 |
 |
 |
 |
Today's organizations face unprecedented security challenges. The sophistication and volume of attacks is increasing exponentially, often resulting in lost company, personal and customer data; stolen intellectual property; damaged reputations; and lost productivity. At the same time, security has become more complex. Organizations are grappling with the BYOD revolution and the explosion of personal devices connecting to the network. Personal smartphones and tablets slow network performance and productivity, and mobile applications such as social media and video streaming consume an enormous amount of bandwidth. In order to address these network security and productivity challenges, some organizations have chosen to compromise their security by turning off features to maintain network performance.
-
General Information Manufacturer: SonicWall Inc. Manufacturer Part Number: 01-SSC-3861 Manufacturer Website Address: http://www.sonicwall.com Brand Name: SonicWall Product Series: NSA Product Model: 2600 Product Name: NSA 2600 Network Security Appliance Marketing Information: Today's organizations face unprecedented security challenges. The sophistication and volume of attacks is increasing exponentially, often resulting in lost company, personal and customer data; stolen intellectual property; damaged reputations; and lost productivity. At the same time, security has become more complex. Organizations are grappling with the BYOD revolution and the explosion of personal devices connecting to the network. Personal smartphones and tablets slow network performance and productivity, and mobile applications such as social media and video streaming consume an enormous amount of bandwidth. In order to address these network security and productivity challenges, some organizations have chosen to compromise their security by turning off features to maintain network performance. Product Type: Network Security/Firewall Appliance Technical Information Firewall Protection Supported: - Application Control
- Gateway Antivirus
- Reassembly-free Deep Packet Inspection
- Access Control
- Remote Access Authentication
- Malware Protection
- Deep Inspection Firewall
- Web Content Filtering
- Anti-spyware
- Packet Inspection
- Content Filtering
- Proxy Blocking
- URL Filtering
- Intrusion Prevention
- Trojan Horse
- Stateful Packet Filtering
- ICMP Flood
- SYNflood Protection
- UDP Flood
- Denial of Service (DoS)
- TCP stream reassembly
- Keyword Filtering
- Distributed Denial of Service (DDoS)
- Zero Day Event
- Ingress Filtering
- Egress Filtering
Encryption Standard: - DES
- 3DES
- AES (128-bit)
- AES (192-bit)
- AES (256-bit)
- MD5
- SHA-1
Interfaces/Ports Total Number of Ports: 8 USB: Yes PoE (RJ-45) Port: No Number of Network (RJ-45) Ports: 8 Network & Communication Ethernet Technology: Gigabit Ethernet Network Standard: 10/100/1000Base-T Wireless Specifications Wireless LAN: No I/O Expansions Number of Total Expansion Slots: 1 Management & Protocols Manageable: Yes Physical Characteristics Compatible Rack Unit: 1U Form Factor: Rack-mountable Height: 1.8" Width: 17" Depth: 10.3" Weight (Approximate): 10.10 lb Miscellaneous Country of Origin: Taiwan TAA Compliant: Yes
Dedicated account managers are available to assist you with purchasing and presales questions at 877-712-2230 Monday through Friday 8-5pm. What Forms Of Payment Do We Take?We accept all forms of payment including Visa, Mastercard, American Express, Discover, Wire Transfer, and Check in Advance. Purchase orders are accepted and net terms are given based on a credit check. Why Buy From ITO?ITO Solutions, Inc. purpose is to provide you, our client, with best in class technology solutions to help you run your network efficiently by leveraging our integrity, partnerships, and years of experience within the IT industry. Our account managers are here to answer your questions and provide you with solutions very effectively.
|
|
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
Key Features
Product Description
Today's organizations face unprecedented security challenges. The sophistication and volume of attacks is increasing exponentially, often resulting in lost company, personal and customer data; stolen intellectual property; damaged reputations; and lost productivity. At the same time, security has become more complex. Organizations are grappling with the BYOD revolution and the explosion of personal devices connecting to the network. Personal smartphones and tablets slow network performance and productivity, and mobile applications such as social media and video streaming consume an enormous amount of bandwidth. In order to address these network security and productivity challenges, some organizations have chosen to compromise their security by turning off features to maintain network performance.
- Firewall Protection Supported: Application Control, Gateway Antivirus, Reassembly-free Deep Packet Inspection, Access Control, Remote Access Authentication, Malware Protection, Deep Inspection Firewall, Web Content Filtering, Anti-spyware, Packet Inspection, Content Filtering, Proxy Blocking, URL Filtering, Intrusion Prevention, Trojan Horse, Stateful Packet Filtering, ICMP Flood, SYNflood Protection, UDP Flood, Denial of Service (DoS), TCP stream reassembly, Keyword Filtering, Distributed Denial of Service (DDoS), Zero Day Event, Ingress Filtering, Egress Filtering
- Encryption Standard: DES, 3DES, AES (128-bit), AES (192-bit), AES (256-bit), MD5, SHA-1
- Total Number of Ports: 8
- USB: Yes
- PoE (RJ-45) Port: No
- Number of Network (RJ-45) Ports: 8
- Ethernet Technology: Gigabit Ethernet
- Network Standard: 10/100/1000Base-T
- Wireless LAN: No
- Number of Total Expansion Slots: 1
- Manageable: Yes
- Compatible Rack Unit: 1U
- Form Factor: Rack-mountable
- Height: 1.8"
- Width: 17"
- Depth: 10.3"
- Weight (Approximate): 10.10 lb
- Country of Origin: Taiwan
- TAA Compliant: Yes
|
|
 |
 |
 |
 |

|