![]() | Enterprise-grade security features, partnered with Sophos™, Commtouch™, and Mailshell™ include industry-leading anti-malware/anti-virus scanning, hybrid in-the-cloud URL Filtering, Distributed Spam Analysis Anti-Spam using an in-the-cloud architecture, HTTP/HTTPS inspection, SSL and IPSec VPNs, and VOIP Support. Ideal as a standalone security solution for independent businesses or a ROBO solution / VPN Endpoint for larger, distributed organizations.
|
| UTM Models | UTM 5 | UTM 10 | UTM 25 | UTM 50 | UTM 150 |
|---|---|---|---|---|---|
Sizing Guidelines | |||||
| Average Anti-virus Throughput¹ | 15 Mbps | 20 Mbps | 25 Mbps | 45 Mbps | 130 Mbps |
| Stateful Packet Inspection Firewall Throughput¹ | 90 Mbps | 90 Mbps | 127 Mbps | 400 Mbps | 900 Mbps |
| Maximum VPN Throughput¹ | 40 Mbps | 50 Mbps | 70 Mbps | 200 Mbps | 400 Mbps |
| Maximum Concurrent Connections¹ | 8,000 | 12,000 | 27,000 | 40,000 | 65,000 |
| VLANs | 255 | 255 | 255 | 255 | 255 |
Content Security | |||||
| Web and Email Scanned Protocols | HTTP, HTTPS, FTP, SMTP, IMAP, POP3 | ||||
| Stream Scanning | ![]() | ![]() | ![]() | ![]() | ![]() |
| Inbound and Outbound Inspection | ![]() | ![]() | ![]() | ![]() | ![]() |
| Signature-Less Zero Hour Protection | ![]() | ![]() | ![]() | ![]() | ![]() |
| Malware Signatures | 1.2 Million | 1.2 Million | 1.2 Million | 1.2 Million | 1.2 Million |
| Automatic Signature Updates | Hourly | Hourly | Hourly | Hourly | Hourly |
| Web Content Filters | Filter By: HTML Body Keywords, File Extension | ||||
| Web Object Filters | ActiveX, Java™, Flash, JavaScript™, Proxy, Cookies | ||||
| Email Content Filters | Filter By: Subject Keywords, Password-protected Attachments, File Extension, File Name | ||||
| Distributed Spam Analysis | ![]() | ![]() | ![]() | ![]() | ![]() |
| Distributed Spam Analysis Supported Protocols | SMTP, POP3 | ||||
| Anti-spam Real-time Blacklist (RBL) | ![]() | ![]() | ![]() | ![]() | ![]() |
| User Defined Spam Allowed/Block Lists | Filter By: Sender Email Address, Domain, IP Address, Recipient Email Address, Domain | ||||
| Distributed Web Analysis w/ 64 categories | ![]() | ![]() | ![]() | ![]() | ![]() |
| Instant Messaging (IM) Control | MSN® Messenger, Yahoo!® Messenger, mIRC, Google Talk | ||||
| Peer to Peer (P2P) Control | BitTorrent™, eDonkey, Gnutella | ||||
| Maximum Number of Users | Unlimited | ||||
Firewall Features | |||||
| Stateful Packet Inspection (SPI) | Port/Service Blocking, Denial-of-service (DoS) Prevention, Stealth Mode, Block TCP Flood, Block UDP Flood, WAN/LAN Ping Response Control | ||||
| Intrusion Detection & Prevention (IPS) | ![]() | ![]() | ![]() | ![]() | ![]() |
| WAN Modes | NAT, Classical Routing | ||||
| ISP Address Assignment | DHCP, Static IP Assignment, PPPoE, PPTP | ||||
| NAT Modes | 1-1 NAT, PAT | ||||
| Routing | Static, Dynamic, RIPv1, RIPv2 | ||||
| VoIP | SIP ALG | ||||
| DDNS | DynDNS.org, TZO.com, Oray.net | ||||
| Firewall Functions | Port Range Forwarding, Port Triggering, DNS proxy, MAC Address Cloning/spoofing, Network Time Protocol NTP Support, Diagnostic Tools (ping, DNS lookup, trace route, other), Auto-Uplink on Switch Ports, L3 Quality of Service (QoS), LAN-to-WAN and WAN-to-LAN (ToS) | ||||
| DHCP | DHCP Server, DHCP Relay | ||||
| User Authentication for VPN | Active Directory, LDAP, Radius, Local User Database | ||||
| Security Policies Based on Active Directory with Single Sign-On (SSO) | n/a | n/a | n/a | ![]() | ![]() |
| PCI Compliance Two Factor Authentication Support | ![]() | ![]() | ![]() | ![]() | ![]() |
VPN | |||||
| Site to Site VPN Tunnels | 5 | 10 | 25 | 50 | 150 |
| SSL VPN for Remote Access | 2 | 5 | 13 | 25 | 75 |
| IPsec Encryption Algorithm | DES, 3DES, AES(128,192,256 bit)/SHA-1, MD5 | ||||
| Key Exchange | IKE, Manual Key, Pre-Shared Key, PKI, X.500 | ||||
| IPsec NAT Traversal (VPN Passthrough) | ![]() | ![]() | ![]() | ![]() | ![]() |
| iPhone Native VPN Client Support | ![]() | ![]() | ![]() | ![]() | ![]() |
| SSL Version Support | SSLv3, TLS1.0 | ||||
| SSL Encryption Support | DES, 3DES, ARC4, AES(128,256bit) | ||||
| SSL Message Integrity | MD5, SHA-1, MAC-MD5/SHA-1, HMAC-MD5/SHA-1 | ||||
| SSL Certificate Support | RSA, Diffie-Hellman, Self | ||||
| SSL VPN Platforms Supported | Windows 2000 / XP / Vista® (32bit), Windows 7 (32 and 64bit), Mac OS® X 10.4.x/10.6.x | ||||
Deployment | |||||
| VLAN Support | ![]() | ![]() | ![]() | ![]() | ![]() |
| Dual-WAN Fail-over | n/a | n/a | ![]() | ![]() | ![]() |
| Intelligent Traffic Load Balancing | n/a | n/a | ![]() | ![]() | ![]() |
| Configuration Wizards | Setup, IPsec VPN, SSL VPN | ||||
Logging and Reporting | |||||
| Management | HTTP/HTTPS, SNMP v2c | ||||
| Reporting | Summary Statistics, Graphical Reporting, Automatic Outbreak Alerts, Automatic Malware Notifications, System Notifications | ||||
| Logging | Traffic, Malware, Spam, Content Filter, Email Filter, System, Service, IPS, Port Scan, IM, P2P, Firewall, IPsec VPN, SSL VPN | ||||
| Log Delivery | Management GUI Query, Email Delivery, Syslog | ||||
Hardware | |||||
| Gigabit RJ45 Ports WAN/LAN | 1/4 | 1/4 | 2/4 | 2/6 | 4/4 |
| DMZ Interfaces (Configurable) | 1 | 1 | 1 | 1 | 1 |
| Flash Memory/RAM | 2 GB/512 MB | 2 GB/512 MB | 2 GB/1 GB | 2 GB/1 GB | 2 GB/1 GB |
| Administration Console Port | RS232 | RS232 | RS232 | RS232 | RS232 |
| USB Ports | 1 | 1 | 1 | 1 | 1 |
| Certifications | ICSA: Anti-virus VPNC: AES Interop, Basic Interop Checkmark: Anti-Malware, Anti-Spam, Enterprise Firewall, VPN, IPS, URL Filtering | ||||
| Major Regulatory Compliance | FCC Class A, CE, WEEE, RoHS | ||||
| Storage and Operating Temperatures | Operating Temperature 0-45°C (32°-113°F), Storage Temperature -20-70°C (-4°-158°F) | ||||
| Humidity | Operation 90% Maximum Relative, Storage 95% Maximum Relative | ||||
| Electrical Specifications | 100-240V, AC/50-60Hz, Universal Input, 1.2 Amp Max | 100-240V, AC/50-60Hz, Universal Input, 1.0 Amp Max | |||
| Dimensions (W x H x D) cm | 33 x 4.3 x 20.9 | 33 x 4.3 x 20.9 | 33 x 4.3 x 20.9 | 44 x 4.3 x 26.1 | 44 x 4.3 x 26.1 |
| Dimensions (W x H x D) inches | 13 x 1.7 x 8.2 | 13 x 1.7 x 8.2 | 13 x 1.7 x 8.2 | 17.3 x 1.7 x 10.3 | 17.3 x 1.7 x 10.3 |
| Weight (kg) | 2.1 | 2.1 | 2.1 | 2.9 | 2.9 |
| Weight (lb) | 4.6 | 4.6 | 4.6 | 6.4 | 6.4 |
| Package Contents | ProSecure UTM Appliance , Power Cable, Rubber Feet, Resource CD, Rackmount Kit, Warranty Card, Quick Installation Guide, Subscription Card (Bundles Only) | ||||
| Hardware Warranty | Lifetime | ||||
ProSecure™ UTM appliances are situated between an organization's internal network and the Internet. The UTM acts as a stateful packet inspection firewall, keeping track of TCP connection state for every connection that is maintained through the UTM. Moreover, the UTM manages an organization's Internet usage and protects these organizations from Internet borne malware, spam, viruses, and inappropriate web surfing. With the ProSecure™ UTM appliance sitting between the organization and the Internet, it is critical that the UTM appliance is sized appropriately and matches the performance needs of the organization.
There are no industry-standard metrics for determining the model to select, as every organization is unique and displays different network traffic characteristics. Moreover, the performance of the UTM can vary widely depending on a number factors including the complexity of the firewall rules loaded, the number of current active VPN users, the IPS signatures employed, the number of active connections used by each user, and a host of other metrics, including, last but not least, the number of protocols inspected by the Antivirus engine and the number of signatures applied to the AV engine.
As such, NETGEAR highly recommends that you contact your ProSecure™ authorized VAR who is well versed in UTM sizing to benchmark your organization and recommend the best model for your needs. That said, NETGEAR generally uses several specifications to roughly evaluate the applicability of an UTM appliance:
A starting point is to estimate the throughput your organization requires between its internal network and the Internet. As the UTM appliance sits between your internal network and the Internet, firewall throughput number is the total amount of traffic that can be passed with the UTM in place.
Users typically engage in a host of activities that consume TCP sessions. Web browsing over HTTP and HTTPS, FTP file transfers, Email over POP3, SMTP, and IMAP, Instant Messenger, Peer to Peer Traffic, TELNET, SSH and streaming audio and video all consume TCP sessions.
On the average, "normal" users typically consume 100-300 active TCP sessions. Virus Infected PCs turned into zombies can often consume upwards of 1000 active TCP sessions, although ProSecure™ UTM appliances have administrator-definable limits to contain infected PCs from consuming an excessive number of TCP sessions.
Anti-Virus scanning can be performed against files or data embedded in time-sensitive applications such as web browsing over HTTP(s) or in latency-tolerant applications such as Email. Because Anti-Virus speed is directly correlated to the number of signatures applied in the scanning process and in the protocols being scanned, Anti-Virus throughput can typically be inflated by reducing the signature set size or reducing the numbers of protocols scanned. Thus, Anti-Virus effectiveness is often a balance between speed and thoroughness. ProSecure™ UTM appliances employ signature sets that are up 400x larger than competing legacy small business UTM solutions while employing patent-pending Stream Scanning technology to vastly increase Anti-Virus throughput.
| UTM Model Capacity | UTM5 | UTM10 | UTM25 |
| Firewall Throughput (Mb/s) | 90 | 90 | 127 |
| Concurrent TCP Sessions | 8000 | 12000 | 27000 |
| Anti-Virus Throughput (Mb/s) | 15 | 20 | 25 |
| Anti-Virus Signature Set Size | 1 Million+ | 1 Million+ | 1 Million+ |
| Recommended # of Users | 1-5+ | 1-15+ | 15-30+ |