200,00 TTC

1 en stock

Catégories : ,

Cyberoam CR 50ING Future Ready Network Firewall 8 Copper Gbe Ports Sophos

Interfaces
Copper GbE Ports 8
Configurable Internal/DMZ/WAN Ports Yes
Console Ports (RJ45) 1
USB Ports 2
Hardware Bypass Segment# 2

System Performance
Firewall Throughput (UDP) 3,250
Firewall Throughput (TCP) 3,000
New sessions/second 30,000
Concurrent sessions 1,000,000
IPSec VPN Throughput 400
No. of IPSec Tunnels 200
SSL VPN Throughput 300
WAF Protected Throughput (Mbps) 300
Anti-Virus Throughput 1,000
IPS Throughput 750
UTM Throughput 550

Stateful Inspection Firewall
– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) – User – Identity, Source & Destination Zone,MACand IP address, Service
– UTM policies – IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
– Layer 7 (Application) Control & Visibility
– Access Scheduling
– Policy based Source & Destination NAT
– H.323, SIPNATTraversal
– 802.1q VLAN Support
– DoS & DDoSAttack prevention
– MAC&IP-MAC filtering and Spoof prevention

GatewayAnti-Virus & Anti-Spyware
-Virus,Worm,Trojan: Detection & Removal
– Spyware, Malware, Phishing protection
– Automatic virus signature database update
– Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
– Customize individual user scanning
– Self Service Quarantine area
– Scan and deliver by file size
– Block by file types
– Add disclaimer/signature

Gateway Anti-Spam
– Inbound/Outbound Scanning
– Real-time Blacklist (RBL), MIME header check
– Filter based on message header, size, sender, recipient
– Subject line tagging
– IP address Black list/White list
– Redirect Spam mails to dedicated email address
– Image-based Spam filtering using RPD Technology
– Zero hour Virus Outbreak Protection
– Self Service Quarantine area
– Spam Notification through Digest
– IP Reputation-based Spam filtering

Intrusion Prevention System
– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
– Automatic real-time updates from CR Protect networks
– Protocol Anomaly Detection
– DDoS attack prevention

Web Filtering
– Inbuilt Web Category Database
– URL, keyword, File type block
– Categories: Default(82+), Custom
– Protocols supported: HTTP, HTTPS
– Block Malware, Phishing, Pharming URLs
– Schedule-based access control
– Custom block messages per category
– Block JavaApplets, Cookies, Active x
– CIPA Compliant
– Data leakage control via HTTP, HTTPS upload

Application Filtering
– Inbuilt Application Category Database
– 11+ Application Categories: e.g. Gaming, IM, P2P, Proxy
– Schedule-based access control
– Block

– P2Papplications e.g. Skype
– Anonymous proxies e.g. UItra surf
– “Phone home” activities
– Keylogger
– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility

Garantie, réservation & échange
Conditions générales de vente

Poids 5,100 kg

Avis

Il n’y a pas encore d’avis.

Seuls les clients connectés ayant acheté ce produit ont la possibilité de laisser un avis.