|<% k.charAt(0).toUpperCase()+k.slice(1) %>|
Merek: YAMAHA<% v.total_order_items %> Orders
<% v.province_name %>
<% v.type %>
<% itemCatalog.result.item_detail.result.brand_name %>
The maximum total number of locations that you can connect to using IPsec, L2TP/IPsec, PPTP, and IPIP is 50.
In case of PPTP, up to 4 connections is recommended.
The load balancing function allows the load to be distributed among multiple routes to a single destination. For example, it allows communication by connecting to multiple ISP’s simultaneously and sorting packets based on the connection speed to each ISP. It also allows packets to be sent via other ISP's when the line is down.
The bandwidth detection function dynamically measures the effective bandwidth of the line and enhances the effectiveness of the QoS function of the device. If the bandwidth may fluctuate, it is possible to measure the bandwidth periodically and configure the sending speed to follow the bandwidth fluctuations.
FWX120 sends pattern packets to WAN/LAN, and analyze its status by receiving packets reply.
You can connect a USB data communication terminal to a USB port and transfer data. This enables you to construct a broadband network in an area where wired Internet is not available or at a construction site or temporary storefront where no lines have been installed.
This product incorporates the "internal database reference URL filter" function. The "internal database reference URL filter" function allows you to register all or a part of the URL as a keyword and restricts access to URLs containing the keyword. Furthermore, Web access via HTTPS can be restricted by letting this product function as a proxy server.
You can configure the filtering setting by hierarchically arranging policies (up to four levels) for easy understanding and management. Up to three sets of policies can be held in the setting. A stateful inspection type filtering can be achieved easily by using policy filters.
The security advice function consists of the "diagnosis function", "monitor function", and "report function". The "diagnosis function" checks for vulnerabilities in the settings before the operation. The "monitor function" monitors for malicious intrusions and attacks during the operation. The "report function" can be used to display the traffic and fault occurrences, allowing you to intuitively assess the network conditions.
The unauthorized access detection function (IDS) (IDS = Intrusion Detection System) detects and warns you of intrusions and/or attacks from the Internet. Filters can be configured based on the detection information to block suspicious sources and applications for enhanced security. It also supports the detection and blocking of the "Winny" and "Share" file sharing software and is capable of identifying the terminals on which "Winny" or "Share" was run.
â—Ž “Winny Version 2" and "Share version 1.0 EX2" are supported.
This function sends a notification email to the designated email address when it detects an unauthorized access.
A permission-based access control can be implemented by specifying which terminals are permitted to access certain networks (registered terminals) and which terminals are not (non-registered terminals). This enables different access rights to be assigned for each terminal e.g. allow registered terminals to access all in-house and external networks and restrict non-registered terminals from accessing specific segments of the in-house network, and so on.
It enables a strict management of terminals by filtering those using MAC addresses that are assigned to the LAN port of the PC, etc. It can also send a notification email to the administrator when it detects a connection from a non-registered MAC address, making it easy to monitor for unauthorized terminals. (* Bridging is not supported)
Unauthorized terminal connections can be monitored more strictly based on combinations of MAC addresses and IP addresses. Register the MAC address of allowed terminals and reserve their IP addresses in advance. When an authorized terminal connects to the network, it will be assigned with the reserved IP address and become able to use the Internet. When an unauthorized terminal attempts connect to the network, it will be unable to use the Internet as no IP address will be assigned to it. Even if the IP address is configured manually, the unauthorized terminal can be blocked as its MAC address is not registered in the allowed list.