Developed in accordance with5651 law legislation and network cyber security solutions for small or medium enterprises.
Memory: 2 GB RAM
Disc: 4 GB CF
6 pieces of 10/100/1000 Ethernet ports
Firewall Throughput (TCP) (Mbps): 2250
URL Throughput (Mbps): 400
Concurrent session: 400000
IPSec Throughput (Mbps): 175
Antivirus Throughput (Mbps): 300
Dimensions: 232mm x 153mm x 44mm
Weight: 4 kg
Operating temperature: 0 ~ 40 ° C (32 ~ 104 ° F)
Humidity: 10 ~ 85%
Certification: CE / FCC
It controls your incoming and outgoing network traffic, preventing unauthorized or unwanted access to your computer or computer network in a variety of ways.It forms the basic function of cyber security.
Recognizes internal and external attacks and blocks them in real time.
Allows Internet users to audit their entries, report them, or restrict them to rules. Provides efficient use of internet resources.
It ensures secure and encrypted flow of traffic between endpoints. It ensures the safety of traffic at the communication points of the companies.
It provides secure and encrypted access to the system from any computer or mobile device. It gives mobility to companies.
Recognizes signature-based malware without entering it and prevents it from spreading in the system.
Creates time-stamped records that the law requires.
It provides control and blocking of undesirable or restricted web applications, especially in the internet environment.
Allows simultaneous use of multiple Internet connections or backed-up usage.