M5400-AC
M5400-AC | ||||
Specification |
||||
Intranet Users: |
2000 |
|||
Support Six 100M Ports: |
1 LAN, 1 DMZ, 4 WANs |
|||
|
|
|||
Network Interfaces |
||||
Standard: |
1000BASE-T (RJ-45) * 2LAN interface |
|||
Actual Network Traffic (All Function Activated): |
60Mb |
|||
Actual Network Traffic (Traffic Control Only): |
120Mb |
|||
Hardware Bypass: |
Y |
|||
Extension: |
N |
|||
SFP: |
N |
|||
GBIC: |
N |
|||
Serial port: |
RS232 * 1 |
|||
|
|
|||
Specification of Hardware |
||||
Dimensions (cm): |
42.7(W)×32.9(D)×4.45(H) |
|||
Weight: |
4.5KG |
|||
Standard 1U Frame Structure |
|
|||
|
|
|||
Functions |
||||
Classification |
Functions |
Detailed indexes |
||
Access Control |
Blocking Malicious Websites |
Users can customize the blocking time for porn, viruses and phishing sites. |
||
Access Control Policy |
Providing safe access control policies with multiple-object combinations on the basis of groups, time, services, website policies, content polices, etc.. |
|||
P2P Interception |
The in-depth detection technologies are used to block the traffic of such P2P software as Skype, MSN, QQ and BT. |
|||
User Authentication |
Providing authentication function for web login, data base of local users and integration function for users data base. |
|||
Control of Uploaded and Downloaded Files |
Controlling the types and sizes of the Http and Ftp files to be uploaded and downloaded, intercepting the transmission of files from Skype, MSN and other P2P software. |
|||
IPMAC Binding |
Providing flexible IPMAC binding policies. |
|||
Proxy Identification |
Identifying activities that escape the inspection of the firewall via such proxy servers as Http, Https and Socks. |
|||
Interception of Sensitive Data |
Sensitive data transmitted via Http, Ftp, Smtp and Imap protocols can be intercepted so as to prevent the leakage or involvement of lawsuits |
|||
Access Audit |
Mail Delay Audit |
The mails to be sent out will be delay-audited before delivery so as to ensure the information assets are not disclosed. |
||
Real-time Monitoring |
Monitoring the Internet access activities in a real-time manner. |
|||
Access Monitoring |
Monitoring all Internet access records of the users, including web accesses, FTP, Telnet, mails (including webmail) and attachments, Skype, MSN, ICQ, Yahoo Message, etc. |
|||
Traffic Analysis |
Internet traffic can be analyzed according to the statistics on the basis of users, protocols and time so as to optimize the utilization of Internet resources. |
|||
Administration |
Administration Function |
Setting different levels of authorities for administrators. |
||
Local Administration |
GUI mode. |
|||
Remote Administration |
GUI mode |
|||
Configuration Backup |
Encrypted files are used for configuration backup and distribution. |
|||
Firmware Upgrading |
Remote upgrading allows firmware to obtain the latest-version software and more functional modules. |
|||
Reliable Design |
Auto Restoration |
The watchdog provides auto restoration function to restore the configurations |
||
Dual-machine Backup |
Supporting dual-machine backup |
|||
Multi-line Backup |
Supporting backups of 2-4 lines |
|||
Logs |
Logs Capacity |
|
||
Log backup |
Supporting auto and timed backup |
|||
Logs import |
Logs can be converted into standard TXT files so as to be imported to MS SQL or ORACLE data library for the second-time development and analysis. |
|||
Data center |
SINFOR IAMs independent data center can be used to make detailed analysis. |
|||
Network Compatibility |
Supporting Internet Ports |
PSTN/ISDN ADSL/xDSL Cable Modem DDN/ATM WLAN |
||
Supported Protocols |
IPv4IPv6 |
|||
Network Partitions |
WANDMZLAN |
|||
Multiple Lines |
Supporting even loads and backups of 2-4 Internet lines, providing optimized line selection and other multiple even loads policies. |
|||
Working Mode |
Route mode and transparent mode |