/ /Res Dated INVITATION FOR BIDS

Size: px
Start display at page:

Download "27-12-05/2011-12/Res Dated 30.12.2011 INVITATION FOR BIDS"

Transcription

1 / /Res Dated INVITATION FOR BIDS Sub: Supply and installation of Internet Load balancing Switch and Firewall Security Appliance at RRII. The RRII invites sealed tenders for the supply and installation of Internet Load balancing switch and Firewall Security Appliances from reputed vendors The details are given below: Tender Reference / /Res dated Price of Tender Document NIL Bid Security(EMD) NIL Last Time and Date for receipt of tender Hrs on offers Time and Date of Opening of tender 15:30 Hrs on offers Venue of the acceptance and opening of bids and address for communication Rubber Research Institute of India, Rubber Board P.O., Kottayam, Contact Telephone Numbers Kerala Phone: , Fax: List enclosures 1. General work description & terms 2. Schedule of requirement Please read the general instructions attached carefully and furnish appropriate details. Tenderer who satisfy the pre-qualification criteria need only to submit their proposals. The Board reserves the right to accept or reject any tender offer without assigning any reason thereof.. Assistant Secretary (Res)

2 GENERAL INFORMATION 2 GENERAL WORK DESCRIPTION & TERMS Data cabling work at RRII Rubber Research Institute of India (RRII) under Rubber Board, a statutory body constituted under Rujbber Act 1947, functioning under the Ministry of Commerce & Industry of the Government of India. The RRII campus is a hill top nearly 8km away from Kottayam town. Buildings in the RRII campus are fully networked through optic fibre and copper for data connectivity. SCOPE Scope of the work include design, fabrication & supply of items at RRII, Kottayam-9, handling at site, storage under safe custody, erection, testing and commissioning and handing over of all items described in the SCHEDULE as per relevant standards of installation. Scope of the work includes a. Obtaining all statutory approvals if required from M/s. BSNL/PWD/Other service providers if required. b. All Civil works including materials required for items such as chipping of wall/ floor grouting, earth work excavations etc. to complete the installation in all respects. Work has to be performed as per the specifications and instructions given by the Engineer-in-charge from time to time. a. All terms and conditions listed in general instructions are covered. CONTRACTOR EXPERIENCE & OBLIGATIONS The bidder should be reputed supplier of networking components and Security appliances to the public sector for a period of 3 years with contact offices in Thiruvananthapuram Kochi area and having certified Engineers to configure networking and security appliances OUTLINE OF THE WORK: The request for the supply and maintenance of (1) Internet Load Balancing Switch, to connect multiple leased line internet connections from different ISPs in load balancing mode (2) Unified Thread Management (UTM) appliance with Firewall, IPS, Gateway Antivirus, Antispam, Content filtering, Link Load Balancing and failover, support for VPN. A schedule for the execution plan shall be submitted against each work order. Service escalation matrix and all contact details should be included in the basic proposal. WARRANTY Warranty expected is 5 years onsite comprehensive mode from the date of installation All material/ equipment supplied should be guaranteed by the contractor for satisfactory performance and all defective items shall be replaced from time to time.

3 3. All the material/ equipment supplied should be guaranteed by the vendor for satisfactory performance. Should any item not perform as intended or should design material or workmanship proved to be defective the item/ work should be promptly corrected by the contractor to the satisfaction of the Board without delay and at no extra cost failing which the Board will be free to take such corrective action at the contractors expense and risk. RoHS compliance and other standards complied by the components shall be clearly stated in the offer. TERMS AND CONDITIONS 1. Validity: The offer should be valid for acceptance for a period of 60 days from the date of opening. 2. Price, taxes and duties: Price quoted shall be all inclusive of sales taxes and other duties. Prices in the tender will kept firm and no escalation on any ground will be admissible. 3. EMD charges: Rs.5000/- in the form of Demand draft in favour of Director (Research), RRII, Rubber Board payable at Kottayam. Tender not accompanying EMD will be rejected. On acceptance of the Tender, EMD of the successful bidder shall be treated as Security Deposit. 4. Completion period of work: Normal course of completion of work is 30 days but will change from time to time, based on work order in the case of repeat order. 5. Delay in completion: Time is the essence of the contract and period of completion stipulated should be strictly adhered to. If contractor fails to complete the work as per order in all respects and hand over the same within the stipulated time, we may at our option either recover liquidity ½% of the contract value per day of such delay with a maximum of 10% of the contract value or terminate the order wholly or partially 6 PAYMENT TERMS: a. 90% against supply and satisfactory completion of the work and b. 10% against BG as performance security for the warranty period 7.AGREEMENT: The successful tender if so required by the RRII, shall execute an agreement with the RRII in the form prescribed by the Board soon after the acceptance of the tenders failing which the EMD will be forfeited and the acceptance of the tender shall be treated as cancelled. 8. The Director (Research) RRII deserves the unrestricted right to reject any or all of the tenders or to accept any tender in whole or part without assigning any reason thereof.

4 4 SCHEDULE OF REQUIREMENT Sl. No. Item 1. Internet Load Balancing Switch with monitoring application software 2. Security Appliance with monitoring software / Unified Thread Management appliance Quantity 1 No. 1 No. SPECIFICATION : Internet Load Balancing Switch 19 Rack mountable Internet load balancer with 2 GB or above RAM Capacity Minimum 200 Mbps throughput Unlimited simultaneous sessions WAN port links 4 nos. or above WAN uplink using full duplex Gigabit Ethernet through SM OFC Modules to support the Fibre uplink Minimum 4 LAN Ethernet ports OSPF, RIP, RIP II or equivalent routing protocols Load balancing and failover algorithms Support for VPN, RADIUS, LDAP etc NAT and IP forwarding capability Integrated application level security support Integrated intrusion prevention Application smart routing SNMP support, Web / GIU based configuration and Monitoring, RS 232 based command line support, VPN Support Bandwidth usage statistics, ISP health monitoring Access permission management etc. Indian standard V power input EN 60950, UL 19050, EN 55022, CE etc. certifications 5 year onsite same business day replacement warranty support Same series unit must be spared for one month performance testing before final selection.

5 SPECIFICATION OF SECURITY APPLIANCE 5 Unified Thread Management Appliance Sl. Features Compliance Remarks Comments No. 1.1 General Requirements: 1 The Firewall must be appliance based and rack mountable 2 It should be modular to accommodate disk based storage or future interface growth. 3 Appliance should have provision for redundant power supply 4 Licensing: should be per device license for unlimited users for Firewall/ VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy 5 Support for Virtualization (ie Virtual Systems / Virtual Domains). Please mention what is the maximum number of virtual instances supported 6 Should support USB interfaces for config. Backup / restore, upgrading images and for connecting 3 G Modems as fall-back. 7 Should support more than one ISP with automatic ISP failover as well as ISP load sharing for outbound traffic. 8. Should have support for Explicit Proxy with Web Caching (especially for the purpose of having session based policies for Citrix/ Terminal Server users) 1.2 Interface and Connectivity Requirements: 1 The platform must be capable of supporting a minimum of 8 gigabit interfaces with auto sensing 10/100/1000 capability 2 It should also support 8 x 10/100 Fast Ethernet interfaces 3 The platform should support the standards based Multi Link aggregation technology (IEEE 802.3ad) to achieve higher bandwidth 4 The platform should support VLAN tagging (IEEE 802.1q) with about 4096 VLANs supported ( in NAT / Route mode) 1.3 Performance Requirements: 1. Firewall must support at least 500,000 concurrent connections

6 2 The Firewall must support at least 15,000 new sessions per second processing 6 3 The Firewall should support throughputs of minimum 4 Gbps for all packet sizes (1518 byte packet, 512 byte packet and 64 byte packet) 4 The firewall should support a minimum of 2.5 Gbps of IPSec VPN Throughput and should be hardware accelerated 5 The Firewall should support a minimum of 500 Mbps of IPS Throughput 1.4 Network / Routing Requirement: 1 Static routing must be supported 2 Policy based Routing must be supported 3 Dynamic Routing (RIP,OSPF,BGP & IS- IS) must be supported for IPv4 4 Should support RIPng, OSPFv3 and BGP4+ 5 Multicast Routing must be supported 1.5 Firewall Features Requirement: 1 The Firewall should be ICSA Labs certified for Enterprise Firewall or EAL 4 certified, if not the same model 2. It should be possible to operate the firewall in bridge mode or transparent mode apart from the standard NAT mode 3 The Firewall must provide NAT functionality, including PAT 4 Should support Policy-based NAT 5 The Firewall should provide advanced NAT capabilities, supporting NAT Traversal for services like SIP/H.323/SCCP 6 Firewall should support Voice based protocols like H.323, SIP, SCCP,MGCP etc and RTP Pinholing 7 The Firewall should support User-Group based Authentication (Identity based Firewalling) & Scheduling 8 IPv6 support for both NAT and Transparent Mode 1.6 Authentication Requirements: 1 Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+) 2 Support for RSA Secure ID or other Token based products 3 Support for Native Windows Active Directory or Novell edirectory Integration

7 Should support PKI / Digital Certificate 4 based two-factor Authentication for both Users and Firewall Administrators 1.7 Encryption / VPN Requirements 1 The VPN should be integrated with firewall and should be ICSA Labs certified for both IPSec and SSL-TLS. Should support the following protocols a DES & 3DES b MD5, SHA-1 & the more secure SHA 256 authentication c Diffie Hellman Group 1, Group 2, Group 5 & the more secure Group 14 d Internet Key Exchange (IKE) vi as well as IKE v2 algorithm e The new encryption standard AES 128,192 & 256 (Advanced Encryption Standard) 2 IPSec VPN should support XAuth over RADIUS and RSA Secur ID or similar product 3 Should have integrated SSL. VPN with no user license restriction. Please specify if the product does not follow the required licensing policy 4 Should support SSL Two-factor Authentication with Digital Certificates 5 Should support Single Sign-On Bookmarks for SSL Web VPN 6 Should support Windows, Linux and MAC OS for SSL VPN (should have always on clients for these OS apart from browser based access) 7 Should support NAT within IPSec/SSL VPN tunnels 8 Should also support PPTP and L2TP over IPSec VPN protocols 1.8 High Availability Requirements 1 The device must support Active Active as well as Active-Passive redundancy 2 The Firewall must support stateful failover for both firewall and VPN sessions 3 The HA Architecture should have the ability for Device Failure Detection and Notification as well as Link Status Monitor 4 Should support VRRP and Link Failure Control 1.9 Data Center Optimization: 1. Should support Server Load Balancing with features like HTTP persistence 2 Should support TCP Multiplexing 3 Should support HTTPS Offloading with flexible Digital Certificate Management

8 4 Should have support for WCCP protocol IPS,AV and Web Filtering 1 Should have integrated Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified 2 Should have a built-in Signature and Anomaly based IPS engine on the same unit 3 Should have protection for signatures 4 Able to prevent denial of service and Distributed Denial of Service attacks 5 Supports user-defined signatures (ie Custom Signatures)with Regular Expressions 6 Should Identify and control over applications (ie Application control feature) 7 Should perform Traffic shaping of popular P2P applications like KaZaa, Gnutella, Bit Torrent, WinNY, edonkey etc 8 Should control popular IM/P2P applications regardless of port/protocol like Yahoo, MSN, Skype, AOL,ICQ etc 9 The appliance should facilitate embedded anti virus support which is ICSA Labs certified 10 Gateway AV should be supported for real-time detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3 and IMAP, NNTP and IM 11 Should have configurable policy options to select what traffic to scan for viruses 12 Should have options to prevent user downloads based on file extension as well as file type 13 Should have an ability of Antivirus scanning for IPv6 traffic 14 The appliance should facilitate embedded Web Content Filtering feature 15 Web content filtering solution should work independently without the need to integrate with External proxy server 16 URL database should have more than 2 billion URLs under 70+ categories 17 Should be able to block different categories / sites based on User Authentication. 1.1 Other Requirements 1

9 1 Provision to create secure zones / DMZ (ie Multi Zone support) 2 Should support DiffServ (Differentiated Services) 3 Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS 4 The DLP feature should support popular file types like MS-Word, PDF etc 5 Should have support WAN Optimization from day 1 for common applications like HTTP, HTTPS, MAPI, FTP, CIFS etc 6 WAN Optimization should be supported for bi-directional traffic in Gateway-to- Client / Gateway-to-Gateway topology 7 Should support Web caching for Explicit proxy traffic 8 Should Support Packet Capture / sniffer to capture and examine the contents of individual data packets that traverse the firewall appliance for troubleshooting, diagnostics and general network activity 9 The vendor should supply a separate logging platform 10 The vendor should take the responsibility of supplying a licensed OS and Hardware if it is software based Logging solution 11 The logging platform should have a capacity of 1 TB 12 The logging platform should have atleast 2 x 10/100/1000 Gigabits ports 1.1 Certifications - Mandatory 2 1 Should have support for the following certifications: a FIPS for Client VPN software b OS should be IPv6 Phase II Ready certified War rant y of the unit Firewall / VPN /IPS/ AV/Web Filtering Appliance with Unlimited user licenses with 3 year warranty and Signature / Firmware / OS updates for 3 years 2 Logging, Statistics and Reporting Platform with 3 year warranty 3 Warranty extension / AMC rate for additional 2 years after the 3 year std. warranty 9

TENDER FOR. SUPPLY, INSTALLATION, TESTING & COMMISSIONING OF UTMs. Tender No. IT/ 01/IIMP/ 05/2015

TENDER FOR. SUPPLY, INSTALLATION, TESTING & COMMISSIONING OF UTMs. Tender No. IT/ 01/IIMP/ 05/2015 INDIAN INSTITUTE OF MANAGEMENT AMRITSAR INDIAN INSTITUTE OF MANAGEMENT KOZHIKODE (Mentoring IIM of IIM Amritsar) Website: https://www.iimk.ac.in/iimamritsar/ TENDER FOR SUPPLY, INSTALLATION, TESTING &

More information

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015 MARINE PRODUCTS EXPORT DEVELOPMENT AUTHORITY (Ministry of Commerce and Industry, Govt. of India) Panampilly Avenue, Cochin 682 036 (Ph: 0484-2311979, e-mail: ho@mpeda.gov.in) QUOTATION FOR UTM 4/26(1)/2009/EDP-HO

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 Check Point Firewall Software and Management Software I. Description of the Item Up gradation, installation and commissioning of Checkpoint security gateway

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

Network Security. Protective and Dependable. Pioneer of IP Innovation

Network Security. Protective and Dependable. Pioneer of IP Innovation Network Protective and Dependable Pioneer of IP Innovation Why PLANET Network Solution? With the growth of the threats, network security becomes the fundamental concerns of home and enterprise network.

More information

Network Security Firewall

Network Security Firewall DFL-210 Multi-Function Security + Network Firewall + VPN Server + Content Manager + Bandwidth Manager + Transparent Firewall Mode Ports + 1 Ethernet WAN + 4 Ethernet LAN + 1 Ethernet DMZ/WAN2 Advanced

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Unified Services Routers

Unified Services Routers High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router Gigabit Multi-Homing VPN Security Router Physical Port 1~2 x 10/100/1000 Base-T RJ-45, configurable with LAN 1 (Mirror Port) 3~4 x 10/100/1000 Base-T RJ-45, configurable with WAN 4 (WAN 4 / LAN2 / DMZ)

More information

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

Meraki MX Family Cloud Managed Security Appliances

Meraki MX Family Cloud Managed Security Appliances DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,

More information

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 June 10, 2014 01-500-96996-20140610

More information

Unified Services Routers

Unified Services Routers High VPN Performance Protocols IPSec PPTP LTP SSL Up to 5 (DSR-500/500N) or 70 (DSR-1000/1000N) VPN tunnels Up to 10 (DSR-500/500N) or 0 (DSR-1000/1000N) SSL VPN tunnels DES, DES, AES Encryption Main/

More information

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall Government of Canada Managed Security Service (GCMSS) Date: July 12, 2012 TABLE OF CONTENTS 1 FIREWALL... 1 1.1 SECURITY...1 1.2 STANDARDS...1 1.3 FAILOVER...2 1.4 PERFORMANCE...3 1.5 REPORTING...3 1.6

More information

*TKtr *W4>K. Government of India itwm mitm Ministry of Labour & Employment W T HSlPT&llem. Directorate General of Mines Safety TENDER NOTICE

*TKtr *W4>K. Government of India itwm mitm Ministry of Labour & Employment W T HSlPT&llem. Directorate General of Mines Safety TENDER NOTICE *TKtr *W4>K Government of India m itwm mitm Ministry of Labour & Employment W T HSlPT&llem Directorate General of Mines Safety TENDER NOTICE No. Z-16025/01/2016-17/MAMID/4 3 Dhanbad, dated : &3/5 /2016

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

MARINE PRODUCTS EXPORT DEVELOPMENT AUTHORITY Panampilly Nagar, Kochi-682036 Ph: 0484-2310160, e-mail: ho@mpeda.gov.in

MARINE PRODUCTS EXPORT DEVELOPMENT AUTHORITY Panampilly Nagar, Kochi-682036 Ph: 0484-2310160, e-mail: ho@mpeda.gov.in MARINE PRODUCTS EXPORT DEVELOPMENT AUTHORITY Panampilly Nagar, Kochi-682036 Ph: 0484-2310160, e-mail: ho@mpeda.gov.in 5/26/2014/EDP-HO 19/01/2015 Sub: Quotation for dedicated Leased Line Internet connection

More information

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway PLANET Product Guide 2011 Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

UTM FIREWALL SPECS HARDWARE SPECIFICATIONS

UTM FIREWALL SPECS HARDWARE SPECIFICATIONS UTM FIREWALL SPECS HARDWARE SPECIFICATIONS ASIC-Based Standalone Appliance GbE RJ45 Ports 42 Internal Storage 64 GB SYSTEM PERFORMANCE Firewall Throughput (1518 / 512 / 64 byte UDP packets) 4 / 4 / 4 Gbps

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN Tagging and Port-Based VLAN D-Link End-to-End

More information

Introduction of Quidway SecPath 1000 Security Gateway

Introduction of Quidway SecPath 1000 Security Gateway Introduction of Quidway SecPath 1000 Security Gateway Quidway SecPath 1000 security gateway is new generation security equipment developed specially for enterprise customer by Huawei-3Com. It can help

More information

Unified Services Routers

Unified Services Routers Product Highlights Cost effective multifunction network solution ideal for small businesses High speed router with integrated VPN tunnel support for secure network access from a remote location Policybased

More information

FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices

FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices DATASHEET FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices Proven Security for Remote Offices, Retail, and Customer Premise Equipment FortiGate/FortiWiFi-80 Series consolidated

More information

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Cyberoam Next-Generation Security. 11 de Setembro de 2015 Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN Tagging D-Link End-to-End Security Solution

More information

Funkwerk UTM Release Notes (english)

Funkwerk UTM Release Notes (english) Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

APV9650. Application Delivery Controller

APV9650. Application Delivery Controller APV9650 D a t a S h e e t Application Delivery Controller Array Networks APV Series of Application Delivery Controllers optimizes the availability, user experience, performance, security and scalability

More information

TENDER DOCUMENT FOR SUPPLY, INSTALLATION, TESTING AND COMMISSIONING OF FIREWALL

TENDER DOCUMENT FOR SUPPLY, INSTALLATION, TESTING AND COMMISSIONING OF FIREWALL TENDER DOCUMENT FOR SUPPLY, INSTALLATION, TESTING AND COMMISSIONING OF FIREWALL NATIONAL CENTRE FOR ANTARCTIC & OCEAN RESEARCH (Ministry of Earth Sciences, Govt. Of India) Headland Sada, Vasco-da-Gama

More information

FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices

FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices DATASHEET FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices Proven Security for Remote Offices, Retail, and Customer Premise Equipment FortiGate/FortiWiFi-80 Series consolidated

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine featuring an intuitive redesigned Web GUI Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

Boston Area Windows Server User Group April 2010

Boston Area Windows Server User Group April 2010 Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series Product Highlights Increased Security Integrated Firewall/VPN and UTM provides protection from viruses, intrusions and harmful content. Reduced Cost of Ownership Subscription service per firewall rather

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Sophos Certified Architect Course overview

Sophos Certified Architect Course overview Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting

More information

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA RFP FOR SELECTION OF SYSTEM INTEGRATOR CORRIGENDUM RELEASED BY: Goa Police Government

More information

Cisco Wide Area Application Services (WAAS) Software Version 4.0

Cisco Wide Area Application Services (WAAS) Software Version 4.0 Cisco Wide Area Application Services () Software Version 4.0 Product Overview Cisco Wide Area Application Services () is a powerful application acceleration and WAN optimization solution that optimizes

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3 WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113

More information

USG6600 Next-Generation Firewall

USG6600 Next-Generation Firewall USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

LB Intelligent Multi-WAN Router

LB Intelligent Multi-WAN Router LB Intelligent Multi-WAN Router Increases WAN reliability and availability Increases Internet Bandwidth Improves availability and response time for external requests to hosted servers Supports VPN resiliency

More information

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features

More information

Cisco RV180 VPN Router

Cisco RV180 VPN Router Data Sheet Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet

More information

NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPPALLI - 620015 COMPUTER SUPPORT GROUP

NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPPALLI - 620015 COMPUTER SUPPORT GROUP Tender Notification No. March / 2011 Item No. CSG 13 : UTM & E-MAIL Security Appliance BIDDER S COPY INSTRUCTIONS TO BIDDERS 1. This document set contains the following: Instructions to Bidders Pages 1

More information

Office of the Competition Commission of India 18-20 Hindustan Times House, K.G. Marg, New Delhi - 110001

Office of the Competition Commission of India 18-20 Hindustan Times House, K.G. Marg, New Delhi - 110001 Office of the Competition Commission of India 18-20 Hindustan Times House, K.G. Marg, New Delhi - 110001 F.No- D-33011/1/2010-CCI (42) Dated: 11/02/2015 Limited Tender Enquiry To ---------------------------

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. SOLUTION GUIDE Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

USG6300 Next-Generation Firewall

USG6300 Next-Generation Firewall USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Security. Quick Sales Guide

Security. Quick Sales Guide Security Quick Sales Guide Security Quick Finder 200 ~ 500 PC Users USG 2000 75 ~ 200 PC Users USG 1000 Unified Security Gateway (Hybrid VPN & UTM) 50 ~ 75 PC Users USG 300 USG 200 10 ~ 50 PC Users USG

More information

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY VISION FUTURE-READY SECURITY Because a security solution represents

More information

KAMLA NEHRU INSTITUTE OF TECHNOLOGY SULATANPUR (UP)-228118 SHORT TENDER NOTICE

KAMLA NEHRU INSTITUTE OF TECHNOLOGY SULATANPUR (UP)-228118 SHORT TENDER NOTICE Tender No: KAMLA NEHRU INSTITUTE OF TECHNOLOGY SULATANPUR (UP)-228118 /Pur/2013 SHORT TENDER NOTICE Sealed tenders are invited in Duplicate from Manufacturers /Authorised dealers for the upgradation of

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

- Introduction to PIX/ASA Firewalls -

- Introduction to PIX/ASA Firewalls - 1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers

More information

ProSecure Unified Threat. UTM Series. Unified Gateway Security for Smart IT Networks Without Compromise

ProSecure Unified Threat. UTM Series. Unified Gateway Security for Smart IT Networks Without Compromise ProSecure Unified Threat Management Firewall Data Sheet Unified Gateway Security for Smart IT Networks Without Compromise ProSecure UTM Features and Highlights Advanced Application Control Firewall Monitors

More information

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay

More information

NEN Community REANNZ. Design Statement: NEN Edge Device

NEN Community REANNZ. Design Statement: NEN Edge Device TO FROM NEN Community REANNZ DATE June 2010 SUBJECT Design Statement: NEN Edge Device Background This National Education Network (NEN) design statement was developed by REANNZ with input from the relevant

More information

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 Course Overview Through this 2-day instructor-led classroom or online virtual training, participants

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Barracuda Load Balancer Online Demo Guide

Barracuda Load Balancer Online Demo Guide Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,

More information

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.) 1 Fortinet - FCNSA Fortinet Certified Network Security Administrator QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.) A. Firewall

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

Section & clause No. 1 5 Time Schedule Last date/time for Sale of document Bid closing date/time Bid opening date/time. No Page No

Section & clause No. 1 5 Time Schedule Last date/time for Sale of document Bid closing date/time Bid opening date/time. No Page No Andhra Pradesh Technology Services Ltd. BRKR Bhavan, B-Block, Tankbund Road, Hyderabad 500063, Andhra Pradesh, India Phone: (40) 2322 4289, 23222865; Fax: 23227458 Email:mdapts@apts.gov.inWeb site: http://apts.gov.in

More information

Cisco RV215W Wireless-N VPN Router

Cisco RV215W Wireless-N VPN Router Data Sheet Cisco RV215W Wireless-N VPN Router Simple, Secure Connectivity for the Small Office and Home Office Figure 1. Cisco RV215W Wireless-N VPN Router The Cisco RV215W Wireless-N VPN Router provides

More information

Assuring Your Business Continuity

Assuring Your Business Continuity Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)

More information

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000 Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Huawei Eudemon200E-N Next-Generation Firewall

Huawei Eudemon200E-N Next-Generation Firewall Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT

More information

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,

More information

SonicWALL Advantages Over WatchGuard

SonicWALL Advantages Over WatchGuard Competitive Analysis August 2001 WatchGuard SOHO - Product Overview WatchGuard Technologies extended its product offerings to the fast-growing broadband market through the acquisition of BeadleNet, LLC,

More information

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600 APV x600 Series D a t a S h e e t Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600 Array Networks APV Series of Application Delivery Controllers optimizes the

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Hosting more than one FortiOS instance on. VLANs. 1. Network topology Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

INVITATION OF TENDERS

INVITATION OF TENDERS Cost of Tender Document Fee Rs.500/ NATIONAL INSTITUTE OF TECHNOLOGY (Under the Ministry of HRD Govt. of India) KURUKSHETRA-136119 (Haryana) INVITATION OF TENDERS Procurement of 155 Mbps (1:1) Leased Line

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

Improving Network Efficiency for SMB Through Intelligent Load Balancing

Improving Network Efficiency for SMB Through Intelligent Load Balancing Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business

More information

we secure YOUR network we secure network security English network security

we secure YOUR network we secure network security English network security we secure YOUR network English network security network security CryptoGuard VPN family The CryptoGuard VPN 5000 family is a flexible (cost-)effective security system, completely developed by Compumatica.

More information