Specification |
Intranet Users: |
2000 |
Support Six 100M Ports: |
1 LAN, 1 DMZ, 4 WANs |
|
|
Network Interfaces |
Standard: |
1000BASE-T (RJ-45) * 2LAN interface
100BASE-T (RJ-45) * 2WAN interface
1000BASE-T(RJ-45)* 2WAN interface |
Actual Network Traffic (All Function Activated): |
60Mb |
Actual Network Traffic (Traffic Control Only): |
120Mb |
Hardware Bypass: |
Y |
Extension: |
N |
SFP: |
N |
GBIC: |
N |
Serial port: |
RS232 * 1 |
|
|
Specification of Hardware |
Dimensions (cm): |
42.7(W)×32.9(D)×4.45(H) |
Weight: |
4.5KG |
Standard 1U Frame Structure |
|
|
|
Functions |
Classification |
Functions |
Detailed indexes |
Access Control |
Blocking Malicious Websites |
Users can customize the blocking time for porn, viruses and phishing sites. |
Access Control Policy |
Providing safe access control policies with multiple-object combinations on the basis of groups, time, services, website policies, content polices, etc.. |
P2P Interception |
The in-depth detection technologies are used to block the traffic of such P2P software as Skype, MSN, QQ and BT. |
User Authentication |
Providing authentication function for web login, data base of local users and integration function for users data base. |
Control of Uploaded and Downloaded Files |
Controlling the types and sizes of the Http and Ftp files to be uploaded and downloaded, intercepting the transmission of files from Skype, MSN and other P2P software. |
IPMAC Binding |
Providing flexible IPMAC binding policies. |
Proxy Identification |
Identifying activities that escape the inspection of the firewall via such proxy servers as Http, Https and Socks. |
Interception of Sensitive Data |
Sensitive data transmitted via Http, Ftp, Smtp and Imap protocols can be intercepted so as to prevent the leakage or involvement of lawsuits |
Access Audit |
Mail Delay Audit |
The mails to be sent out will be delay-audited before delivery so as to ensure the information assets are not disclosed. |
Real-time Monitoring |
Monitoring the Internet access activities in a real-time manner. |
Access Monitoring |
Monitoring all Internet access records of the users, including web accesses, FTP, Telnet, mails (including webmail) and attachments, Skype, MSN, ICQ, Yahoo Message, etc. |
Traffic Analysis |
Internet traffic can be analyzed according to the statistics on the basis of users, protocols and time so as to optimize the utilization of Internet resources. |
Administration |
Administration Function |
Setting different levels of authorities for administrators. |
Local Administration |
GUI mode. |
Remote Administration |
GUI mode |
Configuration Backup |
Encrypted files are used for configuration backup and distribution. |
Firmware Upgrading |
Remote upgrading allows firmware to obtain the latest-version software and more functional modules. |
Reliable Design |
Auto Restoration |
The watchdog provides auto restoration function to restore the configurations |
Dual-machine Backup |
Supporting dual-machine backup |
Multi-line Backup |
Supporting backups of 2-4 lines |
Logs |
Logs Capacity |
|
Log backup |
Supporting auto and timed backup |
Logs import |
Logs can be converted into standard TXT files so as to be imported to MS SQL or ORACLE data library for the second-time development and analysis. |
Data center |
SANGFOR IAMs independent data center can be used to make detailed analysis. |
Network Compatibility |
Supporting Internet Ports |
PSTN/ISDN ADSL/xDSL Cable Modem DDN/ATM WLAN |
Supported Protocols |
IPv4IPv6 |
Network Partitions |
WANDMZLAN |
Multiple Lines |
Supporting even loads and backups of 2-4 Internet lines, providing optimized line selection and other multiple even loads policies. |
Working Mode |
Route mode and transparent mode |