Netgear UTM9SW-10000S Datasheet Page 2

  • Download
  • Add to my manuals
  • Print
  • Page
    / 5
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 1
Simple Setup, Ease of Management
The ProSecure UTM will easily replace any existing firewall or router. A simple 10-step setup
wizard guides you through installation and the UTM will be up and running in minutes.
Administration is performed through an intuitive Web-based interface. Set granular policies
and alerts, check summary statistics and graphical reports, drill down to IP address-level data,
and integrate log data with standard network management tools using SNMP. Malware and IPS
signature, software, and firmware updates are all handled by the UTM - online and automatically.
For many administrators and IT personnel one of their biggest nightmares is the management
of
individual licenses orseats.Buying additional licenses when computers and personnel
are added to the network is time-consuming and costly. The ProSecure UTM offers Web and
email protection subscriptions with noper-user licensing.
Expandability
The ProSecure UTM9S has two modular slots that allow for optional interface cards to be added
to tailor the appliance for specific installation requirements.
A VDSL/ADSL2+ Modem Module, available in both Annex A and Annex B versions, furnishes
direct, always-on Internet connectivity. VDSL capability provides Internet connection speeds
up to three times faster than traditional ADSL2+ DSL networks while providing backwards
compatibility with ADSL2+.
In conjunction with two onboard RJ45 WAN ports for redundancy and failover, the VDSL/ADSL
2+ Modem Module, if installed, can be employed either as the primary WAN connection or as a
third WAN port in a redundant/ oad balancing scenario.
A Wireless-N Module provides access point capability to connect Wireless-N clients at both 2.4
GHz and 5.0 GHz frequencies at up to 15x the speed and 10x the coverage of legacy 802.11g
networks.
Backwards compatibility with 802.11a, 802.11g, and 802.11b network devices allows for
flexible deployment scenarios.
ProSecure
®
Unified Threat Management Firewall UTM9S
IM and P2P Application
Control
Blocks access to public IM clients
Blocks peer-to-peer (P2P) clients
Preserve productivity and
save bandwidth
SSL & IPsec VPN
Remote Access
SSL VPN - clientless remote access,
anywhere, anytime
IPsec VPN - secure site-to-site tunnels
and client-based remote access
Purchase additional licenses for
IPsec VPN
Built-in SPI Firewall
Dual/Quad WAN Gigabit Firewall**
provides load balancing and failover
Gigabit LAN ports, configurable
hardware DMZ port
Stateful packet inspection (SPI)
Denial-of-service (DoS) protection
IPS prevents hackers from penetrating
the network perimeter
UTM SERIES COMPARISON
MODEL UTM5** UTM9S UTM10** UTM25** UTM50** UTM150**
PERFORMANCE
Average Anti-virus Throughpu 15 Mbps 21 Mbps 25 Mbps 32 Mbps 45 Mbps 131 Mbps
Stateful Packet Inspection Firewall
Throughput¹
130 Mbps 130 Mbps 160 Mbps 250 Mbps 400 Mbps 900 Mbps
Maximum VPN Throughpu 50 Mbps 50 Mbps 80 Mbps 100 Mbps 200 Mbps 550 Mbps
Maximum Concurrent Connections¹ 8,000 16,000 16,000 30,000 40,000 65,000
VLANs 255 255 255 255 255 255
CONTENT SECURITY
Web and Email Scanned Protocols HTTP, HTTPS, FTP, SMTP, IMAP, POP3
Stream Scanning
Inbound and Outbound Inspection
Signature-Less Zero Hour Protection
Malware Signatures 1.2 Million 1.2 Million 1.2 Million 1.2 Million 1.2 Million 1.2 Million
Automatic Signature Updates Hourly Hourly Hourly Hourly Hourly Hourly
Web Content Filters Filter By: HTML Body Keywords, File Extension
Web Object Filters ActiveX, Java™, Flash, JavaScript, Proxy, Cookies
Email Content Filters Filter By: Subject Keywords, Password-protected Attachments,
File Extension, File Name
Distributed Spam Analysis
Distributed Spam Analysis Supported Protocols SMTP, POP3
Anti-spam Real-time Blacklist (RBL)
User-defined Spam Allowed/Block Lists Filter By: Sender Email Address, Domain, IP Address, Recipient Email Address, Domain
Distributed Web Analysis w/64 categories
Instant Messaging (IM) Control MSN
®
Messenger, Yahoo!
®
Messenger, mIRC, Google Talk
Peer to Peer (P2P) Control BitTorrent™, eDonkey, Gnutella
Maximum Number of Users Unlimited
Page view 1
1 2 3 4 5

Comments to this Manuals

No comments