Статус товара |
Stock |
Функции |
Firewall |
Cертификация |
CCC |
Бренд |
HiPER |
Номер Модели |
6530G |
Место происхождения |
Shanghai China (Mainland) |
Тип |
Проводные |
Применение |
Предприятие |
ModelHiPER 6530G (Further Platform)NameBroadband Gateway/RouterPacket Forwarding Rate270K PPSWAN3 (Gigabit)LAN1 (Gigabit)Suggested LAN PC Number1000-2000PPPoE Server/AccountsY/500PPPoE Rate LimitingYIP/MAC Binding1200DNS RedirectionY/100VPN Tunnel50/50P2P Rate LimitingYPersonal ManagementYAllow Exceptional Account (QQ)Y/100Internet Access ControlYDHCP-Server Collision DetectionYDatabase UpdateYNotice FunctionYLoad Balancing and Connection BackupYPolicy-based RoutingYID Binding (IM/E-Bank Account)YMaintenance and DiagnosticYIntelligent Bandwidth ManagementYSecurity ProtectionYDevice LogYL3 SwitchYTarget UserMedium and large sized Internet cafe,Broadband community, business and school HiPER 6530G enables a unique gigabit firewall structure that protects network against virus attacks to the greatest extent. With the abilities of intelligent bandwidth control, network monitor and Internet access control, the administrator can easily manage the network. It also supports various VPN functions such as IPSec, L2TP and PPTP in easily establishing VPN connections. A large capacity of packet forwarding is especially suitable for Internet cafes and communities. It ensures high-speed data forwarding of online game, video and chatting. 3-WAN port design offers multiple choices for ISP connections and real-time backup and load balancing. It also supports policy-based routing of different ISPs. Gigabit Performance The new Gigabit Structure is combined with Gigabit LAN Port, Gigabit WAN Port and hardware architecture (64-bit high-performance network processor, DDR memory). It ensures the gigabit processing capability of the CPU and the super ability of packet forwarding, which will meet the needs of multiple connections with wire speed. It can also meet the demands for enterprises and Internet cafes which require high-speed transmission. Firewall The new firewall structure delivers a secure platform against the internal/external attack, detection and eavesdropping, IP address spoofing, source routing attack, IP/port scanning and DoS attacks. Provides protection against virus attacks such as Worm.Blaster, Worm.Sasser ,Trojans, etc.Supports packet filtering based on source/destination IP address, protocols, ports, source/destination MAC address; Supports application layer filtering based on URL and keywords; Supports schedule-based ACL; You can easily control the Internet access and protect the internal network against external attacks. VPN Supports various VPN functions such as IPSec, L2TP and PPTP, which can be used alone or combined; Supports dynamic IP address VPN connections; Supports Site-to-site VPN, remote access VPN (client-to-site); VPN tunnels are restricted to 50, up to 50 concurrent tunnels. IPSec provides features of auto key (IKE) and manual key, ESP/AH protocols, DES/3DES/AES encryption algorithm, MD5/SHA-1 hash algorithm, main mode and aggressive mode, Anti-Replay and NAT Traversal. 3 WAN Ports and NAT 3 WAN ports are provided, which support mixed connections of DSL, fiber optical and Cable Modem. Under the PPPoE mode, 3 dial modes are provided: Always On, On Demand and Manual. Support Link Quality Monitoring (LQM); Offers management of dialing time (start time and end time), to prevent network waste from negligence. Under the DHCP mode, MAC address modification and cloning are available. Policy Database By introducing policy database, UTT router will process several complex policy-based routings as a policy database. The database can be auto updated similar to Windows Update. It simplifies the configuration and avoids cumbersome maintenance for customers. To solve the frequent updating problems of various software like Gtalk, MSN, P2P, UTT employees will collect all the information and update policy database immediately. Bandwidth Control Algorithm-based bandwidth control will optimize the bandwidth utilization. Restricts software such as BT, P2P effectively. Enables the normal hosts to exceed the max speed occasionally and reduces the speed of the hosts which usually use P2P software. SSupports bandwidth control based on schedule; when the network is high loaded, bandwidth control will be enabled to ensure all users receive rational bandwidth; when the network is low loaded, bandwidth control will be disabled.User Administration Offers personal policy to realize the requirements of UTT customers. Each computer of an internal network can take a different policy (bandwidth limit, Max NAT sessions, IM block, P2P block. etc) according to the needs of customers. This user administration enhances the flexibility of management and reduces the workload of the network administrator. Monitor Offers different modes of monitoring and diagnosis, which can monitor network access dynamically and help the administrator to trap and resolve the network fault quickly. This function can be especially useful in its ability to discover the network abnormalities and abnormal hosts. Configuration and Management Offers user-friendly Web interface which delivers an easy-to-use platform with rich functions. Quick Wizard will help customers to complete the initial settings in a short period of time. Supports traditional Command Line Interface (CLI) with more functions. You can use both Web and CLI to manage the remote devices. Supports configuration backup and restores through TFTP, Web, etc. You can save the current configuration file into your computer and import the configuration file into the UTT router.