产品的地位 |
Stock |
职能 |
Firewall |
验证 |
CCC |
牌子的名字 |
HiPER |
模式的数量 |
2620 |
出生地 |
Shanghai China (Mainland) |
类型 |
连线 |
适用 |
企业 |
局域网的港口 |
4 |
万港口 |
2 |
ModelHiPER 2620NameBroadband Gateway/RouterPacket Forwarding Rate80K PPSWAN2LAN4Suggested LAN PC Number80-151PPPoE Server/Accounts-PPPoE Rate Limiting-IP/MAC Binding256DNS RedirectionY/100VPN Tunnel-P2P Rate LimitingYPersonal ManagementYAllow Exceptional Account (QQ)Y/100Internet Access ControlYDHCP-Server Collision DetectionYDatabase UpdateYNotice FunctionYLoad Balancing and Connection BackupYPolicy-based RoutingYID Binding (IM/E-Bank Account)YMaintenance and DiagnosticYIntelligent Bandwidth ManagementYSecurity ProtectionYDevice LogYL3 SwitchYTarget UserSMB, Schoo Interneafé With high-performance network processor and the leading operating system ReOS, HiPER 2620 delivers a high security, easy-to-use and low cost platform for UTT customers. Furthermore, it provides common features such as NAT, firewall, flow control, IP/MAC binding and auto update of policy-based routing. 2-WAN port design offers multiple choices for ISP connections and real-time backup and load balancing. Besides, it also supports policy-based routing of different ISPs. 2 WAN Ports and NAT 2 WAN ports are provided, which support mixed connections of DSL, fiber optical and Cable Modem. Support load balancing and real-time backup; Support network flow distribution based on bandwidth ratio to optimize the bandwidth utilization; Support policy-based routing of different ISPs. Support NAPT/NAT, routing and hybrid mode, which meet the needs of complicated networks; Support port forwarding and DMZ host for external services like HTTP, telnet and FTP, etc; Support NAT re-routing, reverse NAT and NAT ALG: FTP, PPTP and IPSec ESP, etc. Firewall Super abilities of defense against internal/external attacks: ARP spoofing attacks, port scanning, DoS/DDoS attacks, Worm.Blaster, Worm.Sasser, SQL slammer, etc. Ensure the stability and security of your router and network. Support packet filtering based on source/destination IP address, protocols, ports, source/destination MAC address; Support application layer filtering based on URL and keywords; Support schedule-based ACL; Control the Internet access and protect the internal network against external attacks. Policy Database By introducing policy database, UTT router will process several complex policy-based routings as a policy database. The database can be auto updated similar to Windows Update. It simplifies the configuration and avoids cumbersome maintenance for customers. Policy database realizes the convenient one-click operations of ARP Spoofing defense, DoS/DDoS attack defense, virus attack defense, IM (Gtalk, MSN) blocking and P2P (emule, BitTorrent) blocking, which greatly simplify the configuration. Provide policy-based routing of different ISPs. Instead of adding static routings one by one, what you should do is only to update the policy database. Bandwidth Control Algorithm-based bandwidth control will optimize the bandwidth utilization. Restrict software such as BT, P2P effectively. Enable the normal hosts to exceed the max speed occasionally and reduce the speed of the hosts which usually use P2P software. Support bandwidth control based on schedule; when the network is high loaded, bandwidth control will be enabled to ensure all the users can receive rational bandwidth; while the network is low loaded, bandwidth control will be disabled. Therefore, administrator will easily maintenance the network and make sure that all users can access to the Internet with high speed. Restrict the max number of concurrent NAT sessions, TCP sessions, UDP sessions and ICMP sessions, which will effectively prevent overloading download software like P2P and ensure the other hosts' connections smooth from stopping the bandwidth waste of PCs which suffered from computer virus. User Administration Offer personal policy to realize the requirements for UTT customers. Each computer of internal network can take different policy (bandwidth limit, Max NAT sessions, IM block, P2P block. etc) according to the needs of customers. This user administration enhances the flexibility of management and reduces the workload of the network administrator. Support IP/MAC address binding, invalid IP address or MAC address filtering and easy blacklist and whitelist setting. What's needed to pay attention is that UTT router supports binding all the dynamic IP/MAC entries with only one-click operation. Besides, with the function of ARP broadcast control, the router can protect LAN hosts against ARP spoofing attacks. Port Mirroring Support port mirroring; Offer real-time details on each port; Provide ability of sending a copy of all network packets seen on one switch port to a network monitoring connection on another switch port. Port mirroring will simplify network monitoring so that the administrator can control network flow, analyze performance and diagnose faults easily. Monitor Offer different modes of monitoring and diagnosis, which can monitor network access dynamically and help the administrator to trap and resolve the network fault quickly. This function can especially enable ability of discovering the network abnormality and abnormal hosts.] Network administrators can quickly discover the abnormal phenomena of slow network through watching the bandwidth of each port, the uploading/downloading bandwidth of each user and NAT sessions of each user. Configuration and Management Offer user-friendly Web interface which delivers an easy-to-use platform with rich functions. Quick Wizard will help customers to complete the initial settings in short time. Support traditional Command Line Interface (CLI) with more functions. You can use both Web and CLI to manage the remote devices. Support SNMP interface for remote management of SNMP server. Support Syslog for remote messages forwarding from Syslog server.