Identify and control applications on any port. And Deal with unknown traffic by policy
Hotspot controllers allowing service providers to maintain as much control as desired over the usage of the internet
User interface displays individual frames in a numbered list and highlights by sent through TCP, UDP, or other protocols
Next generation Geo-IP filtering can be fine tuned to vastly reduce unwanted and malicious traffic
The ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth
Application layer proxies are able to look deep within the packets (traffic) content, and look for inconsistencies, invalid or malicious commands, and executable programs
Bandwidth Control helps you manage the priority of business-critical, recreational and inappropriate traffic before it impacts the Internet experience of your users.
It can help to optimize the configuration of firewalls, routers, web proxies and related network infrastructure to ensure security and compliance
A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent nauthorized Web users or illicit software from gaining access to private networks connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both.
Gateway anti-virus helps to Monitor all traffic, blocking trojans, viruses, worms and malware before they enter the network. You can optionally integrate other third-party AV software. Anti-virus signature is automatically updated hourly
HTTP proxy allows visible or transparent control of HTTP and encrypted HTTPS browser traffic, including TOR and anonymous browsers. Group based policies can enforce differentiated rules by time, location, or membership. Advanced content filter controls black and white list websites and filters pornographic images. En6200 can control file download by Mime type or file extension. Hacked and Malware web sites are blocked from incoming requests.
Built-in Intrusion Detection (IDS) and Intrusion Prevention (IPS) block over 2500 internet attacks. Attack signatures are update automatically, and you can add customer signatures as well. Beyond known attacks, UTM-5000 constantly scans for anomalous traffic and protocol behavior, as well as preventing DOS and DDOS attacks.
SPAM control rules can be configured by Black/White list, header, file size, MIME, images, or sender/receiver. Bayesian filters and Auto Learning are also supported.
Next-generation firewalls provide a flexible networking architecture that includes support for dynamic routing, switching, and VPN connectivity, and enables you to deploy the firewall into nearly any networking environment. When configuring the Ethernet ports on your firewall, you can choose from virtual wire, Layer 2, or Layer 3 interface deployments. In addition, to allow you to integrate into a variety of network segments, you can configure different types of interfaces on different ports.
EN6200 WAN interfaces that can be configured for incoming and outgoing load balancing or quality based failover. A full routing functionality suite includes static, dynamic, and policy based routing rules.
All of the networks provide USB modems. These are typically available 'free' on most monthly data contracts, or to buy on PAYG ('Pay as You Go') packages. Modems supplied by the telcos are normally 'locked' to their respective networks. Check with your chosen network provider for their current models. The 3G/4G USB modem connects directly into a tacitine firewall and provides shared Internet connectivity
Where firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure on your network. A heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down. Setting up two firewalls in an HA pair provides redundancy and allows you to ensure business continuity.
You can create secure connections between IPSec gateways or VPN clients devices using SSL. Static IP and Dynamic IP configurations are support, and services can be configured by group policy. Multi-WAN support includes VPN failover to maximize uptime.