SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
StoneGate™
                               NextGen Firewall
                     Appliance Comparison Datasheet
                                                                                 November 2010



Next Generation Security                                                           Next Generation Availability & Scalability                               Next Generation Management
ƒ Integrated Firewall/IPS functionality                                            ƒ Built-in patented High Availability technologies                       ƒ Single console – complete visibility and proactive control of physical
                                                                                                                                                              and virtual networks
ƒ Deep packet inspection                                                               ƒ StoneGate Multi-Link™ technology enables multiple redundant        ƒ Third-party event management – monitoring, logging and reporting
                                                                                         internet links                                                       of switches, routers and security appliances from other vendors
ƒ Application awareness
                                                                                       ƒ Load balancing of unlimited ISP circuits                           ƒ One-step management – automatic blacklisting, automatic policy/
ƒ SSL inspection of encrypted Web traffic for both client server side
                                                                                                                                                              rule execution, create once, deploy everywhere policy/rule
  protection                                                                           ƒ Seamless VPN failover across multiple circuits
                                                                                                                                                              execution
ƒ Integrated anti-virus*                                                               ƒ Active/active clustering up to 16 devices                          ƒ Accelerated incident management – correlated view of all network
ƒ Content inspection – integrated Web filtering or redirection of                      ƒ Dynamic server load balancing monitors production servers and        activity, powerful data mining engine and sophisticated incident
  network traffic to external anti-virus gateways, Web filtering systems                 redistributes traffic to available systems                           case management tools
  or anti-spam filters                                                                                                                                      ƒ Central repository – shared rules for Firewall and IPS, repository
                                                                                   ƒ Remote connectivity with integrated VPN client                           backup for disaster recovery, customizable role-based access,
ƒ Granular access control based on user or user group, traffic type,                                                                                          domains for managing different environment with one management
  target or source IP address, time of the day or day of the week                  ƒ Automatic backup connection with 3G
                                                                                                                                                              server
ƒ Integrated with Active Directory and other sources to improve                    ƒ Bandwidth management and support Quality of Service (QoS)
                                                                                                                                                            ƒ Real-time monitoring and alerting – customizable dashboards and
  blocking decisions                                                                 standards
                                                                                                                                                              alerting, geographic pinpointing of IP addresses, Web portal for
                                                                                   ƒ No special network configurations required                               monitoring security from any device
ƒ Seamlessly integrates with StoneGate IPS for layered protection
                                                                                                                                                            ƒ Interactive reporting and compliance – customizable reports,
                                                                                                                                                              automated report generation and distribution, system auditing and
                                                                                                                                                              audit trails, comparative analysis of security policies,
                                                                                                                                                            ƒ Rule-base optimization – enhance rule base, eliminate unused/
                                                                                                                                                              redundant rules, create rules directly from logs
* Optional feature




                                            Stonesoft Corporation International Headquarters                                                    Stonesoft Inc. Americas Headquarters
                                                Itälahdenkatu 22 A Fl-0021O Helsinki, Finland                                                   1050 Crown Pointe Parkway, Suite 900
                                               tel. +358 9 4767 11 | fax. +358 9 4767 1349                                                      Atlanta, GA 30338, USA
                                                                          www.stonesoft.com                                                     tel. +1 866 869 4075 | fax. +1 770 668 1131
StoneGate™ NextGen Firewall Appliances for Demanding Environments
                                 To keep up with today’s sophisticated threats and complex network traffic, a first generation firewall will not do. Stonesoft introduces StoneGate™
                                 NextGen Firewall solution. Stonesoft is the only vendor to uniquely integrate Firewall and IPS technologies with our patented high availability solutions
                                 and sophisticated next generation management. As a result we’re delivering unmatched levels of security, availability, scalability and manageability for
                                 today’s enterprises. In addition, our solutions deliver the lowest TCO on the market today – as much as a 30-70% saving compared to other products.
                                 From the largest data centers and enterprise networks to your remote offices, we offer solutions to fit your specific needs.


Appliance Specifications                   FW-310              -L                 FW-1030               -P         FW-1060             -P             FW-1301           -P                   FW-3201            -P        FW-3205          -P
Firewall throughput                        500 Mbps            100 Mbps           1 Gbps                1.6 Gbps   1.6 Gbps            3.6 Gbps       5 Gbps            7.5 Gbps             10 Gbps            20 Gbps   30 Gbps          50 Gbps

VPN throughput                             60 Mbps             25 Mbps            140 Mbps              220 Mbps   300 Mbps            600 Mbps       1 Gbps            2 Gbps               5 Gbps             8 Gbps    10 Gbps          12 Gbps

VPN tunnels                                100                                    1 000                            5 000                              20 000                                 40 000                       40 000




                                                                                                                                                                                                                                                     * Appliances are available with various interface combinations. The maximum number of interfaces may vary according to the copper/fiber configuration.
Concurrent mVPN clients                    25                  -                  25                    100        150                 200            200               unlimited            unlimited                    unlimited

Concurrent connections                     200 000             50 000             700 000               900 000    1 000 000           1 500 000      10 000 000                             10 000 000                   15 000 000

Connections/sec                            2 000               750                15 000                           20 000                             80 000                                 100 000                      120 000

VLANs                                      32                  16                 150                   250        250                 300            unlimited                              unlimited                    unlimited

Management count                           1                   0.5                1                                1                                  1                                      1                            1

Number of protected IPs                    unlimited                              unlimited                        unlimited                          unlimited                              unlimited                    unlimited

Deep inspection                            yes                                    yes                              yes                                yes                                    yes                          yes

Number of detection signatures             +2 000                                 +2 000                           +2 000                             +2 000                                 +2 000                       +2 000

SSL inspection client side                 10 Mbps             -                  40 Mbps                          80 Mbps                            250 Mbps                               400 Mbps                     500 Mbps




                                                                                                                                                                                                                                                                                                                                                                                                              Copyright Stonesoft 2010. All rights reserved. All specifications are subject to change.
SSL inspection server side                 -                                      -                     40 Mbps    80 Mbps                            250 Mbps                               400 Mbps                     500 Mbps

Antivirus                                  yes                                    option                           option                             option                                 -                            -

Web filtering                              option                                 option                           option                             option                                 option                       option

Multi-Link                                 yes                                    yes                              yes                                yes                                    yes                          yes

Server load balancing                      yes                 -                  yes                              yes                                yes                                    yes                          yes

Clustering                                 yes                 HA                 yes                              yes                                yes                                    yes                          yes

Network Interfaces                         4 x 10/100/1000                        6 x 10/100/1000                  8 x 10/100/1000                    6 x 10/100/1000 (max 12)               2 x 10/100/1000 (max 20)     2 x 10/100/1000 (max 20)
                                                                                                                   or 6 x 10/100/1000
                                                                                                                   + 2 SFP
Module slots                               -                                      -                                -                                  1                                      3                            3

Form factor                                desktop                                1U rack                          1U rack                            1U rack                                2U rack                      2U rack

Dimensions (W x H x D)                     272 x 49 x 193 mm                      425 x 44 x 362 mm                425 x 44 x 362 mm                  426 x 44 x 400 mm                      437 x 89 x 450 mm            437 x 89 x 450 mm
                                           10.71” x 1.93” x 7.60”                 16.73” x 1.73” x 14.25”          16.73” x 1.73” x 14.25”            16.77" x 1.73" x 15.7"                 17.2" x 3.5" x 17.7"         17.2" x 3.5" x 17.7"

Redundant power supply                     -                                      -                                -                                  -                                      yes                          yes



                                                    Stonesoft Corporation International Headquarters                                                              Stonesoft Inc. Americas Headquarters
                                                        Itälahdenkatu 22 A Fl-0021O Helsinki, Finland                                                             1050 Crown Pointe Parkway, Suite 900
                                                       tel. +358 9 4767 11 | fax. +358 9 4767 1349                                                                Atlanta, GA 30338, USA
                                                                                  www.stonesoft.com                                                               tel. +1 866 869 4075 | fax. +1 770 668 1131

Weitere ähnliche Inhalte

Was ist angesagt?

AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...Erol TOKALACOGLU
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Ixia NVS Group
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security SolutionsSymantec
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.Michal Jarski
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked Networks
 
Corp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionCorp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionrgitre
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architectureFeras Ajjawi
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 

Was ist angesagt? (18)

Sonic wall tz series
Sonic wall tz seriesSonic wall tz series
Sonic wall tz series
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
 
Nx9500 spec-sheet-1211
Nx9500 spec-sheet-1211Nx9500 spec-sheet-1211
Nx9500 spec-sheet-1211
 
Corp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionCorp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3version
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architecture
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
 

Ähnlich wie Datasheet stonegate fw-allinone

Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Naba Barkakati
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Brochure Datametrie
Brochure DatametrieBrochure Datametrie
Brochure DatametrieJETLAG
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Nextel S.A.
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAdvantec Distribution
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Wapples brochure v1 4 eng
Wapples brochure v1 4 engWapples brochure v1 4 eng
Wapples brochure v1 4 enghasbro505
 

Ähnlich wie Datasheet stonegate fw-allinone (20)

Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Brochure Datametrie
Brochure DatametrieBrochure Datametrie
Brochure Datametrie
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Oasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITILOasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITIL
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheet
 
G3sixty Overview
G3sixty OverviewG3sixty Overview
G3sixty Overview
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Wapples brochure v1 4 eng
Wapples brochure v1 4 engWapples brochure v1 4 eng
Wapples brochure v1 4 eng
 

Datasheet stonegate fw-allinone

  • 1. StoneGate™ NextGen Firewall Appliance Comparison Datasheet November 2010 Next Generation Security Next Generation Availability & Scalability Next Generation Management ƒ Integrated Firewall/IPS functionality ƒ Built-in patented High Availability technologies ƒ Single console – complete visibility and proactive control of physical and virtual networks ƒ Deep packet inspection ƒ StoneGate Multi-Link™ technology enables multiple redundant ƒ Third-party event management – monitoring, logging and reporting internet links of switches, routers and security appliances from other vendors ƒ Application awareness ƒ Load balancing of unlimited ISP circuits ƒ One-step management – automatic blacklisting, automatic policy/ ƒ SSL inspection of encrypted Web traffic for both client server side rule execution, create once, deploy everywhere policy/rule protection ƒ Seamless VPN failover across multiple circuits execution ƒ Integrated anti-virus* ƒ Active/active clustering up to 16 devices ƒ Accelerated incident management – correlated view of all network ƒ Content inspection – integrated Web filtering or redirection of ƒ Dynamic server load balancing monitors production servers and activity, powerful data mining engine and sophisticated incident network traffic to external anti-virus gateways, Web filtering systems redistributes traffic to available systems case management tools or anti-spam filters ƒ Central repository – shared rules for Firewall and IPS, repository ƒ Remote connectivity with integrated VPN client backup for disaster recovery, customizable role-based access, ƒ Granular access control based on user or user group, traffic type, domains for managing different environment with one management target or source IP address, time of the day or day of the week ƒ Automatic backup connection with 3G server ƒ Integrated with Active Directory and other sources to improve ƒ Bandwidth management and support Quality of Service (QoS) ƒ Real-time monitoring and alerting – customizable dashboards and blocking decisions standards alerting, geographic pinpointing of IP addresses, Web portal for ƒ No special network configurations required monitoring security from any device ƒ Seamlessly integrates with StoneGate IPS for layered protection ƒ Interactive reporting and compliance – customizable reports, automated report generation and distribution, system auditing and audit trails, comparative analysis of security policies, ƒ Rule-base optimization – enhance rule base, eliminate unused/ redundant rules, create rules directly from logs * Optional feature Stonesoft Corporation International Headquarters Stonesoft Inc. Americas Headquarters Itälahdenkatu 22 A Fl-0021O Helsinki, Finland 1050 Crown Pointe Parkway, Suite 900 tel. +358 9 4767 11 | fax. +358 9 4767 1349 Atlanta, GA 30338, USA www.stonesoft.com tel. +1 866 869 4075 | fax. +1 770 668 1131
  • 2. StoneGate™ NextGen Firewall Appliances for Demanding Environments To keep up with today’s sophisticated threats and complex network traffic, a first generation firewall will not do. Stonesoft introduces StoneGate™ NextGen Firewall solution. Stonesoft is the only vendor to uniquely integrate Firewall and IPS technologies with our patented high availability solutions and sophisticated next generation management. As a result we’re delivering unmatched levels of security, availability, scalability and manageability for today’s enterprises. In addition, our solutions deliver the lowest TCO on the market today – as much as a 30-70% saving compared to other products. From the largest data centers and enterprise networks to your remote offices, we offer solutions to fit your specific needs. Appliance Specifications FW-310 -L FW-1030 -P FW-1060 -P FW-1301 -P FW-3201 -P FW-3205 -P Firewall throughput 500 Mbps 100 Mbps 1 Gbps 1.6 Gbps 1.6 Gbps 3.6 Gbps 5 Gbps 7.5 Gbps 10 Gbps 20 Gbps 30 Gbps 50 Gbps VPN throughput 60 Mbps 25 Mbps 140 Mbps 220 Mbps 300 Mbps 600 Mbps 1 Gbps 2 Gbps 5 Gbps 8 Gbps 10 Gbps 12 Gbps VPN tunnels 100 1 000 5 000 20 000 40 000 40 000 * Appliances are available with various interface combinations. The maximum number of interfaces may vary according to the copper/fiber configuration. Concurrent mVPN clients 25 - 25 100 150 200 200 unlimited unlimited unlimited Concurrent connections 200 000 50 000 700 000 900 000 1 000 000 1 500 000 10 000 000 10 000 000 15 000 000 Connections/sec 2 000 750 15 000 20 000 80 000 100 000 120 000 VLANs 32 16 150 250 250 300 unlimited unlimited unlimited Management count 1 0.5 1 1 1 1 1 Number of protected IPs unlimited unlimited unlimited unlimited unlimited unlimited Deep inspection yes yes yes yes yes yes Number of detection signatures +2 000 +2 000 +2 000 +2 000 +2 000 +2 000 SSL inspection client side 10 Mbps - 40 Mbps 80 Mbps 250 Mbps 400 Mbps 500 Mbps Copyright Stonesoft 2010. All rights reserved. All specifications are subject to change. SSL inspection server side - - 40 Mbps 80 Mbps 250 Mbps 400 Mbps 500 Mbps Antivirus yes option option option - - Web filtering option option option option option option Multi-Link yes yes yes yes yes yes Server load balancing yes - yes yes yes yes yes Clustering yes HA yes yes yes yes yes Network Interfaces 4 x 10/100/1000 6 x 10/100/1000 8 x 10/100/1000 6 x 10/100/1000 (max 12) 2 x 10/100/1000 (max 20) 2 x 10/100/1000 (max 20) or 6 x 10/100/1000 + 2 SFP Module slots - - - 1 3 3 Form factor desktop 1U rack 1U rack 1U rack 2U rack 2U rack Dimensions (W x H x D) 272 x 49 x 193 mm 425 x 44 x 362 mm 425 x 44 x 362 mm 426 x 44 x 400 mm 437 x 89 x 450 mm 437 x 89 x 450 mm 10.71” x 1.93” x 7.60” 16.73” x 1.73” x 14.25” 16.73” x 1.73” x 14.25” 16.77" x 1.73" x 15.7" 17.2" x 3.5" x 17.7" 17.2" x 3.5" x 17.7" Redundant power supply - - - - yes yes Stonesoft Corporation International Headquarters Stonesoft Inc. Americas Headquarters Itälahdenkatu 22 A Fl-0021O Helsinki, Finland 1050 Crown Pointe Parkway, Suite 900 tel. +358 9 4767 11 | fax. +358 9 4767 1349 Atlanta, GA 30338, USA www.stonesoft.com tel. +1 866 869 4075 | fax. +1 770 668 1131