Professional Documents
Culture Documents
ISP 3
ADSL 512k/512k
ISP 2
ISP 3
Internet
WWW
ISP 2
automatically redirect the traffic on that line to an active working line. This entire process is done without any human involvements. By doing so, PowerStation not only lessens the system and network administrators' burden, but also ensures the enterprise will always be connected.
ISP 1
ISP 2
ISP 3
ISP 1
Internet
WWW
ISP 2
b We
Mail
FP T
ISP 2
Internet
ISP 3
machine fails, the passive machine immediately becomes active and takes over all the jobs performed by the failed primary active machine.
Passive Mode
Active Mode
Internet
Internet
Cache of Proxy
WWW
IPSec Tunnel PPTP Tunnel Remote Client B Internet PPTP Tunnel Remote Client C
Office B
Internet
Router
Router
Office B
VPN Tunnel
Office A
Office B
Attacker
Log Server
PowerStation Specification
Bandwidth Management
All types of broadband connections: T1, E1, ADSL, ethernet. Outbound Load Balancing. Inbound Load Balancing. Outbound / Inbound Fault Tolerance. Flexible Policy Routing for network services. Guaranteed QoS. Multiple static Routing Rules for customizable best paths. Virtual network card that facilitates up to 20 ~ 50 external connections.
Firewall Function
Dynamic Packet Filtering and Stateful Inspection. Configurable LAN, WAN, DMZ, VPN. Web-based configuration GUI encrypted by SSL (128 bits). Web-based or Command-Line configuration interface. TCP/IP connection inspection, including protocol such as TCP UDP ICMP etc. , , ... Configurable Screened Subnet as a buffer zone between the internal and external network. Anti-Network Attacks. Built-in Network Intrusion Detection System. NAT Policy Filtering specific at source, destination and network protocol. Concurrent session:196,000 Mbps ;Throughput: 190Mbps ;VPN:25 Mbps
VPN
PPTP Tunnel: EClient-side authentication mechanism: PAP CHAP MS-CHAP MS-CHAP2. , , , EStrong data encryption: MPPE (40, 128 bits). EOperating systems: Windows 9x, Windows Me, Windows 2000, Windows XP . PSec Tunnel: EData signature algorithm: MD-5, SHA-1. EData encryption algorithm: 3DES (168 bits). VPN Aggregation: Load balance between VPN.
Others
English menus, Traditional Chinese, and Simplified Chinese.
Unlimited users license. High Availability Optional PStop "Inappropriate Webpage Filtering System" (Web Filter). Public IP NAT Pass-Through. Smart NAT. Dynamic Host Configuration Protocol DHCP . Configurable network components and unlimited hierarchical group definition. Mail Alert and SMS transmission.(optional) URL Filtering and configurable limit for uploading and downloading file size. Built-in DNS Server and DNS Proxy Server. Policy validation to ensure no conflicting policies in presence.
Intrusion Detection
Detailed history recording: including the source IP address, destination IP address, network protocol and time of an illegal intrusion.
Hardware Specification
Network Ports: Many 10/100 Mbps high-speed Ethernet interface or optional Gigabit interfaces. Gigabit interfaces can be installed with two fiberoptic single mode or multi mode interfaces, or RJ45 (Cat 6). Serial Port: one for console and one for HA connection. System Status LEDs: Power, Connection port status. Dimensions: Standard 19-inches rack mounted model 1U.
HGiga Inc.
http://www.hgiga.com
March, 2004