تجهیزاتی که در جدول پایین شرح آنها را ملاحظه میکنید از تجهیزات امنیتی قدرتمند بر اساس شناسه کاربری شبکه هستند که محافظت جامع از شرکتهای بزرگ در برابر تهدیدات مختلف از جمله Malware ، ویروس ،هرزنامه ،دستیابی اطلاعات محرمانه وحملات pharmingرا ارائه می دهد . امنیت منحصر بفرد بر اساس شناسه کاربری شبکه Cyberoam ، کاربران شرکتهای بزرگ را در مقابل حملات داخلی که جهت دزدیدن یا از بینبردن اطلاعات میشود محافظت میکند.
- Cyberoam NG Series
- Cyberoam ia Series
|
|
|
Copper GbE Ports |
14 |
|
1GbE SFP (Mini GBIC) Ports |
4 |
|
10GbE SFP (Mini GBIC) Ports |
2 |
|
Console Ports (RJ45) |
1 |
|
USB Ports |
2 |
|
Hardware Bypass Segments# |
2 |
|
Configurable Internal/DMZ/WAN Ports |
Yes |
|
|
|
|
Firewall Throughput (UDP) (Mbps) |
40,000 |
|
Firewall Throughput (TCP) (Mbps) |
28,000 |
|
New sessions/second |
200,000 |
|
Concurrent sessions |
3,500,000 |
|
IPSec VPN Throughput (Mbps) |
8,000 |
|
No. of IPSec Tunnels |
3,000 |
|
SSL VPN Throughput (Mbps) |
1,000 |
|
WAF Protected Throughput (Mbps) |
1,000 |
|
Anti-Virus Throughput (Mbps) |
6,000 |
|
IPS Throughput (Mbps) |
8,000 |
|
UTM Throughput (Mbps) |
4,500 |
|
Authenticated Users/Nodes |
Unlimited |
|
|
|
|
UTMs for Large Enterprises |
PDF |
|
|
|
|
|
Layer 8 Identity-based policies |
Role-based access at remote locations |
|
|
Visibility into who is doing what |
|
|
|
|
Comprehensive UTM Security |
Stateful Inspection Firewall |
|
|
Intrusion Prevention System |
|
|
Anti-Virus & Anti-Spyware |
|
|
Anti-Spam |
|
|
Web Filtering |
|
|
Application Visibility & Control |
|
|
On-appliance Reporting |
|
|
Web Application Firewall |
|
|
Outbound Spam Protection |
|
|
|
|
Secure Remote Access |
IPSec VPN |
|
|
L2TP |
|
|
PPTP |
|
|
SSL VPN |
|
|
|
|
WAN Connectivity & Availability |
Bandwidth Management |
|
|
Multiple Link Management |
|
|
3G / 4G / WiMAX Support |
|
|
|
|
Advanced Networking |
Multi-core Architecture |
|
|
Extensible Security Architecture |
|
|
|
|
# If Enabled, will bypass traffic only in case of Power failure. |
|
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. |
|
|
|
|
Layer 8 Identity-based policies |
Role-based access at remote locations |
|
|
Visibility into who is doing what |
|
|
|
|
Comprehensive UTM Security |
Stateful Inspection Firewall |
|
|
Intrusion Prevention System |
|
|
Anti-Virus & Anti-Spyware |
|
|
Anti-Spam |
|
|
Web Filtering |
|
|
Application Visibility & Control |
|
|
On-appliance Reporting |
|
|
|
|
Secure Remote Access |
IPSec VPN |
|
|
L2TP |
|
|
PPTP |
|
|
SSL VPN |
|
|
|
|
WAN Connectivity & Availability |
Bandwidth Management |
|
|
Multiple Link Management |
|
|
3G / WiMAX Support |
|
|
|
|
Advanced Networking |
Multi-core Processing |
|
|
Extensible Security Architecture |
|
|
Active-Active High Availability |
|
|
IPv6 Ready Gold Certified |
|
|
|
|
Centralized Security Management |
CCC Appliances |
|
|
Cyberoam iView Open Source Solution – Logging & Reporting |
|
|
Cyberoam iView Appliances – Logging & Reporting |
|
|
|
|
|
|
◊ شبکه های کوچک و شعبات
◊ شبکه های کوچک – متوسط
◊ شبکه های بزرگ
◊ CCC(Cyberoam Central Consol)
◊ iView(Intelligent Logging & Reporting
|