![]() | The NETGEAR ProSecure is an all-in-one gateway security hardware appliance for businesses up to 100 concurrent users in size. The ProSecure UTM combines application proxy firewall, VPN, zero day protection, anti-virus, anti-spyware, anti-spam, intrusion prevention, and URL filtering for total protection.
|
Choose a ProSecure UTM Series | ||
| » 1-5 Concurrent Users » 90 Mbps Firewall Throughput » 40 Mbps VPN Throughput » 5 Site to Site VPN Tunnels » 2 SSL VPN Tunnels | » 1-15 Concurrent Users » 90 Mbps Firewall Throughput » 50 Mbps VPN Throughput » 10 Site to Site VPN Tunnels » 5 SSL VPN Tunnels | » 10-30 Concurrent Users » 127 Mbps Firewall Throughput » 70 Mbps VPN Throughput » 25 Site to Site VPN Tunnels » 13 SSL VPN Tunnels » Dual WAN Fail-over » Load Balancing |
ProSecure UTM150![]() |
||
| » 25-50 Concurrent Users » 400 Mbps Firewall Throughput » 200 Mbps VPN Throughput » 50 Site to Site VPN Tunnels » 25 SSL VPN Tunnels » Dual WAN Fail-over » Load Balancing | » 50-150 Concurrent Users » 900 Mbps Firewall Throughput » 400 Mbps VPN Throughput » 150 Site to Site VPN Tunnels » 75 SSL VPN Tunnels » Dual WAN Fail-over » Load Balancing | |
| UTM Models | UTM 5 | UTM 10 | UTM 25 | UTM 50 | UTM 150 |
|---|---|---|---|---|---|
Sizing Guidelines | |||||
| Average Anti-virus Throughput¹ | 15 Mbps | 20 Mbps | 25 Mbps | 45 Mbps | 130 Mbps |
| Stateful Packet Inspection Firewall Throughput¹ | 90 Mbps | 90 Mbps | 127 Mbps | 400 Mbps | 900 Mbps |
| Maximum VPN Throughput¹ | 40 Mbps | 50 Mbps | 70 Mbps | 200 Mbps | 400 Mbps |
| Maximum Concurrent Connections¹ | 8,000 | 12,000 | 27,000 | 40,000 | 65,000 |
| VLANs | 255 | 255 | 255 | 255 | 255 |
Content Security | |||||
| Web and Email Scanned Protocols | HTTP, HTTPS, FTP, SMTP, IMAP, POP3 | ||||
| Stream Scanning | ![]() | ![]() | ![]() | ![]() | ![]() |
| Inbound and Outbound Inspection | ![]() | ![]() | ![]() | ![]() | ![]() |
| Signature-Less Zero Hour Protection | ![]() | ![]() | ![]() | ![]() | ![]() |
| Malware Signatures | 1.2 Million | 1.2 Million | 1.2 Million | 1.2 Million | 1.2 Million |
| Automatic Signature Updates | Hourly | Hourly | Hourly | Hourly | Hourly |
| Web Content Filters | Filter By: HTML Body Keywords, File Extension | ||||
| Web Object Filters | ActiveX, Java™, Flash, JavaScript™, Proxy, Cookies | ||||
| Email Content Filters | Filter By: Subject Keywords, Password-protected Attachments, File Extension, File Name | ||||
| Distributed Spam Analysis | ![]() | ![]() | ![]() | ![]() | ![]() |
| Distributed Spam Analysis Supported Protocols | SMTP, POP3 | ||||
| Anti-spam Real-time Blacklist (RBL) | ![]() | ![]() | ![]() | ![]() | ![]() |
| User Defined Spam Allowed/Block Lists | Filter By: Sender Email Address, Domain, IP Address, Recipient Email Address, Domain | ||||
| Distributed Web Analysis w/ 64 categories | ![]() | ![]() | ![]() | ![]() | ![]() |
| Instant Messaging (IM) Control | MSN® Messenger, Yahoo!® Messenger, mIRC, Google Talk | ||||
| Peer to Peer (P2P) Control | BitTorrent™, eDonkey, Gnutella | ||||
| Maximum Number of Users | Unlimited | ||||
Firewall Features | |||||
| Stateful Packet Inspection (SPI) | Port/Service Blocking, Denial-of-service (DoS) Prevention, Stealth Mode, Block TCP Flood, Block UDP Flood, WAN/LAN Ping Response Control | ||||
| Intrusion Detection & Prevention (IPS) | ![]() | ![]() | ![]() | ![]() | ![]() |
| WAN Modes | NAT, Classical Routing | ||||
| ISP Address Assignment | DHCP, Static IP Assignment, PPPoE, PPTP | ||||
| NAT Modes | 1-1 NAT, PAT | ||||
| Routing | Static, Dynamic, RIPv1, RIPv2 | ||||
| VoIP | SIP ALG | ||||
| DDNS | DynDNS.org, TZO.com, Oray.net | ||||
| Firewall Functions | Port Range Forwarding, Port Triggering, DNS proxy, MAC Address Cloning/spoofing, Network Time Protocol NTP Support, Diagnostic Tools (ping, DNS lookup, trace route, other), Auto-Uplink on Switch Ports, L3 Quality of Service (QoS), LAN-to-WAN and WAN-to-LAN (ToS) | ||||
| DHCP | DHCP Server, DHCP Relay | ||||
| User Authentication for VPN | Active Directory, LDAP, Radius, Local User Database | ||||
| Security Policies Based on Active Directory with Single Sign-On (SSO) | n/a | n/a | n/a | ![]() | ![]() |
| PCI Compliance Two Factor Authentication Support | ![]() | ![]() | ![]() | ![]() | ![]() |
VPN | |||||
| Site to Site VPN Tunnels | 5 | 10 | 25 | 50 | 150 |
| SSL VPN for Remote Access | 2 | 5 | 13 | 25 | 75 |
| IPsec Encryption Algorithm | DES, 3DES, AES(128,192,256 bit)/SHA-1, MD5 | ||||
| Key Exchange | IKE, Manual Key, Pre-Shared Key, PKI, X.500 | ||||
| IPsec NAT Traversal (VPN Passthrough) | ![]() | ![]() | ![]() | ![]() | ![]() |
| iPhone Native VPN Client Support | ![]() | ![]() | ![]() | ![]() | ![]() |
| SSL Version Support | SSLv3, TLS1.0 | ||||
| SSL Encryption Support | DES, 3DES, ARC4, AES(128,256bit) | ||||
| SSL Message Integrity | MD5, SHA-1, MAC-MD5/SHA-1, HMAC-MD5/SHA-1 | ||||
| SSL Certificate Support | RSA, Diffie-Hellman, Self | ||||
| SSL VPN Platforms Supported | Windows 2000 / XP / Vista® (32bit), Windows 7 (32 and 64bit), Mac OS® X 10.4.x/10.6.x | ||||
Deployment | |||||
| VLAN Support | ![]() | ![]() | ![]() | ![]() | ![]() |
| Dual-WAN Fail-over | n/a | n/a | ![]() | ![]() | ![]() |
| Intelligent Traffic Load Balancing | n/a | n/a | ![]() | ![]() | ![]() |
| Configuration Wizards | Setup, IPsec VPN, SSL VPN | ||||
Logging and Reporting | |||||
| Management | HTTP/HTTPS, SNMP v2c | ||||
| Reporting | Summary Statistics, Graphical Reporting, Automatic Outbreak Alerts, Automatic Malware Notifications, System Notifications | ||||
| Logging | Traffic, Malware, Spam, Content Filter, Email Filter, System, Service, IPS, Port Scan, IM, P2P, Firewall, IPsec VPN, SSL VPN | ||||
| Log Delivery | Management GUI Query, Email Delivery, Syslog | ||||
Hardware | |||||
| Gigabit RJ45 Ports WAN/LAN | 1/4 | 1/4 | 2/4 | 2/6 | 4/4 |
| DMZ Interfaces (Configurable) | 1 | 1 | 1 | 1 | 1 |
| Flash Memory/RAM | 2 GB/512 MB | 2 GB/512 MB | 2 GB/1 GB | 2 GB/1 GB | 2 GB/1 GB |
| Administration Console Port | RS232 | RS232 | RS232 | RS232 | RS232 |
| USB Ports | 1 | 1 | 1 | 1 | 1 |
| Certifications | ICSA: Anti-virus VPNC: AES Interop, Basic Interop Checkmark: Anti-Malware, Anti-Spam, Enterprise Firewall, VPN, IPS, URL Filtering | ||||
| Major Regulatory Compliance | FCC Class A, CE, WEEE, RoHS | ||||
| Storage and Operating Temperatures | Operating Temperature 0-45°C (32°-113°F), Storage Temperature -20-70°C (-4°-158°F) | ||||
| Humidity | Operation 90% Maximum Relative, Storage 95% Maximum Relative | ||||
| Electrical Specifications | 100-240V, AC/50-60Hz, Universal Input, 1.2 Amp Max | 100-240V, AC/50-60Hz, Universal Input, 1.0 Amp Max | |||
| Dimensions (W x H x D) cm | 33 x 4.3 x 20.9 | 33 x 4.3 x 20.9 | 33 x 4.3 x 20.9 | 44 x 4.3 x 26.1 | 44 x 4.3 x 26.1 |
| Dimensions (W x H x D) inches | 13 x 1.7 x 8.2 | 13 x 1.7 x 8.2 | 13 x 1.7 x 8.2 | 17.3 x 1.7 x 10.3 | 17.3 x 1.7 x 10.3 |
| Weight (kg) | 2.1 | 2.1 | 2.1 | 2.9 | 2.9 |
| Weight (lb) | 4.6 | 4.6 | 4.6 | 6.4 | 6.4 |
| Package Contents | ProSecure UTM Appliance , Power Cable, Rubber Feet, Resource CD, Rackmount Kit, Warranty Card, Quick Installation Guide, Subscription Card (Bundles Only) | ||||
| Hardware Warranty | Lifetime | ||||
![]() | A comprehensive all-in-one gateway security solutionAn all-in-one gateway security hardware appliance for growing businesses. The ProSecure UTM combines application proxy firewall, VPN, zero day protection, anti-virus, anti-spyware, anti-spam, intrusion prevention, and URL filtering for total protection. |
Key Features & Advantages:
The ProSecure UTM series of all-in-one gateway security appliances combine best-of-breed enterprise-strength security technologies from Commtouch®, Mailshell™, and Sophos™ with patent-pending Stream Scanning Technology to protect businesses against today's Web, email, and network threats. Malware hosted on Web pages, phishing attacks, spam, virus infected emails, hackers, denial-of-service attacks, and other threats are now all part of a regular repertoire of sophisticated blended attacks that bypass traditional firewalls with ease. Because comprehensive network security solutions require an abundance of processing power to examine network traffic in real time, existing all-in-one security solutions often use rudimentary security technologies that trade comprehensiveness for speed. True security must satisfy the requirements in both speed and coverage.
ProSecure Unified Threat Management (UTM) Appliances combine performance with comprehensive security coverage. Patent-pending Stream Scanning Technology enables the ProSecure UTM to utilize virus and malware threat databases from ProSecure and Sophos™ that are over one million signatures in size - up to 400x more comprehensive than legacy all-in-one platforms at a speed that is up to 5x faster than conventional methods. This architecture, combined with best-of-breed hybrid in-the-cloud Web filter and anti-spam technologies along with proven firewall, IPS, and VPN functionality, form the ideal growing business gateway security solution.


Given the high performance requirements of scanning latency sensitive Web traffic, incorporating enterprise-grade security software technologies onto traditional all-in-one platforms has been a very difficult task. Traditional batch-based scanning methods introduce large amounts of latency into network traffic and can slow Web browsing to a crawl. All-in-one solutions in the past have tried to overcome this by minimizing the malware signature set, scanning only a select few file types, or by avoiding Web scanning altogether. This exposes an entire vector of the network to malware-based attacks. The ProSecure UTM features patent-pending Stream Scanning Technology which analyses data streams as they enter the network. This significantly reduces latency and allows the use of an extensive malware signature library for scanning – thus offering an unprecedented combination of speed and coverage in an all-in-one solution.

The ProSecure UTM will easily replace any existing firewall or router. A simple 10-step setup wizard guides you through installation and the UTM will be up and running in minutes. Administration is performed through an intuitive Web-based interface. Set granular policies and alerts, check summary statistics and graphical reports, drill down to IP address-level data, and integrate log data with standard network management tools using SNMP. Malware and IPS signature, software, and firmware updates are all handled by the UTM - online and automatically.
For many administrators and IT personnel one of their biggest nightmares is the management of individual licenses or “seats.” Buying additional licenses when computers and personnel are added to the network is time-consuming and costly. The ProSecure UTM offers Web and email protection subscriptions with no “per-user” licensing.