Tz180 pdf




















The UI also displays the buffer size, the number of packets captured, the percentage of buffer space used, and how much of the buffer has been lost. Lost packets occur when automatic FTP logging is turned on, but the file transfer is slow for some reason. If the transfer is not finished by the time the buffer is full again, the data in the newly filled buffer is lost.

Note Although the buffer wrap option clears the buffer upon wrapping to the beginning, this is not considered lost data. Next to the FTP logging indicator, the UI also displays the number of successful and failed attempts to transfer the buffer contents to the FTP server, the current state of the FTP process thread, and the status of the capture buffer. Under the FTP logging indicator, on the Current Buffer Statistics line, the UI displays the number of packets dropped, forwarded, consumed, generated, or unknown.

On the Current Configurations line, you can hover your mouse pointer over Filters, General, or Logging to view the currently configured value for each setting in that category. The Filters display includes the capture filter and display filter settings. The display for General includes both the general and advanced settings.

The Logging display shows the FTP logging settings. If a capture is in progress, it is not interrupted when you reset the statistics display. Step 2 Under Packet Capture, click Reset. Supported Packet Types When specifying the Ethernet or IP packet types that you want to capture or display, you can use either the standard acronym for the type, if supported, or the corresponding hexadecimal representation.

The protocol acronyms that SonicOS Enhanced currently supports are as follows:. The following is an example showing the header and part of the data for the first packet in the buffer. Text File Format You can view the text format output in a text editor.

After the form is submitted, a unique case number is returned. Step 2 Click Download Report to save the file to your system.

When you click Download Report, a warning message is displayed. Step 3 Click OK to save the file. Attach the report to your Tech Support Request e-mail. The following diagnostic tools are available:. Click on a column heading to sort by that column. You can filter the results to display only connections matching certain criteria. Enter your filter criteria in the Active Connections Monitor Settings table.

The fields you enter values into are combined into a search string with a logical AND. Check the Group box next to any two or more criteria to combine them with a logical OR. Click Reset Filters to clear the filter and display the unfiltered results again. You can export the list of active connections to a file. Click Export Results, and select if you want the results exported to a plain text file, or a Comma Separated Value CSV file for importing to a spreadsheet, reporting tool, or database.

If you are prompted to Open or Save the file, select Save. Then enter a filename and path and click OK. Note High CPU utilization is normal during Web-management page rendering, and while saving preferences to flash.

Utilization by these tasks is an indication that available resources are being efficiently used rather than sitting idle. Traffic handling and other critical, performance- oriented and system tasks are always prioritized by the scheduler, and never experience starvation. Or, if you enter an IP address, it returns the domain name for that address. Step 1 Enter the host name or IP address in the Look up name field.

Do not add http to the host name. Find Network Path can be used to determine if a target device is located behind a network router and the Ethernet address of the target device. It also displays the gateway the device is using and helps isolate configuration problems. Packet Capture The Packet Capture tool tracks the status of a communications stream as it moves from source to destination. This is a useful tool to determine if a communications stream is being stopped at the SonicWALL security appliance, or is lost on the Internet.

To interpret this tool, it is necessary to understand the three-way handshake that occurs for every TCP connection. Client sends a final ACK, and waits for start of data transfer.

When using packet capture to isolate network connectivity problems, look for the location where the three-way handshake is breaking down. This helps to determine if the problem resides with the SonicWALL security appliance configuration, or if there is a problem on the Internet. Select Packet Capture from the Diagnostic tool menu.

Tip Packet Capture requires an IP address. The Trace is off turns from red to green with Trace Active displayed. Step 9 Click Refresh and the packet capture information is displayed. Step 10 Click Stop to terminate the packet capture, and Reset to clear the results. Select a packet in the Captured Packets table to display packet details.

Packet details include the packet number, time, content, source of the IP address, and the IP address destination. Ping The Ping test bounces a packet off a machine on the Internet and returns it to the sender.

If the test is unsuccessful, try pinging devices outside the ISP. Step 1 Select Ping from the Diagnostic Tool menu. Step 2 Enter the IP address or host name of the target device and click Go. Step 3 If the test is successful, the SonicWALL security appliance returns a message saying the IP address is alive and the time to return in milliseconds ms. Click Go. Trace Route Trace Route is a diagnostic utility to assist in diagnosing and troubleshooting router connections on the Internet.

By using Internet Connect Message Protocol ICMP echo packets similar to Ping packets, Trace Route can test interconnectivity with routers and other hosts that are farther and farther along the network path until the connection fails or until the remote host responds.

Type the IP address or domain name of the destination host. For example, type yahoo. A second window is displayed with each hop to the destination host. By following the route, you can diagnose where the connection fails between the SonicWALL security appliance and the destination.

The time frame of the Web Server Monitor can be changed by selecting one of the following options in the View Style pulldown menu: last 30 seconds, last 30 minutes, last 24 hours, or last 30 days. Click Restart The SonicWALL security appliance takes approximately 60 seconds to restart, and the yellow Test light is lit during the restart.

During the restart time, Internet access is momentarily interrupted on the LAN. The SonicOS Enhanced scheme of interface addressing works in conjunction with network zones and address objects. Interface Settings The Interface Settings table lists the following information for each interface:. As zones are configured, the names are listed in this column. Click the traschan icon to delete a WLAN subnet.

Interface Traffic Statistics The Interface Traffic Statistics table lists received and transmitted information for all configured interfaces. Physical Interfaces Physical interfaces must be assigned to a Zone to allow for configuration of Access Rules to govern inbound and outbound traffic. Security zones are bound to each physical interface where it acts as a conduit for inbound and outbound traffic. If there is no interface, traffic cannot access the zone or exit the zone.

This structure is based on secure objects, which are utilized by rules and policies within SonicOS Enhanced. Address objects comprise a host, a network, a range of addresses, or a MAC address. SonicOS Enhanced includes pre-defined zones as well as allow you to define your own zones.

Zones can include multiple interfaces, however, the WAN Zone is restricted to a total of two interfaces. At the zone configuration level, the Allow Interface Trust setting for zones automates the processes involved in creating a permissive intra-zone Access Rule. It creates a comprehensive Address Object for the entire zone and a inclusively permissive Access Rule from zone address to zone addresses.

Transparent Mode supports unique addressing and interface routing. Step 1 Click on the Configure icon in the Configure column for the Interface you want to configure. The Edit Interface window is displayed. The Add Zone window is displayed. Step 2 Select a Zone to assign to the interface.

Step 5 Enter any optional comment text in the Comment field. This text is displayed in the Comment column of the Interface table. Step 8 Click OK. Auto Negotiate is selected by default as the Link Speed because the Ethernet links automatically negotiate the speed and duplex mode of the Ethernet connection. Check Enable Multicast Support to allow multicast reception on this interface.

Caution If you select a specific Ethernet speed and duplex, you must force the connection speed and duplex from the Ethernet card to the SonicWALL security appliance as well. To confiugre an interface for transparent mode, complete the following steps:. Step 1 Click on the Configure icon in the Configure column for Unassigned Interface you want to configure.

Step 2 Select an interface. Step 4 From the Transparent Range menu, select an address object that contains the range of IP addresses you want to have access through this interface. If you do not have an address object configured that meets your needs: a. In the Add Address Object window, enter a name for the address range. Enter the IP address of the host, the beginning and ending address of the range, or the IP address and subnet mask of the network. Click OK to create the address object and return to the Edit Interface window.

Note The upper limit of the subnet mask is determined by the number of SonicPoints you select in the SonicPoint Limit field. If you are configuring several interfaces or sub-interfaces as Wireless interfaces, you may want to use a smaller subnet higher to limit the number of potential DHCP leases available on the interface.

Otherwise, if you use a class C subnet subnet mask of The following table shows the subnet mask limit for each SonicPoint Limit selection and the number of DHCP leases available on the interface if you enter the maximum allowed subnet mask. Note The above table depicts the maximum subnet mask sizes allowed. You can still use class- full subnetting class A, class B, or class C or any variable length subnet mask that you wish on WLAN interfaces.

You are encouraged to use a smaller subnet mask e. Check Enable In order to make use of this priority information, devices connected to this interface should support priority frames.

Depending on the option you choose from the IP Assignment menu, complete the corresponding fields that are displayed after selecting the option. This protocol is typically found when using a DSL modem. It supports older Microsoft Windows implementations requiring tunneling connectivity.

However, it does not encrypt network traffic to other destinations. You can also select HTTP for management traffic. Caution If you select a specific Ethernet speed and duplex, you must force the connection speed and duplex from the Ethernet card to the SonicWALL as well.

Outbound bandwidth management is done using Class Based Queuing. Every packet destined to the WAN interface is queued in the corresponding priority queue. The scheduler then dequeues the packets and transmits it on the link depending on the guaranteed bandwidth for the flow and the available link bandwidth.

Use the Bandwidth Management section of the Edit Interface screen to enable or disable the ingress and egress bandwidth management. Egress and Ingress available link bandwidth can be used to configure the upstream and downstream connection speeds.

The Bandwidth Management section allows you to specify the available outbound bandwidth for this interface in Kbps. PortShield architecture enables you to configure any or all of the LAN switch ports on the into separate security zones, providing protection not only from the WAN and DMZ, but between devices inside your network as well.

In effect, each security zone has its own wire-speed switch ports that enjoy the protection of a dedicated, deep packet inspection firewall.

To add a PortShield interface, perform the following steps:. Click the Connect button. Click Disconnect. Step 5 Click on the Profiles tab. Optionally, you can select up to two alternate WWAN profiles.

If you do not enter a value in this field, dial-out calls will remain connected indefinitely, and you will have to manually terminate sessions by clicking the Disconnect button. To enable remotely triggered dial-out over the WWAN interface, perform the following steps:.

Step 3 To require remotely triggered dial-out sessions to be authenticated, select the Requires Authentication checkbox and enter a password in the Password and Confirm Password fields. Entering 0 in the Max Host fields allows any number of nodes to connect. To create a WLAN subnet, complete the following steps. Make sure that the IP address subnet does not conflict with another address range. This option is enabled by default. Step 3 Optionally, you can enable multicast reception on the subnet by clicking on the Advanced tab and selecting the Enable multicast support checkbox.

Step 4 Click OK. In effect, each context has its own wire-speed switch ports that enjoy the protection of a dedicated, deep packet inspection firewall. Note Port 1 and the Uplink port are the only ports from which you can establish a SonicOS management session with the device.

You can assign any combination of ports into a PortShield interface. Note Port 1and the Uplink port can not be assigned to a PortShield interface. They can only be LAN interface. For example, if ports 2 and 3 are assigned to the SwitchPort1 interface and ports 4 and 5 are assigned to the SwitchPort2 interface, traffic between port 2 and port 3 will not be inspected by Security Services.

Traffic between port 2 and port 4 will be inspected. Overview A PortShield interface is a virtual interface with a set of ports assigned to it. There are two IP assignment methods you can deploy to create PortShield interfaces. They are Static and Transparent modes. The following two sections describe each.

All ports mapped to the interface are identified by this address. Static mode is available on interfaces assigned to Trusted, Public, or Wireless zones. Transparent mode is available on interfaces assigned to Trusted and Public Zones. When you create a PortShield interface in Transparent Mode, you create a range of addresses to be applied to the PortShield interface.

You include these addresses in one entity called an Address Object. Address Objects allow for entities to be defined one time and to be re-used in multiple referential instances throughout the SonicOS interface. When you create a PortShield interface using an address object, all ports mapped to the interface are identified by any of the addresses specified in the address range. Note Each statically addressed PortShield interface must be on a unique subnetwork.

You can not overlap PortShield interfaces across multiple subnetworks. To create a PortShield interface using the first method, perform the following tasks: 1. Create and add a PortShield interface to the list of interfaces.

After you select a zone, you select a series of ports that you want to assign to the PortShield interface. Navigate to the Switch Port environment and perform either per-port or multiple-port extra configuration. To create a PortShield interface using the second and third methods, perform the following tasks: 1.

Go to the Switch Port environment and assign ports to the PortShield interface you have already created. Perform per-port or multiple-port extra configuration. To create a PortShield interface using the fourth method, perform the following tasks: 1. Navigate through the wizard screens, selecting and verifying one of the options presented for switch partitioning which divides the ports up into various amounts.

Creating a PortShield Interface from the Interfaces Area Before creating and adding a PortShield interface, think about why you are creating it and what role it will play in your network. To create and add a PortShield interface to the list of interfaces, perform the following steps: 4. Column Description Name A string that identifies the interface.

Zone The zone to which the interface maps. Subnet Mask The subnetwork mask value assigned to the IP address to indicate a range of addresses.

Manually creating an explicit address to which you will map ports. Allows for the WAN subnetwork to be shared by the current interface using Address Object assignments.

Status Aggregate Ethernet Link port s status or Ethernet Link port s status summary, indicating the currently active highest speed and duplex properties. Comment A note about the interface. Configure Contains two icons. One icon is a grouping of books that displays traffic statistics when you hover the mouse cursor over it.

The other icon is a pen and paper that enables you to launch an interface configuration session. Click the Zone list box and click on a zone type option to which you want to map the interface.

After you select a zone option, the management software displays a more expanded version of the PortShield Interface Settings dialog box. Type a string in the PortShield Interface Name field. Static indicates the interface obtains its IP address manually. Transparent mode allows for the WAN subnetwork to be shared by the current interface using Address Object assignments.

If you want to specify a range of IP addresses different than the one allowed by the subnetwork mask Click on a checkbox in the Management area to indicate the desired management protocol type. Click on a checkbox in the User Login area. This is a special feature that enables you to set up a Web access environment so you can enforce User Level Authentication. Note This option only appears when creating a PortShield interface, not when editing an existing PortShield interface. Click on the Switch Ports tab.

The management software displays the PortShield Interface dialog box. Click OK. The management software adds the PortShield interface to the interface list. Creating a New Zone for the PortShield Interface You may want to create a zone for a PortShield interface that has different attributes to it than any of the default zones provide. To create a new zone for a PortShield interface, perform the following: 1.

The management software displays the General Settings dialog box. Type a name in the Name field that will identify the new zone.

Click on the Security Type list box and click on a security type option that will classify the zone as having a certain level of access. The choices are: — Trusted - This security type offers the highest level of security, indicating that only trust, indicating that the least amount of scrutiny is applied to traffic coming from trusted zones.

Trusted security can be thought of as being on the LAN protected side of the device. The LAN zone is always Trusted. Public zones can be thought of as being a secure area between the LAN protected side of the device and the WAN unprotected side.

You typical use WiFiSec to secure traffic in a wireless zone. After selecting the security level for the PortShield interface, click on one of the following checkboxes that enables a security service for the zone:. Checkbox Description Allow Interface Automates the creation of Access Rules to allow traffic to flow between the Trust interfaces of a zone instance. Enforce Content Enforces protection and productivity policies for organizations to reduce legal Filtering Service and privacy risks while minimizing administration overhead.

Enforce Client Enables network-level inspection of email, Web traffic, file transfers, various Anti-Virus stream-based protocols, instant messaging, and peer-to-peer applications to Service detect and clean malicious code, viruses, and worms. Enable Gateway Enables gateway-level inspection of email, Web traffic, file transfers, various Anti-Virus stream-based protocols, instant messaging, and peer-to-peer applications to Service detect and clean malicious code, viruses, and worms.

Enable IPS Enables Intrusion Prevention Service which provides a configurable, high- performance deep packet inspection architecture using parallel searching algorithms through the application layer to deliver complete Web and E-Mail attack prevention.

Enable Anti- Enables spyware protection which prevents malicious spyware from infecting Spyware Service networks by blocking related installations at the gateway and disrupting background communications from existing spyware programs.

To refine a PortShield interface group, perform the following steps: 1. Log in to the security appliance. Click on the Switch Ports option. The following items are displayed: — A list of all interfaces including PortShield interfaces. Note the ports you have selected are parts of the PortShield interface you just created. If there are more ports you want to add to the PortShield interface, in the interactive switch ports graphic, select the ports you want to include in the PortShield interface group.

Click the Configure button. The management software displays the Edit Multiple Switch Ports dialog box. You can refine your settings in this dialog box.

The name of the PortShield interface group will be assigned by default. Click on the Port Enable list box and click on either the Enable or Disable option to either activate or deactivate the interfaces in the PortShield interface group. Click on the PortShield interface list box and click on the PortShield interface you created in the previous procedure.

Click on the Link Speed list box and click on a throughput speed you want to assign the interface. Note Do not change this setting from the default of Auto negotiate unless your system requires you to do so. Also, note that for any setting involving the Full Duplex feature to work properly, be sure to configure Full Duplex on both ends of the link. By not having Full Duplex configured on both ends, a duplex mismatch occurs, causing throughput loss.

Wait for a few seconds. The system then will incorporate the changes you made to the PortShield interface Group and add it back to the switch ports list. Creating Transparent Mode PortShield Interfaces You may find it useful to create address objects to bundle addresses into address objects and reference these objects when creating a PortShield interface. Address objects allow for entities to be defined one time and to be reused in multiple referential instances throughout SonicOS.

The PortShield interface creation environment provides a convenient way to reference address objects. The following example takes a network with a series of addresses in the range To create these PortShield interfaces, using the prescribed address objects, perform the following steps: 1.

The Interfaces Settings page displays. Click the Add PortShield Interface button. The management software displays the Add Port Shield dialog box. For this exercise, click the LAN option. Only interfaces assigned to Trusted and Public zones can operate in Transparent mode.

Type a name in the PortShield Interface Name field. Click on the Transparent Range list box and click on the Create new address object option. The management software displays the Add Address Object dialog box.

Fill out the fields as detailed in the next three sections to create the three different types of address objects. The three examples use a subnetwork of Type the name portshield1 in the Name field to identify the address object. Click the Type list box and click the Host option to make the address object apply to a single IP address.

Note the Host option is the default option in the list box. Type your IP address, in this example, The management software assumes a subnetwork mask of Note that because of this assumption, the software does not display a field for a subnetwork mask.

The General tab of the Port Shield dialog box is displayed. Click the Switch Ports tab. The Switch Ports tab is displayed. The Interfaces list displays, along with the new PortShield interface in the list. It displays the name, zone, IP address, subnetwork mask, IP assignment method, status, and comment, and link type status information about the address object you created portshield1.

Note The IP address is the actual subnetwork address, not the specific address you entered. In this example, the address is This is because in Transparent mode, the interface appears to users as having the same address as the gateway.

Therefore your explicit address is invisible or transparent to internet users. Click on the Switch Ports option in the left navigation pane. In the graphic of the switch, view port number 5 and verify that the port is colored blue.

In the switch port list, view the PortShield Interface column for P5 port 5 and verify that the interface listed is portshield1. Refine the configuration of the PortShield Interface. Type the name portshield2 in the Name field to identify the address object.

Click the Type list box and click the Range option to make the address object apply to a range of addresses. The management software displays new fields in the Add Address Object dialog box. Type a starting IP address, in this example, Type an ending IP address, in this example, The management software displays the General tab of the Port Shield dialog box. The management software displays the Switch Ports tab. Note it displays the name, zone, IP address, subnetwork mask, IP assignment method, status, comment, and link type status detail about the address object you created portshield2.

In the graphic of the switch, view port numbers 6, 7, and 8, and verify the port is colored blue. In the switch port list, view the PortShield Interface column for P6, P7, and P8 and verify that the interface listed is portshield2. Click on the Add button in the Address Objects list in the window. Enter the name portshield3 in the Name field. Select Network from the Type menu. Enter The Address Objects window displays the new portshield3 in the address group list.

Repeat the procedure with the same settings for the following IP addresses: Make sure the name of the address object for each address is portshield3. When you finish creating these address objects, you will only see portshield3 displayed in the address group list.

Go back to the Add PortShield Interface dialog box and create an interface called portshield3 with a LAN zone, using a Transparent Mode address assignment type and select portshield3 from the Transparent Range list of existing address groups.

Click on the Switch Port tab and add the ports 2 and 3 to the address object. SonicOS displays the group address object portshield3 in the Interfaces list. Note the Network and Netmask fields in the dialog box. In the graphic of the switch, view port numbers 2and 3, and verify that the port is colored blue. In the switch port list, view the PortShield Interface column for P2 and P3 ports 2 and 3 and verify that the interface listed is portshield3. Mapping Ports from the Switch Ports Window Another way to create a PortShield interface is to configure the interface in the Interfaces window and then assign ports to it in the Switch Ports window.

Approaching it this way assumes you created a PortShield interface first and then selected the ports from the device ports graphic and selected the existing interface. This provides several advantages: — Enables you to easily visualize the actual locations of ports.

To select ports and apply them to a previously configured interface, perform the following steps: 1. Click the Networks option in the navigation pane and then click the Switch Ports option. SonicOS displays the Switch Ports window. Note the color of the ports. While you can map any port, no matter what its color, to an interface, you should be aware of whether it has been selected for use in another PortShield interface.

If they are black, they are unused by another PortShield interface. If they are another color, they are in use. Just be cognizant of ones that are being used and what impact your remapping the port will have on the existing interface. Be cognizant of ones that are being used and what impact your remapping the port will have on the existing interface.

On the appliance graphic, click on ports 3, 4, and 5. The selected port graphics appear as yellow as shown in the following figure if you are viewing this document in color. Click on the PortShield Interface list box as shown in the following figure. Note the list contains called the entry called Accounting. This is the host address object you created. Click on the Accounting entry. By selecting this entry, you mapped ports 3, 4, and 5 to the Accounting entry.

Wait a moment. SonicOS displays the Switch Ports dialog box, displaying the results of your session. Verify the PortShield interface port mappings. This column now displays a blue-colored icon and the accounting string for P3, P4, and P5, indicating these ports are now mapped to the accounting PortShield interface.

Two sonicpoints give wireless access to residents, and a small office LAN contains two computers and a mail and web server. Note The easiest way to configure this example is to use the PortShield Wizard. Configure it to have two PortShield interfaces, with three and two ports respectively. Deployment Details This example uses the following zones and PortShield interfaces:.

This setting allows the zone to be used for both wired and wireless traffic. With SonicPoint enforcement disabled, this enables both wired and wireless guest services. Configure the SonicPoint Profile This example uses two SonicPoints to grant wireless access to users throughout the complex.

Residents can log in with their accounts, and guest users can log in using Wireless Guest Services. The SonicPoint profile contains the settings that the security appliance automatically applies to all connected SonicPoints. Keep the defaults except where appropriate for your installation. Set the SSID for both Residents is a Wireless zone with SonicPoint Enforcement disabled, thus allowing both wireless and wired access.

Guest services is enabled, allowing both wired and wireless guest users access to the internet. For more details on configuring zones, see Chapter 17, Configuring Zones. LAN: Leave the default configuration for these two zones.

Select Wireless so you can use the same context for the both the individual wired connections and the SonicPoints. This disables SonicPoint enforcement, allowing both wired and wireless connections through this zone. The settings in this profile will automatically be applied to the SonicPoints you set up for wireless access. The easiest way to configure this is to use the PortShield Wizard and then modify the configuration. We will use the wizard to configure 2 PortShield interfaces with 3 and 2 ports respectively.

Select 2 PortShield interfaces with 3 and 2 ports resp and click Next. Uncheck the Enable Interface Trust for new PortShield Interface segments checkbox to prevent communication between the wireless segment and the office segment.

If this level of security is not necessary, leave the checkbox checked. At the end of the hold time, the interface operates normally. If this is a false alarm and the interface should not be on hold this long, use the countermeasure tkip hold-time command to adjust the hold time. Explanation The access point received a direct broadcast or multicast frame in which the dot11 MAC header's RA address field is a broadcast or multicast address.

Recommended Action None. However, if your access point displays this message frequently, capture these frames with a sniffer for further analysis. The following sections provide references related to error and event messages.

Cisco IOS wireless LAN commands: complete command syntax, command mode, command history, defaults, usage guidelines, and examples. The Cisco Technical Support website contains thousands of pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools.

Registered Cisco. The anti-spam service offers complete inbound anti-spam, anti-phishing, anti-malware protection and features, IP-reputation lookup, advanced content management, denial of service prevention, full quarantine and customizable per-user junk summaries.

Order replacement parts and upgrades, including power supplies and rack-mount kits, for your SonicWall TZ series firewall. For more than 20 years, SonicWall has been committed to continuous independent third-party security testing performed by ICSA Labs — the foremost independent testing agency for network security products.

Explore the features and interface of the SonicWall TZ series firewall in a functional live demo. We are easily able to configure and deploy a device without having to spend hours to get everything right. When it comes time to rotate out a device, the ability to pull a config from the existing device and place it on the new device saves our time, as well as money for our clients.

This data was sourced directly from a verified user of SonicWall Inc. Great job! It made it easy for me to get them into clients offices and help secure their networks. Ease of management and configuration via web interface is a plus. SonicWall TZ firewalls allow us to do that in a very efficient manner knowing that our remote sites are as secure as our corporate data center.

We count on the firewall features to secure access to our management LAN. Main Menu. Solutions Image Widgets. Partners Image Widgets. Support Image Widgets. Contact Us. Overview In an era of the ever-evolving security landscape, small- and medium-sized businesses SMB face large challenges when it comes to defending their networks, data and reputation.

Demo for Free. Connectivity Wi-Fi Option Firewall Performance Firewall Inspection Throughput 3. Interfaces Ethernet Ports 8x1GbE, 2x2.



0コメント

  • 1000 / 1000