04 2013

Product Datasheet

Unified Threat Management FIREWALL FEATURES Perimeter firewall Layer 7 application filtering Single-step BYOD/Wi-Fi authentication Stateful packet inspection Intrusion Prevention System (IPS) Port grouping Port-agile traffic blocking Multiple rule sets Dynamic NAT (DNAT) and Static NAT (SNAT) operation Internal firewall including DMZ, other zones & inter-zone bridges

VPN FEATURES Layer 2 Tunneling Protocol (L2TP) IPSec SSL VPN

Data Compression - IPComp (RFC 2393) 3DES data encryption (+ AES Rijndael, Twofish, Blowfish and CAST encryption algorithms) NAT Traversal (NAT-T) option

BENEFITS Block threats at the boundary, before they enter your network. Identify and block potentially problematic application traffic such as Skype, BitTorrent, TOR and Ultrasurf. Hundreds of protocols currently supported. Authenticate your mobile users for granular web filtering and reporting as soon as they log on to your wireless access points. Keeps out invalid traffic by ensuring all packets are part of a legitimate sequence. Monitors for, and prevents, malicious intrusion activity. Group ports into types (e.g. web, email, remote access) Detects & blocks traffic travelling through dynamically selected ports Increased flexibility with configuration options. Allowing a range of Internet accessible servers to be positioned on the internal network with multiple IPs supported. Segregate local networks into physically independent zones – useful for controlling inter-zone access and in the event of server compromise.

BENEFITS Secure connections for remote workers. Compatible gateway for both site-to-site and laptop VPN connections. Simplified access from laptop VPN connections. Able to cross network filters where L2TP or IPSec might fail, such as hotel room wireless. Support for Internal SSL VPN also allows VPN connections to be made inside the network. To improve VPN throughput, supporting more VPN connections. Prevents eavesdroppers reading confidential information & provides interoperability with other existing VPN products. Seamless operation even when the peer gateway or client is behind a NAT router.

Activation/deactivation of individual VPN tunnels

Gives administrators full control over who is accessing the network.

NETWORKING FEATURES

BENEFITS

Up to 20 interfaces (4 or 6 ports) Multiple external connections

Allows segregation not only of servers & clients, but different types of client (wireless laptop users, servers, critical servers, guest workstations, different departments, etc). Allows load balancing between a number of Internet connections.

Ethernet, DSL and analogue modem support

Allows failover to ‘lower tech’ connections when the main connection fails.

Auto failover to a standby appliance

Allows connectivity continuation in the event of hardware dropout.

Routing protocol support

Facilitates integration into existing network infrastructures.

VLAN trunking (802.1Q)

Allows creation of VLANs for easier network management.

VIPRE ANTI-MALWARE FEATURES VIPRE Anti-Malware Engine

(Note: subscription payable, only available in conjunction with web filtering or email security)

Real-time behavioral analysis technology Certification MX-Virtualisation™ (MX-V) Genscan™ and Cobra™ heuristics

WEB FILTERING FEATURES* Dynamic Content Analysis™

BENEFITS A powerful anti-malware engine integrated into our web filter and email security products. Protection against known and unknown “zero-day” malware threats by using proprietary detection methods which include; traditional signature-based, behavioral analysis and heuristics. VB100 and Checkmark Certified with exceptional detection rates and fast updates. Analyses zero-day malware threats in a virtual environment, preventing even the newest threats from reaching you. Dynamic pattern assessment to determine if a source is malware.

BENEFITS Screens the content, context and construction of web pages in detail, accurately detecting and blocking all objectionable, inappropriate, hidden or malicious content (including anonymous proxies).

‘Who, What, When, Where’ Policy Tools

True ‘who, what, when, where’ filtering with flexible user, group, time and location based controls.

SSL interception

Allows all unknown secure traffic to be decrypted and inspected (using Dynamic Content Analysis), so harmful HTTPS/SSL content (including SSL proxies) can be effectively blocked even in transparent proxy mode.

Unified Policy Tools and Wizards

‘Quick Block’ and ‘Quick Allow’

Straightforward policy tools and configuration wizards. With unlimited groups and ‘per user’ policies and the ability to combine policies with multigroup membership. ‘Quick Block’ and ‘Quick Allow’ buttons for fast one click fixes

‘Soft-blocking’ per content category

Delivering a better user browsing experience with compromising safety, security or control.

Flash filtering

Screens actual SWF file code to accurately detect and block undesirable Flash content such as online games and video players.

Outbound (web post) monitoring & blocking Customisable URL blocklists Internet Watch Foundation Whitelist mode Temporary ‘Banned User’ list Manage MIME, file extension and download size Block advertising and cookies Policy based controls Search engine filtering Logging, filtering and censoring of Instant Messenger applications Temporary bypass controls Time Quotas

Monitors and blocks text posted on the web (i.e. inappropriate blog / forum / Social Networking / Twitter posts) using a keyword analysis system. Current, categorised and customisable URL blocklists control access to a pre-defined list of undesirable websites. Blocklists are updated daily with IWF datafeeds. Users can only access a customised list of ‘allowed’ sites. Ban selected users until a selected date or time and run reports with lists of ‘banned users’ and the duration of their bans. Filtering policies can be set to manage specific file types, and limit download sizes. Advertising and cookies and be automatically blocked. Different filtering policies can be created and set for different groups of users, in accordance with organisation policy or the AUP. Filter, monitor and report upon search terms used and force “safe search” on popular search engines. Control and monitor the use of Instant Messaging applications. IM file transfers and attachments can be logged or blocked and selected words or phrases can be censored. Encrypted Instant Messaging is also supported. Block page includes password protected options to bypass the filter on a temporary basis. Allow users an allotted period of browsing time for categories normally restricted - such as during lunch and break times.

Limit Bandwidth by Category SWURL delegated blocklist control

YouTube.com/education Channel Support Configurable ‘Site Blocked’ page ‘Softblock’ option Stealth mode

Flexible request and content modification Web proxy cache Default ‘safe’ configuration

Set bandwidth limits based on the type of content being accessed. Particularly useful for heavy bandwidth areas such as streaming video. Personal blocklist control for specified users, allowing immediate (logged) access to resources that are typically blocked. Ideal for education environments. Allows access to youtube.com/education channel without removing restrictions on other YouTube content. ‘Site blocked’ page can be customised to include a logo, message text, a reason for blocking, un-block buttons, IP address and username. Instead of automatically blocking inappropriate content, users are issued warning messages about content and given options to either continue or cancel. Web pages are filtered and logged as normal, but are not blocked, allowing administrators to monitor activity without affecting users (useful when testing a new installation as it allows the filtering rules to be fine-tuned before ‘going live’). Modify web page requests and content ‘on the fly’ to enable neutralisation of malicious JavaScript and other web threats. Reduce bandwidth utilisation by storing and retrieving frequently accessed web pages from local disk storage. Guardian can be installed with a default ‘safe’ configuration which filters out a standard range of illegal and objectionable content. Note: Guardian’s default ‘safe’ configuration matches the requirements of CIPA and BECTA standards.

Mobile Device Filtering

Mobile Guardian allows many devices (iOS,OSX,Windows) to be actively filtered and controlled according to the organization’s policies in or out of the home network.

Guest Mobile Device Filtering

Guest devices can be accomodated on the network and filtered according to the organization’s policies.

EMAIL SECURITY & ANTI-SPAM

(OPTIONAL MODULE)

BENEFITS

SMTP Validity Checking

Checks for malformed email (usually either spam or designed to attack mail server/client vulnerabilities).

Grey Listing

Mail from unknown senders may be temporarily rejected. Genuine email servers (as opposed to zombies or botnets) usually resend after a short delay - if a second attempt is made, the sender is then automatically added to the list of known senders.

Remote Blackhole List (RBL) Sender Domain Spoofing Prevention Disclaimer Footers

The option to utilise RBL services (maintained databases of IP addresses that are acting as open mail relays for bulk spamming). Rejects any incoming email that falsely uses an internal domain in the ‘from’ address. Ability to add standardised disclaimers to the footer of outgoing emails. Different disclaimers can be used for different domains.

Attachment Removal

Allows dangerous or unwanted attachments to be discarded based on type (e.g. executable files, documents and multimedia files).

Content Analysis (Mailshell 3.0 Spam Content)

Examines the content of messages in detail, including address fields, subject, headers, SMTP envelope content, email format, design and layout, image layout, hyperlinks, contact information, language and origin.

Reputation Checking

Sender reputations are determined using comprehensive ‘real-time’ databases of IP addresses, domains and email addresses of known spammers. Bayesian analysis is used to combat attempts to hide sender identity.

Bulk Mail Detection Phishing Near Real-Time Updates

Identifies if a message or similar messages were sent in bulk by creating ‘fingerprints’ based on message elements. Identifies special formatting used to evade spam filters and for phishing attacks and economical bulk mailings. The software is updated every 5 minutes with the latest email fingerprints and detection rules.

User-configurable Spam Treatment Controls

AUTHENTICATION FEATURES Authentication Features Integrates with User Authentication systems Multiple filter groups

Transparent proxy mode

Users have the option to configure their own blacklists, whitelists, quarantine rules and spam reports.

BENEFITS Control access based on authenticated identity as opposed to assumed identity derived from a computer’s IP address (supports Microsoft Active Directory®, Novell eDirectory, and other LDAP systems). Different filter policies can be allocated to up to 100 different groups of users. Particular users can also be configured not to be subject to any filtering at all. System administration is simplified with support for NTLM authentication in transparent proxy mode; which avoids the need to configure proxy settings for each user computer.

Password-protected authentication

The use of NTLM with password verification provides seamless single sign-on without the need for users to log in or enter their Windows ID/password again.

Ident integration

Ident (Windows User Identification) can be enforced so that any user that has not been identified from Ident information (ie their PC is not running an Ident client) will be not be allowed to browse the web.

REPORTING & LOGGING FEATURES Report templates

BENEFITS Users can create, customise and save their own report templates and utilise an extensive range of over 350 report templates including most visited domains, bandwidth utilisation by user, commonly blocked search terms and the worst offending users.

Drill down to a single user or IP

Reports include the user name and IP address of the user PC so AUP violators can be quickly identified. It is possible to view the entire browsing history of a single user.

Automated reports

User-specific reports can be automatically time-scheduled to run on a daily or weekly basis. Reports can also be automatically saved or distributed to recipient lists via email.

AJAX real-time logs & traffic graphs Export into PDF, HTML, Excel, Crystal Reports® Reports via domains or categories User Portal Incident Alerts Hardware healthcare alerts

View web, email or IM activity instantaneously, with the option to filter by user name, IP address or web site. Reports can be produced in a range of formats for ease of viewing (with pie charts/graphs) and to aid integration with existing systems. Report on top domains, categories, page visits and offenders based on user, group and/or IP address. Provides selected users (or groups of users) with limited access for viewing reports/logs, controlling temporary bans and downloading SSL VPN clients. Alert messages can be sent by both email and SMS text message. Notifications about system resource issues (eg low disk space, high memory use, high CPU loads, UPS failures) and network intrusions or violations. * Features with an asterisk are not included in the UTM-100 Series. For more information see the UTM feature comparison matrix on our website: www. smoothwall.net

SWEDEN

UK Smoothwall Ltd 1 John Charles Way Leeds LS12 6QA United Kingdom

+44 (0)800 5 999 040 UK +44 (0)870 1 999 500 International [email protected] www.smoothwall.net

AIES AB Malungsvägen 105 192 71 SOLLENTUNA Sweden

+46 (0) 55 80 60 10 [email protected] www.aies.se

Smoothwall UTM Datasheet swe.pdf

Page 1 of 4. Unified Threat Management. Product Datasheet. 04 2013. Perimeter firewall Block threats at the boundary, before they enter your network. Layer 7 application filtering Identify and block potentially problematic application traffic such as Skype,. BitTorrent, TOR and Ultrasurf. Hundreds of protocols currently ...

146KB Sizes 1 Downloads 98 Views

Recommend Documents

UTM Datasheet - AIES.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. UTM Datasheet ...

smoothwall tutorial pdf
Page 1 of 1. File: Smoothwall tutorial pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. smoothwall tutorial pdf. smoothwall ...

Smoothwall SWG_07-15_SWE.pdf
Page 1 of 2. SWG. Unique, Content-Aware. web filtering. bandwidth. optimization. anti-malware social media. control. The web is changing. Right now. Millions of changes from millions of. users on millions of pages. The only change you need to make. t

Datasheet
Jun 4, 2013 - Table 91. LQFP64 – 10 x 10 mm 64 pin low-profile quad flat package mechanical data. ..... to-pin, software and feature compatible with the STM32F2xx devices, allowing the user to ...... STMicroelectronics group of companies.

CONVENIO DE COOPERACION ACADEMICA UTM-2013 ...
CONVENIO DE COOPERACION ACADEMICA UTM-201 ... IVERSIDAD ORIENTE DE SANTIAGO DE CUBA.pdf. CONVENIO DE COOPERACION ACADEMICA ...

Matrix Utm Sophos.pdf
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more ...

DS1307 Datasheet
plus 56 bytes of NV SRAM. ... 4. 8. 7. 6. 5. SDA l. 2. 3. 4. 8. 7. 6. 5. X1. X2. VBAT. GND. VCC. SQW/OUT. SCL. SDA .... Bit 6 of the hours register is defined as the.

W5500 Datasheet
Aug 1, 2013 - implement the Ethernet application just by adding the simple socket program. It's faster and easier way rather than using any other Embedded ...

DHT22 datasheet
*Extra components not needed. * Long transmission distance * Low power consumption. *4 pins packaged and fully interchangeable. 2.Description: Description: AM2303 output calibrated digital signal. It utilizes exclusive digital-signal-collecting-techn

Datasheet catalog
Dec 6, 1990 - For the DC characteristics see “74HC/HCT/HCU/HCMOS Logic Family Specifications”. Output capability: bus driver. ICC category: MSI. AC CHARACTERISTICS FOR 74HC. GND = 0 V; tr = tf = 6 ns; CL = 50 pF. SYMBOL. PARAMETER. Tamb (°C). UN

GC3355 DATASHEET
Nov 28, 2013 - advanced technology and highly integrated design, GC3355 target to provide multiple function and low cost solution in SHA256 application ...

Datasheet - GitHub
Dec 18, 2014 - Compliant with Android K and L ..... 9.49 SENSORHUB10_REG (37h) . .... DocID026899 Rev 7. 10. Embedded functions register mapping .

UTM Thesis Manual 2007.pdf
the results of original research conducted by a student in fulfilment of the. requirements for a graduate degree. The thesis should be presented in a manner that.

UTM BIO recruitment poster1.pdf
epigenome and environment. oooooooooooo. oooooooooooo. oooooooooooo. oooooooooooo. oooooooooooo. oooooooooooo. CSB. oooooooooooo. oooooooooooo. oooooooooooo. oooooooooooo. oooooooooooo. oooooooooooo. Page 1 of 1. Main menu. Displaying UTM BIO recruit

UTM Thesis Manual 2007.pdf
Page 2 of 70. July 2007. THESIS MANUAL. CHAPTER 1. ORGANISATION OT THE THESIS. 1.1 Definition of a Thesis. Thesis in this manual refers to a ...

UTM Annual Report 2015_with cover_FA.pdf
There was a problem loading more pages. Retrying... UTM Annual Report 2015_with cover_FA.pdf. UTM Annual Report 2015_with cover_FA.pdf. Open. Extract.

Datasheet RPR-220 - GitHub
Office automation equipment. FFeatures. 1) A plastic lens is used for high sensitivity. 2) A built-in visible light filter minimizes the influence of stray light.

datasheet 2FRM.pdf
Page 1 of 16. RE 28389, edition: 2013-05, Bosch Rexroth AG. 2-way flow control valve. Features. ▷ For subplate mounting. ▷ Porting pattern according to DIN ...

datasheet A4CSG.pdf
Axial piston variable pump. A4CSG Series 3x. RE 92105. Edition: 12.2016. Replaces: 07.2016. Type code for standard program 2. Hydraulic fluids 4. Shaft seal ...

BMP280 Datasheet - Adafruit Industries
May 5, 2015 - Please contact your regional Bosch Sensortec partner for more information about software ... 3.2 POWER MANAGEMENT. ...... The bus can.

datasheet 2FRM6A.pdf
With check valve;. with external closing. Type 2FRM 6 A...R... A B. P. A B. P. Page 3 of 16. datasheet 2FRM6A.pdf. datasheet 2FRM6A.pdf. Open. Extract.

Sliding Potentiometer datasheet - GitHub
Mechanical characteristicsi§§l

TMote Sky Datasheet
Nov 25, 2004 - Product Description. Tmote Sky is an ultra low power wireless module for use in sensor networks, monitoring applications, and rapid application prototyping. Tmote Sky leverages industry standards like USB and. IEEE 802.15.4 to interope

Datasheet TSOP22..
Low power consumption. Special Features. • Improved immunity against ambient light. • Suitable burst length ≥ 10 cycles/burst. Mechanical Data. Pinning: 1 = OUT, 2 = VS, 3 = GND. Parts Table. Block Diagram. Application Circuit. Part ... Junctio