YAMAHA Firewall FWX120

Share to:
Merek: YAMAHA | | 0 Orders

<% k.charAt(0).toUpperCase()+k.slice(1) %>
1 Seller(s) selling this item.

<% v.item_name %>

Merek: YAMAHA

<% v.total_order_items %> Orders

Sold by

<% v.name_shop %>

<% v.province_name %>


Quantity :
Minimum Quantity:
<% v.minimum_order %>
Price :
Rp <% v.retail_price | rupiah %>
<% v.retail_discount ? "Discount " : "" %>Price :
Rp <% v.price | rupiah %>
-<% v.retail_discount_percentage %>%

Basic performance

The maximum total number of locations that you can connect to using IPsec, L2TP/IPsec, PPTP, and IPIP is 50.
In case of PPTP, up to 4 connections is recommended.
 

Supported connections

Interface

front

  1. DOWNLOAD button
  2. Power LED
  3. Line status LEDs
  4. microSD slot
  5. USB port

back

  1. Power switch
  2. Power switch guard
  3. Console
  4. LAN port1
  5. LAN port2

 

Features

WAN load balancing function

The load balancing function allows the load to be distributed among multiple routes to a single destination. For example, it allows communication by connecting to multiple ISP’s simultaneously and sorting packets based on the connection speed to each ISP. It also allows packets to be sent via other ISP's when the line is down.

WAN load balancing function

WAN line visualization function

The bandwidth detection function dynamically measures the effective bandwidth of the line and enhances the effectiveness of the QoS function of the device. If the bandwidth may fluctuate, it is possible to measure the bandwidth periodically and configure the sending speed to follow the bandwidth fluctuations.

WAN line visualization function

FWX120 sends pattern packets to WAN/LAN, and analyze its status by receiving packets reply.

Using mobile Internet features

You can connect a USB data communication terminal to a USB port and transfer data. This enables you to construct a broadband network in an area where wired Internet is not available or at a construction site or temporary storefront where no lines have been installed.

Using mobile Internet features

Restricting Web access easily and accurately

This product incorporates the "internal database reference URL filter" function. The "internal database reference URL filter" function allows you to register all or a part of the URL as a keyword and restricts access to URLs containing the keyword. Furthermore, Web access via HTTPS can be restricted by letting this product function as a proxy server.

Restricting Web access easily and accurately

Policy-based filtering setting

You can configure the filtering setting by hierarchically arranging policies (up to four levels) for easy understanding and management. Up to three sets of policies can be held in the setting. A stateful inspection type filtering can be achieved easily by using policy filters.

Policy-based filtering setting

Security advice function

The security advice function consists of the "diagnosis function", "monitor function", and "report function". The "diagnosis function" checks for vulnerabilities in the settings before the operation. The "monitor function" monitors for malicious intrusions and attacks during the operation. The "report function" can be used to display the traffic and fault occurrences, allowing you to intuitively assess the network conditions.

Security advice function

Security advice function

Unauthorized access detection function (IDS) with Winny/Share filters

The unauthorized access detection function (IDS) (IDS = Intrusion Detection System) detects and warns you of intrusions and/or attacks from the Internet. Filters can be configured based on the detection information to block suspicious sources and applications for enhanced security. It also supports the detection and blocking of the "Winny" and "Share" file sharing software and is capable of identifying the terminals on which "Winny" or "Share" was run. 
â—Ž “Winny Version 2" and "Share version 1.0 EX2" are supported.

Unauthorized access detection function (IDS) with Winny/Share filters

IDS email notification function

This function sends a notification email to the designated email address when it detects an unauthorized access.

IDS email notification function

DHCP terminal authentication function

A permission-based access control can be implemented by specifying which terminals are permitted to access certain networks (registered terminals) and which terminals are not (non-registered terminals). This enables different access rights to be assigned for each terminal e.g. allow registered terminals to access all in-house and external networks and restrict non-registered terminals from accessing specific segments of the in-house network, and so on.

DHCP terminal authentication function

MAC address filtering

It enables a strict management of terminals by filtering those using MAC addresses that are assigned to the LAN port of the PC, etc. It can also send a notification email to the administrator when it detects a connection from a non-registered MAC address, making it easy to monitor for unauthorized terminals. (* Bridging is not supported)

MAC address filtering

Combined use of the DHCP server function and MAC address filtering

Unauthorized terminal connections can be monitored more strictly based on combinations of MAC addresses and IP addresses. Register the MAC address of allowed terminals and reserve their IP addresses in advance. When an authorized terminal connects to the network, it will be assigned with the reserved IP address and become able to use the Internet. When an unauthorized terminal attempts connect to the network, it will be unable to use the Internet as no IP address will be assigned to it. Even if the IP address is configured manually, the unauthorized terminal can be blocked as its MAC address is not registered in the allowed list.

Combined use of the DHCP server function and MAC address filtering