XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Unified Threat Management UTM | IEImil

Unified Threat Management UTM

Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security related services and infrastructure components through a single management console. The principle advantage of a UTM product is its ability to reduce complexity.

Our UTM is all-in-one network security platform that provides various security services in the form of integrated and centralized service. This product place between local network and the public network such as internet and protect lo­cal network against cyber-attacks.

 

Specifications

Security:

- Stateful firewall (stateful packet filter)

- Intrusion detection and prevention systems(IDS,IPS)

- VPN (IPsec)

- Automated key management(IKE V2/V3)

- Layer 3 dedicated tunneling

- High availability(Active-Passive)

- Ability to operate at network layer 2 and 3

- Native Security token

- Native encryption algorithm

- Native authentication protocols

Network:

- Bandwidth management(sharing, shaping)

- Static and dynamic routing(OSPF,RIP)

- Using in bridge mode

- VLAN 802.1q

- PPPoE

- DHCP Server

- DNS Forwarder

Reporting:

- Incident report

- Type and number of happened attack

- systems under attack

- The protocol used in the attacks

- Active sessions

- System’s resource consumption

- Statistical data about performance of the firewall

- Statistical information of the network traffic

Events:

- Record events related to the attack

- Record system and security events

- Sending ability to foreign syslog server

- Archiving facility

- Export ability

System:

- The graphical management console

- Command based management console

- Return to factory settings

- Setting support system

- Synchronization with time server