ВОЙТИ Регистрация >
Магазины
Информация

☆2台セット!Disk無し!ファイアウォール/FORTINET FortiGate-500D [FG-500D]!(#J5-303)「120サイズ」☆

Окончание торгов
08/14/2025 22:47 PM (Tokyo)
Текущее время
08/10/2025 17:47 PM (Tokyo)
Ставки
0
Количество
1 единиц
Лидер
Налог:
0 %
Состояние:
やや傷や汚れあり
Доставка по Японии:
Бесплатно
Номер лота:
Автопродление торгов
Область продажи:
Продавец:
Рейтинг продавца:
9386
Текущая цена
¥6,980
(~$44)
Add your bid

Осталось

КАЛЬКУЛЯТОР СТОИМОСТИ
Цена (JP¥)
Доставка по Японии (JP¥)
Общий вес (в граммах)
Страна назначения
Описание товара

商品の説明
●商品名:FORTINET FortiGate-500D [FG-500D]×2台セット!です(#J5-303)。
●写真の通りの商品です。
●login: admin/Password: 無。
●2台共に、Hard Disk/Disk Carrier無し。
●1台はScan DiskのWarningあり。もう1台はWarningありません。
●Warranty/Guarantee Sealed Sticker破損。
●機器起動時は次の状態です。
 FortiGate-500D (16:18-05.20.2016)
Ver:05000005
Serial number:FGT5HD391680****
RAM activation
CPU(00:000306a9 bfebfbff): MP initialization
CPU(02:000306a9 bfebfbff): MP initialization
CPU(04:000306a9 bfebfbff): MP initialization
CPU(06:000306a9 bfebfbff): MP initialization
Total RAM: 8192MB
Enabling cache...Done.
Scanning PCI bus...Done.
Allocating PCI resources...Done.
Enabling PCI resources...Done.
Zeroing IRQ settings...Done.
Verifying PIRQ tables...Done.
Boot up, boot device capacity: 15272MB.
Press any key to display configuration menu...
.............................

Reading boot image 2725377 bytes.
Initializing firewall...
System is starting...

FGT5HD391680**** login: admin
Password:
Welcome !

WARNING: File System Check Recommended! Unsafe reboot may have 
caused inconsistency in disk drive.
It is strongly recommended that you check file system consistency before proceeding.
Please run the 'execute disk list' and then 'execute disk scan 《ref#》'.
Note: The device will reboot and scan during startup. This may take up to an hour

FGT5HD391680**** # get system status
Version: FortiGate-500D v6.0.5,build0268,190507 (GA)
Virus-DB: 1.00123(2015-12-11 13:18)
Extended DB: 1.00000(2018-04-09 18:07)
Extreme DB: 1.00000(2018-04-09 18:07)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 16.00936(2020-10-01 07:09)
APP-DB: 16.00936(2020-10-01 07:09)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
Serial-Number: FGT5HD391680****
IPS Malicious URL Database: 2.00786(2020-10-03 05:05)
Botnet DB: 4.00346(2018-11-09 10:00)
BIOS version: 05000005
System Part-Number: P14822-07
Log hard disk: Not available
Hostname: FGT5HD391680****
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 0268
Release Version Information: GA
FortiOS x86-64: Yes
System time: Tue May 13 04:56:56 2025

FGT5HD391680**** # get system fortiguard-service status
NAME               VERSION LAST UPDATE          METHOD    EXPIRE
AV Engine           6.019  2018-10-17 22:37:00  manual    2017-03-12 17:00:00
Virus Definitions   1.123  2015-12-11 13:18:00  manual    n/a
Extended set        1.000  2018-04-09 18:07:00  manual    2017-03-12 17:00:00
Extreme set         1.000  2018-04-09 18:07:00  manual    2017-03-12 17:00:00
Flow-based Virus Definitions  1.123  2015-07-21 14:19:00  manual    2017-03-12 17:00:00
Attack Definitions  6.741  2015-12-01 02:30:00  manual    2021-04-21 17:00:00
Attack Extended Definitions  16.936  2020-10-01 12:17:40  scheduled 2021-04-21 17:00:00
IPS Malicious URL Database  2.786  2020-10-03 06:17:16  scheduled 2021-04-21 17:00:00
Botnet Definitions  4.346  2018-11-09 10:00:00  manual    2017-03-12 17:00:00
IPS/FlowAV Engine   4.035  2019-01-08 18:57:21  scheduled 2021-04-21 17:00:00
Application Definitions  16.936  2020-10-01 12:17:40  scheduled 2021-04-10 17:00:00
Industrial Attack Definitions  6.741  2015-12-01 02:30:00  manual    2018-04-22 17:00:00

FGT5HD391680**** # get hardware status
Model name: FortiGate-500D
ASIC version: CP8
ASIC SRAM: 64M
CPU: Intel(R) Xeon(R) CPU E3-1225 V2 @ 3.20GHz
Number of CPUs: 4
RAM: 7997 MB
Compact Flash: 15331 MB /dev/sda
Hard disk: not available
USB Flash: not available
Network Card chipset: Intel(R) Gigabit Ethernet Network Driver (rev.0003)
Network Card chipset: FortiASIC NP6 Adapter (rev.)

FGT5HD391680**** # get system interface
== [ mgmt1 ]
name: mgmt1   ip: 192.168.1.99 255.255.255.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable  
== [ mgmt2 ]
name: mgmt2   ip: 192.168.2.99 255.255.255.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable  
== [ port1 ]
name: port1   mode: static    ip: 192.168.100.99 255.255.255.0
   status: up    netbios-forward: disable    type: physical
   netflow-sampler: disable    sflow-sampler: disable
    scan-botnet-connections: disable    src-check: enable
    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port2 ]
name: port2   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port3 ]
name: port3   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port4 ]
name: port4   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port5 ]
name: port5   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port6 ]
name: port6   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port7 ]
name: port7   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port8 ]
name: port8   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port9 ]
name: port9   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port10 ]
name: port10   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port11 ]
name: port11   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port12 ]
name: port12   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port13 ]
name: port13   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port14 ]
name: port14   mode: static    ip: 0.0.0.0 0.0.0.0   status: up
    netbios-forward: disable    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port15 ]
name: port15   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ port16 ]
name: port16   status: up    type: physical   netflow-sampler: disable
    sflow-sampler: disable    scan-botnet-connections: disable
    src-check: enable    mtu-override: disable    wccp: disable
    drop-overlapped-fragment: disable    drop-fragment: disable
== [ modem ]
name: modem   mode: pppoe    ip: 0.0.0.0 0.0.0.0   netbios-forward: disable
    type: physical   netflow-sampler: disable    sflow-sampler: disable
    scan-botnet-connections: disable    src-check: enable
    mtu-override: disable    wccp: disable    drop-overlapped-fragment: disable
    drop-fragment: disable
== [ ssl.root ]
name: ssl.root   ip: 0.0.0.0 0.0.0.0   status: up    netbios-forward: disable
    type: tunnel   netflow-sampler: disable    sflow-sampler: disable
    scan-botnet-connections: disable    src-check: enable    wccp: disable

FGT5HD391680**** #
●使用されていた商品ですが、全機能を検証する環境が無い為、それ以上の動作は未確認です。
●ジャンク扱いでの出品とさせて頂きます。
●パーツ用などに如何でしょうか?
●電源ケーブル等、付属品は一切ありません。
●写真をご参照の上、ご入札のほど、宜しくお願いします。
●送料は下記の「120サイズ」(2台1セットあたり)となります。
●運輸業者は当方で決めさせていただきます。
●上記の発送サイズは2台1セットの場合です。複数同時発送の場合の送料はこちらからご連絡いたします。
●中古のダンボールを使用する事より実際の発送サイズが異なる場合がございます。ご了承下さいませ。
●東京都江戸川区西一之江の倉庫にてのお渡しも可能です。
●その場合は、無梱包お渡しとなります。
●営業時間は月曜日~金曜日、AM10:00~PM18:00となります。
●第1.3.5土曜日のみ、11:00~15:00に限り、営業致します。
●第2.4土曜日・日曜日・祝日は休みになります。
●こちらからのご連絡は平日昼間のみとなります。
●また、お取引後の評価ですが不要のお客様が多い為にこちらからは入れておりま せん。
●評価が必要なお客様は取引メッセージにてのご連絡をお願い致します。
●特定商取法の表示


【送料料金表】
北海道 北東北 南東北 関東 信越 北陸 中部 関西 中国 四国 九州 沖縄
地域詳細 北海道 青森
岩手
秋田
宮城
山形
福島
茨城
栃木
群馬
埼玉
千葉
東京
神奈川
山梨
新潟
長野
富山
石川
福井
静岡
愛知
三重
岐阜
滋賀
京都
大阪
兵庫
奈良
和歌山
鳥取
島根
岡山
広島
山口
徳島
香川
愛媛
高知
福岡
佐賀
長崎
熊本
大分
宮崎
鹿児島
沖縄
離島
60サイズ・2kgまで 1,460円 1,060円 940円 940円 940円 940円 940円 1,060円 1,190円 1,190円 1,460円 1,460円
80サイズ・5kgまで 1,740円 1,350円 1,230円 1,230円 1,230円 1,230円 1,230円 1,350円 1,480円 1,480円 1,740円 2,070円
100サイズ・10kg まで 2,050円 1,650円 1,530円 1,530円 1,530円 1,530円 1,530円 1,650円 1,790円 1,790円 2,050円 2,710円
120サイズ・15kgまで 2,370円 1,970円 1,850円 1,850円 1,850円 1,850円 1,850円 1,970円 2,110円 2,110円 2,370円 3,360円
140サイズ・20kgまで 2,710円 2,310円 2,190円 2,190円 2,190円 2,190円 2,190円 2,310円 2,450円 2,450円 2,710円 4,030円
160サイズ・25kgまで 3,030円 2,630円 2,510円 2,510円 2,510円 2,510円 2,510円 2,630円 2,770円 2,770円 3,030円 4,680円
令和5年4月3日よりのヤマト運輸送料です。
Have a question?