Shop

Draytek Vigorpro 5510G Unified Threat Management-0

Draytek Vigorpro 5510G Unified Threat Management

$760.00

In stock

SKU: SKU - 1016 Category:

Description

1. Anti-Virus

* File Filter
* Defense Viruses, Worms and Trojan
* Scan SMTP
* Scan POP3
* Scan HTTP
* Scan IMAP
* Scan FTP
* Scan ZIP / GZIP / BZIP2
* Scan Built-in VPN Tunnels
* Automatic update latest virus signature to device
* Automatic alert when signature update service expiry
* Real-time Syslog / Mail Alert for the virus detection

2. Anti-Intrusion

* Rule-based Detection List
* Pass / Disallow / Reset while Intrusion is Detected
* Automatic update latest intrusion signature to device
* Automatic alert when signature update service expired
* Real-time Syslog / Mail Alert when attacked

3. Anti-Spam

* Real-time scan SMTP, POP3
* Automatic alert when license expired
* Real-time syslog alert when spam is detected
* Multi Language Detection
* Multi Type ( graphic, document, HTML ) Detection
* Single / Double byte Coding Detection
* No User Limitation
* Black / White List

4. Dual-WAN

* Outbound Policy-based Load-balance
* BoD ( Bandwidth on Demand )
* WAN Connection Fail-over

5. VPN

* Up to 200 VPN Tunnels
* Protocol : PPTP, IPSec, L2TP, L2TP over IPSec
* Encryption : MPPE and Hardware-based AES / DES / 3DES
* Authentication : Hardware-based MD5, SHA-1
* IKE Authentication : Pre-shared Key and Digital Signature ( X.509 )
* LAN-to-LAN, Teleworker-to-LAN
* DHCP over IPSec
* NAT-Traversal ( NAT-T )
* Dead Peer Detection ( DPD )
* VPN Pass-through

6. SSL VPN

* Web Application

7. Firewall

* Transparent Mode
* CSM ( Content Security Management )
o URL Content Filter ( White List and Black List )
o Java Applet, Cookies, Active X, Compressed, Executable, Multimedia File Blocking
o Web Content Filter ( SurfControl )
o IM / P2P Blocking
o Time Schedule Control
* Multi-NAT, DMZ Host, Port-redirection and Open Port
* Policy-based Firewall
* SPI ( Stateful Packet Inspection )
* DoS / DDoS Prevention
* IP Address Anti-spoofing
* E-Mail Alert and Logging via Syslog
* Bind IP to MAC Address
* Time Schedule Control

8. USB

* 3G USB Modem
* USB Printer

9. Network Features

* DHCP Client / Relay / Server
* Dynamic DNS
* NTP Client
* Call Scheduling
* RADIUS Client
* DNS Cache / Proxy
* UPnP
* Routing Protocol : Static Routing , RIP V2
* IGMPv2 Proxy

10. Network Management

* Web-based User Interface ( HTTP / HTTPS )
* Quick Start Wizard
* CLI ( Command Line Interface, Telnet / SSH * )
* Administration Access Control
* Configuration Backup / Restore
* Built-in Diagnostic Function
* Firmware Upgrade via TFTP / FTP
* Logging via Syslog
* SNMP Management with MIB-II

11. Bandwidth Management

* Class-based Bandwidth Guarantee by User-defined Traffic Categories
* DiffServ Code Point Classifying
* 4-level Priority for Each Direction ( Inbound / Outbound )
* Bandwidth Borrowed
* Bandwidth / Session Limitation

Technical Specifications of VigorPro 5510
Hardware Interface

WAN

2x 10/100 Base-Tx RJ-45 ports

LAN

5x 10/100/1000 Base-Tx RJ-45 ports

USB

1x USB for connecting to USB printer or 3G USB Modem

Anti-Virus

File Filter

Defense Viruses, Worms and Trojan

Scan SMTP

Scan POP3

Scan HTTP

Scan IMAP

Scan FTP

Scan ZIP / GZIP / BZIP2

Scan Built-in VPN Tunnels

Automatic update latest virus signature to device

Automatic alert for signature update service expiry

Real-time Syslog / Mail Alert for the virus detection

Anti-Intrusion

Rule-based Detection List

Pass / Disallow / Reset while Intrusion is Detected

Automatic update latest intrusion signature to device

Automatic alert when signature update service expired

Real-time Syslog / Mail Alert when attacked

Anti-Spam

Real-time scan SMTP, POP3

Automatic alert when license expired

Real-time syslog alert when spam is detected

Multi Language Detection

Multi Type ( graphic, document, HTML ) Detection

Single / Double byte Coding Detection

No User Limitation

Black / White List

Dual-WAN

Outbound Policy-based Load-balance

BoD ( Bandwidth on Demand )

WAN Connection Fail-over

VPN

Up to 200 VPN Tunnels

LAN-to-LAN, Teleworker-to-LAN

DHCP over IPSec

NAT-Traversal ( NAT-T )

Dead Peer Detection ( DPD )

VPN Pass-through

Protocol

PPTP

IPSec

L2TP

L2TP over IPSec

Encryption

MPPE

Hardware-based AES / DES / 3DES

Authentication

Hardware-based MD5

SHA-1

IKE authentication

Pre-shared Key

Digital Signature ( X.509 )

SSL VPN

Web Application

Firewall

Transparent Mode

Multi-NAT, DMZ Host, Port-redirection and Open Port

Policy-based Firewall

SPI ( Stateful Packet Inspection )

DoS / DDoS Prevention

IP Address Anti-spoofing

E-Mail Alert and Logging via Syslog

Bind IP to MAC Address

Time Schedule Control

CSM

URL Content Filter ( White List and Black List )

Java Applet, Cookies, Active X, Compressed, Executable, Multimedia File Blocking

Web Content Filter ( SurfControl )

IM / P2P Blocking

Time Schedule Control

Network Features

DHCP Client / Relay / Server

Dynamic DNS

NTP Client

Call Scheduling

RADIUS Client

DNS Cache / Proxy

UPnP

Routing Protocol

Static Routing

RIP V2

IGMPv2 Proxy

Network Management

Web-based User Interface ( HTTP / HTTPS )

Quick Start Wizard

CLI ( Command Line Interface, Telnet / SSH * )

Administration Access Control

Configuration Backup / Restore

Built-in Diagnostic Function

Firmware Upgrade via TFTP / FTP

Logging via Syslog

SNMP Management with MIB-II

Bandwidth Management

Class-based Bandwidth Guarantee by User-defined Traffic Categories

DiffServ Code Point Classifying

4-level Priority for Each Direction ( Inbound / Outbound )

Bandwidth Borrowed

Bandwidth / Session Limitation

Temperature

Operating : 0 ° C ~ 45 ° C

Storage : -25 ° C ~ 70 ° C

Humidity

10% ~ 90% ( non-condensing )

Max. Power

15 Watt

Dimension

L273 * W166 * H44.6 ( mm )

Power

AC 100~240V, 50/60Hz

Conventional firewalls are bind to today’s attacks, and also cannot detect inappropriate e-mail and Web content. The most common solution is a complex, costly collection of independent systems to deal with each of these threats along with network-level intrusions and attacks.

Figure 1. Front Panel

Network-level Protection

Conventional way to protect against virus or malicious program, requires each host to install software on the host. To install software on a large number of hosts is a time consuming process. To evaluate the vulnerabilities, both scan engine and database of virus pattern need constant upgrade. It is very costly and annoying for IT personnel with high maintenance. VigorPro 5510 works as firewall as well as Internet gateway, it will block any attacks at the point of network entry. Through the web user interface, the network administrator can monitor and instruct the VigorPro 5510 to look for all hosts inside network edge before threats intrude.

Figure 2. Network-level Protection

Hardware-accelerated, Real-time Response

The VigorPro 5510 employs an unique, hardware-accelerated architecture that provides the ability to perform real-time security without slowing down critical network applications, such as Web traffic. Software-based anti-virus solutions, which are designed for scanning non-real-time email messages, are too slow to be used to scan Web traffic or other real-time network applications.

Figure 3. Hardware-accelerated, Real-time Response

Content-based Inline Inspection

Conventional firewalls only inspect packets connection behavior to against any connection-based attack. While the content-based threats today. such as virus, worms, Trojans or banned content, which spread faster and do more damage. Conventional firewalls bypass the widely spread content-based threat and expose internal network to outside world. VigorPro5500 deploys DrayTek’s unique MSSI. ( Multi-stack Stateful Inspection) mechanism. With MSSI. , VigorPro5500 inspects packet streams, compares any suspected content or behavior with build-in database in real-time, and provide inline anti-virus and anti-intrusion protection.

Figure 4. Content-based Inline Inspection

3G Application

DrayTek supports 3G HSDPA USB Modem via USB port of VigorPro 5510 from firmware version V3.2.2 and above. It is a good application for the mobile sharing environment.

For 3G mobile communication through Access Point is popular more and more, VigorPro 5510 adds the function of 3G network connection for such purpose. By connecting 3G USB Modem to the USB port of VigorPro 5510, it can support HSDPA/UMTS/EDGE/GPRS/GSM and the future 3G standard ( HSDPA, etc ). VigorPro 5510 with 3G USB Modem allows you to receive 3G signals at any place such as your car or certain location holding outdoor activity and share the bandwidth for using by more people. Users can use four LAN ports on the router to access Internet.

Figure 5. 3G Application

Technical Specifications of VigorPro 5510
Hardware Interface

WAN

2x 10/100 Base-Tx RJ-45 ports

LAN

5x 10/100/1000 Base-Tx RJ-45 ports

USB

1x USB for connecting to USB printer or 3G USB Modem

Anti-Virus

File Filter

Defense Viruses, Worms and Trojan

Scan SMTP

Scan POP3

Scan HTTP

Scan IMAP

Scan FTP

Scan ZIP / GZIP / BZIP2

Scan Built-in VPN Tunnels

Automatic update latest virus signature to device

Automatic alert for signature update service expiry

Real-time Syslog / Mail Alert for the virus detection

Anti-Intrusion

Rule-based Detection List

Pass / Disallow / Reset while Intrusion is Detected

Automatic update latest intrusion signature to device

Automatic alert when signature update service expired

Real-time Syslog / Mail Alert when attacked

Anti-Spam

Real-time scan SMTP, POP3

Automatic alert when license expired

Real-time syslog alert when spam is detected

Multi Language Detection

Multi Type ( graphic, document, HTML ) Detection

Single / Double byte Coding Detection

No User Limitation

Black / White List

Dual-WAN

Outbound Policy-based Load-balance

BoD ( Bandwidth on Demand )

WAN Connection Fail-over

VPN

Up to 200 VPN Tunnels

LAN-to-LAN, Teleworker-to-LAN

DHCP over IPSec

NAT-Traversal ( NAT-T )

Dead Peer Detection ( DPD )

VPN Pass-through

Protocol

PPTP

IPSec

L2TP

L2TP over IPSec

Encryption

MPPE

Hardware-based AES / DES / 3DES

Authentication

Hardware-based MD5

SHA-1

IKE authentication

Pre-shared Key

Digital Signature ( X.509 )

SSL VPN

Web Application

Firewall

Transparent Mode

Multi-NAT, DMZ Host, Port-redirection and Open Port

Policy-based Firewall

SPI ( Stateful Packet Inspection )

DoS / DDoS Prevention

IP Address Anti-spoofing

E-Mail Alert and Logging via Syslog

Bind IP to MAC Address

Time Schedule Control

CSM

URL Content Filter ( White List and Black List )

Java Applet, Cookies, Active X, Compressed, Executable, Multimedia File Blocking

Web Content Filter ( SurfControl )

IM / P2P Blocking

Time Schedule Control

Network Features

DHCP Client / Relay / Server

Dynamic DNS

NTP Client

Call Scheduling

RADIUS Client

DNS Cache / Proxy

UPnP

Routing Protocol

Static Routing

RIP V2

IGMPv2 Proxy

Network Management

Web-based User Interface ( HTTP / HTTPS )

Quick Start Wizard

CLI ( Command Line Interface, Telnet / SSH * )

Administration Access Control

Configuration Backup / Restore

Built-in Diagnostic Function

Firmware Upgrade via TFTP / FTP

Logging via Syslog

SNMP Management with MIB-II

Bandwidth Management

Class-based Bandwidth Guarantee by User-defined Traffic Categories

DiffServ Code Point Classifying

4-level Priority for Each Direction ( Inbound / Outbound )

Bandwidth Borrowed

Bandwidth / Session Limitation

Temperature

Operating : 0 ° C ~ 45 ° C

Storage : -25 ° C ~ 70 ° C

Humidity

10% ~ 90% ( non-condensing )

Max. Power

15 Watt

Dimension

L273 * W166 * H44.6 ( mm )

Power

AC 100~240V, 50/60Hz

Conventional firewalls are bind to today’s attacks, and also cannot detect inappropriate e-mail and Web content. The most common solution is a complex, costly collection of independent systems to deal with each of these threats along with network-level intrusions and attacks.

Figure 1. Front Panel

Network-level Protection

Conventional way to protect against virus or malicious program, requires each host to install software on the host. To install software on a large number of hosts is a time consuming process. To evaluate the vulnerabilities, both scan engine and database of virus pattern need constant upgrade. It is very costly and annoying for IT personnel with high maintenance. VigorPro 5510 works as firewall as well as Internet gateway, it will block any attacks at the point of network entry. Through the web user interface, the network administrator can monitor and instruct the VigorPro 5510 to look for all hosts inside network edge before threats intrude.

Figure 2. Network-level Protection

Hardware-accelerated, Real-time Response

The VigorPro 5510 employs an unique, hardware-accelerated architecture that provides the ability to perform real-time security without slowing down critical network applications, such as Web traffic. Software-based anti-virus solutions, which are designed for scanning non-real-time email messages, are too slow to be used to scan Web traffic or other real-time network applications.

Figure 3. Hardware-accelerated, Real-time Response

Content-based Inline Inspection

Conventional firewalls only inspect packets connection behavior to against any connection-based attack. While the content-based threats today. such as virus, worms, Trojans or banned content, which spread faster and do more damage. Conventional firewalls bypass the widely spread content-based threat and expose internal network to outside world. VigorPro5500 deploys DrayTek’s unique MSSI. ( Multi-stack Stateful Inspection) mechanism. With MSSI. , VigorPro5500 inspects packet streams, compares any suspected content or behavior with build-in database in real-time, and provide inline anti-virus and anti-intrusion protection.

Figure 4. Content-based Inline Inspection

3G Application

DrayTek supports 3G HSDPA USB Modem via USB port of VigorPro 5510 from firmware version V3.2.2 and above. It is a good application for the mobile sharing environment.

For 3G mobile communication through Access Point is popular more and more, VigorPro 5510 adds the function of 3G network connection for such purpose. By connecting 3G USB Modem to the USB port of VigorPro 5510, it can support HSDPA/UMTS/EDGE/GPRS/GSM and the future 3G standard ( HSDPA, etc ). VigorPro 5510 with 3G USB Modem allows you to receive 3G signals at any place such as your car or certain location holding outdoor activity and share the bandwidth for using by more people. Users can use four LAN ports on the router to access Internet.

Figure 5. 3G Application

Additional information

Weight 2 lbs
Dimensions 5 × 5 × 5 in