2
Internet Access Management SANGFOR TECHNOLOGIES Function Description Function Description SANGFOR ® IAM Product Features Log & Reports & Network Visibility Internet Access Control Internet Access Optimization Additional Features Equipment Management Real-time monitoring of CPU/hard disk/trafc/connection/ session status, as well as online user information, trafc ranking and connection ranking; real-time utilization visibility of bandwidth channels; Records a wide variety of audit information including: URL, Webpage title and content accessed (can record only Webpage content containing speci c keywords), outbound le transmissions via HTTP and FTP and le content, names and behavior of les downloaded, plain text thread posting and emails, chat sessions on MSN, MSN Shell, Skype, Yahoo! Messenger, Google Talk, etc.; also records application behavior such as network gaming, stock trading, entertainment, P2P downloads and Telnet; tallies user trafc and access duration and audits Webpage/le/email access of extranet users on intranet servers; Supports various kinds of reports, including scheduled reporting of statistics, behaviors, trend, comparison, plus customized reporting of trafc statistics, queries, ranking, times and behavior of users and user groups; Massed log storage with built-in and independent data center support; administrators can easily manage users based on a hierarchical permissions structure; Prevents access audits for users assigned audit-free keys; audit-free status cannot be arbitrarily changed by system administrato r (Optional); Data center administrators can view recorded audit logs only via audit check key (Optional); Google-like log search tool to enable the manager to locate logs quickly by entering multiple keywords, including the search and location of the content of the log attachments; supports the title subscription, and supports automatically sending the search results to designated mailbox; Bandwidth management based on wide range of criteria, including application type/Website type/le type, user, time, target IP, etc.; extranet-to-intranet access ow control and bandwidth management; In case that organizations may have multi-lines that connecting to the Internet, the IAM’s multi-lines and intelligent routing feature will allocate the best output for users automatically when Intranet users are visiting the resources of different ISP operators. To guarantee stability, IAM can also lead the trafc to the other healthy lines automatically when one line is interrupted; The “virtual line” visualizes one link into multiple virtual links and each virtual links can be applied with independent trafc shaping policies; The “virtual pipe” allows the trafc shaping pipes to be divided into 8 layers to offer better exibility; The “dynamic bandwidth control” allows “bandwidth borrowing” to optimize the bandwidth usage. All policies can be applied to uplink as well as downlink; The frequently accessed webpage, les and videos are cached in IAM appliance. When internal users visit these websites or watch these videos, they will get the data from IAM’s cache rather than directly from the servers in Internet; HTTP proxy; Socks 5 proxy; Transparent proxy; Built-in SPI rewall thwarts a range of security threats to gateway reliability , including DoS attacks, ARP spoong, etc.; Detects end-point prole (including OS version/patch, system processes, disk les, registry, etc.) and can prompt or reject access for end-points not meeting IT requirements or passing security tests; Built-in professional anti-virus engine supports gateway virus elimination (Optional); Deployable via router, bridge, bypass and multi-bridge topologies, with active-standby, active-active for HA; Web based management access; functionality of different modules can be assigned to different administrators as needed, via a hierarchical managemen t paradigm; Supports hardware bypass IP, MAC, IP/MAC binding, username/password, third-party authentication such as LDAP/AD/RADIUS/POP3/PROXY, USB-KEY and hardware authentication; Single Sign-on (SSO) options include LDAP/POP3/Proxy and forced SSO of designated network segment/account; account control via public/private accounts and account validity period; account import options include text list, IP/MAC scanning, and even account and organization structures from Active Directory servers; Accounts can be renamed (in the IP/MAC/computer name formats) based on new users’ IP segments; authentication exception-handling includes conict detection, privileged control after authentication failure and page forward control after successful authentication; Multi-level user account management to align with organizational structure, allowing access control based on account, IP, application, behavior, content, period, etc.; Implements re-use, integration and forced inheritance of access privileges by combining object-based access policy templates; Monitoring of accumulated duration and maximum trafc for specied user applications; Support Webpage ltering based on URL/search word/keyword contained in Webpage; Support keyword-based ltering of outbound Webmail and Web post; ne-grained control such as allowing only reading post but not post thread, and only allowing receiving but not sending mail; Optional URL database for in-box URL database, on-cloud URL database, Blue Printdata URL database; Over 1000 application identication rules conveniently built-in to identify and control popular network protocols, including IM chat, network games, Web-based stock trading, P2P, streaming media, remote control, and proxy software; Perfectly control over the usage of IM tools, including IM tool that been encrypted or not encrypted, such as MSN, Skype, Gtalk, MSNShell, Yahoo!, QQ, etc. Support blocking the designated IM tools or allow IM chatting while block le sharing and other applications via IM tools. Apart from that, the IAM’s IM logging feature also allows you to audit all the IM chatting content to ensure the full visualization of the network; Capable to control outbound le transmission via HTTP/FTP/email attachments, supports identication and blocking of outbound les based on le extensions and le types (to identify encrypted, compressed, extension name modied les); Supports complete blocking of email reception and sending, and ltering of outbound and inbound junk mail; ltering can be based on multiple conditions such as keyword, sender and receiver addresses; Identies over 30 popular P2P application protocols such as BitTorrent, eMule, etc. with deep packet inspection (DPI); SANGFOR’s patented intelligent P2P identi cation technology can further comprehensively identify and manage other variant P2P protocols, encrypted P2P behaviors and unknown P2P behaviors; Encrypted SSL URL ltering; identies and lters attempts to avoid management via public network proxies or encrypted proxy software; Capable to control behavior of sharing web access privileges with others via installed proxy software; Real-time monitor User identi cation  Aut hen tication exception Online access authorization  Web lt er ing  App lic ati on control IM software control File control Email control Intelligent P2P identi cation and control  Adv anced control  Acc ess au dit (Optional) Reporting Data center  Aud it- fr ee Key Data center aut- hentication Key Content search Bandwidth management Multiplexing and intelligent routing Virtual line virtual pipe Dynamic band-  wid th con tr ol Caching Proxy Deployment mode Device management Bypass Firewall End-point detection Gateway anti-virus

Sangfor IAM v3.4 Datasheet

  • Upload
    mbozho

  • View
    224

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Sangfor IAM v3.4 Datasheet

 

Internet Access ManagementSANGFOR TECHNOLOGIES

Function Description Function Description

SANGFOR® IAM Product Features

Log & Reports & Network Visibility Internet Access Control

Internet Access Optimization

Additional Features Equipment Management

 

Real-time monitoring of CPU/hard disk/traffic/connection/session status, as well as online user information, traffic rankingand connection ranking; real-time utilization visibility of bandwidth channels;

Records a wide variety of audit information including: URL,Webpage title and content accessed (can record onlyWebpage content containing specific keywords), outbound filetransmissions via HTTP and FTP and file content, names andbehavior of files downloaded, plain text thread posting andemails, chat sessions on MSN, MSN Shell, Skype, Yahoo!Messenger, Google Talk, etc.; also records application behaviorsuch as network gaming, stock trading, entertainment, P2Pdownloads and Telnet; tallies user traffic and access durationand audits Webpage/file/email access of extranet users onintranet servers;

Supports various kinds of reports, including scheduledreporting of statistics, behaviors, trend, comparison, pluscustomized reporting of traffic statistics, queries, ranking, timesand behavior of users and user groups;

Massed log storage with built-in and independent data centersupport; administrators can easily manage users based on ahierarchical permissions structure;

Prevents access audits for users assigned audit-free keys;audit-free status cannot be arbitrarily changed by systemadministrator (Optional);

Data center administrators can view recorded audit logs only viaaudit check key (Optional);

Google-like log search tool to enable the manager to locatelogs quickly by entering multiple keywords, including the searchand location of the content of the log attachments; supports thetitle subscription, and supports automatically sending thesearch results to designated mailbox;

Bandwidth management based on wide range of criteria,including application type/Website type/file type, user, time,target IP, etc.; extranet-to-intranet access flow control andbandwidth management;

In case that organizations may have multi-lines that connectingto the Internet, the IAM’s multi-lines and intelligent routingfeature will allocate the best output for users automaticallywhen Intranet users are visiting the resources of different ISPoperators. To guarantee stability, IAM can also lead the traffic tothe other healthy lines automatically when one line isinterrupted;

The “virtual line” visualizes one link into multiple virtual links andeach virtual links can be applied with independent trafficshaping policies;

The “virtual pipe” allows the traffic shaping pipes to be dividedinto 8 layers to offer better flexibility;

The “dynamic bandwidth control” allows “bandwidthborrowing” to optimize the bandwidth usage. All policies canbe applied to uplink as well as downlink;

The frequently accessed webpage, files and videos are cachedin IAM appliance. When internal users visit these websites orwatch these videos, they will get the data from IAM’s cacherather than directly from the servers in Internet;

HTTP proxy; Socks 5 proxy; Transparent proxy;

Built-in SPI firewall thwarts a range of security threats to gatewayreliability, including DoS attacks, ARP spoofing, etc.;

Detects end-point profile (including OS version/patch, systemprocesses, disk files, registry, etc.) and can prompt or rejectaccess for end-points not meeting IT requirements or passingsecurity tests;

Built-in professional anti-virus engine supports gateway viruselimination (Optional);

Deployable via router, bridge, bypass and multi-bridgetopologies, with active-standby, active-active for HA;

Web based management access; functionality of differentmodules can be assigned to different administrators as needed,via a hierarchical management paradigm;

Supports hardware bypass

IP, MAC, IP/MAC binding, username/password, third-partyauthentication such as LDAP/AD/RADIUS/POP3/PROXY,USB-KEY and hardware authentication; Single Sign-on (SSO)options include LDAP/POP3/Proxy and forced SSO of designated network segment/account; account control viapublic/private accounts and account validity period; accountimport options include text list, IP/MAC scanning, and evenaccount and organization structures from Active Directoryservers;

Accounts can be renamed (in the IP/MAC/computer nameformats) based on new users’ IP segments; authenticationexception-handling includes conflict detection, privilegedcontrol after authentication failure and page forward controlafter successful authentication;

Multi-level user account management to align withorganizational structure, allowing access control based onaccount, IP, application, behavior, content, period, etc.;Implements re-use, integration and forced inheritance of accessprivileges by combining object-based access policy templates;Monitoring of accumulated duration and maximum traffic forspecified user applications;

Support Webpage filtering based on URL/searchword/keyword contained in Webpage; Support keyword-basedfiltering of outbound Webmail and Web post; fine-grainedcontrol such as allowing only reading post but not post thread,and only allowing receiving but not sending mail; Optional URLdatabase for in-box URL database, on-cloud URL database,Blue Printdata URL database;

Over 1000 application identification rules conveniently built-into identify and control popular network protocols, including IMchat, network games, Web-based stock trading, P2P, streamingmedia, remote control, and proxy software;

Perfectly control over the usage of IM tools, including IM toolthat been encrypted or not encrypted, such as MSN, Skype,Gtalk, MSNShell, Yahoo!, QQ, etc. Support blocking thedesignated IM tools or allow IM chatting while block file sharingand other applications via IM tools. Apart from that, the IAM’sIM logging feature also allows you to audit all the IM chattingcontent to ensure the full visualization of the network;

Capable to control outbound file transmission viaHTTP/FTP/email attachments, supports identification andblocking of outbound files based on file extensions and filetypes (to identify encrypted, compressed, extension namemodified files);

Supports complete blocking of email reception and sending,and filtering of outbound and inbound junk mail; filtering canbe based on multiple conditions such as keyword, sender andreceiver addresses;

Identifies over 30 popular P2P application protocols such asBitTorrent, eMule, etc. with deep packet inspection (DPI);SANGFOR’s patented intelligent P2P identification technologycan further comprehensively identify and manage other variantP2P protocols, encrypted P2P behaviors and unknown P2Pbehaviors;

Encrypted SSL URL filtering; identifies and filters attempts toavoid management via public network proxies or encryptedproxy software; Capable to control behavior of sharing webaccess privileges with others via installed proxy software;

Real-timemonitor

Useridentification

 Authenticationexception

Online accessauthorization

 Web filtering

 Applicationcontrol

IM softwarecontrol

File control

Email control

Intelligent P2Pidentificationand control

 Advancedcontrol

 Access audit(Optional)

Reporting

Data center

 Audit-free Key

Data center aut-hentication Key

Content search

Bandwidthmanagement

Multiplexingandintelligentrouting

Virtual line

virtual pipe

Dynamic band- width control

Caching

Proxy Deploymentmode

Devicemanagement

Bypass

Firewall

End-pointdetection

Gatewayanti-virus

Page 2: Sangfor IAM v3.4 Datasheet

 

Typical Deployment

SANGFOR® IAM Product Family

Profile

1U

1U

1U

2U

2U

2U

2U

RAM

512M

1G

2G

2G

4G

4G

4G

HDCapacity

250GB

250GB

250GB

500GB

500GB

500GB

500GB

Throughput(without proxy)

5~8 Mbps

10~20 Mbps

25~50 Mbps

60~130 Mbps

140~300 Mbps

300~400 Mbps

400 Mbps ~1 Gbps

Concurrent Connections(without proxy)

30,000

40,000

120,000

400,000

550,000

700,000

1,000,000

Throughput(with proxy)

N/A

5~15 Mbps

18~35 Mbps

40~75 Mbps

100~150 Mbps

150~250 Mbps

250~500 Mbps

Concurrent Connections(with proxy)

N/A

7,000

15,000

20,000

60,000

85,000

100,000

Model

M5000

M5100

M5400

M5500

M5600

M5800

M5900

Concurrent Users

50~100

100~200

200~500

500~1,200

1,200~3,000

3,000~5,000

5,000~10,000

2U 4G 500GB 800 Mbps ~2 Gbps 1,700,000 400 Mbps~1 Gbps 120,000M6000 10,000~14,000

Model Specifications

Model

M5000

M5100

M5400

M5500

M5600

M5800

M5900

Power [Watt](Typical)

60W

80W

250W

250W

350W

460W

460W

Temperature

0℃~40℃

0℃~40℃

0℃~40℃

0℃~40℃

0℃~40℃

0℃~40℃

0℃~40℃

Relative Humidity

5%~95% non-condensing

5%~95% non-condensing

5%~95% non-condensing

5%~95% non-condensing

5%~95% non-condensing

5%~95% non-condensing

5%~95% non-condensing

System Dimensions(W×L×H)

440x300x50 mm3

430x274.8x44.5 mm3

440x420x44.5 mm3

440x500x89 mm3

440x435.4x88 mm3

440x600x90 mm3

440x600x90 mm3

System Weight

4.0 Kg

4.25 Kg

7.0 Kg

10.9 Kg

18.0 Kg

19.0 Kg

19.0 Kg

Power and Physical Specifications

Model

M5000

M5100

M5400

M5500

M5600

M5800

M5900

Bypass (copper)

1 pair

1 pair

1 pair

1 pair

3 pair

3 pair

2 pair

M6000 2 pair

 WAN

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

LAN

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

DMZ

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

 WAN

2

2

4

4

4

4

2

2

LAN

1

1

1

1

1

1

1

1

DMZ

1

1

1

1

1

1

1

1

SFP

N/A

N/A

N/A

4

4

4

4

4

Serial Port

RJ45×1

RJ45×1

RJ45×1

RJ45×2

RJ45×1

RJ45×1

RJ45×1

RJ45×1

USB

1

2

N/A

N/A

1

1

2

2

10/100 Base-T 10/100/1000 Base-T Other Interfaces

Network Interfaces

Dual PowerSupplies

N/A

N/A

N/A

N/A

M6000 460W 0℃~40℃ 5%~95% non-condensing 440x600x90 mm3 20.0 Kg√

SANGFOR TECHNOLOGIES CO., LTD www.sangfor.com