| Interfaces | |
| 10/100 Ethernet Ports | - |
| 10/100/1000 GBE Ports | 6 |
| Configurable Internal/DMZ/WAN Ports | Yes |
| Console Ports (RJ45) | - |
| SFP (Mini GBIC) Ports | - |
| USB ports | 2 |
| |
| System Performance* | |
| Firewall throughput (Mbps) | 1,000 |
| New sessions/second | 10,000 |
| Concurrent sessions | 400,000 |
| 168-bit Triple-DES/AES throughput (Mbps) | 80/100 |
| Antivirus throughput (Mbps) | 200 |
| IPS throughput (Mbps) | 300 |
| UTM throughput (Mbps) | 160 |
| |
| Stateful Inspection Firewall | |
| Multiple Zones security with separate levels of access rule enforcement for each zone | Yes |
Rules based on the combination of User, Source & Destination Zone and IP address and Service | Yes |
Actions include policy based control for IPS, Content Filtering, Anti virus, Anti spam and Bandwidth Management | Yes |
| Access Scheduling | Yes |
| Policy based Source & Destination NAT | Yes |
| H.323 NAT Traversal | Yes |
| 802.1q VLAN Support | Yes |
| DoS & DDoS Attack prevention | Yes |
| |
| Gateway Anti-Virus & Anti-Spyware | |
| Virus, Worm, Trojan Detection & Removal | Yes |
| Spyware, Malware, Phishing protection | Yes |
| Automatic virus signature database update | Yes |
| Scans HTTP, FTP, SMTP, POP3, IMAP, VPN Tunnels | Yes |
| Customize individual user scanning | Yes |
| Self Service Quarantine area | Yes |
| Scan and deliver by file size | Yes |
| Block by file types | Yes |
| |
| Gateway Anti-Spam | |
| Real-time Blacklist (RBL), MIME header check | Yes |
| Filter based on message header, size, sender, recipient | Yes |
| Subject line tagging | Yes |
| IP address Black list/White list | Yes |
| Redirect spam mails to dedicated email address | Yes |
| Image-based spam filtering using RPD Technology | Yes |
| Zero hour Virus Outbreak Protection | Yes |
| Self Service Quarantine area | Yes |
| |
| Intrusion Prevention System | |
| Signatures: Default (3000+), Custom | Yes |
| IPS Policies: Multiple, Custom | Yes |
| User-based policy creation | Yes |
| Automatic real-time updates from CRProtect networks | Yes |
| Protocol Anomaly Detection | Yes |
| Block | |
- P2P applications e.g. Skype - Anonymous proxies e.g. UItra surf - “Phone home” activities - Keylogger | Yes Yes Yes Yes |
| |
| Content & Application Filtering | |
| Inbuilt Web Category Database | Yes |
| URL, keyword, File type block | Yes |
| Categories: Default(82+), Custom | Yes |
| Protocols supported: HTTP, HTTPS | Yes |
| Block Malware, Phishing, Pharming URLs | Yes |
| Custom block messages per category | Yes |
| Block Java Applets, Cookies, Active X | Yes |
| CIPA Compliant | Yes |
| Data leakage control via HTTP upload | Yes |
| |
| Virtual Private Network - VPN | |
| IPSec, L2TP, PPTP Yes | |
| Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent Yes | |
| Hash Algorithms - MD5, SHA-1 Yes | |
| Authentication - Preshared key, Digital certificates Yes | |
| IPSec NAT Traversal Yes | |
| Dead peer detection and PFS support Yes | |
| Diffie Hellman Groups - 1,2,5,14,15,16 Yes | |
| External Certificate Authority support Yes | |
| Export Road Warrior connection configuration Yes | |
| Domain name support for tunnel end points Yes | |
| VPN connection redundancy Yes | |
| Overlapping Network support Yes | |
| Hub & Spoke VPN support Yes | |
| |
| SSL VPN | |
| TCP & UDP Tunneling | Yes |
| Authentication - Active Directory, LDAP, RADIUS, Cyberoam | Yes |
| Multi-layered Client Authentication - Certificate, Username/Password | Yes |
| Network access - Split and Full tunneling | Yes |
| Browser-based (Portal) Access - Clientless access | Yes |
| Lightweight SSL VPN Tunneling Client | Yes |
| Granular access control to all the Enterprise Network resources | Yes |
| Administrative controls - Session timeout, Dead Peer Detection, Portal customization | Yes |
| User & Group policy enforcement | Yes |
No comments:
Post a Comment