Description
This Information Security Gateway allows you to effectively control and manage information flows from your company to the outside world. The NetDefend family of Firewall/VPN Security Appliances is D-Link's answer for hardware-based network security. The D-Link DFL-M510 NetDefend Information Security Gateway is a revolutionary security device designed to protect your network from the emerging security risks.
The DFL-M510 is an essential resource for business facing threats posed by an increasing use of instant messaging (IM) and peer-to-peer (P2P) applications. Without effective management and control mechanisms in place, these applications are vulnerable to a wide variety of security risks including viruses and worms, leakage of confidential information, corporate and regulatory compliance violations, and even identity theft.
The DFL-M510 can help address these threats by identifying unmanaged, unauthorized IM and P2P activity on your network. Effectively control and manage information flows from your company to the outside world. The DFL-M510 will not only let you control and manage IM and P2P applications, but also file transfers, e-mail and streaming media applications
IM/P2P and Bandwidth Management
The DFL-M510 allows you to better manage your employees' network activities and prevent possible misuse of IM and P2P applications. Implementation can be based on company policies and operation is both automatic and transparent. Eliminate excessive use of precious network bandwidth and prevent against possible leaks of company secrets through unauthorized and unmanaged communication.
Malicious Traffic Prevention
Hackers and scammers are becoming more sophisticated in their approach to vulnerable networks, distributing not just viruses and malicious agents, but putting together blended attacks, increasing perimeter security for other scam methods, multiplying mutations of initial attacks and migrating new threats. The DFL-M510 Information Security Gateway can prevent these threats by blocking illegal agents attempting to hide amongst normal network traffic, eliminating harmful programs, identifying victims and providing a ZoneDefense Mechanism* to quarantine infected computers. You can detect and drop traffic with health concerns, including Trojan, illegal agents and Network Worms, based on policy rules applied to specific groups, hosts, IP addresses and subnets.
Seamless Integration
The DFL-M510 integrates easily with industry-standard network infrastructures and works exceptionally well when used in tandem with a D-Link NetDefend VPN Firewall. Deployed between your company's internal network and the network firewall, the DFL-M510 can be installed in in-line mode without causing any change to your current network architecture. It implements a hardware bypass function that avoids single points of failure and maximizes network connection in the event of a hardware crash.
With the DFL-M510, leverage your existing investments by adding anti-virus and anti-IM spam, identity authentication and management, session logging and archiving, as well as detection and usage reporting. Improve office productivity, reduce potential legal liability, and enhance your company's overall network security with the D-Link DFL-M510 NetDefend Information Security Gateway.
* Future firmware upgrade
This Information Security Gateway allows you to effectively control and manage information flows from your company to the outside world. The NetDefend family of Firewall/VPN Security Appliances is D-Link's answer for hardware-based network security. The D-Link DFL-M510 NetDefend Information Security Gateway is a revolutionary security device designed to protect your network from the emerging security risks.
The DFL-M510 is an essential resource for business facing threats posed by an increasing use of instant messaging (IM) and peer-to-peer (P2P) applications. Without effective management and control mechanisms in place, these applications are vulnerable to a wide variety of security risks including viruses and worms, leakage of confidential information, corporate and regulatory compliance violations, and even identity theft.
The DFL-M510 can help address these threats by identifying unmanaged, unauthorized IM and P2P activity on your network. Effectively control and manage information flows from your company to the outside world. The DFL-M510 will not only let you control and manage IM and P2P applications, but also file transfers, e-mail and streaming media applications
IM/P2P and Bandwidth Management
The DFL-M510 allows you to better manage your employees' network activities and prevent possible misuse of IM and P2P applications. Implementation can be based on company policies and operation is both automatic and transparent. Eliminate excessive use of precious network bandwidth and prevent against possible leaks of company secrets through unauthorized and unmanaged communication.
Malicious Traffic Prevention
Hackers and scammers are becoming more sophisticated in their approach to vulnerable networks, distributing not just viruses and malicious agents, but putting together blended attacks, increasing perimeter security for other scam methods, multiplying mutations of initial attacks and migrating new threats. The DFL-M510 Information Security Gateway can prevent these threats by blocking illegal agents attempting to hide amongst normal network traffic, eliminating harmful programs, identifying victims and providing a ZoneDefense Mechanism* to quarantine infected computers. You can detect and drop traffic with health concerns, including Trojan, illegal agents and Network Worms, based on policy rules applied to specific groups, hosts, IP addresses and subnets.
Seamless Integration
The DFL-M510 integrates easily with industry-standard network infrastructures and works exceptionally well when used in tandem with a D-Link NetDefend VPN Firewall. Deployed between your company's internal network and the network firewall, the DFL-M510 can be installed in in-line mode without causing any change to your current network architecture. It implements a hardware bypass function that avoids single points of failure and maximizes network connection in the event of a hardware crash.
With the DFL-M510, leverage your existing investments by adding anti-virus and anti-IM spam, identity authentication and management, session logging and archiving, as well as detection and usage reporting. Improve office productivity, reduce potential legal liability, and enhance your company's overall network security with the D-Link DFL-M510 NetDefend Information Security Gateway.
* Future firmware upgrade
Technické specifikace produktu
Specifications
Real Transparent Mode Implementation
Hardware-Based Layer 7 Payload Inspection
Granular Management by Hosts, IPs, Groups and Subnets
Transparent Blocking of Trojan, Spyware, Illegal Agents, and Network Worms
Victim Identification
Hardware Bypass
Log/Analysis Report
DOS/DDOS Protection, Stealth Mode
IM/P2P Management
Layer 7 Applications Management
Health Checking
Real-Time Monitor and Report
Installation/Setup
Performance
Power Input
Dimensions
Operating Temperature
Storage Temperature
Safety
EMI
Operating Humidity
Warranty
1 Future firmware upgrade.
Real Transparent Mode Implementation
- Easy Installation with No Change to Existing Network Architecture
- Interoperability with third-party network devices
Hardware-Based Layer 7 Payload Inspection
- High-Performance Processing via ASIC Content Processing Chip
Granular Management by Hosts, IPs, Groups and Subnets
- Transparent Control of IM, P2P, File Transfers, Streaming Media, Personal Mail
- Discreet Control of Internet Activities Through Application of Policy-Based Actions on Hosts, Groups, IP Addresses, Subnets
Transparent Blocking of Trojan, Spyware, Illegal Agents, and Network Worms
- Prevention of Malicious Traffic Spreading on the Network
Victim Identification
- Isolation of Trouble Spots for Troubleshooting
Hardware Bypass
- No Single Points of Failure, Maximized Network Connection in Case of Hardware Crash
Log/Analysis Report
- Easily Readable Reports Printable in HTML Formats
DOS/DDOS Protection, Stealth Mode
- Protection from Various Kinds of DOS/DDOS Attacks
- No Response to ICMP Packets in Stealth Mode
IM/P2P Management
- Control/management of IM applications
- Control/management of P2P applications
- Policy setting by IP, host name, group or subnet
Layer 7 Applications Management
- Control/Management of Mile Transfers
- Control/Management of Streaming Media
- Control/Management of Web Applications
- Control/Management of Email for Personal Use
- User-Defined Application Control
Health Checking
- Detection/Blocking of Malicious Programs such as Spyware, SoftEther, Network Worms
- Victim Identification in Intranet
- D-Link Zone Defense Mechanism1 to Prevent Malicious Programs from Spreading on Network when Used in Conjunction with Certain D-Link Mananged Switches
Real-Time Monitor and Report
- Real-time Traffic Monitoring
- Multi-Layer TOP N Reports
Installation/Setup
- Plug-and-play Installation with No Change to Existing Network
- Transparent In-line mode, Seamless Integration with Other Network Devices
- Java Web-Based Setup Wizard
- Hardware Bypass Mechanism to Maximize Network Connectivity
- Stealth Mode for Interface
Performance
- 4,000 Concurrent TCP sessions
- Up to 150 Concurrent Users
- Up to 22Mbps Throughput (All Functions Enabled)
- Up to 80Mbps Throughput (Bypass Mode)
Power Input
- Internal Universal Power Supply
Dimensions
- Standard 19-Inch Rackmount, 1U Height
- 17.3” x 9.8” x 1.75”
Operating Temperature
- 32°F to 140°F
Storage Temperature
- -4°F to 158°F
Safety
- UL/CUL
- LVD (EN60950)
EMI
- FCC Class A
- CE Class A
- C-Tick
Operating Humidity
- 5% to 95% (non-condensing)
Warranty
- 1-Year
1 Future firmware upgrade.
Produktová podpora
Tento produkt byl ukončen: 02/03/2009
This product's last date of support is on: 02/03/2011
Version | Date | Type | File Size | |
---|---|---|---|---|
Datasheet (English) | - | 1.64mb | Stáhnout |
Version | Description | Date | Type | File Size | |
---|---|---|---|---|---|
Manual (English) | Manual (English) | - | 7.79mb | Stáhnout |
Version | Description | Date | Type | File Size | |
---|---|---|---|---|---|
Quick Installation Guide (English) | - | 0.72mb | Stáhnout |
Version | Description | Date | Type | |
---|---|---|---|---|
Firmware GPL Release Source | Firmware GPL Release Source | - | - | Stáhnout |
Version | Description | Date | |
---|---|---|---|
DEU_CE_A2_RevA | Certificate of Declaration A2 |
20.04.2006 | Stáhnout |