Subscribe
  • Home
  • /
  • Channel
  • /
  • DrayTek VigorPro 5510 Unified Security Firewall now available

DrayTek VigorPro 5510 Unified Security Firewall now available


Johannesburg, 15 May 2008

Local DrayTek distributor Network Platforms has announced the release of the DrayTek VigorPro 5510 Security Firewall featuring unified threat management (UTM) that protects networks from threats at the point of entry.

The VigorPro 5510 offers a complete security solution incorporating standard firewalling, anti-virus, anti-spam, anti-intruder, load-balancing and content filtering and also includes three years of DrayTek anti-virus/anti-intrusion updates. One can also add optional Web-content filtering and anti-spam measures.

Combined with prudent personnel policies, the DrayTek VigorPro 5510 enables companies to provide far stronger protection and detection than with simpler firewalls. VPN facilities also make the DrayTek VigorPro 5510 ideal for remote offices and teleworkers.

The DrayTek VigorPro 5510 also provides two WAN ports, allowing load balancing and bandwidth aggregation across two separate WAN feeds, or one can use the secondary WAN port as a backup on another feed in case the first Internet feed (eg, broadband connection) fails. In summary, the Draytek VigorPro 5510 provides networks with far greater security, productivity and resilience.

Network Platforms managing director Bradley Love says security appliances are a great idea for smaller businesses as they offer a simple drop-in solution that protects an entire local network.

"These unified threat management boxes provide a full range of security services, but although initial costs can look very reasonable many incur high yearly subscription charges, which reduce their value in the long-term. Draytek aims to buck the trend as its latest VigorPro 5510 offers the full gamut of security measures but only asks modest yearly subscription fees."

The DrayTek VigorPro 5510 offers a quintet of Gigabit LAN ports teamed up with a pair of Fast Ethernet WAN ports. Four options are provided for one`s Internet connection where two WAN ports can be joined together for failover or policy-based load balancing. Alternatively, the second WAN port can be used as a standby connection in case the primary link fails or one can activate it only when traffic levels peak. The USB port at the front offers more options, one can network a printer from the appliance or use a USB 3G modem as the secondary WAN connection.

DrayTek`s Web interface is well designed and intuitive and kicks off with a quick start wizard that takes users through defining their Internet connection.

Love says the DrayTek VigorPro 5510 provides many different types of threat detection and protection, each protection method covering one or more of the attack types. "However, border control is not the complete solution - any installation should be coupled with staff or household policies to protect data and hardware physically too, but the Vigor`s extensive range of protection methods goes a great way in helping to protect ones network, data and resources."

The DrayTek VigorPro 5510 will decode each of these sequential methods in real-time using DrayTek`s patent-pending Multi-Stack Stateful Inspection (MSSI). With MSSI, separate protocol stacks take care of each layer which allows for varied protocols and cross-packet inspection (where content is fragmented in transit). Most importantly, MSSI scans data inline in real time - there is no proxy and no file size limitation and thanks to the dedicated CICP (Content Inspection Co-Processor), active scanning adds no processing overhead to the DrayTek VigorPro 5510`s main CPU.

The DrayTek VigorPro 5510`s features include:

* Anti-virus, anti-intrusion and anti-Trojan protection
* Includes three years of DrayTek anti-virus/anti-intrusion signature updates
* DrayTek Labs or optional Kapersky
* Labs anti-virus updates
* Anti-spam - detects and blocks incoming spam e-mail
* Deep packet inspection with DrayTek MSSI
* Load balancing between WAN ports
* Intrusion detection and prevention (inline, real-time)
* Dos/DDos protection
* Stateful packet inspection
* VPN - Up to 200 concurrent tunnels
* WAN failover/backup via secondary Ethernet port
* 3G (cellular network) USB modem connectivity for WAN backup
* QoS (quality of service) assurance
* Parental control/categorical Web site filtering
* Web content filtering
* Time schedule access/filtering
* Comprehensive Reporting/Logging Mechanisms
* Dedicated Draytek VigorPro R&D team (D-SWAT) and Web Site
* Five Gigabit Ethernet LAN ports

The DrayTek VigorPro 5510 scans connections for any virus or Trojan signatures. On detecting a virus, the Draytek VigorPro 5510 will destroy it; if the virus is in an e-mail (IMAP/POP3/SMTP) that e-mail is destroyed. If the virus is in a downloaded file (FTP/HTTP) then that file is destroyed. The DrayTek VigorPro 5510`s response can be recorded via syslog. Instead of destroying the virus, the current connection can be reset, or even no action taken (other than logging), depending on ones preferences. Where an e-mail file attachment has been removed, or destroyed, it is replaced with a harmless dummy file so that it is evident that something has been removed.

The DrayTek VigorPro 5510 stores the current library of known threats. This is updated automatically by the DrayTek VigorPro 5510 whenever a new signature library is available in order that your DrayTek VigorPro 5510 is kept up-to-date. On purchasing the product, one receives a 12-month anti-virus/anti-intrusion update from DrayTek Labs (D-SWAT Team). As an option, one can select Kapersky Labs virus signature file as an alternative at additional cost.

Love says spam (unsolicited bulk e-mail) is one of the most serious threats to e-mail productivity and also Internet bandwidth usage. "It is estimated that a staggering 90 billion spam e-mails are sent every day and that over 80% of all e-mail sent across the Internet is spam. One cannot stop it being sent, so intercepting or identifying it before it reaches ones PC, at least reduces one`s wasted time, processing and annoyance."

"If you have multiple Internet feeds, you can connect both of them to the DrayTek VigorPro 5510 to provide greater total bandwidth by using both at once; this uses load balancing to distribute the traffic evenly across both feeds, or you can set an uneven ratio. With failover backup, the secondary connection is normally inactive but is used automatically in the event of the primary connection failing. Bandwidth-on-demand (BoD) is where the second WAN interface is used whenever the first WAN interface exceeds preset throughput thresholds. This flexible dual-WAN facility provides redundancy and fault tolerance to your mission-critical network," he concludes.

Main specifications:

* Security firewall with dedicated UTM Co-processor
* Unified threat management
* Scans in real-time (no proxy) including inside compressed files
* Scans inbound and outbound data packets and cross-packet boundary scanning
* Anti-virus - Scanning of recognised signatures
* Anti-spam - Detects incoming spam e-mail received via POP3 or SMTP
* Intrusion detection featuring DrayTek`s MSSI (Multi-Stack Stateful Inspection)
* DoS (denial of service) and DDoS attack blocking and detection
* Stateful packet inspection
* Deep packet inspection
* Blocking of non-HTTP content on Port 80 (switchable)
* DrayTek MSSI (Multi-Stack Stateful Scanning)
* IDP - inline intrusion detection system
* Unlimited file size scanning
* Rule-based packet filtering
* Selectable Web content filtering:
* Web URL keyword filtering - blacklist or whitelist of Web site URLs
* Block browsing by IP address
* Blocking download of Java applets and ActiveX controls
* Blocking of Web site cookies
* Block http downloads of file types:
* Binary executable: .EXE / .COM / .BAT / .SCR / .PIF
* Compressed: .ZIP / .SIT / .ARC / .CAB/. ARJ / .RAR
* Multimedia: .MOV / .MP3 / .MPEG / .MPG / .WMV / .WAV / .RAM / .RA / .RM / .AVI / .AU
* Time schedules for enabling/disabling the content restrictions
* Block P2P (peer-to-peer) file sharing programs
* Block instant messaging programs (eg, ICQ, MSN/Yahoo Messenger)
* Parental control using Surfcontrol Database - block/allow specific Web categories, for example block adult or uncategorised sites from your workplace or home
* Logging of Web activity to Syslog for audit trail purposes
* Automatic e-mailing to administrator of detected/foiled attacks/threats
* Secure (SSL) local and remote management and status monitoring
* Ethernet port mirroring for sniffing/diagnostic (VigorPro 5510 only)

Connectivity features include:

* Firewall throughput up to 90Mb/s
* VPN throughput up to 50Mb/s
* Twin-WAN ports:
* Load-balancing - Connect two broadband feeds and distribute your traffic between them either automatically or according to your chosen rule-set.
* Redundant failover - switch to secondary feed when primary fails
* Bandwidth-on-demand (BoD)- use secondary WAN based on demand
* Ethernet LAN ports with auto-crossover/uplink
* Four flexible LAN ports:
* VLAN - Segment ports into inclusive or exclusive groups
* Five Gigabit Ethernet LAN ports (VigorPro5510 only)
* 10/100BaseT with auto-crossover/uplink
* VPN features
* Up to 200 simultaneous VPN tunnels (VigorPro5510 only)
* Dial-in or dial-out, LAN-to-LAN or Teleworker-to-LAN
* Protocol support for PPTP, L2TP, IPSec, L2TP over IPSec
* MD-5 and SHA-1 authentication (hardware processed)
* Encryption: MPPE, DES/3DES & AES
* PFS (Perfect Forward Secrecy)
* Pre-shared/IKE keying and PKI (X.509) certificate support
* IKE Phase 1 aggressive/standard modes and phase two selectable lifetimes
* Radius support for dial-in teleworker profiles
* Compatible with other leading third-party vendor VPN devices
* Quality of service assurance
* Guarantee available bandwidth for priority services
* For example, ensure VOIP traffic always has bandwidth available
* Class-based policy by user-defined traffic categories
* Support for DiffServ CodePoint classifying

For more information, visit www.networkplatforms.co.za or contact Network Platforms on 0861 112 129.

Share

Network Platforms

Established in 2003, Network Platforms offers everything from IT support, Internet connectivity, hosting and Web design. The company strives to be a "one-stop shop" where it takes care of all its clients IT needs, allowing clients the peace of mind of using one IT specialist company rather than having to deal with multiple companies.

Network Platforms specialises in VPN and VOIP data services for inter-branch communications. It offers a free network evaluation to address vulnerabilities in the infrastructure which includes network security, Internet connectivity, data backups and anti-virus/anti-spyware.

The company takes advantage of existing technologies to improve and save its clients money. Network Platforms offers remote and onsite support with a customisable service level agreement.

Geographically, Network Platforms has regional offices in Johannesburg, Cape Town and Durban and it has partners across the country.

It is currently implementing a monitoring system which will be available to clients on a service level agreement. Network Platforms will monitor its clients` networks remotely and the call centre will be notified by SMS and e-mail should any irregularities appear.

Network Platforms represents all major brands in the laptop, PC, printer and servers arena. It also specialises in implementing servers from both Unix/Linux and Microsoft-based networks.

Editorial contacts

Ivor van Rensburg
IT Public Relations
(082) 652 8050
ivor@itpr.co.za