Form Factor
|
DIN rail mountable
|
Connectivity Technology
|
Wired
|
Data Link Protocol
|
Ethernet, Fast Ethernet, Gigabit Ethernet
|
Network / Transport Protocol
|
TCP/IP, PPTP, UDP/IP, L2TP, IPSec, PPPoE, PPPoA, ARP, SMTP, FTP, DHCP, DNS, POP3, SMB, DDNS, SMTPS
|
Routing Protocol
|
OSPF, RIP, BGP
|
Remote Management Protocol
|
SNMP, HTTP, HTTPS, SSH, CLI, SMTP, SMTPS
|
Performance
|
Firewall throughput (UDP): 1.5 Gbps ¦ VPN throughput (128-bit AES, TINA): 240 Mbps ¦ VPN throughput (256-bit AES, TINA): 200 Mbps ¦ VPN throughput (256-bit AES, SHA-256): 180 Mbps ¦ VPN throughput (256-bit AES, MD5): 200 Mbps ¦ VPN throughput (256-bit AES, GCM): 180 Mbps ¦ IPS throughput (UDP): 400 Mbps ¦ NGFW throughput: 400 Mbps ¦ Threat protection throughput: 380 Mbps
|
Capacity
|
Concurrent sessions: 80000 ¦ New sessions per second: 8000 ¦ Maximum number of users: 50 - 100
|
Status Indicators
|
Power, HDD activity, status, link/activity
|
Features
|
Firewall protection, routing, NAT support, VPN support, PAT support, ARP support, load balancing, VLAN support, Syslog support, traffic shaping, Stateful Packet Inspection (SPI), DoS attack prevention, manageable, Intrusion Detection System (IDS), IPv6 support, High Availability, Intrusion Prevention System (IPS), URL filtering, Deep Packet Inspection (DPI), DDos attack prevention, IPSec Virtual Private Network (VPN), anti-spam protection, anti-malware protection, Quality of Service (QoS), IPSec NAT-Traversal (NAT-T), SSH support, DHCP server, FTP proxy, HTTP proxy, reset button, bandwidth control, IPv4 support, fanless, anti-spyware protection, web threat protection, e-mail protection, DHCP relay, SNMP trap, application filtering, DHCP client, e-mail notification, Identity Awareness, rugged, Virtual Routing and Forwarding (VRF), SMS remote control, DNS caching, 1.5 KV Magnetic Isolation, 15KV ESD Protector, VoIP support, anti-virus protection, traffic replication, event notification, Web Filtering, Jumbo Frames support (up to 9000 bytes), black list, white list, bridge mode, Transparent Proxy, built-in hardware crypto accelerator, flooding detection
|
Encryption Algorithm
|
DES, Triple DES, Blowfish, CAST, SSL, TLS, PKI, 128-bit AES, 256-bit AES
|
Authentication Method
|
SecurID, RADIUS, X.509 certificates, TACACS+, LDAP, Active Directory, NTLM
|
Compliant Standards
|
IEEE 802.1Q, X.509
|