GateProtect GPO 75a GPO 75A 产品宣传页
产品代码
GPO 75A
The appliance is a full-scale firewall with all the basic functions of the larger gateProtect xUTM appliances.
Like gateProtect‘s larger solutions, the GPO 75 is equipped with cutting-edge eGUI® technology and can also be configured
to operate in tandem with the Command Center. You receive a high-end firewall and VPN solution incl. a gateProtect xVPN.
Like gateProtect‘s larger solutions, the GPO 75 is equipped with cutting-edge eGUI® technology and can also be configured
to operate in tandem with the Command Center. You receive a high-end firewall and VPN solution incl. a gateProtect xVPN.
The GPO 75 is the perfect entry-level solution
for small and remote offices per VPN
GPO 75 / GPO 75a
eGUI
®
-Technology
The new eGUI® technology from gateProtect is remarkable for its ergonomic ap-
proach to the processing operation. The display, even of sometimes very different
applications, is always consistent and delivers the information required by the
user for the current operation only. A measure of the quality of the gateProtect
operator concept are the principles governing the design of software dialogue, as
formulated in ISO 9241, part 110.
proach to the processing operation. The display, even of sometimes very different
applications, is always consistent and delivers the information required by the
user for the current operation only. A measure of the quality of the gateProtect
operator concept are the principles governing the design of software dialogue, as
formulated in ISO 9241, part 110.
Extended User Authentication
Most modern firewall systems support proxy-based user authentication. This
means that only those services which work with proxies such as HTTP or FTP
can be issued to specific users. The gateProtect firewall has rule-based Exten-
ded User Authentication. This allows any number of services to be assigned in-
dividually to one user or a group of users. If a user logs on to the firewall from a
computer, all the assigned services for the computer in question are enabled.
means that only those services which work with proxies such as HTTP or FTP
can be issued to specific users. The gateProtect firewall has rule-based Exten-
ded User Authentication. This allows any number of services to be assigned in-
dividually to one user or a group of users. If a user logs on to the firewall from a
computer, all the assigned services for the computer in question are enabled.
1. Web browser/UA Client:
logon is via an HTTPs connection.
2. Single sign-on:
Kerberos automatically passes the log-on to the domain to the firewall.
VPN Gateway (SSL with X.509 Certificates + IPSec)
gateProtect offers the most commonly used forms of current site-to-site and Road
Warrior VPN connections via IPSec and SSL. Wizards and the eGUI® technology
help with the management and set up of these connections. In addition, the fire-
wall generates external configuration files when the VPN connections are created.
These files can be used for setting up single click connections and also for site-to-
site connections when importing on the firewall at a remote site.
Warrior VPN connections via IPSec and SSL. Wizards and the eGUI® technology
help with the management and set up of these connections. In addition, the fire-
wall generates external configuration files when the VPN connections are created.
These files can be used for setting up single click connections and also for site-to-
site connections when importing on the firewall at a remote site.
Furthermore, gateProtect offers an IPSec and SSL site-to-site solution with X.509
certificates which can work in bridge mode as an option. For a normal bridge, two
or more network cards are linked to form a logical network. gateProtect not only
allows this for network cards but also for VPN-over-SSL connections. This makes it
possible to treat remote computers as if they were in the local network.
certificates which can work in bridge mode as an option. For a normal bridge, two
or more network cards are linked to form a logical network. gateProtect not only
allows this for network cards but also for VPN-over-SSL connections. This makes it
possible to treat remote computers as if they were in the local network.
HighEnd-Firewall Features
The gateProtect rule set offers a high level of protection against the transfer of un-
wanted data by forbidding any access through the firewall. Wanted data can only
pass through the firewall after it has been configured. In this respect, gateProtect
has introduced a number of functions which make it easier to create standard
environments safely. These include single sign-on, xUA, DMZ, NAT.
wanted data by forbidding any access through the firewall. Wanted data can only
pass through the firewall after it has been configured. In this respect, gateProtect
has introduced a number of functions which make it easier to create standard
environments safely. These include single sign-on, xUA, DMZ, NAT.
Quality of Service in the VPN tunnel
Another special feature of the gateProtect solution is the prioritisation of data pa-
ckets in the VPN tunnel with QoS. This is important for time-critical applications
where a delay would not be desirable. For example, gateProtect makes it possible
to use VoIP via a VPN tunnel for interference-free telephone calls, irrespective of
the utilisation of the tunnel for RDP or data download, for instance.
ckets in the VPN tunnel with QoS. This is important for time-critical applications
where a delay would not be desirable. For example, gateProtect makes it possible
to use VoIP via a VPN tunnel for interference-free telephone calls, irrespective of
the utilisation of the tunnel for RDP or data download, for instance.
Bridging
Bridging makes it possible to introduce firewall functionality into an existing local
network. The part of the network that requires protecting, for example the servers,
are physically disconnected from the rest of the network and re-attached via a
bridge on the firewall. Then access restrictions, proxies and virus scans can be
set up between the physical networks. It is not necessary to make any changes to
the networks themselves.
In addition to the local network cards, gateProtect also allows a VPN tunnel to be
linked into a bridge. This special features makes it possible for the gateProtect
firewall to create a logical network covering different locations on the Internet.
network. The part of the network that requires protecting, for example the servers,
are physically disconnected from the rest of the network and re-attached via a
bridge on the firewall. Then access restrictions, proxies and virus scans can be
set up between the physical networks. It is not necessary to make any changes to
the networks themselves.
In addition to the local network cards, gateProtect also allows a VPN tunnel to be
linked into a bridge. This special features makes it possible for the gateProtect
firewall to create a logical network covering different locations on the Internet.
VLAN
A virtual LAN allows several logical networks to be operated in a single physical
network. To do this, every data packet carries a flag on the basis of which it is
assigned to a VLAN. The gateProtect xUTM appliance recognises this assignment.
This means that rules can generated on the firewall for these virtual networks in
exactly the same way as for normal networks. gateProtect relieves the administra-
tor of any special management of these VLANS and improves efficiency.
network. To do this, every data packet carries a flag on the basis of which it is
assigned to a VLAN. The gateProtect xUTM appliance recognises this assignment.
This means that rules can generated on the firewall for these virtual networks in
exactly the same way as for normal networks. gateProtect relieves the administra-
tor of any special management of these VLANS and improves efficiency.
Office-Serie
Clarity · Perfection · Security
Firewall
_Layer function
_Single Sign-On (xUA)
_Packet filter
_NAT
_DHCP Server
_DMZ
_Bridging
_VLAN
Interception
_Syslog
Features