Share on:
Firewall type | Small and medium-sized firewall |
Product number | F100-C-A5-W |
Weight | 1Kg |
Fixed interface | Console port |
VPN | L2TP VPN, IPSec VPN, GRE VPN, SSL VPN Intrusion detection Dos, DDoS |
Voltage | Input: 100-240V, 50/60Hz; output: 12V, Maximum power: 11W |
Other | Operating mode: routing mode, transparent mode, promiscuous mode AAA services: Portal authentication, RADIUS authentication, HWTACACS authentication, PKI /CA (X.509 format) authentication, domain authentication, CHAP authentication, PAP authentication Firewall: SOP virtual firewall technology, fully virtualized security zone division that supports CPU, memory, storage and other hardware resources division It can defend against Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP fragmentation, ARP spoofing, ARP active reverse query, illegal TCP packet flag bit, oversized ICMP packet, address scan, port scan , SYN Flood, UPD Flood, ICMP Flood, DNS Flood and other malicious attacks Basic and extended access control lists Access control list based on time period User-based, application-based access control list ASPF application layer packet filtering Static and dynamic blacklist function MAC and IP binding function MAC-based access control list Support 802.1q VLAN transparent transmission Virus protection: detection based on virus characteristics Support manual and automatic update of virus database Packet flow processing mode Support HTTP, FTP, SMTP, POP3 protocol Supported virus types: Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, Virus, etc. Support virus logs and reports Deep intrusion system: support common attack defense against hacker attacks, worms/viruses, Trojan horses, malicious code, spyware, adware, DoS/DDoS, etc. Support buffer overflow, SQL injection, IDS/IPS escape attack defense Support classification of attack signature database (classification according to attack type and target machine system), classification (high, medium, low, prompt four levels) Support manual and automatic upgrade of attack signature database (TFTP and HTTP) Supports P2P/IM identification and control such as BT Mail/web/application layer filtering: mail filtering, SMTP mail address filtering, mail header filtering, mail content filtering, mail attachment filtering, web filtering, HTTP URL filtering, HTTP content filtering, application layer filtering, Java Blocking, ActiveX Blocking, SQL injection attack prevention |