Do you support the following:
Active communication equipment type FIREWALL/UTM
interfaces WAN 1x GE RJ45 (Gigabit Ethernet)
interfaces DMZ 1x GE RJ45
interfaces LAN 1x GE RJ45
- Firewall Policies > 5,000
(packets of 512 bytes with encryption AES256-SHA256)
Gateway-to-Gateway IPsec VPN Tunnels 200
Client-to-Gateway IPsec VPN Tunnels 500
SSL-VPN Throughput = 150 Mbps
Concurrent SSL-VPN Users (Tunnel = 100 Mode)
SSL Inspection Throughput (IPS, HTTP) = 170 Mbps . The performances for SSL encryption are measured in the conditions of TLS v1.2 with AES128-SHA256
High availability configurations
Application Control Throughput (HTTP > 650 Mbps 64K)
Threat Protection Throughput > 200Mbps
IPS Throughput > 400 Mbps
CAPWAP Throughput (HTTP 64K) > 890 Mbps
1. | UTM CHARACTERISTICS (Unified Threat yes. included. Management)
2. | Antivirus yes. Traffic scanning. With license included.
3. | Yes. Traffic scanning. With license included.
4. | IP, TCP/UDP ports, applications. Da. With license included.
5. | Web filtering. Yes. With license included.
6. | Vulnerability scanning .Yes. With license included
7. | Email scanning. Yes. With license included.
8. | DHCP server. Yes. With advanced facilities: IP reservation, allocation pool addresses at the interface level
9. | Advanced monitoring facilities. Yes. Reporting and journaling.
10. | Possibility to realize VPN IPSec and SSL.
POWER SUPPLY CHARACTERISTICS
1. | Power supply 100-240V AC, 50-60 Hz
2. | Power supply source included. Yes.
3. | Redundant power supply. Yes.
4. | Power supply cables for powering directly from from the electrical outlet, but also from UPS.
1. | Operation in the temperature range 0°C - 50°C
2. | Humidity 10-90%
CERTIFICATIONS AND COMPATIBILITIES
1. | Certifications and Compatibilities FCC, CE, UL, CB, RoHS2
2. | Antivirus, IPS&Application Control, Vulnerability Scan, etc. Yes.
3 years warranty of Next Business Day type, on site, offered by the vendor
LICENSING Minimum 2 years
1. | Antivirus Yes.
2. | IDS/IPS & applications control. Yes.
3. | Web filtering. Yes.
4. | Vulnerability scanning. Yes.
5. | Email scanning.Yes.