash: 15331 MB /dev/sda
Hard disk: not available
USB Flash: not available
Network Card chipset: Intel(R) Gigabit Ethernet Linux Driver (rev.0003)
Network Card chipset: FortiASIC NP6 Adapter (rev.)

FortiGate-600D # get system interface
== [ mgmt1 ]
name: mgmt1   ip: 192.168.1.99 255.255.255.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable    mtu-override: disable
    wccp: disable    drop-overlapped-fragment: disable    drop-fragment: disable
== [ mgmt2 ]
name: mgmt2   ip: 192.168.2.99 255.255.255.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable    mtu-override: disable
    wccp: disable    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port1 ]
name: port1   mode: static    ip: 192.168.100.99 255.255.255.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port2 ]
name: port2   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
e    drop-fragment: disable
== [ port3 ]
name: port3   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port4 ]
name: port4   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port5 ]
name: port5   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port6 ]
name: port6   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port7 ]
name: port7   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    mtu-override: disable
    wccp: disable    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port8 ]
name: port8   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    mtu-override: disable
    wccp: disable    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port9 ]
name: port9   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port10 ]
name: port10   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port11 ]
name: port11   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port12 ]
name: port12   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port13 ]
name: port13   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port14 ]
name: port14   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port15 ]
name: port15   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    mtu-override: disable
    wccp: disable    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port16 ]
name: port16   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    mtu-override: disable
    wccp: disable    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port17 ]
name: port17   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ port18 ]
name: port18   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ modem ]
name: modem   mode: pppoe    ip: 0.0.0.0 0.0.0.0   status: down
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ ssl.root ]
name: ssl.root   ip: 0.0.0.0 0.0.0.0   status: up    netbios-forward: disable
    type: tunnel   netflow-sampler: disable    sflow-sampler: disable
    src-check: enable    explicit-web-proxy: disable    explicit-ftp-proxy: disable
    proxy-captive-portal: disable    wccp: disable
== [ fortilink ]
name: fortilink   mode: static    ip: 169.254.1.1 255.255.255.0   status: up
    netbios-forward: disable    type: aggregate   netflow-sampler: disable
    sflow-sampler: disable    src-check: enable    explicit-web-proxy: disable
    explicit-ftp-proxy: disable    proxy-captive-portal: disable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable   

FortiGate-600D #
●使用されていた商品ですが、全機能を検証する環境が無い為、それ以上の動作は未確認です。
●ジャンク扱いでの出品とさせて頂きます。
●パーツ用などに如何でしょうか?
●出品は、写真の商品本体×2台のみ、です。電源ケーブル等、付属品は何もありません。
●写真をご参照の上、ご入札のほど、宜しくお願いします。
●送料は下記の「120サイズ」(2台1セットあたり)となります。
●運輸業者は当方で決めさせていただきます。
●上記の発送サイズは2台1セットの場合です。複数同時発送の場合の送料はこちらからご連絡いたします。
●中古のダンボールを使用する事より実際の発送サイズが異なる場合がございます。ご了承下さいませ。
●東京都江戸川区西一之江の倉庫にてのお渡しも可能です。
●その場合は、無梱包お渡しとなります。
●営業時間は月曜日~金曜日、AM10:00~PM18:00となります。
●第1.3.5土曜日のみ、11:00~15:00に限り、営業致します。
●第2.4土曜日・日曜日・祝日は休みになります。
●こちらからのご連絡は平日昼間のみとなります。
●また、お取引後の評価ですが不要のお客様が多い為にこちらからは入れておりま せん。
●評価が必要なお客様は取引メッセージにてのご連絡をお願い致します。
●特定商取法の表示


【送料料金表】
北海道北東北南東北関東信越北陸中部関西中国四国九州沖縄
地域詳細北海道青森
岩手
秋田
宮城
山形
福島
茨城
栃木
群馬
埼玉
千葉
東京
神奈川
山梨
新潟
長野
富山
石川
福井
静岡
愛知
三重
岐阜
滋賀
京都
大阪
兵庫
奈良
和歌山
鳥取
島根
岡山
広島
山口
徳島
香川
愛媛
高知
福岡
佐賀
長崎
熊本
大分
宮崎
鹿児島
沖縄
離島
60サイズ・2kgまで1,460円1,060円940円940円940円940円940円1,060円1,190円1,190円1,460円1,460円
80サイズ・5kgまで1,740円1,350円1,230円1,230円1,230円1,230円1,230円1,350円1,480円1,480円1,740円2,070円
100サイズ・10kgまで2,050円1,650円1,530円1,530円1,530円1,530円1,530円1,650円1,790円1,790円2,050円3,250円
120サイズ・15kgまで2,610円2,170円2,040円2,040円2,040円2,040円2,040円2,170円2,310円2,310円2,610円3,360円
140サイズ・20kgまで3,250円2,780円2,630円2,630円2,630円2,630円2,630円2,780円2,930円2,930円3,250円4,030円
160サイズ・25kgまで3,630円3,160円3,020円3,020円3,020円3,020円3,020円3,160円3,320円3,320円3,630円4,680円
令和7年10月1日よりのヤマト運輸送料です。
出价者 信用 价格 时间

推荐