3Com X5 Especificações - Página 4

Procurar online ou descarregar pdf Especificações para Hardware de rede 3Com X5. 3Com X5 8 páginas. Unified security platform
Também para 3Com X5: Manual do produto (15 páginas), Manual (2 páginas), Início rápido (2 páginas)

3Com X5 Especificações
4

FEATURES HIGHLIGHTS

Feature
PROACTIVE INTRUSION PREVENTION
Based on award-winning TippingPoint Provides peace of mind by preventing business disruption, loss of revenue
Threat Suppression Engine
Packet flow inspection for Layer 2
through Layer 7
Statistical, protocol and application
anomaly protection
Quarantine protection
Recommended settings supplied
with IPS filters in Digital Vaccine
Digital Vaccine Attack Filter
Update Service
Traffic normalization
Elimination of ad hoc patching and
alert responses
ADVANCED VPN
High-performance, low-latency
IPSec VPN
Ability to apply IPS inside VPN tunnels Offers complete security protection, ensuring that remote VPN clients or
APPLICATION PRIORITIZATION AND OPTIMIZATION
Single, high-performance, resilient
platform
Policy-based prioritization
SIP/H323 application layer gateway
and stateful traffic shaping
Traffic shaping inside VPN tunnels
Support for PIM-DM multicast routing Enables next-generation applications such as distance-based learning,
between sites over IPSec VPN
ENFORCE ACCEPTABLE INTERNET USAGE
Block instant messages (IM),
peer-to-peer file sharing and
streaming applications
Web content filtering
Layer 4 through Layer 7 rate limiting
3COM
X5 AND X506 UNIFIED SECURITY PLATFORMS
®
Description
and damage to the organization's reputation caused by security breaches.
Continuously cleanses Internet and intranet traffic, eradicating threats
and helping to prevent bandwidth hijacking.
Safeguards against traffic surges, buffer overflows, unknown attacks and
unknown vulnerabilities (zero-day threats).
Isolate infected devices from the network without the need for PC software
agents; transparently redirect web requests so users know they are
infected or running applications which do not conform to corporate policies.
Ensures that no "good" traffic is blocked and no "bad" traffic is permitted;
no security expertise or fine-tuning of settings is required.
Automatically delivers new security filters that preemptively protect
against new exploits; offers updated protection and prevention on a
weekly (or more frequent) basis.
Eliminates malformed or illegal packets and performs TCP reassembly
and IP defragmentation to increase bandwidth and detect evasions.
Increases IT productivity and saves management costs; continuously
shields the network from application and infrastructure exploits while
patches are being deployed.
Allows the Internet to be used as a secure connectivity mechanism for
site-to-site connections and remote user connectivity.
branch offices cannot be used to propagate threats into the LAN.
Reduces the number of devices that need to be managed and saves
management costs; provides greater flexibility by integrating multiple
functions (e.g., IPS in VPN tunnels).
Ensures QoS for business-critical applications and latency-sensitive
services such as VoIP; makes sure network traffic adheres to policies set
by management; improves users' productivity.
Provides ability to identify and prioritize mission-critical VoIP applications.
Prioritizes site-to-site voice traffic across VPN tunnels, saving costs on
long-distance phone calls and leveraging centralized business applications.
real-time training and conferencing
Improves employee productivity and preserves bandwidth by restricting
access to unauthorized applications.
Reduces legal liability and security threats related to offensive or harmful
Web content; boosts employee productivity by restricting access to non
business content.
Provides the ability to limit the data rate of applications like IM and
streaming video to maximize WAN bandwidth.