M5000-AC
M5000-AC | |||
Specification |
|||
Intranet Users: |
100 |
||
Support Four 100M ports: |
1 LAN, 1 DMZ, 2 WANs |
||
|
|
||
Network Interfaces | |||
Standard: |
100BASE-T (RJ-45) * 2LAN interface |
||
Actual Network Traffic (All Function Activated): |
5Mb |
||
Actual Network Traffic (Traffic Control Only): |
10Mb |
||
Hardware Bypass: |
N |
||
Extension: |
N |
||
SFP: |
N |
||
GBIC: |
N |
||
Serial Port: |
RS232 * 1 |
||
|
|
||
Specification of Hardware |
|||
Dimensions (cm): |
42.7(W)×22.9(D)×4.45(H) |
||
Weight: |
3.5KG |
||
Standard 1U Frame Structure |
|
||
|
|
||
Functions |
|||
Classification |
Functions |
Detailed indexes |
|
Access Control |
Blocking Malicious Websites |
Users can customize the blocking time for porn, viruses and phishing sites. |
|
Access Control Policy |
Providing safe access control policies with multiple-object combinations on the basis of groups, time, services, website policies, content polices, etc.. |
||
P2P Interception |
The in-depth detection technologies are used to block the traffic of such P2P software as Skype, MSN, QQ and BT. |
||
User Authentication |
Providing authentication function for web login, data base of local users and integration function for users data base. |
||
Control of Uploaded and Downloaded Files |
Controlling the types and sizes of the Http and Ftp files to be uploaded and downloaded, intercepting the transmission of files from Skype, MSN and other P2P software. |
||
IPMAC Binding |
Providing flexible IPMAC binding policies. |
||
Proxy Identification |
Identifying activities that escape the inspection of the firewall via such proxy servers as Http, Https and Socks. |
||
Interception of Sensitive Data |
Sensitive data transmitted via Http, Ftp, Smtp and Imap protocols can be intercepted so as to prevent the leakage or involvement of lawsuits |
||
Access Audit |
Mail Delay Audit |
The mails to be sent out will be delay-audited before delivery so as to ensure the information assets are not disclosed. |
|
Real-time Monitoring |
Monitoring the Internet access activities in a real-time manner. |
||
Access Monitoring |
Monitoring all Internet access records of the users, including web accesses, FTP, Telnet, mails (including webmail) and attachments, Skype, MSN, ICQ, Yahoo Message, etc. |
||
Traffic Analysis |
Internet traffic can be analyzed according to the statistics on the basis of users, protocols and time so as to optimize the utilization of Internet resources. |
||
Administration |
Administration Function |
Setting different levels of authorities for administrators. |
|
Local Administration |
GUI mode. |
||
Remote Administration |
GUI mode |
||
Configuration Backup |
Encrypted files are used for configuration backup and distribution. |
||
Firmware Upgrading |
Remote upgrading allows firmware to obtain the latest-version software and more functional modules. |
||
Reliable Design |
Auto Restoration |
The watchdog provides auto restoration function to restore the configurations |
|
Dual-machine Backup |
Supporting dual-machine backup |
||
Multi-line Backup |
Supporting backups of 2-4 lines |
||
Logs |
Logs Capacity |
|
|
Log Backup |
Supporting auto and timed backup |
||
Logs Import |
Logs can be converted into standard TXT files so as to be imported to MS SQL or ORACLE data library for the second-time development and analysis. |
||
Data Center |
SINFOR IAMs independent data center can be used to make detailed analysis. |
||
Network Compatibility |
Supporting Internet Ports |
PSTN/ISDN ADSL/xDSL Cable Modem DDN/ATM WLAN |
|
Supported Protocols |
IPv4IPv6 |
||
Network Partitions |
WANDMZLAN |
||
Multiple Lines |
Supporting even loads and backups of 2-4 Internet lines, providing optimized line selection and other multiple even loads policies. |
||
Working Mode |
Route mode and transparent mode |