Funktion |
Firewall |
Produkte Status |
Stock |
Zulassung |
CCC |
Marke |
UTT |
Modell-Nummer |
6830G |
Ort der Herkunft |
Shanghai China (Mainland) |
Geben |
WLAN |
Anwendung |
Unternehmen |
ModelUTT 6830G (Further Platform)NameUTT Series Security Gateway/VPN FirewallPacket Forwarding Rate270K PPSWAN3 (Gigabit)LAN1 (Gigabit)Suggested LAN PC Number1000-2000PPPoE Notice and BillingYPPPoE Server/AccountsY/500PPPoE Rate LimitingYIP/MAC Binding1200DNS RedirectionY/100VPN Tunnel300/200Allow Exceptional Account (MSN/e-BANK)Y/100Intrusion DetectionYNotice FunctionYDoS/DDoS Attack DefenseYDHCP-Server Collision DetectionYVirus DefensseYAdvanced Device LogYARP Spoofing DefenseYPlug-and-playYPort-based VLANYIntelligent Bandwidth ManagementYP2P Rate LimitingYDatabase UpdateYFlow and Bandwidth StatisticsYLoad Balancing and Connection BackupYID Binding (IM/E-Bank Account)YPolicy-based RoutingYMaintenance and DiagnosticYL3 SwitchYTarget UserMedium to large sized Business,hotel, Big orgination UTT 6830G enables a unique gigabit firewall structure that protects network against virus attacks to the greatest extent. With the abilities of intelligent bandwidth control, network monitor and Internet access control, the administrator can easily manage the network. It also supports various VPN functions such as IPSec, L2TP and PPTP in easily establishing VPN connections. 6830G provides super capacity of packet forwarding and effective ability of multi-service handling, to easily build your own gigabit network. 3-WAN port design offers multiple choices for ISP connections and real-time backup and load balancing. Besides, it also supports policy-based routing of different ISPs. Gigabit Performance The new Gigabit Structure is combined with Gigabit LAN Port, Gigabit WAN Port and hardware architecture (64-bit high-performance network processor, DDR memory). It ensures the gigabit processing capability of CPU and the super ability of packet forwarding, which will meet the needs of multiple connections with wire speed. It can also meet the demands for medium and large-sized enterprises, Internet cafes and chains which require high-speed transmission. Firewall The new firewall structure delivers a secure platform against the internal/external attack, detection and eavesdropping, IP address spoofing, source routing attack, IP/port scanning and DoS attack. Provide the protection against virus attacks such as Worm.Blaster, Worm.Sasser and Trojan, etc. Support packet filtering based on source/destination IP address, protocols, ports, source/destination MAC address; Support application layer filtering based on URL and keywords; Support schedule-based ACL; You can easily control the Internet access and protect the internal network against external attacks. Support IP/MAC binding, blacklist, whitelist and user classification to authenticate users. VPN Support various VPN functions such as IPSec, L2TP and PPTP, which can be used alone or combined; Support dynamic IP address VPN connections; Support Site-to-site VPN, remote access VPN (client-to-site); VPN tunnels are restricted to 300, up to 200 concurrent tunnels. IPSec provides features of auto key (IKE) and manual key, ESP/AH protocols, DES/3DES/AES encryption algorithm, MD5/SHA-1 hash algorithm, main mode and aggressive mode, Anti-Replay and NAT Traversal. 3 WAN Ports and NAT 3 WAN ports are provided, which support mixed connections of DSL, fiber optical and Cable Modem. Under the PPPoE mode, 3 dial modes are provided: Always On, On Demand and Manual. Support Link Quality Monitoring (LQM); Offer management of dialing time (start time and end time), to prevent network waste from negligence. Under the DHCP mode, MAC address modification and cloning are available. 3-WAN ports design provides 3 Internet connections; Support load balancing and real-time backup; Support network flow distribution based on bandwidth ratio to optimize the bandwidth utilization; Support policy-based routing of different ISPs. Policy Database By introducing policy database, UTT router will process several complex policy-based routings as a policy database. The database can be auto updated similar to Windows Update. It simplifies the configuration and avoids cumbersome maintenance for customers. Policy database realizes the convenient one-click operations of ARP Spoofing defense, DoS/DDoS attack defense, virus attack defense, IM (GTALK, MSN) blocking and P2P (emule, BitTorrent) blocking, which greatly simplify the configuration. Bandwidth Control Algorithm-based bandwidth control will optimize the bandwidth utilization. Restrict software such as BT, P2P effectively. Enable the normal hosts to exceed the max speed occasionally and reduce the speed of the hosts which usually use P2P software. User Administration Offer personal policy to realize the requirements for UTT customers. Each computer of internal network can take different policy (bandwidth limit, Max NAT sessions, IM block, P2P block. etc) according to the needs of customers. This user administration enhances the flexibility of management and reduces the workload of the network administrator. Monitor Offer different modes of monitoring and diagnosis, which can monitor network access dynamically and help the administrator to trap and resolve the network fault quickly. This function can especially enable ability of discovering the network abnormality and abnormal hosts. Configuration and Management Offer user-friendly Web interface which delivers an easy-to-use platform with rich functions. Quick Wizard will help customers to complete the initial settings in short time. Support traditional Command Line Interface (CLI) with more functions. You can use both Web and CLI to manage the remote devices. Support SNMP interface for remote management of SNMP server. Support Syslog for remote messages forwarding from Syslog server.