0% found this document useful (0 votes)
456 views2 pages

Firewalls Technical Specifications-Final2

The document outlines the technical specifications for a firewall, including required features, interfaces, performance specifications, storage, and support requirements. It specifies requirements for advanced security functions, visibility, threat protection, control, and automation. It also lists requirements for interfaces, slots, throughput, connections, encryption, and high availability configurations.

Uploaded by

getchman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
456 views2 pages

Firewalls Technical Specifications-Final2

The document outlines the technical specifications for a firewall, including required features, interfaces, performance specifications, storage, and support requirements. It specifies requirements for advanced security functions, visibility, threat protection, control, and automation. It also lists requirements for interfaces, slots, throughput, connections, encryption, and high availability configurations.

Uploaded by

getchman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Firewall Technical Specifications

Features Description of the Minimum Requirement Quantity


Supported Features The UTM must support advanced security
2
functions such as Web and Application
Filter,Gateway Anti Spam,Firewall, NAT, VPN,
IM Control P2P Control, IPS, anti-virus, URL
filtering, Application Detection, Email security,
DLP and Anti-Spam, and it provides all-around
security protection to safeguard the efficient
running of data center network systems.
Total Network Visibility: Passive, real-time
visibility of hosts, mobile devices, applications,
operating systems, users, content, attacks, and more
Advanced Threat Protection: Protecting for the
latest threats, it should delivers the best threat
prevention that money can buy as validated by
independent third-party testing and thousands of
satisfied customers around the world
Control Without Compromise: Achieve
granular network and application access control
without compromising threat prevention
Intelligent Security Automation: Leverage rich
contextual awareness to automate key security
functions, including impact assessment, user
identification and policy tuning
Should have hardware-accelerated modules that
provide maximum flexibility.
Should support DES, 3DES, and AES
encryption, MD-5 and SHA-1 authentication,
Manually configured key, PKI (X 509), and
IKEv2, Anti-replay attack, Remote VPN access,
Link fault detection, Source-based routing,
Policy-based routing, Policy-based route,
management (GUI , CLI)
Rack mountable
Redundant power supply
The internal power supply should supports input
voltages between 100 and 240 VAC (220v, 50HZ,
AC input Voltage)
2 x USB 2.0
1 x USB 3.0
2 x Mgmt Port
Interface/slots Console port
2 x GE RJ45 Management Ports
16 x GE RJ45 Ports
2 x 10 GE SFP+ modules and connectors
Firewall throughput: 85 Gbps
IPS throughput : 20 Gbps
VPN throughput: 9 Gbps
Performance Concurrent connections: 30,000,000
New TCP connections/sec: 240,000
High Availability Configurations Active-Active,
Active-Passive, Clustering
2 x integrated
Local Storage
hot-swap SSD
MANUFACTURER’S
AUTHORIZATION FORM Mandatory
(MAF)
Official Classroom (Instructor-Led) Technical
Technical Training
Training for 4 persons
Vendor Support and Standard hardware, software, and technical support
Services for three years

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy