|
|
|
|
| Content Security Gateway User’s Manual | ||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| settings. | |||
|
|
|
|
|
|
|
|
|
| WAN |
| Connect to your xDSL/Cable modem or other |
|
| |
|
|
|
| Internet connection devices |
|
| |
|
|
|
|
|
|
|
|
|
| LAN |
| Connect to your local PC, switch or other |
|
| |
|
|
|
| local network device |
|
| |
|
|
|
|
|
|
|
|
|
| DMZ |
| Connect to your server or other network |
|
| |
|
|
|
| device |
|
|
|
|
|
|
|
|
|
|
|
1.5 Specification |
|
|
| ||||
|
|
|
|
|
| ||
| Product |
|
| Content Security Gateway |
| ||
| Model |
|
|
| |||
| Hardware |
|
|
|
|
| |
| Ethernet | LAN | 1 x 10/100Mbps |
| |||
|
|
| WAN | 1 x 10/100Mbps |
| ||
|
|
| DMZ | 1 x 10/100Mbps |
| ||
| LED |
|
| POWER, STATUS, 10/100 and LNK/ACT for each LAN and WAN port |
| ||
| Power |
|
| 5VDC, 2.4A |
| ||
| Operating Environment | Temperature: 0~50°C |
| ||||
|
|
|
|
| Relative Humidity: 10%~90% |
| |
| Dimension W x D x H, mm | 220 x 150 x 40 |
| ||||
| Regulatory |
|
| FCC, CE Mark |
| ||
| Software |
|
|
|
|
| |
| Management |
|
| Web |
| ||
| Network Connection | Transparent mode (WAN to DMZ), NAT, |
| ||||
| Routing Mode | Static Route, RIPv2 |
| ||||
| Concurrent Sessions | 110,000 |
|
| |||
| New session / second | 8,000 |
|
| |||
| Email Capacity per Day | 90,000 |
|
| |||
| Firewall Throughout | 100Mbps |
| ||||
| 3DES Throughput | 15Mbps |
| ||||
| Firewall |
|
|
| |||
| VPN Tunnels |
|
| 200 |
|
| |
| VPN Function | PPTP server and client, IPSec |
| ||||
|
|
|
|
| DES, 3DES and AES encryption, |
| |
|
|
|
|
| Remote access VPN |
| |
| Content Filtering | URL, P2P application, Instant Message, download & upload blocking |
| ||||
|
|
|
|
| Popup, Java Applet, cookies and Active X blocking |
| |
| Anomaly Flow IP | Hacker Alert: |
| ||||
|
|
|
|
| Sasser, Code Red, Syn Flood, ICMP Flood, UDP Flood, Blaster Alert |
| |
| Scanning Mail Settings | The allowed size of scanned mail: 10 ~ 512Kbytes |
| ||||
|
|
| Email attachment virus scanning by SMTP, POP3 |
| |||
|
|
|
|
| Inbound scanning for internal and external Mail server |
| |
|
|
|
|
| Action of infected mail: Delete, Deliver to the recipient, forward to a specific |
| |
|
|
|
|
| account |
| |
|
|
|
|
| Automatic or manual update virus database |
| |
|
|
| Inbound scanning for external and internal Mail Server |
| |||
|
|
|
|
| Check sender address in RBL |
| |
|
|
|
|
| Black list and white list support auto training system |
| |
|
|
|
|
| Action of spam mail: Delete, Deliver to the recipient, forward to a specific |
| |
|
|
|
|
| account |
|
- 3 -