Features - NEC ZA-SA3500G Function Manual

Hide thumbs Also See for ZA-SA3500G:
Table of Contents

Advertisement

2.2. Features

Easy installation
In bridge mode, this device can be easily set up without changing an existing internal network configuration.
Since setting this product can be done with a simple GUI using a Web browser, it can be set and operated even
with neither special knowledge of the network nor knowledge concerning the security equipment in bridge
mode.
High-speed security engine
The forwarding speed of the network tends to slow down when a lot of security terminals manage/analyze the
communication of the network when the security/scan function is used. This device has achieved high
throughput of about 700Mbps
Device map function
The device which belongs to a subordinate network can be checked visually on the management screen of this
product. It is expected to improve the management efficiency at a glance by understanding the device
configuration of the internal network which could not be managed until now.
Simple RADIUS function
This product can be used as a simple RADIUS server. To prevent unauthorized devices from connecting to the
company LAN, authentication can be provided. It is unnecessary to build a separate server for authentication
and have a secure connection environment at low cost.
Notification function
When a threat is detected, a license expiration warning, or a firmware update is required, it can be displayed
on the Web browser, on the main unit lamp, and notification via email.
Router function
The operation mode can be changed to router mode through the management screen (Web setting). The
function of the router on a small-scale network can be combined with this product. Special knowledge of the
network is needed for router mode.
Other functions
Confirmation of various information of the terminal connected to the network can be done on the management
screen (Web setting).
The threat detection status can be viewed on a daily, weekly, or monthly basis. In addition, it can be compiled
per terminal, and it corresponds to the graphical representation of the detection arranged in ascending order.
Potential threat risk will be easier to grasp. Security log inspection and white list creation can be done on the
management screen (Web Setting).
1
Measured result in our test environment.
1
by adopting the high-speed security/scan engine.
|About the Product
23

Advertisement

Table of Contents
loading

Table of Contents