M5400-AC

M5400-AC

Specification

Intranet Users:

2000

Support Six 100M Ports:

1 LAN, 1 DMZ, 4 WANs

 

 

Network Interfaces

Standard:

1000BASE-T (RJ-45) * 2LAN interface
100BASE-T (RJ-45) * 2WAN interface
1000BASE-T(RJ-45)* 2WAN interface

Actual Network Traffic (All Function Activated):

60Mb

Actual Network Traffic (Traffic Control Only):

120Mb

Hardware Bypass:

Y

Extension:

N

SFP:

N

GBIC:

N

Serial port:

RS232 * 1

 

 

Specification of Hardware

Dimensions (cm):

42.7(W)×32.9(D)×4.45(H)

Weight:

4.5KG

Standard 1U Frame Structure

 

 

 

Functions

Classification

Functions

Detailed indexes

Access Control

Blocking Malicious Websites

Users can customize the blocking time for porn, viruses and phishing sites.

Access Control Policy

Providing safe access control policies with multiple-object combinations on the basis of groups, time, services, website policies, content polices, etc..

P2P Interception

The in-depth detection technologies are used to block the traffic of such P2P software as Skype, MSN, QQ and BT.

User Authentication

Providing authentication function for web login, data base of local users and integration function for users data base.

Control of Uploaded and Downloaded Files

Controlling the types and sizes of the Http and Ftp files to be uploaded and downloaded, intercepting the transmission of files from Skype, MSN and other P2P software.

IPMAC Binding

Providing flexible IPMAC binding policies.

Proxy Identification

Identifying activities that escape the inspection of the firewall via such proxy servers as Http, Https and Socks.

Interception of Sensitive Data

Sensitive data transmitted via Http, Ftp, Smtp and Imap protocols can be intercepted so as to prevent the leakage or involvement of lawsuits

Access Audit

Mail Delay Audit

The mails to be sent out will be delay-audited before delivery so as to ensure the information assets are not disclosed.

Real-time Monitoring

Monitoring the Internet access activities in a real-time manner.

Access Monitoring

Monitoring all Internet access records of the users, including web accesses, FTP, Telnet, mails (including webmail) and attachments, Skype, MSN, ICQ, Yahoo Message, etc.

Traffic Analysis

Internet traffic can be analyzed according to the statistics on the basis of users, protocols and time so as to optimize the utilization of Internet resources.  

Administration

Administration Function

Setting different levels of authorities for administrators.

Local Administration

GUI mode.

Remote Administration

GUI mode

Configuration Backup

Encrypted files are used for configuration backup and distribution.

Firmware Upgrading

Remote upgrading allows firmware to obtain the latest-version software and more functional modules.

Reliable Design

Auto Restoration

The watchdog provides auto restoration function to restore the configurations

Dual-machine Backup

Supporting dual-machine backup

Multi-line Backup

Supporting backups of 2-4 lines

Logs

Logs Capacity

 

Log backup

Supporting auto and timed backup

Logs import

Logs can be converted into standard TXT files so as to be imported to MS SQL or ORACLE data library for the second-time development and analysis.

Data center

SINFOR IAMs independent data center can be used to make detailed analysis.

Network Compatibility

Supporting Internet Ports

PSTN/ISDN ADSL/xDSL Cable Modem DDN/ATM WLAN

Supported Protocols

IPv4IPv6

Network Partitions

WANDMZLAN

Multiple Lines

Supporting even loads and backups of 2-4 Internet lines, providing optimized line selection and other multiple even loads policies.

Working Mode

Route mode and transparent mode

Copyright 2012© ICT Technologies & Services Limited. All right reserved.