3Com 3C8567 - SuperStack II NETBuilder SI 567 Router Fiche technique

Parcourez en ligne ou téléchargez le pdf Fiche technique pour {nom_de_la_catégorie} 3Com 3C8567 - SuperStack II NETBuilder SI 567 Router. 3Com 3C8567 - SuperStack II NETBuilder SI 567 Router 6 pages. Si routers

3Com 3C8567 - SuperStack II NETBuilder SI 567 Router Fiche technique
3Com
Cost effective.
Interoperable.
IBM/legacy support.
Secure, flexible WAN access for enterprise networks
Designed to meet today's network
challenges and tomorrow's growth,
the SuperStack
II NETBuilder
®
(Secure Internet/Intranet) routers
future-proof your network, fitting
into any WAN environment and
providing all the functionality you
need for migrating regional and
branch offices to Fast Ethernet and
new WAN services. These platforms
ensure predictable system perfor-
mance and offer industry-leading
flexibility as the only remote device
with two or four WAN ports, two
LAN ports, and a telco connection.
A range of platforms gives you the
choice of an integrated 56/64 Kbps
DSU/CSU, FT1/T1 DSU/CSU,
ISDN (U and S/T interfaces), plus
two or four serial T1/E1 WAN
connections. This provides an easy
migration path and comprehensive
backup choices to meet the changing
needs of your network.
Security is a big concern for today's
system administrators who need to
R R o o u u t t e e r r s s
provide users with information-
sharing capabilities and Internet
SI
access, while maintaining the
®
integrity of their enterprise networks.
The SuperStack II NETBuilder SI
routers provide complete network
security with Network Address
Translation (NAT) for internal
address security, two 10/100BASE-T
ports that segment two LANs from
each other, and a flexible easy-to-use
ICSA-certified IP firewall, for secure
WAN access to enterprise networks
and the Internet.
The SuperStack II NETBuilder SI
platforms are part of 3Com's compre-
hensive VPN solutions, offering
site-to-site connectivity for remote
access and client-to-LAN connec-
tivity for secure corporate intranets
and extranets. VPNs are supported
through tunneling and encryption
technologies, Point-to-Point
Tunneling Protocol (PPTP) and
Layer 2 Tunneling Protocol (L2TP),
IP Security (IPSec), and Microsoft
Point-to-Point Encryption (MPPE).