SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Astaro Security Gateway Overview




     Astaro
     Security Gateway

Delivering powerful, easy to use, and
affordable network protection
Enterprises are subject every day to a wide variety of Internet threats - hackers,
viruses, worms, spyware, spam, phishing, botnets, Trojans, application exploits, and
identity and information theft. These can infect computers, reduce productivity, and
increase costs.
Traditional firewalls and intrusion protection products filter network traffic, but are
not designed to protect against these new content-based attacks.
The Astaro Security Gateway, based on Astaro's award-winning Astaro Security
Linux, provides a complete package of perimeter security applications. This package
is powerful, easy to manage, and affordable.                                                       Web
                                                                                                   Security
                                                                        Network
                                                                        Security




                                                                                            Email
                                                                                            Security

Unified Threat Management
The Astaro Security Gateway, available as appliances and as software,
integrates nine security applications:


Web Security                                Email Security                                Network Security
N Spyware Protection blocks                 N Virus Protection for Email catches          N Intrusion Protection detects and
  incoming spyware, adware and other          viruses in SMTP and POP3 emails and           blocks probes and application-based
  malicious applications, and prevents        attachments, even in compressed and           attacks using heuristics, anomaly
  them from sending out confidential          archived formats.                             detection, and pattern-based
  information.                              N Spam Protection uses eight                    techniques.
N Virus Protection for the Web                different techniques to filter out spam     N Firewall, with stateful packet
  defends computers against virus             without stopping legitimate emails.           inspection and application-level
  infections from web downloads and         N Phishing Protection blocks emails             proxies, guards Internet communica-
  web-based email.                            from criminals trying to trick users          tions traffic in and out of the
N Content Filtering can block Internet        into revealing confidential                   organization.
  access to 60 categories of web sites        information.                                N Virtual Private Network Gateway
  during working hours.                                                                     assures secure communications with
                                                                                            remote offices and “road warriors”.
Powerful and Cost-Effective
“The Astaro Security Gateway … is our top       The Astaro Security Gateway is the most feature-rich, sophisticated, yet easy-to-
choice among the products in this roundup:      manage network security product on the market:
It has an extremely well-rounded set of
                                                Powerful Security. The Astaro Security Gateway utilizes over 100,000 virus
features, the best-designed interface, and
                                                signatures, two independent virus scanning engines, more than 3,000 intrusion
the most valuable reporting for the
                                                protection rules, and a database of over 60 million web sites classified to identify
administrator”
                                                sources of spyware, spam, phishing attacks, and questionable or illegal content.
                                 PC Magazine
                                                No other product available protects against more threats.

“Once again, words almost fail us where this    Most Cost-Effective. Astaro's technology can be deployed and managed with
product is concerned. With more features        minimum effort. An award-winning user interface, efficient management tools,
than you can shake a stick at, this is a real   and an Internet-based update service, provide quick installation, real-time
winner”
                                                visibility into security threats, and simple administration.
                                 SC Magazine
                                                Best Design for the Future. The Astaro Security Gateway incorporates best of
                                                breed technologies from both open source projects and commercial vendors,
                                                which are integrated with Astaro's extensible Content Filtering Framework™. This
                                                open architecture allows Astaro to add new security technologies quickly as new
                                                types of security threats emerge.




                                                Easiest Configuration and Reporting
                                                With Astaro Security Gateway, one administrator can efficiently deploy and
                                                manage a complete security infrastructure.


                                                Simple Configuration                        Internet Updates
                                                Configuration is performed from a PC        Updates and new threat signatures can
                                                through an intuitive browser-based          be installed hourly, either automatically
                                                interface. No extra software needs to       or through a simple one-click process.
                                                be installed.                               This minimizes the window of opportu-
                                                Unified Reporting                           nity for potential threats.

                                                State-of-the-art reporting gives real-      Central Management
                                                time visibility of the security status of   Astaro offers two separate powerful
                                                the network.                                tools to manage large deployments:
                                                                                            Astaro Configuration Manager and
                                                                                            Astaro Report Manager.
Choice Between
                                 Appliance and Software
                                 Astaro provides the same features and capabilities in the Astaro Security Gateway
                                 appliances and in the Astaro Security Gateway software. Customers can mix and
                                 match both types in the same environment and use the same central manage-
       Astaro Security Gateway   ment tools with both.
       Appliances
                                 Appliances
                                 The Astaro Security Gateway appliances are reliable, high performance security
                                 devices that are extremely easy to deploy and manage. Astaro offers a full series
                                 of models to protect networks of all sizes.
                                 Software
                                 The Astaro Security Gateway software includes all the security applications of
Astaro Security Gateway
Software                         the Astaro Security Gateway appliances. It installs on Intel-compatible PCs and
                                 servers.



                                 Support and Training Services
                                 Astaro supports its customers with an outstanding services program.
                                 All Astaro products come with a 90-day software warranty and at least one year
                                 of hardware replacement. Customers can purchase support programs that include
                                 expedited replacement, email and telephone support, and 24-by-7 assistance.
                                 Astaro trains and certifies network administrators in brief web-based sessions,
                                 enabling them to become fully proficient in all aspects of Astaro's products.



                                 About Astaro
                                 Astaro was founded in 2000, with the goal of creating integrated, easy-to-use
                                 network security products. The company's leading Unified Threat Management
                                 product, Astaro Security Gateway, protects more than 25,000 customers, ranging
                                 from small businesses, to government and non-profit agencies, to global
                                 enterprises. Astaro's firewall is ICSA Labs certified. The company's technology
                                 has received recognition and awards such as Editors' Choice and Best
                                 Business Security Solution of the Year from PC Magazine, Best Security
                                 Solution from LinuxWorld Expo, 10 Stars and Test Center Recommended
                                 from CRN Magazine, Five Stars from SC Magazine, “Extremely Cost-Effective”
                                 from The Tolly Group, and “Excellent” from InfoWorld Magazine. Astaro is co-
                                 headquartered in Karlsruhe, Germany and Boston, United States, with offices and
                                 solutions partners in over 40 countries.
Astaro Security Gateway Overview


Technical Highlights
Web Security                                            N Time-based packet filter rules                      User Management
N High performance web proxy                            N Instant messaging and P2P Control                   N Local and remote users/groups
N Content filtering and monitoring against 60           N Worm and Botnet prevention                          N X.509 certificate/PKI support
  content categories                                    N Zero day intrusion prevention                       N Radius
N Blocking of incoming spyware downloads                N Anomaly detection                                   N SMB/Netbios
N Detection of outgoing spyware messages                N DoS/flood protection                                N Novell eDirectory
Email Security                                          N PPTP, L2TP and IPSec VPNs                           N LDAP
N Eight spam identification methods                     N Clientless Remote Access                            N Active Directory/NTLM
N Options to drop, flag or quarantine spam              Security Proxies                                      Networking
N Detection of phishing emails                          N HTTP/HTTPS                                          N Stateful high availability
N SMTP email encryption (TLS)                           N SMTP                                                N Transparent/bridging mode
N Quarantine management                                 N POP3                                                N Advanced routing
Virus Detection                                         N DNS                                                 N Bandwidth management
N Two independent virus scanning engines                N SIP, RTP                                            N Traffic shaping/QoS
N Scans emails and web file downloads                   N SOCKS                                               N Uplink redundancy
N Utilizes pattern matching, heuristics, and            Logging & Reporting                                   N VoIP support
  code emulation
                                                        N Web reports                                         Interface Support
Network Security
                                                        N Email reports                                       N 10/100/1000 Mbps Ethernet
N Stateful packet inspection firewall
                                                        N Real-time notification (Email/SNMP)                 N DSL, Cable, Modem
N Application-level deep packet inspection
                                                        N Remote Syslog                                       N VLAN

Specifications

                                                                           Appliances                                                        Software

                                 Astaro Security   Astaro Security        Astaro Security   Astaro Security   Astaro Security          Astaro Security
                                 Gateway 110       Gateway 120            Gateway 220       Gateway 320       Gateway 425              Gateway Software

 Form factor                     Desktop           Desktop                1U Rackmount      1U Rackmount      1U Rackmount                       ----

                                                                                                                                       Licenses available for
 Users                           10                Unrestricted           Unrestricted      Unrestricted      Unrestricted             10, 25, 50, 100, 250,
                                                                                                                                       500 or unlimited users

 Firewall throughput (Mbps)      100               100                    260               420               1 200
                                                                                                                                       Varies by capacity of
 VPN throughput (Mbps)           30                30                     150               200               265                      the system selected

 Concurrent connections          60 000            60 000                 400 000           550 000           700 000

 Policies                        Unrestricted      Unrestricted           Unrestricted      Unrestricted      Unrestricted             Unrestricted

 Memory                          256 MB            256 MB                 512 MB            1 GB              2 GB

 Hard drive                      20 GB             20 GB                  40 GB             74 GB             74 GB                    Runs on
                                                                                                                                       PC-compatible
 10/100 Ethernet ports           3                 3                      8                 4                 ----                     hardware

 10/100/1000 Ethernet ports      ----              ----                   ----              4                 8




Learn More
Download an evaluation copy of the Astaro Security Gateway software at
http://www.astaro.com or contact Astaro at:

The Americas                                            Europe, Middle East, Africa                           Asia Pacific Region
Astaro Corporation                                      Astaro AG                                             Astaro Corporation
3 New England Executive Park                            Amalienbadstrasse 36                                  30th Floor Bank of China Tower
Burlington, MA 01803                                    76227 Karlsruhe                                       1 Garden Road, Central
                                                                                                                                                                2005-10-01




USA                                                     Germany                                               Hong Kong, China
T: +1 781 345 5000                                      T: +49 721 255 16 0                                   T: +852 2251 8514
F: +1 781 345 5100                                      F: +49 721 255 16 200                                 F: +852 2251 8515
americas@astaro.com                                     emea@astaro.com                                       apac@astaro.com
Your Astaro Solutions Partner


                                                                                                                                        www.astaro.com
© 2005 Astaro AG. Subject to change without notice. Astaro, Astaro Security Gateway, Astaro Security Linux and Content Filtering Framework are
trademarks of Astaro AG. All other trademarks and registered trademarks are the property of their respective owners.

Contenu connexe

En vedette

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

En vedette (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Astaro Security Gateway data sheet

  • 1. Astaro Security Gateway Overview Astaro Security Gateway Delivering powerful, easy to use, and affordable network protection Enterprises are subject every day to a wide variety of Internet threats - hackers, viruses, worms, spyware, spam, phishing, botnets, Trojans, application exploits, and identity and information theft. These can infect computers, reduce productivity, and increase costs. Traditional firewalls and intrusion protection products filter network traffic, but are not designed to protect against these new content-based attacks. The Astaro Security Gateway, based on Astaro's award-winning Astaro Security Linux, provides a complete package of perimeter security applications. This package is powerful, easy to manage, and affordable. Web Security Network Security Email Security Unified Threat Management The Astaro Security Gateway, available as appliances and as software, integrates nine security applications: Web Security Email Security Network Security N Spyware Protection blocks N Virus Protection for Email catches N Intrusion Protection detects and incoming spyware, adware and other viruses in SMTP and POP3 emails and blocks probes and application-based malicious applications, and prevents attachments, even in compressed and attacks using heuristics, anomaly them from sending out confidential archived formats. detection, and pattern-based information. N Spam Protection uses eight techniques. N Virus Protection for the Web different techniques to filter out spam N Firewall, with stateful packet defends computers against virus without stopping legitimate emails. inspection and application-level infections from web downloads and N Phishing Protection blocks emails proxies, guards Internet communica- web-based email. from criminals trying to trick users tions traffic in and out of the N Content Filtering can block Internet into revealing confidential organization. access to 60 categories of web sites information. N Virtual Private Network Gateway during working hours. assures secure communications with remote offices and “road warriors”.
  • 2. Powerful and Cost-Effective “The Astaro Security Gateway … is our top The Astaro Security Gateway is the most feature-rich, sophisticated, yet easy-to- choice among the products in this roundup: manage network security product on the market: It has an extremely well-rounded set of Powerful Security. The Astaro Security Gateway utilizes over 100,000 virus features, the best-designed interface, and signatures, two independent virus scanning engines, more than 3,000 intrusion the most valuable reporting for the protection rules, and a database of over 60 million web sites classified to identify administrator” sources of spyware, spam, phishing attacks, and questionable or illegal content. PC Magazine No other product available protects against more threats. “Once again, words almost fail us where this Most Cost-Effective. Astaro's technology can be deployed and managed with product is concerned. With more features minimum effort. An award-winning user interface, efficient management tools, than you can shake a stick at, this is a real and an Internet-based update service, provide quick installation, real-time winner” visibility into security threats, and simple administration. SC Magazine Best Design for the Future. The Astaro Security Gateway incorporates best of breed technologies from both open source projects and commercial vendors, which are integrated with Astaro's extensible Content Filtering Framework™. This open architecture allows Astaro to add new security technologies quickly as new types of security threats emerge. Easiest Configuration and Reporting With Astaro Security Gateway, one administrator can efficiently deploy and manage a complete security infrastructure. Simple Configuration Internet Updates Configuration is performed from a PC Updates and new threat signatures can through an intuitive browser-based be installed hourly, either automatically interface. No extra software needs to or through a simple one-click process. be installed. This minimizes the window of opportu- Unified Reporting nity for potential threats. State-of-the-art reporting gives real- Central Management time visibility of the security status of Astaro offers two separate powerful the network. tools to manage large deployments: Astaro Configuration Manager and Astaro Report Manager.
  • 3. Choice Between Appliance and Software Astaro provides the same features and capabilities in the Astaro Security Gateway appliances and in the Astaro Security Gateway software. Customers can mix and match both types in the same environment and use the same central manage- Astaro Security Gateway ment tools with both. Appliances Appliances The Astaro Security Gateway appliances are reliable, high performance security devices that are extremely easy to deploy and manage. Astaro offers a full series of models to protect networks of all sizes. Software The Astaro Security Gateway software includes all the security applications of Astaro Security Gateway Software the Astaro Security Gateway appliances. It installs on Intel-compatible PCs and servers. Support and Training Services Astaro supports its customers with an outstanding services program. All Astaro products come with a 90-day software warranty and at least one year of hardware replacement. Customers can purchase support programs that include expedited replacement, email and telephone support, and 24-by-7 assistance. Astaro trains and certifies network administrators in brief web-based sessions, enabling them to become fully proficient in all aspects of Astaro's products. About Astaro Astaro was founded in 2000, with the goal of creating integrated, easy-to-use network security products. The company's leading Unified Threat Management product, Astaro Security Gateway, protects more than 25,000 customers, ranging from small businesses, to government and non-profit agencies, to global enterprises. Astaro's firewall is ICSA Labs certified. The company's technology has received recognition and awards such as Editors' Choice and Best Business Security Solution of the Year from PC Magazine, Best Security Solution from LinuxWorld Expo, 10 Stars and Test Center Recommended from CRN Magazine, Five Stars from SC Magazine, “Extremely Cost-Effective” from The Tolly Group, and “Excellent” from InfoWorld Magazine. Astaro is co- headquartered in Karlsruhe, Germany and Boston, United States, with offices and solutions partners in over 40 countries.
  • 4. Astaro Security Gateway Overview Technical Highlights Web Security N Time-based packet filter rules User Management N High performance web proxy N Instant messaging and P2P Control N Local and remote users/groups N Content filtering and monitoring against 60 N Worm and Botnet prevention N X.509 certificate/PKI support content categories N Zero day intrusion prevention N Radius N Blocking of incoming spyware downloads N Anomaly detection N SMB/Netbios N Detection of outgoing spyware messages N DoS/flood protection N Novell eDirectory Email Security N PPTP, L2TP and IPSec VPNs N LDAP N Eight spam identification methods N Clientless Remote Access N Active Directory/NTLM N Options to drop, flag or quarantine spam Security Proxies Networking N Detection of phishing emails N HTTP/HTTPS N Stateful high availability N SMTP email encryption (TLS) N SMTP N Transparent/bridging mode N Quarantine management N POP3 N Advanced routing Virus Detection N DNS N Bandwidth management N Two independent virus scanning engines N SIP, RTP N Traffic shaping/QoS N Scans emails and web file downloads N SOCKS N Uplink redundancy N Utilizes pattern matching, heuristics, and Logging & Reporting N VoIP support code emulation N Web reports Interface Support Network Security N Email reports N 10/100/1000 Mbps Ethernet N Stateful packet inspection firewall N Real-time notification (Email/SNMP) N DSL, Cable, Modem N Application-level deep packet inspection N Remote Syslog N VLAN Specifications Appliances Software Astaro Security Astaro Security Astaro Security Astaro Security Astaro Security Astaro Security Gateway 110 Gateway 120 Gateway 220 Gateway 320 Gateway 425 Gateway Software Form factor Desktop Desktop 1U Rackmount 1U Rackmount 1U Rackmount ---- Licenses available for Users 10 Unrestricted Unrestricted Unrestricted Unrestricted 10, 25, 50, 100, 250, 500 or unlimited users Firewall throughput (Mbps) 100 100 260 420 1 200 Varies by capacity of VPN throughput (Mbps) 30 30 150 200 265 the system selected Concurrent connections 60 000 60 000 400 000 550 000 700 000 Policies Unrestricted Unrestricted Unrestricted Unrestricted Unrestricted Unrestricted Memory 256 MB 256 MB 512 MB 1 GB 2 GB Hard drive 20 GB 20 GB 40 GB 74 GB 74 GB Runs on PC-compatible 10/100 Ethernet ports 3 3 8 4 ---- hardware 10/100/1000 Ethernet ports ---- ---- ---- 4 8 Learn More Download an evaluation copy of the Astaro Security Gateway software at http://www.astaro.com or contact Astaro at: The Americas Europe, Middle East, Africa Asia Pacific Region Astaro Corporation Astaro AG Astaro Corporation 3 New England Executive Park Amalienbadstrasse 36 30th Floor Bank of China Tower Burlington, MA 01803 76227 Karlsruhe 1 Garden Road, Central 2005-10-01 USA Germany Hong Kong, China T: +1 781 345 5000 T: +49 721 255 16 0 T: +852 2251 8514 F: +1 781 345 5100 F: +49 721 255 16 200 F: +852 2251 8515 americas@astaro.com emea@astaro.com apac@astaro.com Your Astaro Solutions Partner www.astaro.com © 2005 Astaro AG. Subject to change without notice. Astaro, Astaro Security Gateway, Astaro Security Linux and Content Filtering Framework are trademarks of Astaro AG. All other trademarks and registered trademarks are the property of their respective owners.