- Product Categories
- Friendly Links
Information Name: | Buying public to UR 915 Firewall multifunction UTM devices send iPod nano 16GB One |
Published: | 2013-03-08 |
Validity: | 365 |
Specifications: | Buying public to UR 915 Firewall multifunction UTM devices send iPod nano 16GB One |
Quantity: | 1.00 |
Price Description: | |
Detailed Product Description: | Products built-in SPI firewall UR-915 technology, proactively block, block hackers, whether SYN, ICMP, UDP attack can stop. The public to information is to apply the concept of reasonable traffic that each source will not produce too many packets at the same time, in case more than set a reasonable number of packets, the firewall will require extra packet blocking. IP V4 of / V6 Dual Band firewall technology IP V4 address the shortage of IP V6 era sooner or later come in developing the next generation UTM ShareTech this trend together with a network interface, whether it is defined as WAN or a LAN, can simultaneously bind the IP address of the V4 or V6, so whether it is in the environment of the pure V4 the V4/V6 mixing pure V6 environment, UR-915 are the same combination. Clam AV antivirus engine protection system virus mail filtering Clam AV antivirus engine, can detect more than 800,000 kinds of viruses, worms, Trojan horses, regardless of the e-mail, WEB, FTP altogether will automatically scan for viruses, automatic daily via the Internet network update virus files and the virus messages Ranking Report. Web, FTP anti-virus filtering service when the user opens a browser to access a web page, UR-915 according to the system set discriminant site security, and can do the filtering and file blocking rules for file upload and download. Based on past experience, the use of FTP download information most likely to let the computer poisoning. So use the Internet to do the download and upload files to pay special attention, because there may be accidentally let their information be destroyed. UR-915 OfficeScan to help companies do a good job scanning of FTP upload and download scanning services, and can prevent employees use FTP to download files, do the security services for enterprise network security. Internal mail or external mail spam filter can filter and ST-IP network Ratings rapid ST-PIC multi-dimensional pattern recognition techniques, Bayesian filtering method, Bayesian filtering method automatically learning mechanism, greylisting, automatic white list mechanisms, characteristics of spam filtering fingerprint method, and black and white list on and intelligent recognition learning databases (Auto-Learning) can even set personal rules, and flexibility to develop filtering rules dealing with spam no miscarriage of justice to ensure comprehensive protection, more than 95% accuracy. Mail filtering, and able to comply with the letter of the managers to set the filter conditions, perform forwarding, delete, block such action. IDP Intrusion Prevention IDP checks corresponding to layers 4-7 of the OSI model, whether malicious exploits, viruses, hidden in the TCP / IP protocol, through detailed content inspection, qualifying characteristics The code will be marked, but found instant packets prevent these malicious packets through the firewall nothing within the network protection (ARP anti-counterfeiting) in terms of the UTM, the most difficult to detect the type of attack is broadcast-type packets, such as ARP spoofing, private planes DHCP server, because of congenital defects of the protocol, resulting in this kind of attacks are difficult to detect out, all the the ARP detection mechanisms to the UR-915, in the first a time to find the 'indiscriminate release' ARP messages. In addition, it can be used with the equipment cooperative defense switches can be marked out of the physical location of the IP, allowing him to escape detection with. Abnormal IP analysis of the behavior of any network, regardless of the user to perform what kind of software, from the point of view of network packets, roughly divided into uploaded, downloaded a number of connections the (Connect Seesion), flow (Flow) with duration (Time), by estimate the user by the detect these quantities combination, it is normal to use the network or abnormal behavior. Found abnormal behavior of internal users, managers can adopt a variety of strategies, for example, to block the Internet, limit his maximum bandwidth immediately switch enable collaborative defense mechanism to notify his blockade or notify the manager is like. With. Cooperative defense (with SNMP switches) cooperative defense belongs to the UTM advanced protection, through abnormalities IP analysis switches (Switch), real-time monitoring of the internal machine segment situation, When the intranet issued a large number of abnormal packets, blocking these packet transmission, and assist managers exclude abnormal state as soon as possible, can know what a computer the first time of the incident in which a switch PORT, to avoid the paralysis of the corporate network. Collaborative defense mechanism of the UR-915, the public to not need to change the network architecture, does not require expensive specialized Switch (with Layer 2 can), and do not need to add any additional detection equipment, without changing the user network habits, so that the action of network management becomes simple and intuitive. BotNet collaborative defense the ShareTech the UTM both BotNet function, because both NAT functionality itself, when internal users to use the e-mail server to send junk mail or direct foreign UTM can clear that with BotNet detection equipment, Which is the real source of the attack, the only way to harm the network packets directly blockade. Computer in case, UTM BotNet of blocking events, specific computer continued foreign attacks, in order to ensure that the UTM CPU resources will not be wasted on the same thing, the administrator can enable collaboration BotNet defense mechanism, will have problems Switch Port directly off the UTM can not only save resources, but also to ensure that the internal network will not be this zombie virus continued to endanger the. IP / MAC / Port interlock in some of the sensitivity of the network environment, such as the military, government agencies, research institutions, do not want the user to arbitrarily replace the physical location of the Switch, to the following user A (IP : 192.168.100.5, MAC: 05:51:62:53:02:03) for example, through the UR-915 can locate it in Switch hole 3Port,, if he changed to any Switch holes, equipment will not work. Content Filtering Web Filter (web filtering) can stop working end access to inappropriate web pages (such as pornography, violence) and offensive Web (such as hackers, viruses), and can set up a filter condition, block inappropriate websites. The URL database management UR-915 built-in "cloud URL database, automatic Web page classification, managers as long as the blockades, harmful URLs network can easily control, do not need to enter the website IP address, keywords one by one ... Come blocked. Arbitrary Click harmful the URL of the origin of evil, the best attempts to prevent prohibit the use of the Internet, if not a total ban on use of the URL database updated from time to time is the best protection mechanisms. Certification Authentication provides local user / AD/POP3 authentication and authorization mechanisms, to help network administrators monitor internal user account, confirm the user ID of a valid license to allow it to use the network, so that enterprises can manage the network effectively use resources. Application control UR-915 the use packet eigenvalue technology, identify the type of software used, and properly classified, contains [P2P software] [instant messaging software], [WEB applications], [Entertainment Software】 【other】 5 categories can be made for the need to control project control objectives, to apply methodical control Control Ordinance, or open a specific application. Hardware specifications the network interface 2WAN / 1LAN / 1DMZ network speed 10/100/1000 Mbps system management using a browser to manage settings (HTTP & HTTPS) Safety Approvals CE FCC Environmental Operating ambient temperature: 0 ℃ ~ 60 ℃ Operating Humidity: 5% ~ 90% RH Product Size 44mm (H) x 432mm for both (width) x 270mm (D) software product specifications performance ◎ maximum processing speed: 600 Mbps (bi-directional) ◎ Maximum Connections: 170,000 ◎ VPN certification + AES: 85 Mbps (bi-directional) ◎ VPN authentication +3 DES: 50 Mbps (bi-directional) anti-drug and mail filtering ◎ Scan Engine: Clam the AV ◎ Mail Gateway (Mail Gateway) ◎ antidrug function: MAIL (within the external mail (POP3, SMTP), outside the internal mail ◎ Mail antidrug: Do not scan the file extension settings, virus the letters in quarantine poisoning mail handling ◎ spam filtering ● valid account settings ● spam handling: Send ● Client spam Web search interface ● personal black list, black list of the system ● recognition engine: ST-IP network Ratings, ST-PIC multi-dimensional pattern recognition, Bayesian filtering method, Bayesian filtering method automatically learning mechanism, automatic white list mechanism, spam filtering, fingerprint identification method, greylisting filter ● spam automatically learning: the spam learning mechanism set the spam learning database import / export ● traffic blockade defense set SMTP records of calls query IDP the number of features set the the ◎ BotNet set ◎ IDP record ◎ BotNet record ◎ IDP Intrusion Detection / Botnet Defense ◎ IDP: 2243 ◎ BotNet characteristic number: 4917 ◎ Web user interface: Fan, simplified Chinese, English ◎ Web Management: HTTP, HTTPS ◎ firmware upgrade: WEB interface the ◎ times administrator: the most repeatedly administrator: 16 ● maximum number of administrators: 16 ● View, Read, Write, ALL ◎ remote management ● Remote management ● management IP address restrictions ● remote web management port number variable ● management traffic statistics ◎ time setting the ◎ interface (LAN, WAN, DMZ) interface TimeOut Logout ● time zone and time ● Network Time Proofing ◎ system settings ● update itself LOGO ● set their own Home Title ● set the login banner ● set the browser title ● restore the factory settings (reserved network interface settings) ● restart the system ● message notification ◎ Network Services ● routing table ● DNS server ● DDNS service ● System Restore ◎ DHCP ● DHCP Client / Server ● DHCP server assigned static IP ● ● Ping, DNS Query, Traceroute, Server Link, Interface Information, Wake Up firewall functions ◎ deployment customize the default gateway ◎ connection test : NAT mode firewall protection, Bridging (transparent bridge mode) ◎ ● SYN attacks, UDP attacks, ICMP attacks, Port Scan Attack Protection records ◎ address table ● internal IP address table (Max entry): 300 ● demilitarized zone network group (Max entry): 32 ● the intranet group (Max entry): 32 ● external IP address of the table (Max entry): 300 ● IP address of the demilitarized zone table (Max entry): 300 ● external network group (Max entry): 32 ◎ intranet group demilitarized zone group to establish a way ● select members from the address table ● members ● select from the range of select members from a DHCP users select members from the IP / Mask ● ● all interfaces can control bandwidth users to customize ◎ service table the basic services ● custom service group (Max entry): 32 ● custom service group (up to 16 ports) ◎ QoS ● ● guaranteed bandwidth ● priority ● maximum bandwidth ● SMART QOS ● bandwidth table the (Max entry): 32 ◎ timetable ● custom start and end of the the time ● timetable (Max entry): 32-◎ application management ● P2P management ● Entertainment Management ● Real-time communications management ● ● WEB management ● Application Management (Max entry): 32 |
Admin>>>
You are the 6176 visitor
Copyright © GuangDong ICP No. 10089450, Anglo-wide network Technology Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility
You are the 6176 visitor
Copyright © GuangDong ICP No. 10089450, Anglo-wide network Technology Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility