SlideShare une entreprise Scribd logo
1  sur  22
FortiGate™ Voice Integrated Multi-Threat Security and Enterprise IP PBX services Fortinet Internal Sales Presentation April 2010
FortiGate Voice Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FortiGate Voice Targeted Market
FortiGate Voice Targeted Market FortiGate Voice ,[object Object],[object Object],[object Object],FortiGate Voice ,[object Object],[object Object],[object Object],[object Object],FortiGate Voice Headquarter Branch FortiGate Voice FortiGate Voice SME Managed Security Service Provider Client A Client B ,[object Object],[object Object],[object Object],[object Object],Branch
FortiGate Voice – Applications Purpose-Built Hardware Specialized OS Firewall Real Time Protection Flexible Capabilities High Performance Secured Platform Traffic Shaping VPN AV IPS Antispam WF SSL Insp DLP WANopt ,[object Object],AppCtrl Comprehensive Support Offerings World-Class Support In-House Update Services IP PBX WAP
FortiGate Voice – Products Integral PBX enabled branch office UTM solution FortiGate Voice 80C Targets SMB market with up to 50 users FortiWiFi Voice 80CS Supports WiFi Q2 Specification WAN 2 x 10/100/1000 LAN 8 Port 10/100 PSTN interfaces  4 x FXO (RJ11) phone ports Management 2 x USB, 1 x RJ45 Console Specification WAN 2 x 10/100/1000 LAN 6 Port 10/100 DMZ 1 x 10/100 Wireless 802.11 a/b/g/n Management 2 x USB, 1 x RJ45 Console GA GA
FortiGate Voice-80C – Network Interfaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FortiGate Voice-80C Deployment Example ,[object Object],POTS SIP Soft-Client SIP Hard-phone (e.g. FortiFone-110) Telecom Service Provider VoIP Service Provider Corporate Network Connects office to NGN/IMS VoIP service provider (“SIP Trunking”) Remote worker Small/medium or remote business office Connects office to traditional Local Exchange Carrier (LEC) Connects office to cooperate network (“Toll Bypass”) FXO, a/b-wire SIP / VPN SIP / VPN SIP / IP LAN FWF-80C FGV-80C
FortiWiFi Voice-80CS – Network Interfaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FortiWiFi Voice-80CS Deployment Example ,[object Object],POTS SIP Soft-Client SIP Hard-phone (FortiFone) VoIP Service Provider Corporate Network Connects office to NGN/IMS VoIP service provider (“SIP Trunking”) Remote worker Small/medium or remote business office Connects office to cooperate network (“Toll Bypass”) SIP / VPN SIP / VPN SIP / IP LAN FWF-80C FWV-80CS WiFi SIP Phones or SIP Apps FXS
FortiWiFi Voice-80CS Deployment Example ,[object Object],POTS SIP Soft-Client SIP Hard-phone (FortiFone) VoIP Service Provider Corporate Network Connects office to NGN/IMS VoIP service provider (“SIP Trunking”) Remote worker Small/medium or remote business office Connects office to cooperate network (“Toll Bypass”) SIP / VPN SIP / VPN SIP / IP LAN FWF-80C Telecom Service Provider ,[object Object],FWV-80CS FXO, a/b-wire Connects office to traditional Local Exchange Carrier (LEC) WiFi SIP Phones or SIP Apps FXS
FortiGate Voice – Features (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FortiGate Voice – Features (2) Conference Units Session Controller Music on hold Voice transcoder Units Interactive Voice Response Voice Mail FortiOS™ SIP Trunking Service Provider PSTN Public Switch  Local Exchange SIP FXO SIP SIP Endpoints (Hard-phones, ATAs, Soft-phones, WiFi Phones) VoiceMail HTTP, CLI Logging VoiceMail @ Flash Storage Announcements Voice Message Wave Service Provider Extensions Mail Server FortiAnalyzer … @
FortiGate Voice – Features (3) FGV Features Voicemail Allows a caller to leave voice messages in the FortiGate Voice. FortiGate Voice uses local flash disk storage with up to 60h of overall capacity. Users can access the voice mails via phone (dial *97 or shortcuts). The maximum recordable length of a single voice mail is configurable (default 60 seconds). Message Notification  VoiceMail configuration allows to get a message notification via an eMail. This requires to connect FortiGate Voice with the eMail user account via SMTP. Unified Messaging Configurable Voice mail to eMail integration. The voice mail will be attached to an eMail and sent to the user’s account at the mail server.  Music on hold The FortiGate Voice can insert music or voice while the caller is on hold Call Transfer FortiGate Voice supports user initiated call transfers.  Automatic Call Distributor (ACD) Distributes an incoming call to a specific group of terminals (extension group).
FortiGate Voice – Features (4) FGV Features Standard Conference (3 party) Conferences can be initiated by the user phone. Conference Bridge /  Meet me Call-in conference bridge initiated by GUI.  Interactive Voice Response (IVR)    or  Auto Attendant Provides a Digital Receptionist service. The FortiGate Voice provides the caller a menu that can detect touch tones and allows the caller to pre-select for instance a service.  One menu level is supported. Dial Plan Configurable dial plan that routes the outgoing call requests. Direct Inward Dialing (DID) Telephone Service Providers can allocate a range of public telephone numbers and forward calls directly to the user. The user can be assigned in the FortiGate Voice. The FortiGate Voice support inward dialing for calls via the FXO interfaces (FGV-80C) or via the SIP Trunk.
FortiGate Voice – Features (5) FGV Features Other Language Voice Prompts  FortiGate Voice support the upload of alternative voice files, for instance in other language or with other content.  Codecs G.711, G.729 (pass-thru) Statistics and Logging / Reporting:  Leverages Fortinet event logging with FortiAnalyzer or SYSLOG compliant servers. Diagnosis CLI interface to diag extensions or SIP trunks. Call Monitoring Monitors inbound and outbound calls. Provides display filter options.
FortiGate Voice Performance Performance Specifications FG-80C/CM FGV-80C/ FWV-80CS FG-110C Firewall Throughput – 1,518 byte packet 700 Mbps 1 Gbps 1 Gbps Firewall Throughput – 512 byte packet 350 Mbps 500 Mbps 500 Mbps Firewall Throughput – 64 byte packet NA NA NA IPSec VPN Throughput  80 Mbps 100 Mbps 100 Mbps Antivirus Throughput 50 Mbps 65 Mbps 65 Mbps IPS Throughput  100 Mbps 200 Mbps 200 Mbps Static IPSec VPN Tunnels (System / VDOM) 200 50 / 500 1,500 Concurrent IPSec VPN Tunnels 300 1,500 1,500 Concurrent Sessions 100,000 400,000 400,000 New Sessions/Sec 5,000 10,000 10,000 Recommend # of Concurrent SSL Users 60 100 100 Maximum number of Policies (VDOM / System) 2,000 500 / 5,000 4,000 Number of VDOM (Max / Default) 10/10 10/10 10/10 Maximum number of registered SIP user agents  NA 50 NA Number of SIP client registering per second NA 50 NA Maximum number of concurrent calls NA 20 NA Maximum number of call attempts per second NA 5 NA Maximum number of conference calls NA 5 NA Maximum length of all voice mails NA 60 hour NA
FortiGate Voice Quality Performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MOS R-Factor R-Factor  MOS User Experience  90 43 (4.3) Excellent 80 40 (4.0) Good  70  36 (3.6) Fair  60  31 (3.1) Poor  50  26 (2.6) Bad
FortiGate Voice - Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FortiGate Voice-80C - Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],Service Providers  (SIP Trunks and FXO) SIP Extensions What to do with the call requests What is going on?
Series Components & Pricing ,[object Object],Product Description SKU List Price FortiGate Voice-80C Dual 10/100/1000 ports, 8-port 10/100 switch, and 4 port PBX FGV-80C FortiGate Voice-80C Bundle Bundle - Dual 10/100/1000 ports, 8-port 10/100 switch, and 4 port PBX FGV-80C-BDL FortiWiFi Voice-80CS Wireless (802.11 a/b/g/n), Dual 10/100/1000 ports, 10/100 DMZ port, 6-port 10/100 switch, and IP PBX FWV-80CS FortiWiFi Voice-80CS Bundle  Bundle - Wireless (802.11 a/b/g/n), Dual 10/100/1000 ports, 10/100 DMZ port, 6-port 10/100 switch, and IP PBX FWV-80CS-BDL FortiFone-100 SIP based VoIP phone for FortiGate Voice  FON-100
Thank You! For more information please visit http://www.fortinet.com

Contenu connexe

Tendances

Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM3G4G
 
2+ipt+configuring cisco-cme
2+ipt+configuring cisco-cme2+ipt+configuring cisco-cme
2+ipt+configuring cisco-cmeYves Jean Louis
 
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsTechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsRobb Boyd
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureMyNOG
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityGLC Networks
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLANIndonesia Network Operators Group
 
Domino-A520i-continuous-inkjet-printer
Domino-A520i-continuous-inkjet-printerDomino-A520i-continuous-inkjet-printer
Domino-A520i-continuous-inkjet-printerMelanie Buckle
 
Switching conditions in SDH protection schemes.
Switching conditions in SDH protection schemes.Switching conditions in SDH protection schemes.
Switching conditions in SDH protection schemes.MapYourTech
 
Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...Siddharth Rao
 
VoiceBootcamp Ccnp collaboration lab guide v1.0 sample
VoiceBootcamp Ccnp collaboration lab guide v1.0 sampleVoiceBootcamp Ccnp collaboration lab guide v1.0 sample
VoiceBootcamp Ccnp collaboration lab guide v1.0 sampleFaisal Khan
 
Cisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e TopologiasCisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e TopologiasVinicius Buscacio
 
Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network GLC Networks
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersBruno Teixeira
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021Purdicom
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsReal-Time Innovations (RTI)
 

Tendances (20)

Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM
 
2+ipt+configuring cisco-cme
2+ipt+configuring cisco-cme2+ipt+configuring cisco-cme
2+ipt+configuring cisco-cme
 
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsTechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
 
Track SD-WAN.pdf
Track SD-WAN.pdfTrack SD-WAN.pdf
Track SD-WAN.pdf
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native Infrastructure
 
GPON-Doctor TR-156 Monitoring Features
GPON-Doctor TR-156 Monitoring FeaturesGPON-Doctor TR-156 Monitoring Features
GPON-Doctor TR-156 Monitoring Features
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
 
Domino-A520i-continuous-inkjet-printer
Domino-A520i-continuous-inkjet-printerDomino-A520i-continuous-inkjet-printer
Domino-A520i-continuous-inkjet-printer
 
Switching conditions in SDH protection schemes.
Switching conditions in SDH protection schemes.Switching conditions in SDH protection schemes.
Switching conditions in SDH protection schemes.
 
Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...
 
VoiceBootcamp Ccnp collaboration lab guide v1.0 sample
VoiceBootcamp Ccnp collaboration lab guide v1.0 sampleVoiceBootcamp Ccnp collaboration lab guide v1.0 sample
VoiceBootcamp Ccnp collaboration lab guide v1.0 sample
 
Cisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e TopologiasCisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e Topologias
 
Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
 

En vedette

Is China giving rise threats to the world?
Is China giving rise threats to the world?Is China giving rise threats to the world?
Is China giving rise threats to the world?guest891c8f15
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To TerrorismFaheem Ul Hasan
 
Social Identity Theory & Stereotypes
Social Identity Theory & StereotypesSocial Identity Theory & Stereotypes
Social Identity Theory & Stereotypesabonica
 
Chapter 2b project stakeholder management process
Chapter 2b   project stakeholder management processChapter 2b   project stakeholder management process
Chapter 2b project stakeholder management processSaddan Juhari
 

En vedette (6)

Is China giving rise threats to the world?
Is China giving rise threats to the world?Is China giving rise threats to the world?
Is China giving rise threats to the world?
 
Social psychology
Social psychologySocial psychology
Social psychology
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To Terrorism
 
Social Identity Theory & Stereotypes
Social Identity Theory & StereotypesSocial Identity Theory & Stereotypes
Social Identity Theory & Stereotypes
 
Chapter 2b project stakeholder management process
Chapter 2b   project stakeholder management processChapter 2b   project stakeholder management process
Chapter 2b project stakeholder management process
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similaire à Fortinet Fortivoice - Solucion de UTM + VoIP

Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Haris Khan
 
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS GatewaysMatrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS GatewaysMatrix Comsec
 
Matrix Comsec Introduction
Matrix Comsec IntroductionMatrix Comsec Introduction
Matrix Comsec IntroductionMatrix Comsec
 
Alcatel lucent eterprise solution bakrie brother
Alcatel lucent eterprise solution bakrie brotherAlcatel lucent eterprise solution bakrie brother
Alcatel lucent eterprise solution bakrie brothercefer mecid
 
Cisco Small Biz Portfolio
Cisco Small Biz PortfolioCisco Small Biz Portfolio
Cisco Small Biz Portfoliopilihpk
 
Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!pilihpk
 
Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...
Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...
Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...Rob Bliss
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVideoguy
 
Matrix Telecom Solutions: SETU ATAs
Matrix Telecom Solutions: SETU ATAs Matrix Telecom Solutions: SETU ATAs
Matrix Telecom Solutions: SETU ATAs Matrix Comsec
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90dhape01
 
GDC Telecom Company Presentation
GDC Telecom Company PresentationGDC Telecom Company Presentation
GDC Telecom Company PresentationGDC Telecom
 
Forti gate 200b poe
Forti gate 200b poeForti gate 200b poe
Forti gate 200b poeHuu Hieu
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 
14 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
14 Net Presentation Telco Day Kiev Ukraine Mar 4 200914 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
14 Net Presentation Telco Day Kiev Ukraine Mar 4 2009guest6aa1b1
 

Similaire à Fortinet Fortivoice - Solucion de UTM + VoIP (20)

FortiGate-40C
FortiGate-40CFortiGate-40C
FortiGate-40C
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS GatewaysMatrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
 
Matrix Comsec Introduction
Matrix Comsec IntroductionMatrix Comsec Introduction
Matrix Comsec Introduction
 
Alcatel lucent eterprise solution bakrie brother
Alcatel lucent eterprise solution bakrie brotherAlcatel lucent eterprise solution bakrie brother
Alcatel lucent eterprise solution bakrie brother
 
Cisco Small Biz Portfolio
Cisco Small Biz PortfolioCisco Small Biz Portfolio
Cisco Small Biz Portfolio
 
Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!
 
Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...
Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...
Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
Matrix Telecom Solutions: SETU ATAs
Matrix Telecom Solutions: SETU ATAs Matrix Telecom Solutions: SETU ATAs
Matrix Telecom Solutions: SETU ATAs
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
GDC Telecom Company Presentation
GDC Telecom Company PresentationGDC Telecom Company Presentation
GDC Telecom Company Presentation
 
FortiGate-60C
FortiGate-60CFortiGate-60C
FortiGate-60C
 
Alllworx Presentation
Alllworx PresentationAlllworx Presentation
Alllworx Presentation
 
14 Net Quintum
14 Net Quintum14 Net Quintum
14 Net Quintum
 
Forti gate 200b poe
Forti gate 200b poeForti gate 200b poe
Forti gate 200b poe
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
14 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
14 Net Presentation Telco Day Kiev Ukraine Mar 4 200914 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
14 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
 

Plus de Suministros Obras y Sistemas

VMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMwareVMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMwareSuministros Obras y Sistemas
 
Measuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized EnvironmentsMeasuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized EnvironmentsSuministros Obras y Sistemas
 
Caso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / SiragonCaso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / SiragonSuministros Obras y Sistemas
 
Caso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro BarquisimetoCaso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro BarquisimetoSuministros Obras y Sistemas
 
Guía para padres de protección infantil en internet
Guía para padres de protección infantil en internetGuía para padres de protección infantil en internet
Guía para padres de protección infantil en internetSuministros Obras y Sistemas
 
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NASNexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NASSuministros Obras y Sistemas
 
Veeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & ReplicationVeeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & ReplicationSuministros Obras y Sistemas
 
VMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva CorporativaVMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva CorporativaSuministros Obras y Sistemas
 
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex GenerationCisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex GenerationSuministros Obras y Sistemas
 
Veeam Product info - Backup Standard vs. Enterprise Edition
Veeam Product info -  Backup Standard vs. Enterprise EditionVeeam Product info -  Backup Standard vs. Enterprise Edition
Veeam Product info - Backup Standard vs. Enterprise EditionSuministros Obras y Sistemas
 

Plus de Suministros Obras y Sistemas (20)

Cisco Rock Night - UCS & VXI
Cisco Rock Night -  UCS & VXICisco Rock Night -  UCS & VXI
Cisco Rock Night - UCS & VXI
 
Cisco Rock Night SMB
Cisco Rock Night   SMBCisco Rock Night   SMB
Cisco Rock Night SMB
 
Ruckus Wireless - Guia de productos en Español
Ruckus Wireless - Guia de productos en EspañolRuckus Wireless - Guia de productos en Español
Ruckus Wireless - Guia de productos en Español
 
ESG Brief Nexsan Gets Its NAS
ESG Brief Nexsan Gets Its NASESG Brief Nexsan Gets Its NAS
ESG Brief Nexsan Gets Its NAS
 
VMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMwareVMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMware
 
IPv6 Transition,Transcición IPv6
IPv6 Transition,Transcición IPv6IPv6 Transition,Transcición IPv6
IPv6 Transition,Transcición IPv6
 
Measuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized EnvironmentsMeasuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized Environments
 
Caso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / SiragonCaso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / Siragon
 
Caso de Estudio SAP sobre VMware en SATECA
Caso de Estudio SAP sobre VMware en SATECACaso de Estudio SAP sobre VMware en SATECA
Caso de Estudio SAP sobre VMware en SATECA
 
Caso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro BarquisimetoCaso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro Barquisimeto
 
Guía para padres de protección infantil en internet
Guía para padres de protección infantil en internetGuía para padres de protección infantil en internet
Guía para padres de protección infantil en internet
 
SAP Solution On VMware - Best Practice Guide 2011
SAP Solution On VMware - Best Practice Guide 2011SAP Solution On VMware - Best Practice Guide 2011
SAP Solution On VMware - Best Practice Guide 2011
 
Cisco Catalyst Poster
Cisco Catalyst PosterCisco Catalyst Poster
Cisco Catalyst Poster
 
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NASNexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
 
Veeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & ReplicationVeeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & Replication
 
Veeam Resumen de productos
Veeam Resumen de productosVeeam Resumen de productos
Veeam Resumen de productos
 
VMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva CorporativaVMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
 
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex GenerationCisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
 
VCON xPoint S Briefing
VCON xPoint S BriefingVCON xPoint S Briefing
VCON xPoint S Briefing
 
Veeam Product info - Backup Standard vs. Enterprise Edition
Veeam Product info -  Backup Standard vs. Enterprise EditionVeeam Product info -  Backup Standard vs. Enterprise Edition
Veeam Product info - Backup Standard vs. Enterprise Edition
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Fortinet Fortivoice - Solucion de UTM + VoIP

  • 1. FortiGate™ Voice Integrated Multi-Threat Security and Enterprise IP PBX services Fortinet Internal Sales Presentation April 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. FortiGate Voice – Products Integral PBX enabled branch office UTM solution FortiGate Voice 80C Targets SMB market with up to 50 users FortiWiFi Voice 80CS Supports WiFi Q2 Specification WAN 2 x 10/100/1000 LAN 8 Port 10/100 PSTN interfaces 4 x FXO (RJ11) phone ports Management 2 x USB, 1 x RJ45 Console Specification WAN 2 x 10/100/1000 LAN 6 Port 10/100 DMZ 1 x 10/100 Wireless 802.11 a/b/g/n Management 2 x USB, 1 x RJ45 Console GA GA
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. FortiGate Voice – Features (2) Conference Units Session Controller Music on hold Voice transcoder Units Interactive Voice Response Voice Mail FortiOS™ SIP Trunking Service Provider PSTN Public Switch Local Exchange SIP FXO SIP SIP Endpoints (Hard-phones, ATAs, Soft-phones, WiFi Phones) VoiceMail HTTP, CLI Logging VoiceMail @ Flash Storage Announcements Voice Message Wave Service Provider Extensions Mail Server FortiAnalyzer … @
  • 14. FortiGate Voice – Features (3) FGV Features Voicemail Allows a caller to leave voice messages in the FortiGate Voice. FortiGate Voice uses local flash disk storage with up to 60h of overall capacity. Users can access the voice mails via phone (dial *97 or shortcuts). The maximum recordable length of a single voice mail is configurable (default 60 seconds). Message Notification VoiceMail configuration allows to get a message notification via an eMail. This requires to connect FortiGate Voice with the eMail user account via SMTP. Unified Messaging Configurable Voice mail to eMail integration. The voice mail will be attached to an eMail and sent to the user’s account at the mail server. Music on hold The FortiGate Voice can insert music or voice while the caller is on hold Call Transfer FortiGate Voice supports user initiated call transfers. Automatic Call Distributor (ACD) Distributes an incoming call to a specific group of terminals (extension group).
  • 15. FortiGate Voice – Features (4) FGV Features Standard Conference (3 party) Conferences can be initiated by the user phone. Conference Bridge / Meet me Call-in conference bridge initiated by GUI. Interactive Voice Response (IVR) or Auto Attendant Provides a Digital Receptionist service. The FortiGate Voice provides the caller a menu that can detect touch tones and allows the caller to pre-select for instance a service. One menu level is supported. Dial Plan Configurable dial plan that routes the outgoing call requests. Direct Inward Dialing (DID) Telephone Service Providers can allocate a range of public telephone numbers and forward calls directly to the user. The user can be assigned in the FortiGate Voice. The FortiGate Voice support inward dialing for calls via the FXO interfaces (FGV-80C) or via the SIP Trunk.
  • 16. FortiGate Voice – Features (5) FGV Features Other Language Voice Prompts FortiGate Voice support the upload of alternative voice files, for instance in other language or with other content. Codecs G.711, G.729 (pass-thru) Statistics and Logging / Reporting: Leverages Fortinet event logging with FortiAnalyzer or SYSLOG compliant servers. Diagnosis CLI interface to diag extensions or SIP trunks. Call Monitoring Monitors inbound and outbound calls. Provides display filter options.
  • 17. FortiGate Voice Performance Performance Specifications FG-80C/CM FGV-80C/ FWV-80CS FG-110C Firewall Throughput – 1,518 byte packet 700 Mbps 1 Gbps 1 Gbps Firewall Throughput – 512 byte packet 350 Mbps 500 Mbps 500 Mbps Firewall Throughput – 64 byte packet NA NA NA IPSec VPN Throughput 80 Mbps 100 Mbps 100 Mbps Antivirus Throughput 50 Mbps 65 Mbps 65 Mbps IPS Throughput 100 Mbps 200 Mbps 200 Mbps Static IPSec VPN Tunnels (System / VDOM) 200 50 / 500 1,500 Concurrent IPSec VPN Tunnels 300 1,500 1,500 Concurrent Sessions 100,000 400,000 400,000 New Sessions/Sec 5,000 10,000 10,000 Recommend # of Concurrent SSL Users 60 100 100 Maximum number of Policies (VDOM / System) 2,000 500 / 5,000 4,000 Number of VDOM (Max / Default) 10/10 10/10 10/10 Maximum number of registered SIP user agents NA 50 NA Number of SIP client registering per second NA 50 NA Maximum number of concurrent calls NA 20 NA Maximum number of call attempts per second NA 5 NA Maximum number of conference calls NA 5 NA Maximum length of all voice mails NA 60 hour NA
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Thank You! For more information please visit http://www.fortinet.com