Simple Setup, Ease of Management
The ProSecure UTM will easily replace any existing firewall or router. A simple 10-step setup
wizard guides you through installation and the UTM will be up and running in minutes.
Administration is performed through an intuitive Web-based interface. Set granular policies
and alerts, check summary statistics and graphical reports, drill down to IP address-level data,
and integrate log data with standard network management tools using SNMP. Malware and
IPS signature, software, and firmware updates are all handled by the UTM - online
and automatically.
For many administrators and IT personnel one of their biggest nightmares is the management
of individual licenses or “seats.” Buying additional licenses when computers and personnel are
added to the network is time-consuming and costly. The ProSecure UTM offers Web and email
protection subscriptions withno“per-user”licensing.
ProSecure™ Unified Threat Management Appliance UTM Series
•SSL&IPsecVPN
RemoteAccess
SSL VPN - clientless remote access, –
anywhere, anytime
IPsec VPN - secure site-to-site tunnels –
and client-based remote access
No additional licenses to purchase –
•Built-inSPIFirewall
Dual WAN Gigabit Firewall* provides –
load balancing and failover
Four Gigabit LAN ports, one –
configurable hardware DMZ port
Stateful packet inspection (SPI) –
Denial-of-service (DoS) protection –
IPS prevents hackers from penetrating –
the network perimeter
UTMSERIESCOMPARISON
MODEL UTM5 UTM10 UTM25
SIZING GUIDELINES
Recommended Number of Concurrent Users 1-5 1-15 10-30
Average Anti-virus Throughput¹ 15 Mbps 20 Mbps 25 Mbps
Stateful Packet Inspection Firewall Throughput¹ 90 Mbps 90 Mbps 127 Mbps
Maximum VPN Throughput¹ 40 Mbps 50 Mbps 70 Mbps
Maximum Concurrent Connections¹ 8,000 12,000 27,000
VLANs 255 255 255
CONTENT SECURITY
Web and Email Scanned Protocols ● HTTP, HTTPS, FTP, SMTP, IMAP, POP3
Stream Scanning ● ●
Inbound and Outbound Inspection ● ●
Signature-Less Zero Hour Protection ● ●
Malware Signatures 1 Million+ 1 Million+ 1 Million+
Automatic Signature Updates Hourly Hourly Hourly
Web Content Filters Filter By: HTML Body Keywords, File Extension
Web Object Filters ActiveX, Java™, Flash, JavaScript™, Proxy, Cookies
Email Content Filters Filter By: Subject Keywords, Password-protected Attachments,
File Extension, File Name
Distributed Spam Analysis ● ●
Distributed Spam Analysis Supported Protocols SMTP, POP3
Anti-spam Real-time Blacklist (RBL) ● ●
User-defined Spam Allowed/Block Lists Filter By: Sender Email Address, Domain, IP Address, Recipient Email Address, Domain
Distributed Web Analysis w/ 64 categories ● ●
Instant Messaging (IM) Control MSN
®
Messenger, Yahoo!
®
Messenger, mIRC, Google Talk
Peer to Peer (P2P) Control BitTorrent™, eDonkey, Gnutella
Maximum Number of Users Unlimited
FIREWALL FEATURES
Stateful Packet Inspection (SPI) Port/Service Blocking, Denial-of-service (DoS) Prevention, Stealth Mode, Block TCP Flood, Block UDP
Flood, WAN/LAN Ping Response Control
Intrusion Detection & Prevention (IPS) ● ●
WAN Modes NAT, Classical Routing
ISP Address Assignment DHCP, Static IP Assignment, PPPoE, PPTP
NAT Modes 1-1 NAT, PAT
Routing Static, Dynamic, RIPv1, RIPv2
VoIP SIP ALG
Comments to this Manuals