Draytek Vigorpro 5510G Unified Threat Management
$760.00
In stock
Description
1. Anti-Virus
* File Filter
* Defense Viruses, Worms and Trojan
* Scan SMTP
* Scan POP3
* Scan HTTP
* Scan IMAP
* Scan FTP
* Scan ZIP / GZIP / BZIP2
* Scan Built-in VPN Tunnels
* Automatic update latest virus signature to device
* Automatic alert when signature update service expiry
* Real-time Syslog / Mail Alert for the virus detection
2. Anti-Intrusion
* Rule-based Detection List
* Pass / Disallow / Reset while Intrusion is Detected
* Automatic update latest intrusion signature to device
* Automatic alert when signature update service expired
* Real-time Syslog / Mail Alert when attacked
3. Anti-Spam
* Real-time scan SMTP, POP3
* Automatic alert when license expired
* Real-time syslog alert when spam is detected
* Multi Language Detection
* Multi Type ( graphic, document, HTML ) Detection
* Single / Double byte Coding Detection
* No User Limitation
* Black / White List
4. Dual-WAN
* Outbound Policy-based Load-balance
* BoD ( Bandwidth on Demand )
* WAN Connection Fail-over
5. VPN
* Up to 200 VPN Tunnels
* Protocol : PPTP, IPSec, L2TP, L2TP over IPSec
* Encryption : MPPE and Hardware-based AES / DES / 3DES
* Authentication : Hardware-based MD5, SHA-1
* IKE Authentication : Pre-shared Key and Digital Signature ( X.509 )
* LAN-to-LAN, Teleworker-to-LAN
* DHCP over IPSec
* NAT-Traversal ( NAT-T )
* Dead Peer Detection ( DPD )
* VPN Pass-through
6. SSL VPN
* Web Application
7. Firewall
* Transparent Mode
* CSM ( Content Security Management )
o URL Content Filter ( White List and Black List )
o Java Applet, Cookies, Active X, Compressed, Executable, Multimedia File Blocking
o Web Content Filter ( SurfControl )
o IM / P2P Blocking
o Time Schedule Control
* Multi-NAT, DMZ Host, Port-redirection and Open Port
* Policy-based Firewall
* SPI ( Stateful Packet Inspection )
* DoS / DDoS Prevention
* IP Address Anti-spoofing
* E-Mail Alert and Logging via Syslog
* Bind IP to MAC Address
* Time Schedule Control
8. USB
* 3G USB Modem
* USB Printer
9. Network Features
* DHCP Client / Relay / Server
* Dynamic DNS
* NTP Client
* Call Scheduling
* RADIUS Client
* DNS Cache / Proxy
* UPnP
* Routing Protocol : Static Routing , RIP V2
* IGMPv2 Proxy
10. Network Management
* Web-based User Interface ( HTTP / HTTPS )
* Quick Start Wizard
* CLI ( Command Line Interface, Telnet / SSH * )
* Administration Access Control
* Configuration Backup / Restore
* Built-in Diagnostic Function
* Firmware Upgrade via TFTP / FTP
* Logging via Syslog
* SNMP Management with MIB-II
11. Bandwidth Management
* Class-based Bandwidth Guarantee by User-defined Traffic Categories
* DiffServ Code Point Classifying
* 4-level Priority for Each Direction ( Inbound / Outbound )
* Bandwidth Borrowed
* Bandwidth / Session Limitation
Technical Specifications of VigorPro 5510
Hardware Interface
WAN
2x 10/100 Base-Tx RJ-45 ports
LAN
5x 10/100/1000 Base-Tx RJ-45 ports
USB
1x USB for connecting to USB printer or 3G USB Modem
Anti-Virus
File Filter
Defense Viruses, Worms and Trojan
Scan SMTP
Scan POP3
Scan HTTP
Scan IMAP
Scan FTP
Scan ZIP / GZIP / BZIP2
Scan Built-in VPN Tunnels
Automatic update latest virus signature to device
Automatic alert for signature update service expiry
Real-time Syslog / Mail Alert for the virus detection
Anti-Intrusion
Rule-based Detection List
Pass / Disallow / Reset while Intrusion is Detected
Automatic update latest intrusion signature to device
Automatic alert when signature update service expired
Real-time Syslog / Mail Alert when attacked
Anti-Spam
Real-time scan SMTP, POP3
Automatic alert when license expired
Real-time syslog alert when spam is detected
Multi Language Detection
Multi Type ( graphic, document, HTML ) Detection
Single / Double byte Coding Detection
No User Limitation
Black / White List
Dual-WAN
Outbound Policy-based Load-balance
BoD ( Bandwidth on Demand )
WAN Connection Fail-over
VPN
Up to 200 VPN Tunnels
LAN-to-LAN, Teleworker-to-LAN
DHCP over IPSec
NAT-Traversal ( NAT-T )
Dead Peer Detection ( DPD )
VPN Pass-through
Protocol
PPTP
IPSec
L2TP
L2TP over IPSec
Encryption
MPPE
Hardware-based AES / DES / 3DES
Authentication
Hardware-based MD5
SHA-1
IKE authentication
Pre-shared Key
Digital Signature ( X.509 )
SSL VPN
Web Application
Firewall
Transparent Mode
Multi-NAT, DMZ Host, Port-redirection and Open Port
Policy-based Firewall
SPI ( Stateful Packet Inspection )
DoS / DDoS Prevention
IP Address Anti-spoofing
E-Mail Alert and Logging via Syslog
Bind IP to MAC Address
Time Schedule Control
CSM
URL Content Filter ( White List and Black List )
Java Applet, Cookies, Active X, Compressed, Executable, Multimedia File Blocking
Web Content Filter ( SurfControl )
IM / P2P Blocking
Time Schedule Control
Network Features
DHCP Client / Relay / Server
Dynamic DNS
NTP Client
Call Scheduling
RADIUS Client
DNS Cache / Proxy
UPnP
Routing Protocol
Static Routing
RIP V2
IGMPv2 Proxy
Network Management
Web-based User Interface ( HTTP / HTTPS )
Quick Start Wizard
CLI ( Command Line Interface, Telnet / SSH * )
Administration Access Control
Configuration Backup / Restore
Built-in Diagnostic Function
Firmware Upgrade via TFTP / FTP
Logging via Syslog
SNMP Management with MIB-II
Bandwidth Management
Class-based Bandwidth Guarantee by User-defined Traffic Categories
DiffServ Code Point Classifying
4-level Priority for Each Direction ( Inbound / Outbound )
Bandwidth Borrowed
Bandwidth / Session Limitation
Temperature
Operating : 0 ° C ~ 45 ° C
Storage : -25 ° C ~ 70 ° C
Humidity
10% ~ 90% ( non-condensing )
Max. Power
15 Watt
Dimension
L273 * W166 * H44.6 ( mm )
Power
AC 100~240V, 50/60Hz
Conventional firewalls are bind to today’s attacks, and also cannot detect inappropriate e-mail and Web content. The most common solution is a complex, costly collection of independent systems to deal with each of these threats along with network-level intrusions and attacks.
Figure 1. Front Panel
Network-level Protection
Conventional way to protect against virus or malicious program, requires each host to install software on the host. To install software on a large number of hosts is a time consuming process. To evaluate the vulnerabilities, both scan engine and database of virus pattern need constant upgrade. It is very costly and annoying for IT personnel with high maintenance. VigorPro 5510 works as firewall as well as Internet gateway, it will block any attacks at the point of network entry. Through the web user interface, the network administrator can monitor and instruct the VigorPro 5510 to look for all hosts inside network edge before threats intrude.
Figure 2. Network-level Protection
Hardware-accelerated, Real-time Response
The VigorPro 5510 employs an unique, hardware-accelerated architecture that provides the ability to perform real-time security without slowing down critical network applications, such as Web traffic. Software-based anti-virus solutions, which are designed for scanning non-real-time email messages, are too slow to be used to scan Web traffic or other real-time network applications.
Figure 3. Hardware-accelerated, Real-time Response
Content-based Inline Inspection
Conventional firewalls only inspect packets connection behavior to against any connection-based attack. While the content-based threats today. such as virus, worms, Trojans or banned content, which spread faster and do more damage. Conventional firewalls bypass the widely spread content-based threat and expose internal network to outside world. VigorPro5500 deploys DrayTek’s unique MSSI. ( Multi-stack Stateful Inspection) mechanism. With MSSI. , VigorPro5500 inspects packet streams, compares any suspected content or behavior with build-in database in real-time, and provide inline anti-virus and anti-intrusion protection.
Figure 4. Content-based Inline Inspection
3G Application
DrayTek supports 3G HSDPA USB Modem via USB port of VigorPro 5510 from firmware version V3.2.2 and above. It is a good application for the mobile sharing environment.
For 3G mobile communication through Access Point is popular more and more, VigorPro 5510 adds the function of 3G network connection for such purpose. By connecting 3G USB Modem to the USB port of VigorPro 5510, it can support HSDPA/UMTS/EDGE/GPRS/GSM and the future 3G standard ( HSDPA, etc ). VigorPro 5510 with 3G USB Modem allows you to receive 3G signals at any place such as your car or certain location holding outdoor activity and share the bandwidth for using by more people. Users can use four LAN ports on the router to access Internet.
Figure 5. 3G Application
Technical Specifications of VigorPro 5510
Hardware Interface
WAN
2x 10/100 Base-Tx RJ-45 ports
LAN
5x 10/100/1000 Base-Tx RJ-45 ports
USB
1x USB for connecting to USB printer or 3G USB Modem
Anti-Virus
File Filter
Defense Viruses, Worms and Trojan
Scan SMTP
Scan POP3
Scan HTTP
Scan IMAP
Scan FTP
Scan ZIP / GZIP / BZIP2
Scan Built-in VPN Tunnels
Automatic update latest virus signature to device
Automatic alert for signature update service expiry
Real-time Syslog / Mail Alert for the virus detection
Anti-Intrusion
Rule-based Detection List
Pass / Disallow / Reset while Intrusion is Detected
Automatic update latest intrusion signature to device
Automatic alert when signature update service expired
Real-time Syslog / Mail Alert when attacked
Anti-Spam
Real-time scan SMTP, POP3
Automatic alert when license expired
Real-time syslog alert when spam is detected
Multi Language Detection
Multi Type ( graphic, document, HTML ) Detection
Single / Double byte Coding Detection
No User Limitation
Black / White List
Dual-WAN
Outbound Policy-based Load-balance
BoD ( Bandwidth on Demand )
WAN Connection Fail-over
VPN
Up to 200 VPN Tunnels
LAN-to-LAN, Teleworker-to-LAN
DHCP over IPSec
NAT-Traversal ( NAT-T )
Dead Peer Detection ( DPD )
VPN Pass-through
Protocol
PPTP
IPSec
L2TP
L2TP over IPSec
Encryption
MPPE
Hardware-based AES / DES / 3DES
Authentication
Hardware-based MD5
SHA-1
IKE authentication
Pre-shared Key
Digital Signature ( X.509 )
SSL VPN
Web Application
Firewall
Transparent Mode
Multi-NAT, DMZ Host, Port-redirection and Open Port
Policy-based Firewall
SPI ( Stateful Packet Inspection )
DoS / DDoS Prevention
IP Address Anti-spoofing
E-Mail Alert and Logging via Syslog
Bind IP to MAC Address
Time Schedule Control
CSM
URL Content Filter ( White List and Black List )
Java Applet, Cookies, Active X, Compressed, Executable, Multimedia File Blocking
Web Content Filter ( SurfControl )
IM / P2P Blocking
Time Schedule Control
Network Features
DHCP Client / Relay / Server
Dynamic DNS
NTP Client
Call Scheduling
RADIUS Client
DNS Cache / Proxy
UPnP
Routing Protocol
Static Routing
RIP V2
IGMPv2 Proxy
Network Management
Web-based User Interface ( HTTP / HTTPS )
Quick Start Wizard
CLI ( Command Line Interface, Telnet / SSH * )
Administration Access Control
Configuration Backup / Restore
Built-in Diagnostic Function
Firmware Upgrade via TFTP / FTP
Logging via Syslog
SNMP Management with MIB-II
Bandwidth Management
Class-based Bandwidth Guarantee by User-defined Traffic Categories
DiffServ Code Point Classifying
4-level Priority for Each Direction ( Inbound / Outbound )
Bandwidth Borrowed
Bandwidth / Session Limitation
Temperature
Operating : 0 ° C ~ 45 ° C
Storage : -25 ° C ~ 70 ° C
Humidity
10% ~ 90% ( non-condensing )
Max. Power
15 Watt
Dimension
L273 * W166 * H44.6 ( mm )
Power
AC 100~240V, 50/60Hz
Conventional firewalls are bind to today’s attacks, and also cannot detect inappropriate e-mail and Web content. The most common solution is a complex, costly collection of independent systems to deal with each of these threats along with network-level intrusions and attacks.
Figure 1. Front Panel
Network-level Protection
Conventional way to protect against virus or malicious program, requires each host to install software on the host. To install software on a large number of hosts is a time consuming process. To evaluate the vulnerabilities, both scan engine and database of virus pattern need constant upgrade. It is very costly and annoying for IT personnel with high maintenance. VigorPro 5510 works as firewall as well as Internet gateway, it will block any attacks at the point of network entry. Through the web user interface, the network administrator can monitor and instruct the VigorPro 5510 to look for all hosts inside network edge before threats intrude.
Figure 2. Network-level Protection
Hardware-accelerated, Real-time Response
The VigorPro 5510 employs an unique, hardware-accelerated architecture that provides the ability to perform real-time security without slowing down critical network applications, such as Web traffic. Software-based anti-virus solutions, which are designed for scanning non-real-time email messages, are too slow to be used to scan Web traffic or other real-time network applications.
Figure 3. Hardware-accelerated, Real-time Response
Content-based Inline Inspection
Conventional firewalls only inspect packets connection behavior to against any connection-based attack. While the content-based threats today. such as virus, worms, Trojans or banned content, which spread faster and do more damage. Conventional firewalls bypass the widely spread content-based threat and expose internal network to outside world. VigorPro5500 deploys DrayTek’s unique MSSI. ( Multi-stack Stateful Inspection) mechanism. With MSSI. , VigorPro5500 inspects packet streams, compares any suspected content or behavior with build-in database in real-time, and provide inline anti-virus and anti-intrusion protection.
Figure 4. Content-based Inline Inspection
3G Application
DrayTek supports 3G HSDPA USB Modem via USB port of VigorPro 5510 from firmware version V3.2.2 and above. It is a good application for the mobile sharing environment.
For 3G mobile communication through Access Point is popular more and more, VigorPro 5510 adds the function of 3G network connection for such purpose. By connecting 3G USB Modem to the USB port of VigorPro 5510, it can support HSDPA/UMTS/EDGE/GPRS/GSM and the future 3G standard ( HSDPA, etc ). VigorPro 5510 with 3G USB Modem allows you to receive 3G signals at any place such as your car or certain location holding outdoor activity and share the bandwidth for using by more people. Users can use four LAN ports on the router to access Internet.
Figure 5. 3G Application
Additional information
Weight | 2 lbs |
---|---|
Dimensions | 5 × 5 × 5 in |