Introduction
12
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
• Hidden mode. The SSID is not broadcast, assuring that only clients configured with the
correct SSID can connect.
• Secure an
d economical operation. Adjustable power output allows more secure or
economical operation.
Advanced VPN Support for Both IPSec and SSL
The wireless VPN firewall supports IPSec and SSL virtual private network (VPN)
connections:
• IPSec VPN delivers fu
ll network access between a central office and branch offices, or
between a central office and telecommuters. Remote access by telecommuters requires
the installation of VPN client software on the remote computer.
- IPSec VPN with b
road protocol support for secure connection to other IPSec
gateways and clients.
- Up to 12
simultaneous IPSec VPN connections.
- Bundled with
a 30-day trial license for the ProSafe VPN Client software (VPN01L).
• SSL VPN p
rovides remote access for mobile users to selected corporate resources
without requiring a preinstalled VPN client on their computers.
- Uses the fa
miliar Secure Sockets Layer (SSL) protocol, commonly used for
e-commerce transactions, to provide client-free access with customizable user portals
and support for a wide variety of user repositories.
- Up to five simult
aneous SSL VPN connections.
- Allo
ws browser-based, platform-independent remote access through a number of
popular browsers, such as Microsoft Internet Explorer, Mozilla Firefox, and Apple
Safari.
- Provides granular access to
corporate resources based on user type or group
membership.
A Powerful, True Firewall
Unlike simple NAT routers, the wireless VPN firewall is a true firewall, using stateful packet
inspection (SPI) to defend against hacker attacks. Its firewall features have the following
capabilities:
• DoS protection. Automa
tically detects and thwarts denial of service (DoS) attacks such
as Ping of Death and SYN flood.
• Secure firewall. Blocks un
wanted traffic from the Internet to your LAN.
• Schedul
e policies. Permits scheduling of firewall policies by day and time.
• Logs security incident
s. Logs security events such as logins and secure logins. You can
configure the firewall to email the log to you at specified intervals.