Internet Security

Skip to Main Content »

Have a Question? Call Us!
Toll Free: 877.449.5102

Welcome to NTSecurity.com

You're currently on:

gateProtect gateProtect GPA 600 SMB Firewall ( 75-100 Users) gateProtect GPA 600 gateProtect GPA 600 UTM Firewall Appliances 2845.25 GPA 600 Next Generation Firewall Appliances

GPA 600 Next Generation Firewall Appliances have extensive features including VLAN, Layer 8 technology, single sign-on, bridging, VPN SSL via x.509 certificates & VPN IPSec, IDS/ IPS, traffic shaping, antivirus, zero hour mail protection, web filtering and the very latest procedure-oriented eGUI® technology. VPN connection performance is greatly enhanced by the special ASIC Crypto accelerator chip.

eGUI®-Technology

The new eGUI® technology from gateProtect is remarkable for its ergonomic approach to the processing operation. The display, even of sometimes very different applications, is always consistent and delivers the information required by the user for the current operation only. A measure of the quality of the gateProtect operator concept are the principles governing the design of software dialogue, as formulated in ISO 9241, part 110.

gate Protect eGUI-Technology

Extended User Authentication

Most modern firewall systems support proxy-based user authentication. This means that only those services which work with proxies such as HTTP or FTP can be issued to specific users. The gateProtect firewall has rule-based Extended User Authentication. This allows any number of services to be assigned individually to one user or a group of users. If a user logs on to the firewall from a computer, all the assigned services for the computer in question are enabled.

  1. Web browser/UA Client: logon is via an HTTPs connection.
  2. Single sign-on: Kerberos automatically passes the log-on to the domain to the firewall.

VPN Gateway (SSL with X.509 Certificates + IPSec)

gateProtect offers the most commonly used forms of current site-to-site and Road Warrior VPN connections via IPSec and SSL. Wizards and the eGUI® technology help with the management and set up of these connections. In addition, the firewall generates external configuration files when the VPN connections are created. These files can be used for setting up single click connections and also for site-tosite connections when importing on the firewall at a remote site.

Furthermore, gateProtect offers an IPSec and SSL site-to-site solution with X.509 certificates which can work in bridge mode as an option. For a normal bridge, two or more network cards are linked to form a logical network. gateProtect not only allows this for network cards but also for VPN-over-SSL connections. This makes it possible to treat remote computers as if they were in the local network.

Traffic Shaping & QoS / Up- & Download

The traffic shaping facility from gateProtect is one of the most comprehensive implementations on the market. Maximum and minimum bandwidth can be specified for each object on the desktop. Based on this, it is possible to manipulate the traffic for each service. Bandwidth distribution can be configured at any level of detail. Another special feature of the gateProtect solution is the prioritization of data packets in the VPN tunnel with QoS. This is important for time-critical applications where a delay would not be desirable. For example, gateProtect makes it possible to use VoIP via a VPN tunnel for interference-free telephone calls, irrespective of the utilization of the tunnel for RDP or data download, for instance.

gateProtect Traffic Shaping

High Availability

The high availability of gateProtect firewall systems is based on an active/passive system where a secondary firewall is installed in parallel with the primary firewall. The secondary firewall synchronizes itself constantly with the primary firewall using dedicated connections. It can therefore at any time take over the work of the primary firewall, should this fail, without any manual intervention.

gateProtect High Availability

Furthermore, the status of the primary firewall is monitored by different systems. If any problems are detected in the firewall, it switches itself off. The secondary firewall enables the synchronized configuration and can continue operating in the place of the primary firewall immediately. Downtime is minimized and problems can be dealt with under less pressure.

HTTPS Scan

It is not possible to scan HTTPS traffic on the firewall with the products from most other suppliers. Malware such as trojans and viruses exploit this open door to enter an internal network unhindered.

gateProtect is one of the few manufacturers to close this door with their xUTM appliances. gateProtect software can also scan encrypted HTTPS connections in the data traffic for viruses and other malware.

To do this, the data flow is decrypted at the firewall, analyzed and, if no viruses are found, re-encrypted and sent on its way again.

Load Balancing

gateProtect load balancing distributes the data traffic with the Internet to different routes. The firewall then decides which way the Internet is accessed each time a connection is established.

As a rule, this distribution is based on protocols. gateProtect also makes it possible to assign each individual connection to a route. This allows the utilization of Internet connections to be planned in great detail and optimized.

http://www.ntsecurity.com/gateprotect-gpa-600-xutm-appliances.html in_stock Yes Products Catalog USD
gateProtect GPA 600 UTM Firewall Appliances

GPA-600 gateProtect GPA 600 UTM Firewall Appliances


Finding Lowest
Internet Price...

FREE Training with Purchase

Purchase this gateProtect Firewall and receive free, unlimited access to our online training and how-to videos.


Purchase Orders & Company Checks Accepted.

gateProtect GPA 600 UTM Firewall Appliances

Double click on above image to view full picture

Zoom Out
Zoom In

More Views

Details

GPA 600 Next Generation Firewall Appliances

GPA 600 Next Generation Firewall Appliances have extensive features including VLAN, Layer 8 technology, single sign-on, bridging, VPN SSL via x.509 certificates & VPN IPSec, IDS/ IPS, traffic shaping, antivirus, zero hour mail protection, web filtering and the very latest procedure-oriented eGUI® technology. VPN connection performance is greatly enhanced by the special ASIC Crypto accelerator chip.

eGUI®-Technology

The new eGUI® technology from gateProtect is remarkable for its ergonomic approach to the processing operation. The display, even of sometimes very different applications, is always consistent and delivers the information required by the user for the current operation only. A measure of the quality of the gateProtect operator concept are the principles governing the design of software dialogue, as formulated in ISO 9241, part 110.

gate Protect eGUI-Technology

Extended User Authentication

Most modern firewall systems support proxy-based user authentication. This means that only those services which work with proxies such as HTTP or FTP can be issued to specific users. The gateProtect firewall has rule-based Extended User Authentication. This allows any number of services to be assigned individually to one user or a group of users. If a user logs on to the firewall from a computer, all the assigned services for the computer in question are enabled.

  1. Web browser/UA Client: logon is via an HTTPs connection.
  2. Single sign-on: Kerberos automatically passes the log-on to the domain to the firewall.

VPN Gateway (SSL with X.509 Certificates + IPSec)

gateProtect offers the most commonly used forms of current site-to-site and Road Warrior VPN connections via IPSec and SSL. Wizards and the eGUI® technology help with the management and set up of these connections. In addition, the firewall generates external configuration files when the VPN connections are created. These files can be used for setting up single click connections and also for site-tosite connections when importing on the firewall at a remote site.

Furthermore, gateProtect offers an IPSec and SSL site-to-site solution with X.509 certificates which can work in bridge mode as an option. For a normal bridge, two or more network cards are linked to form a logical network. gateProtect not only allows this for network cards but also for VPN-over-SSL connections. This makes it possible to treat remote computers as if they were in the local network.

Traffic Shaping & QoS / Up- & Download

The traffic shaping facility from gateProtect is one of the most comprehensive implementations on the market. Maximum and minimum bandwidth can be specified for each object on the desktop. Based on this, it is possible to manipulate the traffic for each service. Bandwidth distribution can be configured at any level of detail. Another special feature of the gateProtect solution is the prioritization of data packets in the VPN tunnel with QoS. This is important for time-critical applications where a delay would not be desirable. For example, gateProtect makes it possible to use VoIP via a VPN tunnel for interference-free telephone calls, irrespective of the utilization of the tunnel for RDP or data download, for instance.

gateProtect Traffic Shaping

High Availability

The high availability of gateProtect firewall systems is based on an active/passive system where a secondary firewall is installed in parallel with the primary firewall. The secondary firewall synchronizes itself constantly with the primary firewall using dedicated connections. It can therefore at any time take over the work of the primary firewall, should this fail, without any manual intervention.

gateProtect High Availability

Furthermore, the status of the primary firewall is monitored by different systems. If any problems are detected in the firewall, it switches itself off. The secondary firewall enables the synchronized configuration and can continue operating in the place of the primary firewall immediately. Downtime is minimized and problems can be dealt with under less pressure.

HTTPS Scan

It is not possible to scan HTTPS traffic on the firewall with the products from most other suppliers. Malware such as trojans and viruses exploit this open door to enter an internal network unhindered.

gateProtect is one of the few manufacturers to close this door with their xUTM appliances. gateProtect software can also scan encrypted HTTPS connections in the data traffic for viruses and other malware.

To do this, the data flow is decrypted at the firewall, analyzed and, if no viruses are found, re-encrypted and sent on its way again.

Load Balancing

gateProtect load balancing distributes the data traffic with the Internet to different routes. The firewall then decides which way the Internet is accessed each time a connection is established.

As a rule, this distribution is based on protocols. gateProtect also makes it possible to assign each individual connection to a route. This allows the utilization of Internet connections to be planned in great detail and optimized.

Additional Information

Manufacturer gateProtect
Designed For Mid-Enterprise Networks
Device Type medium-sized enterprises VPN / Firewall appliance
Bundled with No
Form Factor External
Ports Qty 8
Condition New
Renewal No
Height (Rack Units) 1U
Width 444 mm
Depth 270 mm
Height 44 mm
Weight 5.6 Kg
RAM Installed (Max) No
Flash Memory Installed (Max) No
Connectivity Technology 8 x RJ-45 10/100/1000Base-T Network LAN
2 x USB
1 x Serial Management
Data Transfer Rate 1 Gbps
Data Link Protocol Ethernet, Fast Ethernet
Network / Transport Protocol TCP/IP, PPTP, UDP/IP, L2TP, ICMP/IP, IPSec, PPPoE, DHCP
Routing Protocol No
Remote Management Protocol Web-Based Management, Command Line Interface, SNMP v2c, DHCP, QoS, VLAN, eGUI
Performance VPN Throughput: 700 Mbps
Firewall Throughput: 3500 Mbps
VPN IPSec throughput: 700 Mbps
UTM throughput: 400 Mbps
IDS / IPS throughput: 600 Mbps
Capacity 1250000 x Concurrent Session
15000 x New Sessions/second
Features User Authentication
VPN Authentication
Stateful Packet Filtering
Dead Peer Detection
Content Filtering
Firewall rules - timecontrolled
Packet filter
Adaptable Proxies
Stateful Inspection & Proxy combined
Failover
Load Balanci
Encryption Algorithm 3DES, AES (192-bit), AES (256-bit), AES (128-bit), MD5, SHA-1, Blowfish
Authentication Method Active Directory (NT Domain)
openLDAP + Kerberos
Single Sign-On
Compliant Standards X.509, X.509/IKE
VoIP Protocols No
Expansion Slots Total (Free) No
Interfaces 8 x 1 000 MBit: Ethernet
Included Accessories No
Pricing Type No
Power Device Power supply
Installed Qty (Power) 1
Voltage Required AC 100V-240V
Power Consumption Operational 110 V AC
Power Provided 220 V AC
OS Provided No
Software Included No
OS Required No
Min Operating Temperature 0 ~ 40 °C
Max Operating Temperature No
Humidity Range Operating 10 ~ 85%
Part Number GPA-600
UPC No
Protection Level UTM Enabled
Firewall Type Wired Firewall
Network Interface Speed 10/100/1000 Mbps
VPN Tunnels No
VPN Clients Included No
Product Articles RSS No
Price $2,995.00

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Additional Product Images: