ZyXEL ZyWALL IDP 10 NFR 120102.0010NFR プリント

製品コード
120102.0010NFR
ページ / 2
ZyWALL IDP 10
F e a t u r e s
R e c o m m e n d e d   f o r
S p e c i f i c a t i o n s
Intrusion Detection and Prevention
• Real-time detection and prevention  
  with in-line structure
• Misuse Detection and Anomaly  
 Detection technologies
• DoS/DDoS  Protection
• Buffer Overflow Protection
• Port Scan Protection
• Trojan Horse/Back Door Protection
• Virus/Worm  Protection
• Layer 7 application blocking 
  (P2P, IM, SPAM, Porn, Web Attack)
• User definable policy Protection
Signature
• Over 1,600 policies
• Automatic latest signature
 policy check
• Support automatic/scheduling  
 policy download
• User definable policies
• Log/Report/Alert
• Instant Attack Notification
• Attack Event Logs
• System Status Logs
• Regular/Scheduling  Reports
System Management
• Firmware  Upgrade
• Changeable Operation Mode: 
  In-line, Monitor (Sniff), Bypass
• Back up and Restore Configuration
• RS-232 Console Management
• Web-Based GUI (HTTP)
• Command Line Interface
• SNMP
• SSH  v.2
Technical Specification
• Throughput: 10 Mbps
• Concurrent sessions: 8,000
• Policies:  >1,600
• Prevention Policy Table: 3,000
• User-Define Policy: 128
• LAN Driver Packet Buffer: 1024 x 4
• Event Pool: 2,131
• Trap Pool: 128
• Port Scan Data Buffer: 1,000
• System Log Pool: 128
Hardware Specification
• Power: 5V DC, 4A
• Ports: 1 x LAN, 1 x WAN, 1 x MGMT    
  10/100Mbps Auto sensing Ethernet
• Console: RS-232 DB9F
Operating Environment
• Operating Temperature: 0ºC ~ 40ºC
• Operating Humidity: 5% ~ 90% 
 (non-condensing)
Intrusion Detection and 
Prevention Appliance
• Small and Medium Business looking for a solid, cost-effective intrusion detection prevention system that can avoid  
  malicious attacks from the Internet/Intranet  
• Small and Medium Business requiring a real-time security solution with in-line operation to stop network and  
 
  application level attacks, including DoS/DDoS, Buffer Overflow, Port Scan, Trojan Horse, Worm
• Small and Medium Business needing a security solution that can block unauthorized applications, as Peer-to-Peer,  
  Instant Messenger, On-line games and Spam to protect internal assets and resources
• Complimenting Firewall/VPN/Bandwidth Management Appliances to jointly protect network