Posted on

Pentingnya UPS untuk alat medis dan rumah sakit

gambar UPS Rumah Sakit

Pentingnya UPS untuk alat medis dan rumah sakit

gambar UPS Rumah Sakit

Di Indonesia, masih sering terjadi insiden yang telah membahayakan kesehatan dan bahkan merenggut nyawa pasien di rumah sakit akibat gangguan atau pemadaman listrik. Gangguan listrik di tempat-tempat perawatan kritis seperti unit perawatan intensif (ICU) atau ruang bedah bisa berarti mempertaruhkan kesehatan, bahkan nyawa pasien.

“Di tengah insiden gangguan listrik yang dapat terjadi sewaktu-waktu di rumah sakit, dibutuhkan Uninterruptible Power Supply atau UPS handal yang dapat menyediakan run-time yang cukup agar dapat melakukan prosedur backup untuk membangkitkan listrik alternatif atau relokasi pelayanan kritikal jika diperlukan,” jelas Michael Kurniawan, selaku Vice President IT Business, Schneider Electric Indonesia.

APA itu UPS ?
Uninterruptible power supply atau sering disingkat dengan UPS. UPS merupakan hardware yang sangat penting dengan fungsi utama sebagai penyimpan dan penyuplai daya aliran listrik. cara kerja dari ups ini ialah dengan menyimpan daya kemudian mengalirkannya ke output, oleh karena itu ups sangat penting sebab memiliki simpanan daya untuk menyuplai tegangan listrik apabila terjadi aliran listrik utama (PLN) yang terputus atau mati mendadak.

Apa saja FUNGSI UPS :
1. Dapat memberikan energi listrik sementara ketika terjadi kegagalan daya pada listrik utama (PLN). Memberikan kesempatan dan rentang waktu yang cukup untuk segera menghidupkan genset sebagai pengganti listrik utama.
2. Mengatasi masalah kelistrikan lainnya seperti current fluktuasi, undervoltage, overvoltage, electrical line noise, distorsi harmonisa, dan lain sebagainya. sehingga sangat bermanfaat melindungi dan memperpanjang usia peralatan yang berhubungan dengan listrik.
3. Memberikan kesempatan dan waktu yang cukup untuk segera melakukan back up data dan mengamankan sistem operasi (OS) dengan melakukan shutdown yang sesuai prosedur ketika listrik utama mati.
4. Mengamankan sistem komputer dari gangguan-gangguan listrik yang dapat mengganggu sistem komputer baik berupa kerusakan software, data maupun kerusakan hardware.
5. UPS secara otomatis dapat melakukan stabilisasi tegangan ketika terjadi perubahan tegangan pada input sehingga tegangan output yang digunakan oleh sistem komputer berupa tegangan Yang stabil.

Peralatan Rumah sakit sangat memerlukan UPS sebagai Back up pada saat listrik mati sebelum pindah ke genset. Sistem back up biasanya minimal 10 – 30 menit. UPS ini akan memback up sistem selama genset belum dihidupkan.

6 (enam) hal yang perlu di perhatikan dalam memilih UPS untuk laboratorium, peralatan medis pada rumah sakit :
1. Hitung kapasitas yang di perlukan dan pikirkan rencana pengembangan kedepannya.
Misal di alatnya tertulis :
– Input : 220 VAC, 10 a ( ini berarti 220 x 10 = 2200 watt) Jadi Kapasitas yang di perlukan minimal (2200 x 20%) + 2200 = 2640 watts, jadi Apabila UPS dengan power faktor 0,8 maka UPS yang di perlukan minimal 5000 VA
– Berkembangnya suatu rumah sakit di masa depan akan berimbang juga dengan kebutuhan daya listriknya, sehingga akan membutuhkan juga UPS yang mampu menghandle penambahan daya listrik utama tersebut, hal ini dapat disiasati dengan UPS yang bersifat modular sehingga mampu memberikan daya backup tambahan, modular disini biasanya penambahan berupa paket baterai sebagai backup dan suplai daya tambahan pada suatu UPS, sehingga lebih ekonomis dikarenakan tidak perlu menukar atau membeli ups yang baru namun hanya membeli paket baterainya saja.

2. Pastikan UPS Online Pure Sinewave
– UPS Online artinya perpindahan dari Listrik mati ke ke battery adalah 0 ms
– UPS Pure Sinewave artinya gelombangnya sudah memenuhi standart gelombang sinus

3. Minimal Back up 10 menit dalam kondisi beban penuh
Pada saat pindah battery yang di dalam UPS mampu bertahan antara 10 – 15 menit supaya saat listrik mati masih ada kesempatan untuk menghidupkan genset.

4. Pastikan grounding bagus
Grounding ini berhubungan dengan arus petir, sehingga pada saat ada surge petir alat laboratorium sangat terproteksi dari petir dan ups sendiri akan aman karena arus petir akan lari ke grounding.

5. Gunakan arester atau anti petir
Aresster ini bisa di pasang sistem 3 phase atau ke sistem UPS yang fungsinya akan memfilter arus petir dan langsung ke grounding.

6. Garansi dan sistem layanan pemasok UPS
Pembelian sebaiknya di barengi dengan pemasangan UPS oleh tenaga ahlinya baik SDM ahli dari produsen ups, distributor dan agen resmi ups. ini untuk menghindari kesalahan pemasangan (human erorr) yang akan berakibat fatal pada perangkat ups tersebut, bahkan dapat menghilangkan garansi UPS-nya (VOID).

SPESIFIKASI UPS ALAT MEDIS YANG DISARANKAN :
– Banyak Dokter dan Rumah Sakit yang salah dalam memilih spesifikasi UPS untuk alat medis yang benar, tidak setiap UPS sama, Anda harus melihat kebutuhan dan unit alat medis yang akan diback up listriknya oleh UPS apabila listrik mati.
– Pastikan memilih UPS include Stabilizer modul built in.
– Pastikan memlih UPS yang tegangan outputnya Pure Sine Wave, itu berarti tegangan output akan selalu stabil walaupun terjadi naik turun tegangan dari input unit UPS
– Pastikan kebutuhan daya cadangan yang terpakai, misal unit USG anda 1 KVA maka anda memerlukan setidaknya 50% lebih dari sisa kebutuhan daya UPS. Maka Anda disarankan membeli UPS dengan spesifikasi 1 KVA + (50% x 1 KVA) = 1,5 KVA. Space output yang terlalu sedikit berakit cover UPS yang sebentar atau dimungkinkan kegagalan recovery saat listrik mati. Semakin besar space output semakin bagus. Tentu semakin mahal harganya.
– Pastikan UPS anda memiliki panel operator yang mudah dan jelas.
– Pastikan dilakukan pemantauan uji fungsi saat listrik mati
– Pastikan pemeliharaan berkala dan penggantian baterry UPS

Rumah sakit dengan berbagai jenis alat elektromedis dan alat kesehatan yang ada memerlukan UPS sebagai salah satu hardware penunjang alat medis terutama alat dengan teknologi tinggi di antaranya :
– Peralatan Pemeriksaan Mata
– Peralatan Pemeriksaan Laboratorium (Auto Chemistry Analyzer, Auto Immunologi Analyzer, Blood Analyzer, Urine Analyzer)
– Peralatan Ruang Operasi
– Lemari Es Penyimpan Darah, Reagen dan Vaksin
– USG (Ultrasonograph)
– EEG (Elektro Enchelograph)
– Laser Printer X Ray Unit
– Console Computer Unit Server Angiography
– Console Computer Unit Server CT-Scan
– CT Scan
– Anastesi Machine
– Ventilator
– MRI
– dll sesuai kebutuhan

Terutama pada alat-alat medis yang spesifikasi tidak ada battery internal built in. Sehingga apabila listrik utama mati, masih bisa dilakukan recovery pada unit alat medis tersebut baik itu shut down unit atau menyimpan hasil pemeriksaan yang telah dilakukan.

Anda bisa bayangkan bagaimana bila Anda sebagai dokter harus mengulangi lagi pemeriksaan USG dari awal ke pasien hanya karena video dan gambar tidak tersimpan karena adanya listrik mati, USG tidak ada penunjang UPS. Tentu sangatlah menjengkelkan. Bagi pasien juga sangat tidak nyaman karena harus dilakukan pemeriksaan ulang.

Maka dari itu, UPS sangat diperlukan sebagai penunjang alat medis, dan Anda harus mempunyai unit back up, karena saat dilakukan maintenance penggantian battery setiap 2 tahun sekali maka UPS tidak bisa dipakai sementara.

Sangat menyarankan untuk dilakukan sentralisasi UPS pada ruangan ruangan rumah sakit yang menjadi prioritas, bisa dibayangkan apabila listrik utama mati dan Anda menjadi pasiennya 🙂

Ruangan prioritas Rumah Sakit untuk sentralisasi UPS :
– Ruangan Operasi ( integrasi dengan unit utama seperti lampu operasi, stop kontak dinding dan pendant unit )
– Ruangan Laboratorium ( integrasi dengan lampu penerangan utama, stop kontak dinding)
– Ruangan ICU ( integrasi dengan lampu penerangan utama, stop kontak dinding, dan peralatan lifesupport)
– Ruangan NICU ( integrasi dengan lampu penerangan utama, stop kontak dinding, dan peralatan lifesupport)
– Ruangan IGD ( integrasi dengan lampu penerangan utama, stop kontak dinding, dan peralatan lifesupport)
– Ruangan Hemodialysa ( integrasi dengan lampu penerangan utama, stop kontak dinding, dan peralatan lifesupport)
– Ruangan CT Scan ( integrasi dengan lampu penerangan utama, stop kontak dinding, dan peralatan lifesupport)
– Dll sesuai kebutuhan prioritas

“Pilihan solusi UPS yang terandalkan mampu membantu pengelola rumah sakit melindungi manusia maupun asset rumah sakit serta menyalurkan daya listrik yang berkualitas, bahkan di situasi tersulit sekalipun. Rumah sakit akan terus siaga, sehingga memungkinkan lingkungan yang sangat aman untuk pasien, staf rumah sakit dan pengunjung,” Michael menyimpulkan.

Anda memerlukan solusi perangkat UPS untuk Hospital atau Rumah Sakit, maka jangan ragu untuk menanyakan kepada ahlinya, banyak klien kami yang sudah terbantu untuk kebutuhan UPS-nya, kami memiliki pengalaman yang cukup didalam hal menghitung, mengukur, pemenuhan kebutuhan akan perangkat UPS, pemasangan di beberapa daerah diindonesia, solusi UPS didalam sektor Perusahaan, UPS Data Center, UPS Industrial, UPS Rumah Sakit dan UPS lainya.

===== Segera Hubungi Kami ======

Posted on

Pentingnya UPS untuk alat medis dan Rumah Sakit

gambar ups apc rumah sakit

Pentingnya UPS untuk alat medis dan Rumah Sakit

gambar ups apc rumah sakit

Jakarta, Di Indonesia, masih sering terjadi insiden yang telah membahayakan kesehatan dan bahkan merenggut nyawa pasien di rumah sakit akibat gangguan atau pemadaman listrik. Gangguan listrik di tempat-tempat perawatan kritis seperti unit perawatan intensif (ICU) atau ruang bedah bisa berarti mempertaruhkan kesehatan, bahkan nyawa pasien.

“Di tengah insiden gangguan listrik yang dapat terjadi sewaktu-waktu di rumah sakit, dibutuhkan Uninterruptible Power Supply atau UPS handal yang dapat menyediakan run-time yang cukup agar dapat melakukan prosedur backup untuk membangkitkan listrik alternatif atau relokasi pelayanan kritikal jika diperlukan,” jelas Michael Kurniawan, selaku Vice President IT Business, Schneider Electric Indonesia.

Standar International Electrotechnical Commission (IEC) menetapkan bahwa pemasangan UPS di area-area yang dianggap kritikal di sebuah rumah sakit merupakan suatu kewajiban. Selain ruang operasi, unit gawat darurat, ICU, dan unit perawatan bayi, solusi UPS dapat memberikan dukungan uptime di beberapa area lain, sepertiMagnetic Resonance Imaging (MRI) dan Computerized Tomography (CT) scanners, Picture Archiving & Communications Systems (PACS), dan area suster jaga dan ruang administrasi.

UPS dari Schneider Electric dapat menjadi satu pilihan terkait hal tersebut. Dalam mendesain sistem UPS yang disesuaikan dengan kebutuhan maupun dalam paket standar, Schneider Electric memberi solusi UPS fasa tunggal dan fasa tiga untuk aplikasi layanan kesehatan sehingga dapat memenuhi standarfasilitas layanan kesehatan, seperti rumah sakit.

“Pilihan solusi UPS yang terandalkan mampu membantu pengelola rumah sakit melindungi manusia maupun asset rumah sakit serta menyalurkan daya listrik yang berkualitas, bahkan di situasi tersulit sekalipun. Rumah sakit akan terus siaga, sehingga memungkinkan lingkungan yang sangat aman untuk pasien, staf rumah sakit dan pengunjung,” Michael menyimpulkan.

Posted on

Server HP ProLiant ML350e Gen8 E5-2407 (648376-371)

Server HP ProLiant ML350e Gen8 E5-2407 (648376-371)

Server HP ProLiant ML350e Gen8 E5-2407 (648376-371)

SPESIFIKASI Server HP ProLiant ML350e Gen8 E5-2407 (648376-371) :

Prosessor (1) Intel® Xeon® E5-2407 (2.2GHz/4-core/80W/10MB) Processor
Cache Memory 10MB (1 x 10MB) Level 3
Memory 4GB (1 x 4GB) Unbuffered DIMMs PC3L-10600E
Network Controller HP Ethernet 1Gb 2-port 361i Adapter
Storage Controller HP Dynamic Smart Array B120i/512MB FBWC SATA Controller (RAID 0,1, 5, 10)
Hard Drive None ships standard; includes 3 LFF hard drive blanks
Internal Storage 4 LFF Hot Plug SATA HDD Bays only
Optical Drive Bay HP Half-Height SATA DVD-ROM Optical Drive
PCI-Express Slots (1) 460 Watt Power Supply (non-hot plug, non-redundant)
Power Supply 2 Non-Hot Plug, Non Redundant Fans
Fans USB Keyboard and Mouse ship standard, NOTE: EURO (-421) Models excludes the keyboard.
Management HP iLO Management Engine (standard), Optional: HP iLO Essentials or HP Insight Control
Form Factor Tower (5U)
Warranty Server Warranty includes 3-Year Parts, 1-Year Labor, 1-Year Onsite support with next business day response
Posted on

Server HP ProLiant ML310e Gen8 v2 E3-1220v3 (712329-371)

Server HP ProLiant ML310e Gen8 v2 E3-1220v3 (712329-371)

Server HP ProLiant ML310e Gen8 v2 E3-1220v3 (712329-371)

SPESIFIKASI Server HP ProLiant ML310e Gen8 v2 E3-1220v3 (712329-371) :

Prosessor (1) Intel® Xeon® E3-1220v3 (3.1GHz/4-core/8MB/80W) Processor
Cache Memory 8MB (1 x 8MB) L3 cache
Memory 4GB (1 x 4GB) PC3-12800E DDR3 UDIMM
Network Controller HP Ethernet 1Gb 2-port 332i Adapter
Internal Storage 4 LFF SAS/SATA HDD cage; includes 4 LFF hard drive blanks
Optical Drive Bay HP Half-Height 16x SATA DVD-RW
Power Supply HP 350W Multi-Output Power Supply
Fans One (1) Non-redundant system fan ships standard, One (1) Non-redundant PCIe fan ships standard
Management HP iLO Management Engine (standard on shared system NIC), Optional: HP Insight Control
Form Factor Micro ATX Tower (4U)
Warranty Server Warranty includes 3-Year Parts, 3-Year Labor, 3-Year Onsite support with next business day response
Posted on

Cyberoam CR15wiNG – Spesifikasi Dan Harga

gambar Cyberoam CR15wiNG

Cyberoam CR15wiNG

gambar Cyberoam CR15wiNG

Cyberoam CR15wiNG
CR15wiNG is the Next-Generation Unified Threat Management appliance with Wi-Fi access points that offer “the fastest UTMs made for SMBs” to small offices with high performance security over WLAN. CR15wiNG appliances come with 3×3 MIMO technology that greatly enhances wireless range and performance . It supports 802.11n/b/g wireless standards. Combined with security over wired networks offered by its range of UTM appliances, Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs.

The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.

Cyberoam’s Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow Identity-based security policies in dynamic IP environment.

Hardware UTM Appliances for Small & Branch Offices:
Cyberoam UTM appliances deliver unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive UTM protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming and intrusions. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. These offices also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.

Product Features :
Stateful Inspection Firewall
VPN (SSL VPN & IPSec)
Intrusion Prevention System
Anti-Virus & Anti-Spyware
Anti-Spam
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility & Control
Web Application Firewall
3G / 4G / WiMAx Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances

Stateful Inspection Firewall
– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) – User – Identity, Source & DestinationZone, MAC and IP address, Service
– UTM policies – IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
– Layer 7 (Application) Control &Visibility
– Access Scheduling
– Policy based Source &DestinationNAT
– H.323, SIPNATTraversal
– 802.1q VLAN Support
– DoS &DDoSAttack prevention
-MAC&IP-MAC filtering and Spoof prevention

GatewayAnti-Virus & Anti-Spyware
-Virus,Worm,Trojan Detection &Removal
– Spyware, Malware, Phishing protection
-Automatic virus signature database update
– Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
– Customize individual user scanning
– Scan and deliver by file size
– Block by file types
-Add disclaimer/signature

GatewayAnti-Spam
– Inbound Scanning
– Real-time Blacklist (RBL), MIME header check
– Filter based on message header, size, sender, recipient
– Subject line tagging
– IP address Black list/White list
– Redirect Spam mails to dedicated email address
– Image-based Spam filtering usingRPDTechnology
– Zero hour Virus Outbreak Protection
– IP Reputation-based Spam filtering

Intrusion Prevention System
– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
-Automatic real-time updates from CRProtect networks
– ProtocolAnomaly Detection
-DDoS attack prevention

Web Filtering
– InbuiltWeb Category Database
– URL, keyword, File type block
– Categories: Default(82+), Custom
– Protocols supported: HTTP, HTTPS
– Block Malware, Phishing, Pharming URLs
– Schedule-based access control
– Custom block messages per category
– Block JavaApplets, Cookies,Active x
– CIPA Compliant
– Data leakage control via HTTP, HTTPS upload

Application Filtering
– Inbuilt Application Category Database
– 11+ Application Categories: e.g. Gaming, IM, P2P, Proxy
– Schedule-based access control
– Block
– P2P applications e.g. Skype
– Anonymous proxies e.g. UItra surf
– “Phone home” activities
– Keylogger
– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility

Web Application Firewall
– Positive Protection model
– Unique “Intuitive Website Flow Detector” technology
– Protection against SQL Injections, Cross-site Scripting
(xSS), Session Hijacking, URL Tampering, Cookie
Poisoning
– Support for HTTP 0.9/1.0/1.1
– Extensive Logging & Reporting

Virtual Private Network
– IPSec, L2TP, PPTP
– Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
– HashAlgorithms – MD5, SHA-1
– Authentication – Preshared key, Digital certificates
– IPSec NAT Traversal
– Dead peer detection and PFS support
– Diffie Hellman Groups – 1,2,5,14,15,16
– External Certificate Authority support
– Export RoadWarrior connection configuration
– Domain name support for tunnel end points
-VPNconnection redundancy
– Overlapping Network support
– Hub &Spoke VPN support

SSL VPN
-TCP&UDPTunneling
-Authentication -Active Directory, LDAP, RADIUS,
Cyberoam
– Multi-layered ClientAuthentication – Certificate,
Username/Password
– User &Group policy enforcement
– Network access – Split and Full tunneling
– Browser-based (Portal)Access – Clientless access
– Lightweight SSLVPNTunneling Client
– Granular access control to all the Enterprise Network
resources
-Administrative controls – Session timeout, Dead Peer
Detection, Portal customization
– TCP- basedApplicationAccess – HTTP, HTTPS,
RDP,TELNET,SSH

Instant Messaging (IM) Management
-Yahoo and Windows Live Messenger
-Virus Scanning for IM traffic
-Allow/Block Login
-Allow/Block FileTransfer
-Allow/BlockWebcam
-Allow/Block one-to-one/group chat
– Content-based blocking
– IM activities Log
– Archive files transferred
– CustomAlerts

WirelessWAN
-USBport 3G/4G and Wimax Support
– PrimaryWANlink
-WANBackup link

Bandwidth Management
– Application and User Identity based Bandwidth
Management
– Guaranteed &Burstable bandwidth policy
– Application & User Identity based Traffic Discovery
– MultiWANbandwidth reporting
– Category-based bandwidth restriction

User Identity and Group Based Controls
– Access time restriction
-Time and Data Quota restriction
– Schedule based Committed and Burstable Bandwidth
– Schedule based P2Pand IM Controls

Networking
– Failover – Automated Failover/Failback, Multi-WAN failover,
3GModem failover
-WRRbased load balancing
– Policy routing based onApplication and User
– IP Address Assignment – Static, PPPoE, L2TP, PPTP & DDNS
Client, Proxy ARP, DHCP server, DHCP relay
– Support for HTTPProxy
– Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast
Forwarding
– Parent Proxy support withFQDN
– “IPv6 Ready” Gold Logo

Administration & System Management
-Web-based configuration wizard
– Role-based access control
– Firmware Upgrades viaWeb UI
-Web 2.0 compliant UI (HTTPS)
– UI Color Styler
– Command Line Interface (Serial, SSH,Telnet)
-SNMP(v1, v2c, v3)
– Multi-lingual support: Chinese, Hindi, French, Korean
– CyberoamCentral Console (Optional)
– NTPSupport

User Authentication
– Internal database
-Active Directory Integration
-Automatic Windows Single Sign On
– External LDAP/RADIUS database integration
– Thin Client support – Microsoft Windows Server 2003
Terminal Services and Citrix xenApp
-RSAsecurID support
– ExternalAuthentication – Users andAdministrators
– User/MAC Binding
– MultipleAuthentication servers

Logging/Monitoring
– Graphical real-time and historical monitoring
– Email notification of reports, viruses and attacks
– Syslog support
– Log Viewer – IPS, Web filter, Anti Virus, Anti Spam,
Authentication, System and Admin Events

On-Appliance Cyberoam-iView Reporting
– Integrated Web-based Reporting tool –
Cyberoam-iView
– 1000+ drilldown reports
– 45+ Compliance Reports
– Historical and Real-time reports
– Multiple Dashboards
– Username, Host, Email ID specific Monitoring
Dashboard
– Reports – Security, Spam, Virus, Traffic, Policy violations,
VPN, Search Engine keywords
– Multi-format reports – tabular, graphical
– Exportable formats – PDF, Excel
– Automated Report Scheduling

IPSecVPNClient
– Inter-operability with major IPSecVPNGateways
– Supported platforms: Windows 2000, WinxP 32/64-bit,
Windows 2003 32-bit, Windows 2008 32/64-bit, Windows Vista
32/64-bit, Windows 7 RC1 32/64-bit
– Import Connection configuration

Certification
– ICSAFirewall – Corporate
– CheckmarkUTMLevel 5 Certification
-VPNC- Basic andAESinteroperability
– “IPv6 Ready” Gold Logo

Specifications Cyberoam CR15wiNG

Interfaces

Copper GbE Ports Configurable

3

Internal/DMZ/WAN Ports

Yes

Console Ports (RJ45/DB9)

1

USB Ports

2

Built-in Wireless LAN

Wireless Standards

IEEE 802.11 a/b/g/n (WEP, WPA, WPA2, 802.11i, TKIP, AES, PSK)

Antenna

Detachable 3×3 MIMO

Access Points

Up to 8 bssid

Transmit Power (EIRP)

11n HT40 :
+15dBm
11b CCK: +15dBm
11g OFDM:+15dBm

Receiver Sensitivity

-68dBm at
300Mbps
-70dBm at 54Mbps
-88dBm at 6Mbps

Frequency Range

2.412 GHz –
2.472 GHz
5.200 GHz – 5.825 GHz

Number of Selectable Channels

USA (FCC) –
11 channels,
EU (ETSI) / Japan (TELEC) – 13 channels

Data Rate

802.11n: up
to 450Mbps,
802.11b: 1, 2, 5,5, 11Mbps,
802.11g: 6, 9, 12, 18, 24, 36, 48, 54Mbps

System Performance

Firewall Throughput (UDP)

1,000 (Mbps)

Firewall Throughput (TCP)

750 (Mbps)

New sessions/second

3,500

Concurrent sessions

60,000

IPSec VPN Throughput

110 (Mbps)

No. of IPSec Tunnels

50

SSL VPN Throughput

50 (Mbps)

Anti-Virus Throughput

180 (Mbps)

IPS Throughput

140 (Mbps)

UTM Throughput

80 (Mbps)

Hardware Specifications

Memory

1GB

Compact Flash

4GB

Dimensions

HxWxD(inches)

1.7 x 6 x 9.1

HxWxD(cms)

4.4 x 15.3 x 23.2

Weight

1.5kg, 3.307 lbs

Power

Input Voltage

100-240 VAC

Consumption

13.2W

Total Heat Dissipation (BTU)

45

Environmental

OperatingTemperature

0 to 40 °C

Storage Temperature

-25 to 75 °C

Relative Humidity (Non condensing)

10 to 90%

Kata Kunci Terkait :

Cyberoam CR15wiNG, jual Cyberoam CR15wiNG, harga Cyberoam CR15wiNG, spesifikasi Cyberoam CR15wiNG, beli Cyberoam CR15wiNG, distributor Cyberoam CR15wiNG, cyberoam cr15ing, cyberoam cr15ing manual, cyberoam cr15wi datasheet, cyberoam cr15wi, cyberoam cr15wi price, cyberoam cr15ing review, cyberoam cr 15 wing

Posted on

Cyberoam CR25wiNG – Spesifikasi Dan Harga

Cyberoam CR25wiNG

gambar Cyberoam CR25wiNG

Cyberoam CR25wiNG
Future-ready Security with Wi-Fi Access Point for SOHO/ROBO networks

CR25wiNG is the Next-Generation Unified Threat Management appliance with Wi-Fi access points that offer “the fastest UTMs made for SMBs” to small offices, with high performance security over WLAN. CR25wiNG appliances come with 3×3 MIMO technology that greatly enhances wireless range and performance. It supports 802.11n/b/g wireless standards. Combined with security over wired networks offered by its range of UTM appliances, Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs.

The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.

Cyberoam’s Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow Identity-based security policies in dynamic IP environment.

Hardware UTM Appliances for Small & Branch Offices:
Cyberoam UTM appliances deliver unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive UTM protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming and intrusions. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. These offices also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.

Product Features :
Stateful Inspection Firewall
VPN (SSL VPN & IPSec)
Intrusion Prevention System
Anti-Virus & Anti-Spyware
Anti-Spam
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility & Control
Web Application Firewall
3G / 4G / WiMAx Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances

Stateful Inspection Firewall
– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) – User – Identity, Source & DestinationZone, MAC and IP address, Service
– UTM policies – IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
– Layer 7 (Application) Control &Visibility
– Access Scheduling
– Policy based Source &DestinationNAT
– H.323, SIPNATTraversal
– 802.1q VLAN Support
– DoS &DDoSAttack prevention
-M AC&IP-MAC filtering and Spoof prevention

GatewayAnti-Virus & Anti-Spyware
-Virus,Worm,Trojan Detection &Removal
– Spyware, Malware, Phishing protection
– Automatic virus signature database update
– Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
– Customize individual user scanning
– Scan and deliver by file size
– Block by file types
-Add disclaimer/signature

GatewayAnti-Spam
– Inbound/Outbound Scanning
– Real-time Blacklist (RBL), MIME header check
– Filter based on message header, size, sender, recipient
– Subject line tagging
– IP address Black list/White list
– Redirect Spam mails to dedicated email address
– Image-based Spam filtering usingRPDTechnology
– Zero hour Virus Outbreak Protection
– IP Reputation-based Spam filtering

Intrusion Prevention System
– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
– Automatic real-time updates from CRProtect networks
– ProtocolAnomaly Detection
-DDoS attack prevention

Web Filtering
– InbuiltWeb Category Database
– URL, keyword, File type block
– Categories: Default(82+), Custom
– Protocols supported: HTTP, HTTPS
– Block Malware, Phishing, Pharming URLs
– Schedule-based access control
– Custom block messages per category
– Block JavaApplets, Cookies,Active x
– CIPA Compliant
– Data leakage control via HTTP, HTTPS upload

Application Filtering
– Inbuilt Application Category Database
– 11+ Application Categories: e.g. Gaming, IM, P2P, Proxy
– Schedule-based access control
– Block
– P2Papplications e.g. Skype
-Anonymous proxies e.g. UItra surf
– “Phone home” activities
– Keylogger
– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility

Web Application Firewall
– Positive Protection model
– Unique “Intuitive Website Flow Detector” technology
– Protection against SQL Injections, Cross-site Scripting (xSS), Session Hijacking, URL Tampering, Cookie Poisoning
– Support for HTTP 0.9/1.0/1.1
– Extensive Logging & Reporting

Virtual Private Network
– IPSec, L2TP, PPTP
– Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
– HashAlgorithms – MD5, SHA-1
– Authentication – Preshared key, Digital certificates
– IPSec NAT Traversal
– Dead peer detection and PFS support
– Diffie Hellman Groups – 1,2,5,14,15,16
– External Certificate Authority support
– Export RoadWarrior connection configuration
– Domain name support for tunnel end points
– VPNconnection redundancy
– Overlapping Network support
– Hub &SpokeVPNsupport

SSL VPN
-TCP&UDPTunneling
-Authentication -Active Directory, LDAP, RADIUS, Cyberoam
– Multi-layered ClientAuthentication
– Certificate, Username/Password
– User &Group policy enforcement
– Network access
– Split and Full tunneling
– Browser-based (Portal)Access
– Clientless access
– Lightweight SSLVPNTunneling Client
– Granular access control to all the Enterprise Network resources
-Administrative controls – Session timeout, Dead Peer Detection, Portal customization
– TCP- basedApplicationAccess – HTTP, HTTPS, RDP,TELNET,SSH

Instant Messaging (IM) Management
-Yahoo and Windows Live Messenger
-Virus Scanning for IM traffic
-Allow/Block Login
-Allow/Block FileTransfer
-Allow/BlockWebcam
-Allow/Block one-to-one/group chat
– Content-based blocking
– IM activities Log
– Archive files transferred
– CustomAlerts

WirelessWAN
-USBport 3G/4G and Wimax Support
– PrimaryWANlink
-WANBackup link

Bandwidth Management
– Application and User Identity based Bandwidth Management
– Guaranteed &Burstable bandwidth policy
– Application & User Identity based Traffic Discovery
– MultiWANbandwidth reporting
– Category-based bandwidth restriction

User Identity and Group Based Controls
– Access time restriction
-Time and Data Quota restriction
– Schedule based Committed and Burstable Bandwidth
– Schedule based P2Pand IM Controls

Networking
– Failover – Automated Failover/Failback, Multi-WAN failover, 3GModem failover
-WRRbased load balancing
– Policy routing based onApplication and User
– IP Address Assignment – Static, PPPoE, L2TP, PPTP & DDNS Client, Proxy ARP, DHCP server, DHCP relay
– Support for HTTPProxy
– Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Forwarding
– Parent Proxy support withFQDN
– “IPv6 Ready” Gold Logo

Administration & System Management
-Web-based configuration wizard
– Role-based access control
– Firmware Upgrades viaWeb UI
– Web 2.0 compliant UI (HTTPS)
– UI Color Styler
– Command Line Interface (Serial, SSH,Telnet)
– SNMP(v1, v2c, v3)
– Multi-lingual support: Chinese, Hindi, French, Korean
– CyberoamCentral Console (Optional)
– NTPSupport

User Authentication
– Internal database
– Active Directory Integration
– Automatic Windows Single Sign On
– External LDAP/RADIUS database integration
– Thin Client support – Microsoft Windows Server 2003 Terminal Services and Citrix xenApp
– RSAsecurID support
– ExternalAuthentication – Users andAdministrators
– User/MAC Binding
– MultipleAuthentication servers

Logging/Monitoring
– Graphical real-time and historical monitoring
– Email notification of reports, viruses and attacks
– Syslog support
– Log Viewer – IPS, Web filter, Anti Virus, Anti Spam,
Authentication, System and Admin Events

On-Appliance Cyberoam-iView Reporting
– Integrated Web-based Reporting tool
– Cyberoam-iView
– 1000+ drilldown reports
– 45+ Compliance Reports
– Historical and Real-time reports
– Multiple Dashboards
– Username, Host, Email ID specific Monitoring Dashboard
– Reports – Security, Spam, Virus, Traffic, Policy violations, VPN, Search Engine keywords
– Multi-format reports – tabular, graphical
– Exportable formats – PDF, Excel
– Automated Report Scheduling

IPSecVPNClient
– Inter-operability with major IPSecVPNGateways
– Supported platforms: Windows 2000, WinxP 32/64-bit, Windows 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
– Import Connection configuration

Certification
– ICSAFirewall – Corporate
– CheckmarkUTMLevel 5 Certification
-VPNC- Basic andAESinteroperability
– “IPv6 Ready” Gold Logo

Specifications Cyberoam CR25wiNG

Interfaces

Copper GbE Ports Configurable

4

Internal/DMZ/WAN Ports

Yes

Console Ports (RJ45/DB9)

1

USB Ports

2

Built-in Wireless LAN

Wireless Standards

IEEE 802.11 a/b/g/n (WEP, WPA, WPA2, 802.11i , TKIP, AES, PSK)

Antenna

Detachable 3×3 MIMO

Access Points

Up to 8 bssid

Transmit Power (EIRP)

11n HT40 :
+15dBm
11b CCK: +15dBm
11g OFDM:+15dBm

Receiver Sensitivity

-68dBm at
300Mbps
-70dBm at 54Mbps
-88dBm at 6Mbps

Frequency Range

2.412 GHz –
2.472 GHz
5.200 GHz – 5.825 GHz

Number of Selectable Channels

USA (FCC) –
11 channels,
EU (ETSI) / Japan (TELEC) – 13 channels

Data Rate

802.11n: up
to 450Mbps,
802.11b: 1, 2, 5,5, 11Mbps,
802.11g: 6, 9, 12, 18, 24, 36, 48, 54Mbps

System Performance

Firewall Throughput (UDP)

1,500 (Mbps)

Firewall Throughput (TCP)

1,000 (Mbps)

New sessions/second

5,000

Concurrent sessions

150,000

IPSec VPN Throughput

210 (Mbps)

No. of IPSec Tunnels

100

SSL VPN Throughput

75 (Mbps)

WAF Protected Throughput

45 (Mbps)

Anti-Virus Throughput

300 (Mbps)

IPS Throughput

200 (Mbps)

UTM Throughput

110 (Mbps)

Hardware Specifications

Memory

1GB

Compact Flash

4GB

HDD

250GB or higher

Dimensions

HxWxD(inches)

1.7 x 6 x 9.1

HxWxD(cms)

4.4 x 15.3 x 23.2

Weight

2.3kg, 5.07 lbs

Power

Input Voltage

100-240 VAC

Consumption

33.5W

Total Heat Dissipation (BTU)

114

Environmental

OperatingTemperature

0 to 40 °C

Storage Temperature

0 to 75 °C

Relative Humidity (Non condensing)

10 to 90%

Kata Kunci Terkait :

Cyberoam CR25wiNG, jual Cyberoam CR25wiNG, harga Cyberoam CR25wiNG, spesifikasi Cyberoam CR25wiNG, beli Cyberoam CR25wiNG, cyberoam cr25ing, cyberoam cr25ing review, cyberoam cr25ing price, cyberoam cr25ing-6p, cyberoam cr25ing appliance, cyberoam cr25ing firmware, cyberoam cr 25 wing, distributor Cyberoam CR25wiNG, Cyberoam CR25wiNG indonesia

Posted on

Cyberoam CR35wiNG – Spesifikasi Dan Harga

gambar Cyberoam CR35wiNG

Cyberoam CR35wiNG

gambar Cyberoam CR35wiNG

Cyberoam CR35wiNG
Future-ready Security with Wi-Fi Access Point for SOHO/ROBO networks
6×10/100/1000 Ethernet ports, 2000 Mbps Firewall Throughput, 210 Mbps UTM Throughput

CR35wiNG is the Next-Generation Unified Threat Management appliance with Wi-Fi access points that offer “the fastest UTMs made for SMBs” to small offices, with high performance security over WLAN. CR35wiNG appliances come with 3×3 MIMO technology that greatly enhances wireless range and performance. It supports 802.11n/b/g wireless standards. Combined with security over wired networks offered by its range of UTM appliances, Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs.

The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.

Cyberoam’s Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow Identity-based security policies in dynamic IP environment.

Hardware UTM Appliances for Small & Branch Offices:
Cyberoam UTM appliances deliver unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive UTM protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming and intrusions. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. These offices also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.

Stateful Inspection Firewall
– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) – User – Identity, Source & Destination Zone, MAC and IP address, Service
– UTM policies – IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
– Layer 7 (Application) Control &Visibility
– Access Scheduling
– Policy based Source &DestinationNAT
– H.323, SIPNATTraversal
– 802.1q VLAN Support
– DoS &DDoSAttack prevention
– MAC&IP-MAC filtering and Spoof prevention

GatewayAnti-Virus & Anti-Spyware
-Virus,Worm,Trojan Detection &Removal
– Spyware, Malware, Phishing protection
-Automatic virus signature database update
– Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
– Customize individual user scanning
– Scan and deliver by file size
– Block by file types
-Add disclaimer/signature

GatewayAnti-Spam
– Inbound/Outbound Scanning
– Real-time Blacklist (RBL), MIME header check
– Filter based on message header, size, sender, recipient
– Subject line tagging
– IP address Black list/White list
– Redirect Spam mails to dedicated email address
– Image-based Spam filtering usingRPDTechnology
– Zero hour Virus Outbreak Protection
– IP Reputation-based Spam filtering

Intrusion Prevention System
– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
-Automatic real-time updates from CRProtect networks
– ProtocolAnomaly Detection
-DDoS attack prevention

Web Filtering
– InbuiltWeb Category Database
– URL, keyword, File type block
– Categories: Default(82+), Custom
– Protocols supported: HTTP, HTTPS
– Block Malware, Phishing, Pharming URLs
– Schedule-based access control
– Custom block messages per category
– Block JavaApplets, Cookies,Active x
– CIPA Compliant
– Data leakage control via HTTP, HTTPS upload

Application Filtering
– Inbuilt Application Category Database
– 11+ Application Categories: e.g. Gaming, IM, P2P, Proxy
– Schedule-based access control
– Block
– P2Papplications e.g. Skype
-Anonymous proxies e.g. UItra surf
– “Phone home” activities
– Keylogger
– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility

Web Application Firewall
– Positive Protection model
– Unique “Intuitive Website Flow Detector” technology
– Protection against SQL Injections, Cross-site Scripting (xSS), Session Hijacking, URL Tampering, Cookie Poisoning
– Support for HTTP 0.9/1.0/1.1
– Extensive Logging & Reporting

Virtual Private Network
– IPSec, L2TP, PPTP
– Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
– HashAlgorithms – MD5, SHA-1
– Authentication – Preshared key, Digital certificates
– IPSec NAT Traversal
– Dead peer detection and PFS support
– Diffie Hellman Groups – 1,2,5,14,15,16
– External Certificate Authority support
– Export RoadWarrior connection configuration
– Domain name support for tunnel end points
– VPNconnection redundancy
– Overlapping Network support
– Hub &SpokeVPNsupport

SSL VPN
-TCP&UDPTunneling
-Authentication -Active Directory, LDAP, RADIUS, Cyberoam
– Multi-layered ClientAuthentication – Certificate, Username/Password
– User &Group policy enforcement
– Network access – Split and Full tunneling
– Browser-based (Portal)Access – Clientless access
– Lightweight SSLVPNTunneling Client
– Granular access control to all the Enterprise Network resources
-Administrative controls – Session timeout, Dead Peer Detection, Portal customization
– TCP- basedApplicationAccess – HTTP, HTTPS, RDP,TELNET,SSH

Instant Messaging (IM) Management
-Yahoo and Windows Live Messenger
-Virus Scanning for IM traffic
-Allow/Block Login
-Allow/Block FileTransfer
-Allow/BlockWebcam
-Allow/Block one-to-one/group chat
– Content-based blocking
– IM activities Log
– Archive files transferred
– CustomAlerts

WirelessWAN
-USBport 3G/4G and Wimax Support
– PrimaryWANlink
-WANBackup link

Bandwidth Management
– Application and User Identity based Bandwidth Management
– Guaranteed &Burstable bandwidth policy
– Application & User Identity based Traffic Discovery
– MultiWANbandwidth reporting
– Category-based bandwidth restriction

User Identity and Group Based Controls
– Access time restriction
-Time and Data Quota restriction
– Schedule based Committed and Burstable Bandwidth
– Schedule based P2Pand IM Controls

Networking
– Failover – Automated Failover/Failback, Multi-WAN failover,
3GModem failover
-WRRbased load balancing
– Policy routing based onApplication and User
– IP Address Assignment – Static, PPPoE, L2TP, PPTP & DDNS Client, Proxy ARP, DHCP server, DHCP relay
– Support for HTTPProxy
– Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Forwarding
– Parent Proxy support withFQDN
– “IPv6 Ready” Gold Logo

Administration & System Management
-Web-based configuration wizard
– Role-based access control
– Firmware Upgrades viaWeb UI
-Web 2.0 compliant UI (HTTPS)
– UI Color Styler
– Command Line Interface (Serial, SSH,Telnet)
-SNMP(v1, v2c, v3)
– Multi-lingual support: Chinese, Hindi, French, Korean
– CyberoamCentral Console (Optional)
– NTPSupport

User Authentication
– Internal database
-Active Directory Integration
-Automatic Windows Single Sign On
– External LDAP/RADIUS database integration
– Thin Client support – Microsoft Windows Server 2003 Terminal Services and Citrix xenApp
– RSAsecurID support
– ExternalAuthentication – Users andAdministrators
– User/MAC Binding
– MultipleAuthentication servers

Logging/Monitoring
– Graphical real-time and historical monitoring
– Email notification of reports, viruses and attacks
– Syslog support
– Log Viewer – IPS, Web filter, Anti Virus, Anti Spam,
Authentication, System and Admin Events

On-Appliance Cyberoam-iView Reporting
– Integrated Web-based Reporting tool
– Cyberoam-iView
– 1000+ drilldown reports
– 45+ Compliance Reports
– Historical and Real-time reports
– Multiple Dashboards
– Username, Host, Email ID specific Monitoring Dashboard
– Reports – Security, Spam, Virus, Traffic, Policy violations, VPN, Search Engine keywords
– Multi-format reports – tabular, graphical
– Exportable formats – PDF, Excel
– Automated Report Scheduling

IPSecVPNClient
– Inter-operability with major IPSecVPNGateways
– Supported platforms: Windows 2000, WinxP 32/64-bit, Windows 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
– Import Connection configuration

Certification
– ICSAFirewall – Corporate
– CheckmarkUTMLevel 5 Certification
-VPNC- Basic andAESinteroperability
– “IPv6 Ready” Gold Logo

Specifications Cyberoam CR35wiNG

Interfaces

Copper GbE Ports Configurable

6

Internal/DMZ/WAN Ports

Yes

Console Ports (RJ45/DB9)

1

USB Ports

2

Built-in Wireless LAN

Wireless Standards

IEEE 802.11 a/b/g/n (WEP, WPA, WPA2, 802.11i , TKIP, AES, PSK)

Antenna

Detachable 3×3 MIMO

Access Points

Up to 8 bssid

Transmit Power (EIRP)

11n HT40 : +15dBm
11b CCK: +15dBm
11g OFDM:+15dBm

Receiver Sensitivity

-68dBm at 300Mbps
-70dBm at 54Mbps
-88dBm at 6Mbps

Frequency Range

2.412 GHz –
2.472 GHz
5.200 GHz – 5.825 GHz

Number of Selectable Channels

USA (FCC) – 11 channels,
EU (ETSI) / Japan (TELEC) – 13 channels

Data Rate

802.11n: up to 450Mbps,
802.11b: 1, 2, 5,5, 11Mbps,
802.11g: 6, 9, 12, 18, 24, 36, 48, 54Mbps

System Performance

Firewall Throughput (UDP)

2,300 (Mbps)

Firewall Throughput (TCP)

2,000 (Mbps)

New sessions/second

12,000

Concurrent sessions

350,000

IPSec VPN Throughput

250 (Mbps)

No. of IPSec Tunnels

150

SSL VPN Throughput

100 (Mbps)

WAF Protected Throughput

65 (Mbps)

Anti-Virus Throughput

525 (Mbps)

IPS Throughput

350 (Mbps)

UTM Throughput

210 (Mbps)

Hardware Specifications

Memory

1GB

Compact Flash

4GB

HDD

250GB or higher

Dimensions

HxWxD(inches)

1.7 x 6 x 9.1

HxWxD(cms)

4.4 x 15.3 x 23.2

Weight

2.3kg, 5.07 lbs

Power

Input Voltage

100-240 VAC

Consumption

47.8W

Total Heat Dissipation (BTU)

163

Environmental

OperatingTemperature

0 to 40 °C

Storage Temperature

-25 to 75 °C

Relative Humidity (Non condensing)

10 to 90%

Kata Kunci Terkait :

Cyberoam CR35wiNG, jual Cyberoam CR35wiNG, harga Cyberoam CR35wiNG, spesifikasi Cyberoam CR35wiNG, beli Cyberoam CR35wiNG, distributor Cyberoam, cyberoam cr35ing, cyberoam cr35ing review

Posted on

Cyberoam CR15iNG – Spesifikasi Dan Harga

Cyberoam CR15iNG

gambar Cyberoam CR15iNG

Cyberoam CR15iNG
Future-ready Security for SOHO/ROBO networks
3 x10/100/1000 Ethernet ports, 750 Mbps Firewall Throughput, 80 Mbps UTM Throughput

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.

With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations.

Hardware UTM Appliances for Small & Branch Offices:
Cyberoam UTM appliances deliver unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive UTM protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming and intrusions. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. These offices also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.

Product Features:
Stateful Inspection Firewall
VPN (SSL VPN & IPSec)
Intrusion Prevention System
Anti-Virus & Anti-Spyware
Anti-Spam
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility & Control
Web Application Firewall
3G / 4G / WiMAx Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances

Stateful Inspection Firewall
– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) – User – Identity, Source &Destination Zone,MACand IP address, Service
– UTM policies – IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
– Layer 7 (Application) Control & Visibility
-Access Scheduling
– Policy based Source & DestinationNAT
– H.323, SIPNATTraversal
– 802.1q VLAN Support
– DoS &DDoS attack prevention
-MAC&IP-MAC filtering and Spoof prevention

GatewayAnti-Virus & Anti-Spyware
-Virus,Worm,Trojan:Detection &Removal
– Spyware, Malware, Phishing protection
-Automatic virus signature database update
– Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
– Customize individual user scanning
– Scan and deliver by file size
– Block by file types
-Add disclaimer/signature

Gateway Anti-Spam
– Inbound Scanning
– Real-time Blacklist (RBL), MIME header check
– Filter based on message header, size, sender, recipient
– Subject line tagging
– IP address Black list/White list
– Redirect Spam mails to dedicated email address
– Image-based Spam filtering usingRPDTechnology
– Zero hour Virus Outbreak Protection
– IP Reputation-based Spam filtering
– Spam notification through digest

Intrusion Prevention System
– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
-Automatic real-time updates from CRProtect networks
– ProtocolAnomaly Detection
-DDoS attack prevention

Web Filtering
– InbuiltWeb Category Database
– URL, keyword, File type block
– Categories: Default(82+), Custom
– Protocols supported: HTTP, HTTPS
– Block Malware, Phishing, Pharming URLs
– Schedule-based access control
– Custom block messages per category
– Block JavaApplets, Cookies,Active x
– CIPA Compliant
– Data leakage control via HTTP, HTTPS upload

Application Filtering
– Inbuilt Application Category Database
– Application Categories: e.g. Gaming, IM, P2P,
Proxy
– Spam notification through digest DDoS attack prevention 11+
– Schedule-based access control
– Block
– P2Papplications e.g. Skype
-Anonymous proxies e.g. UItra surf
– “Phone home” activities
– Keylogger
– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility

Virtual Private Network
– IPSec, L2TP, PPTP
– Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
– HashAlgorithms – MD5, SHA-1
-Authentication – Preshared key, Digital certificates
– IPSecNATTraversal
– Dead peer detection and PFS support
– Diffie Hellman Groups – 1,2,5,14,15,16
– External Certificate Authority support
– Export RoadWarrior connection configuration
– Domain name support for tunnel end points
-VPNconnection redundancy
– Overlapping Network support
– Hub &SpokeVPNsupport

SSL VPN
-TCP&UDPTunneling
– Authentication – Active Directory, LDAP, RADIUS, Cyberoam
– Multi-layered Client Authentication – Certificate, Username/Password
– User &Group policy enforcement
– Network access – Split and Full tunneling
– Browser-based (Portal)Access – Clientless access
– Lightweight SSLVPNTunneling Client
– Granular access control to all the Enterprise Network resources
– Administrative controls – Session timeout, Dead Peer Detection, Portal customization
– TCP- based Application Access – HTTP, HTTPS, RDP, TELNET, SSH

Instant Messaging (IM) Management
-Yahoo and Windows Live Messenger
-Virus Scanning for IM traffic
-Allow/Block Login
-Allow/Block FileTransfer
-Allow/BlockWebcam
-Allow/Block one-to-one/group chat
– Content-based blocking
– IM activities Log
-Archive files transferred
– CustomAlerts

WirelessWAN
-USBport 3G/4G and Wimax Support
– PrimaryWANlink
-WANBackup link

Bandwidth Management
– Application and User Identity based Bandwidth Management
– Guaranteed &Burstable bandwidth policy
– Application &User Identity basedTraffic Discovery
– MultiWANbandwidth reporting
– Category-based bandwidth restriction

User Identity and Group Based Controls
-Access time restriction
-Time and Data Quota restriction
– Schedule based Committed and Burstable Bandwidth
– Schedule based P2Pand IM Controls

Networking
– Failover – Automated Failover/Failback, Multi-WAN failover, 3GModem failover
-WRRbased load balancing
– Policy routing based onApplication and User
– IP Address Assignment – Static, PPPoE, L2TP, PPTP & DDNS Client, Proxy ARP, DHCP server, DHCP relay
– Support for HTTPProxy
– Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Forwarding
– Parent Proxy support withFQDN
– “IPv6 Ready” Gold Logo

Administration & System Management
-Web-based configuration wizard
– Role-based access control
– Firmware Upgrades viaWeb UI
-Web 2.0 compliant UI (HTTPS)
– UI Color Styler
– Command Line Interface (Serial, SSH,Telnet)
-SNMP(v1, v2c, v3)
– Multi-lingual support: Chinese, Hindi, French, Korean
– Cyberoam Central Console (Optional)
– NetworkTime Protocol Support

User Authentication
– Internal database
-Active Directory Integration
-Automatic Windows Single Sign On
– External LDAP/RADIUS database integration
– Thin Client support – Microsoft Windows Server 2003 Terminal Services and Citrix xenApp – Novell eDirectory
-RSASecurID support
– ExternalAuthentication – Users andAdministrators
– User/MAC Binding
– MultipleAuthentication servers

Logging/Monitoring
– Graphical real-time and historical monitoring
– Email notification of reports, gateway status, viruses and attacks
– Syslog support
– Log Viewer – Firewall, IPS,Web filter, Anti Virus, Anti Spam,Authentication, System andAdmin Events

IPSecVPNClient
– Inter-operability with major IPSecVPNGateways
– Supported platforms: Windows 2000, WinxP 32/64- bit, Windows 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
– Import Connection configuration

Certification
– ICSAFirewall – Corporate
– CheckmarkUTMLevel 5 Certification
-VPNC- Basic andAESinteroperability
– “IPv6 Ready” Gold Logo

Specifications Cyberoam CR15iNG

Interfaces

Copper GbEPorts

3

Configurable Internal/DMZ/WANPorts

Yes

Console Ports (RJ45)

1

USB Ports

2

System Performance

Firewall Throughput (UDP)

1,000

Firewall Throughput (TCP)

750

New sessions/second

3,500

Concurrent sessions

60,000

IPSec VPN Throughput

110

No. of IPSec Tunnels

50

SSL VPN Throughput

50

Anti-Virus Throughput

180

IPS Throughput

140

UTM Throughput

80

Hardware Specifications

Memory

1GB

Compact Flash

4GB

Dimensions

HxWxD(inches)

1.7 x 6 x 9.1

HxWxD(cms)

4.4 x 15.3 x 23.2

Weight

1.5 kg, 3.307 lbs

Power

Input Voltage

100-240 VAC

Consumption

13.2W

Total Heat Dissipation (BTU)

45

Environmental

OperatingTemperature

0 to 40 °C

Storage Temperature

-25 to 75 °C

Relative Humidity (Non condensing)

10 to 90%

Kata Kkunci Terkait :

Cyberoam CR15iNG, jual Cyberoam CR15iNG, harga Cyberoam CR15iNG, spesifikasi Cyberoam CR15iNG, beli Cyberoam CR15iNG, distributor Cyberoam CR15iNG, cyberoam cr15ing, cyberoam cr15wing, cyberoam cr15ing price, cyberoam cr15ing default ip, cyberoam cr15ing firmware, cyberoam cr15ing utm, cyberoam cr15ing manual,
cyberoam cr15ing configuration, cyberoam cr15ing review, cyberoam cr15ing installation, cyberoam cr15ing iview

Posted on

Cyberoam CR25iNG – Spesifikasi Dan Harga

gambar Cyberoam CR25iNG

Cyberoam CR25iNG

gambar Cyberoam CR25iNG

Cyberoam CR25iNG
Future-ready Security for SOHO/ROBO networks

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.

With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations.

Hardware UTM Appliances for Small & Branch Offices:
Cyberoam UTM appliances deliver unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive UTM protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming and intrusions. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. These offices also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.

Stateful Inspection Firewall
– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) – User – Identity, Source & Destination Zone,MACand IP address, Service
– UTM policies – IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
– Layer 7 (Application) Control &Visibility
– Access Scheduling
– Policy based Source &DestinationNAT
– H.323, SIPNATTraversal
– 802.1q VLAN Support
– DoS &DDoSAttack prevention
– MAC&IP-MAC filtering and Spoof prevention

GatewayAnti-Virus & Anti-Spyware
-Virus,Worm,Trojan: Detection &Removal
– Spyware, Malware, Phishing protection
– Automatic virus signature database update
– Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
– Customize individual user scanning
– Self Service Quarantine area
– Scan and deliver by file size
– Block by file types
– Add disclaimer/signature

Gateway Anti-Spam
– Inbound/Outbound Scanning
– Real-time Blacklist (RBL), MIME header check
– Filter based on message header, size, sender, recipient
– Subject line tagging
– IP address Black list/White list
– Redirect Spam mails to dedicated email address
– Image-based Spam filtering usingRPDTechnology
– Zero hour Virus Outbreak Protection
– Self Service Quarantine area
– Spam Notification through Digest
– IP Reputation-based Spam filtering

Intrusion Prevention System
– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
– Automatic real-time updates from CRProtect networks
– ProtocolAnomaly Detection
-DDoS attack prevention

Web Filtering
– InbuiltWeb Category Database
– URL, keyword, File type block
– Categories: Default(82+), Custom
– Protocols supported: HTTP, HTTPS
– Block Malware, Phishing, Pharming URLs
– Schedule-based access control
– Custom block messages per category
– Block JavaApplets, Cookies,Active x
– CIPA Compliant
– Data leakage control via HTTP, HTTPS upload

Application Filtering
– Inbuilt Application Category Database
– 11+ Application Categories: e.g. Gaming, IM, P2P,Proxy
– Schedule-based access control
– Block
– P2Papplications e.g. Skype
– Anonymous proxies e.g. UItra surf
– “Phone home” activities
– Keylogger
– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility

Web Application Firewall
– Positive Protection model
– Unique “Intuitive Website Flow Detector” technology
– Protection against SQL Injections, Cross-site Scripting (xSS), Session Hijacking, URL Tampering, Cookie Poisoning
– Support for HTTP 0.9/1.0/1.1
– Extensive Logging & Reporting

Virtual Private Network
– IPSec, L2TP, PPTP
– Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
– HashAlgorithms – MD5, SHA-1
– Authentication – Preshared key, Digital certificates
– IPSecNATTraversal
– Dead peer detection and PFS support
– Diffie Hellman Groups – 1,2,5,14,15,16
– External Certificate Authority support
– Export RoadWarrior connection configuration
– Domain name support for tunnel end points
– VPNconnection redundancy
– Overlapping Network support
– Hub &SpokeVPNsupport

SSL VPN
-TCP&UDPTunneling
– Authentication – Active Directory, LDAP, RADIUS, Cyberoam
– Multi-layered Client Authentication – Certificate, Username/Password
– User &Group policy enforcement
– Network access – Split and Full tunneling
– Browser-based (Portal)Access – Clientless access
– Lightweight SSLVPNTunneling Client
– Granular access control to all the Enterprise Network resources
– Administrative controls – Session timeout, Dead Peer Detection, Portal customization
– TCP- based Application Access – HTTP, HTTPS, RDP, TELNET, SSH

Instant Messaging (IM) Management
-Yahoo and Windows Live Messenger
– Virus Scanning for IM traffic
– Allow/Block Login
– Allow/Block FileTransfer
– Allow/BlockWebcam
– Allow/Block one-to-one/group chat
– Content-based blocking
– IM activities Log
-Archive files transferred
– CustomAlerts

WirelessWAN
-USBport 3G/4G and Wimax Support
– PrimaryWANlink
– WANBackup link

Bandwidth Management
– Application and User Identity based Bandwidth Management
– Guaranteed &Burstable bandwidth policy
– Application &User Identity basedTraffic Discovery
– MultiWANbandwidth reporting
– Category-based bandwidth restriction

User Identity and Group Based Controls
-Access time restriction
-Time and Data Quota restriction
– Schedule based Committed and Burstable Bandwidth
– Schedule based P2Pand IM Controls

Networking
– Failover – Automated Failover/Failback, Multi-WAN failover, 3GModem failover
– WRRbased load balancing
– Policy routing based onApplication and User
– IP Address Assignment – Static, PPPoE, L2TP, PPTP & DDNSClient, ProxyARP,DHCPserver,DHCPrelay
– Support for HTTPProxy
– Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Forwarding
– Parent Proxy support withFQDN
– “IPv6 Ready” Gold Logo

High Availability
– Active-Active
-Active-Passive with State Synchronization
– Stateful failover
– Alerts on appliance status change

Administration & System Management
-Web-based configuration wizard
– Role-based access control
– Firmware Upgrades viaWeb UI
– Web 2.0 compliant UI (HTTPS)
– UI Color Styler
– Command Line Interface (Serial, SSH,Telnet)
– SNMP(v1, v2c, v3)
– Multi-lingual support: Chinese, Hindi, French, Korean
– Cyberoam Central Console (Optional)
– Network Time Protocol Support

User Authentication
– Internal database
– Active Directory Integration
– Automatic Windows Single Sign On
– External LDAP/RADIUS database integration
– Thin Client support – Microsoft Windows Server 2003 Terminal Services and Citrix xenApp – Novell eDirectory
– RSASecurID support
– ExternalAuthentication – Users andAdministrators
– User/MAC Binding
– MultipleAuthentication servers

Logging/Monitoring
– Graphical real-time and historical monitoring
– Email notification of reports, gateway status, viruses and attacks
– Syslog support
– Log Viewer – Firewall, IPS,Web filter, Anti Virus, Anti Spam,
Authentication, System andAdmin Events

On-Appliance Cyberoam-iView Reporting
– IntegratedWeb-based Reporting tool – Cyberoam-iView
– 1000+ drilldown reports
– 45+ Compliance Reports
– Historical and Real-time reports
– Multiple Dashboards
– Username, Host, Email ID specific Monitoring Dashboard
– Reports – Security, Virus, Spam, Traffic, Policy violations, VPN, Search Engine keywords
– Multi-format reports – tabular, graphical
– Exportable formats – PDF, Excel
-Automated Report Scheduling

IPSecVPNClient
– Inter-operability with major IPSecVPNGateways
– Supported platforms: Windows 2000, WinxP 32/64-bit, Windows 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
– Import Connection configuration

Certification
– ICSAFirewall – Corporate
– CheckmarkUTMLevel 5 Certification
-VPNC- Basic andAESinteroperability
– “IPv6 Ready”Gold Logo

Specifications Cyberoam CR25iNG

Interfaces

Copper GbEPorts

4

Configurable Internal/DMZ/WANPorts

Yes

Console Ports (RJ45)

1

USB Ports

2

System Performance

Firewall Throughput (UDP)

1,500

Firewall Throughput (TCP)

1,000

New sessions/second

5,000

Concurrent sessions

150,000

IPSec VPN Throughput

210

No. of IPSec Tunnels

100

SSL VPN Throughput

75

WAF Protected Throughput (Mbps)

45

Anti-Virus Throughput

300

IPS Throughput

200

UTM Throughput

110

Hardware Specifications

Memory

1GB

Compact Flash

4GB

HDD

250GB or higher

Dimensions

HxWxD(inches)

1.7 x 6 x 9.1

HxWxD(cms)

4.4 x 15.3 x 23.2

Weight

2.3 kg, 5.07 lbs

Power

Input Voltage

100-240 VAC

Consumption

33.5W

Total Heat Dissipation (BTU)

114

Environmental

OperatingTemperature

0 to 40 °C

Storage Temperature

-25 to 75 °C

Relative Humidity (Non condensing)

10 to 90%

Kata Kunci Terkait :

Cyberoam CR25iNG, jual Cyberoam CR25iNG, harga Cyberoam CR25iNG, spesifikasi Cyberoam CR25iNG, beli Cyberoam CR25iNG, reseller Cyberoam CR25iNG, cyberoam cr25ing price, cyberoam cr25ing firmware, cyberoam cr25ing configuration, cyberoam cr25ing firmware download, cyberoam cr25ing firewall, cyberoam cr25ing manual, cyberoam cr25ing installation guide, cyberoam cr25ing reset button, cyberoam cr25ing-6p

Posted on

Router CISCO 1941/K9 Spesifikasi – Harga

CISCO 1941/K9

gambar CISCO 1941/K9

The platforms are architected to enable the next phase of branch-office evolution, providing rich media collaboration and virtualization to the branch while maximizing operational cost savings The Integrated Services Routers Generation 2 platforms are future-enabled with multicore CPUs, Gigabit Ethernet switching with enhanced POE, and energy monitoring and control capabilities while enhancing overall system performance. Overall, the Cisco 1900 series offer unparalleled total cost of ownership savings and network agility through the intelligent integration of market leading security, unified communications, wireless, and application services.

This Cisco 1900 series integrated services router offers embedded hardware encryption acceleration, optional firewall, intrusion prevention, and application services. In addition, the platforms support the industries widest range of wired and wireless connectivity options such as T1/E1, xDSL, 3G, and GE.

Product Features

  • Service integration
    The Cisco 1941 series offer increased levels of services integration with data, security, and wireless and mobility services enabling greater efficiencies cost savings.
  • Services on demand
    The Cisco Services Ready Engine (SRE) enables a operational model which allows you to reduce capital expenditures (CapEx) and deploy a variety of application services as needed on a single integrated compute services module.
  • High performance with integrated services
    The Cisco 1900 series enables deployment in high speed WAN environments with concurrent services enabled up to 25 Mbps. Multi-Gigabit Fabric enables high bandwidth module to module communication without compromising routing performance
  • Network agility
    Designed to address customer business requirements, Cisco 1941 series with the modular architecture, offers performance range of modular interfaces and services as your network needs grow. Modular interfaces offer increased bandwidth, a diversity of connection options, and network resiliency.
  • Energy efficiency
    The Cisco 1900 series offers intelligent power management and allows the customer to control power to the modules based on the time of day. Cisco EnergyWise technology will be supported in the future. Services integration and modularity on a single platform performing multiple functions, optimizes raw materials consumption and energy usage.

 

Specifications CISCO 1941/K9

Standards Protocol

IEEE 802.3, IEEE 802.1Q, IEEE 802.3af, IEEE 802.3ah, IEEE 802.1ah, IEEE 802.1ag, ANSI T1.101, ITU-T G.823, ITU-T G.824 , CISPR 22 Class A, CISPR 24, EN55024, EN55022 Class A, EN50082-1, AS/NZS 60950-1, ICES-003 Class A, CS-03, R&TTE, FCC CFR47 Part 15, EN300-386, UL 60950-1, IEC 60950-1, EN 60950-1, BSMI CNS 13438, AS/NZS 3548 Class A, CAN/CSA C22.2 No. 60950-1, VCCI V-3, EN 61000, TIA/EIA/IS-968

Interface

2 x 10Base-T/100Base-TX/1000Base-T – RJ-45

Management : 1 x console – RJ-45

Management : 1 x console – mini-USB Type B

Serial : 1 x auxiliary – RJ-45

USB : 2 x 4 PIN USB Type A

Fitur

Cisco IOS IP Base , firewall protection, VPN support, MPLS support, Syslog support, IPv6 support, Class-Based Weighted Fair Queuing (CBWFQ), Weighted Random Early Detection (WRED)

Daya Keluar

AC 120/230 V ( 50/60 Hz )

Dimensi

34.3 cm x 29.2 cm x 8.9 cm

Berat

5.8 kg

 

Posted on

Router CISCO RV042G-K9-EU Spesifikasi – Harga

gambar CISCO RV042G-K9-EU

CISCO RV042G-K9-EU

gambar CISCO RV042G-K9-EU

Enjoy Highly Secure, Reliable Connectivity

Designed for small business networks, the Cisco RV042G Dual Gigabit WAN Router delivers highly secure, high-performance, reliable connectivity to the Internet, other offices, and to employees working remotely. This proven router provides the performance and security you need to help keep your employees, and your business, productive.

Features and Capabilities

The Cisco RV042G Dual Gigabit WAN Router includes:

  • Dual Gigabit Ethernet WAN ports for load balancing and business continuity
  • Built-in 4-port Gigabit Ethernet switch
  • Strong security: Proven stateful packet inspection (SPI) firewall and hardware encryption
  • High capacity, high-performance, IP Security (IPsec) VPN capabilities
  • Intuitive, browser-based device manager and setup wizards.

Specifications at a Glance

  • Performance – Supports Gigabit Ethernet speeds for internal and external wired connections; easily manages large files and concurrent users to keep employees productive
  • Simple, highly secure access so that you can connect multiple locations and remote workers using VPN, or set up separate virtual networks and access rules to secure sensitive data
  • Ease of use – Can be deployed directly out of the box; setup wizards reduce configuration time to minutes.

 

Specifications CISCO RV042G-K9-EU

Standards Protocol

IEEE 802.3, IEEE 802.3u, IEEE 802.1D, IEEE 802.1Q, IEEE 802.3ab, IEEE 802.1p, IEEE 802.1x, IEEE 802.11e, IEEE 802.3az

Antarmuka / Interface

  4x 10/100/1000 RJ-45 ports  

  1x 10/100/1000 RJ-45 Internet port  

Fitur

Firewall protection, NAT support, PAT support, NAPT support, Stateful Packet Inspection (SPI), DoS attack prevention, port mirroring, IPv6 support, VPN passthrough, URL filtering, domain blocking, Rapid Spanning Tree Protocol (RSTP) support, Quality of Service (QoS), DHCP server, port
forwarding, port triggering, DHCP client.

Daya Keluar

AC 120/230 V ( 50/60 Hz )

Dimensi

130 x 38.5 x 200 mm 

Berat

1.2 Kg

 

Posted on

Router CISCO RV220W-E-K9-G5 Spesifikasi – Harga

gambar CISCO RV220W-E-K9-G5

CISCO RV220W-E-K9-G5

gambar CISCO RV220W-E-K9-G5

High-Performance, Highly Secure Connectivity for the Small Office
The Cisco ® RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and wireless, broadband connectivity – to the Internet, other offices, and employees working remotely. This high-performance wireless router helps improve productivity by providing fast access to the large files and rich media applications your employees use every day.
Designed to provide greater flexibility for highly secure, remote connections, the RV220W supports both IP Security (IPsec) and Secure Sockets Layer (SSL) VPN, often referred to as hybrid VPN. IPsec VPN enables other offices to connect just as if they were physically connected to the primary business network. SSL VPN, which allows secure connections through any web browser, is application-specific, offering a means of extending controlled access to business partners and others, without compromising critical data.
To help further safeguard your network and data, the Cisco RV220W includes business-class security features and optional cloud-based Web filtering. Setup is simple, using a browser-based configuration utility and wizards.

Features
• High-performance Gigabit Ethernet connections, internally and externally, plus a built-in wireless-N access point, speeds file transfers to improve productivity
• 4-port 10/100/1000 Mbps Gigabit Ethernet switch
• Selectable, dual-band wireless radio helps reduce interference to improve wireless performance
• Hybrid VPN (IPsec and SSL VPN) features enable secure access for other offices, employees working remotely, and business partners
• Proven firewall, support for separate virtual networks, and strong wireless security help protect the network and business assets
• Intuitive, browser-based device manager with setup wizards makes installation and use easy

 

Specifications CISCO RV220W-E-K9-G5

Standards Protocol

IEEE 802.3, IEEE 802.3u, IEEE 802.1Q, IEEE 802.1p, IEEE 802.11b, IEEE 802.11a, IEEE 802.11g, IEEE 802.1x, X.509, IEEE 802.11i, IEEE 802.11e, IEEE 802.11n, UPnP

Antarmuka / Interface

  4 x LAN 10/100/1000 Mbps Gigabit

1 x WAN 10/100/1000 Mbps Gigabit

Fitur

Firewall protection,,Switching , DMZ port , NAT support , VPN support, PAT support, VLAN support, Syslog support, Stateful Packet Inspection (SPI), Content filtering, E-mail alert, MAC address filtering, IPv6 support

Dimensi

23 x 25 x 8 cm

Berat

1.6 Kg