Interfaces | |
10/100 Ethernet Ports | - |
10/100/1000 GBE Ports | 6 |
Configurable Internal/DMZ/WAN Ports | Yes |
Console Ports (RJ45) | - |
SFP (Mini GBIC) Ports | - |
USB ports | 2 |
| |
System Performance* | |
Firewall throughput (Mbps) | 1,000 |
New sessions/second | 10,000 |
Concurrent sessions | 400,000 |
168-bit Triple-DES/AES throughput (Mbps) | 80/100 |
Antivirus throughput (Mbps) | 200 |
IPS throughput (Mbps) | 300 |
UTM throughput (Mbps) | 160 |
| |
Stateful Inspection Firewall | |
Multiple Zones security with separate levels of access rule enforcement for each zone | Yes |
Rules based on the combination of User, Source & Destination Zone and IP address and Service | Yes |
Actions include policy based control for IPS, Content Filtering, Anti virus, Anti spam and Bandwidth Management | Yes |
Access Scheduling | Yes |
Policy based Source & Destination NAT | Yes |
H.323 NAT Traversal | Yes |
802.1q VLAN Support | Yes |
DoS & DDoS Attack prevention | Yes |
| |
Gateway Anti-Virus & Anti-Spyware | |
Virus, Worm, Trojan Detection & Removal | Yes |
Spyware, Malware, Phishing protection | Yes |
Automatic virus signature database update | Yes |
Scans HTTP, FTP, SMTP, POP3, IMAP, VPN Tunnels | Yes |
Customize individual user scanning | Yes |
Self Service Quarantine area | Yes |
Scan and deliver by file size | Yes |
Block by file types | Yes |
| |
Gateway Anti-Spam | |
Real-time Blacklist (RBL), MIME header check | Yes |
Filter based on message header, size, sender, recipient | Yes |
Subject line tagging | Yes |
IP address Black list/White list | Yes |
Redirect spam mails to dedicated email address | Yes |
Image-based spam filtering using RPD Technology | Yes |
Zero hour Virus Outbreak Protection | Yes |
Self Service Quarantine area | Yes |
| |
Intrusion Prevention System | |
Signatures: Default (3000+), Custom | Yes |
IPS Policies: Multiple, Custom | Yes |
User-based policy creation | Yes |
Automatic real-time updates from CRProtect networks | Yes |
Protocol Anomaly Detection | Yes |
Block | |
- P2P applications e.g. Skype - Anonymous proxies e.g. UItra surf - “Phone home” activities - Keylogger | Yes Yes Yes Yes |
| |
Content & Application Filtering | |
Inbuilt Web Category Database | Yes |
URL, keyword, File type block | Yes |
Categories: Default(82+), Custom | Yes |
Protocols supported: HTTP, HTTPS | Yes |
Block Malware, Phishing, Pharming URLs | Yes |
Custom block messages per category | Yes |
Block Java Applets, Cookies, Active X | Yes |
CIPA Compliant | Yes |
Data leakage control via HTTP upload | Yes |
| |
Virtual Private Network - VPN | |
IPSec, L2TP, PPTP Yes | |
Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent Yes | |
Hash Algorithms - MD5, SHA-1 Yes | |
Authentication - Preshared key, Digital certificates Yes | |
IPSec NAT Traversal Yes | |
Dead peer detection and PFS support Yes | |
Diffie Hellman Groups - 1,2,5,14,15,16 Yes | |
External Certificate Authority support Yes | |
Export Road Warrior connection configuration Yes | |
Domain name support for tunnel end points Yes | |
VPN connection redundancy Yes | |
Overlapping Network support Yes | |
Hub & Spoke VPN support Yes | |
| |
SSL VPN | |
TCP & UDP Tunneling | Yes |
Authentication - Active Directory, LDAP, RADIUS, Cyberoam | Yes |
Multi-layered Client Authentication - Certificate, Username/Password | Yes |
Network access - Split and Full tunneling | Yes |
Browser-based (Portal) Access - Clientless access | Yes |
Lightweight SSL VPN Tunneling Client | Yes |
Granular access control to all the Enterprise Network resources | Yes |
Administrative controls - Session timeout, Dead Peer Detection, Portal customization | Yes |
User & Group policy enforcement | Yes |
No comments:
Post a Comment