Netgear Web Threat Management UTM25W3-10000S Scheda Tecnica
Codici prodotto
UTM25W3-10000S
Because of its nature, traditional batch-based scanning methods introduce latency to network
traffic. While latency is more tolerable for email traffic, for large amounts of HTTP Web traffic,
such latency often slows Web browsing to a crawl. All-in-one solutions in the past have tried to
overcome the latency issue by minimizing the malware signature set, scanning only a handful of
file types, or by avoiding Web traffic scanning altogether. This approach exposes an entire vector
of the network to malware-based attacks.
Simple Setup, Ease of Management
The NETGEAR ProSecure UTM will easily replace any existing firewall or router. A simple 10-step
setup wizard guides you through installation and the UTM will be up and running in minutes.
Administration is performed through an intuitive Web-based interface. Set granular policies
and alerts, check summary statistics and graphical reports, drill down to IP address-level data,
and integrate log data with standard network management tools using SNMP. Malware and
IPS signature, software, and firmware updates are all handled by the UTM - online
and automatically.
For many administrators and IT personnel one of their biggest nightmares is the management
For many administrators and IT personnel one of their biggest nightmares is the management
of individual licenses or “seats.” Buying additional licenses when computers and personnel are
added to the network is time-consuming and costly. The NETGEAR ProSecure UTM offers Web
and email protection subscriptions
with no “per-user” licensing.
ProSecure™ Unified Threat Management Appliance
UTM Series
Traditional Batch-based Scanning
Stream Scanning
Receive
Scan
Output
Latency
Time
Receive
Scan
Output
Latency
Time
• NETGEAR Intrusion
Prevention System
Prevention System
Rules-driven language
–
Prevent hackers from penetrating the
–
network perimeter
• IM and P2P Application
Control
Control
Blocks access to public IM clients
–
Blocks peer-to-peer (P2P) clients
–
Preserve productivity and save
–
bandwidth
• SSL & IPsec VPN
Remote Access
Remote Access
SSL VPN - clientless remote access,
–
anywhere, anytime
IPsec VPN - secure site-to-site tunnels
–
and client-based remote access.
No additional licenses to purchase
–
• Built-in VPN/Firewall
Dual WAN Gigabit Firewall* provides
–
load balancing and failover
Four Gigabit LAN ports, one
–
configurable DMZ port
Stateful packet inspection (SPI)
–
Denial-of-service (DoS) protection
–
UTM SERIES COMPARISON
MODEL
UTM10
UTM25
SIZING GUIDELINES
Customer Type
Small Networks
Small Networks
Recommended Number of Concurrent Users
1-15
10-30
AV Throughput
31 Mbps
45 Mbps
Stateful Packet Inspection Firewall Throughput
133 Mbps
153 Mbps
IPS Throughput
TBD
TBD
VPN Throughput
TBD
TBD
Concurrent Sessions
8,000
20,000
VLANs
4,096
4,096
CONTENT SECURITY
Web (HTTP, HTTPS, FTP)
●
●
Email (SMTP, POP3, IMAP)
●
●
Stream Scanning
●
●
Inbound and Outbound Inspection
●
●
Intrusion Detection & Prevention
●
●
Signature-Less Zero Hour Protection
●
●
Malware Signatures
600,000
600,000
Automatic Signature Updates
Hourly
Hourly
True HTTPS Scanning and Filtering
●
●
Web Content Filters
Filter By: HTML Body Keywords, File Extension