USG 100 is ideal for complex network security in a single device for offices with up to 25 people
Status ICSA-certified firewall protects the network and important Internet services such as e-mail, web browsing, and file transfer servers. As protection against viruses and spyware can choose an antivirus program ICSA-certified ZyXEL or program from Kaspersky Labs. Contains the IDP module to protect the network from unauthorized intrusions such as Trojans and worms. SSL or L2TP VPN to work from home and secure connection to the corporate network without having to install VPN software.
Seven Gigabit Ethernet ports, two WAN ports. OTP port can be used as additional WAN, LAN, WLAN or DMZ port. Expansion card slot lets you add additional wireless LAN IEEE 802.11b/g or 3G wireless WAN. The device further comprises two USB ports, which may be used for 3G wireless WAN.
Main features:
ICSA Certified Firewall
Antivir (ZyXEL s ICSA certified antivirus, Kaspersky)
IDP
VPN (IPSec ICSA Certified, SSL, L2TP)
Management IM/P2P
Antispam
Individual (user-aware) configuration
Bandwidth Management
Support for multiple providers (ISP link)
Ports:
1x PC Card (PCMCIA) card for 3G
2x USB
7x RJ45 WAN (10/100 Mbit/s)
ICSA Firewall certified:
Access Control List (ACL) based on zones
The Safety Zone
Stateful Packet Inspection
Protection against DoS/DDoS
Set rules based on user (user-aware)
ALG support user ports
Protection against intrusion:
In-line Mode (Routing/Bridge)
IDP-based control zones
Customizable protection profile
Deep packet inspection-based signatures
Customized signatures
Detection and prevention of anomalous data
Detection and Protection against flooding (flooding)
Detection and prevention of anomalies in the protocol: HTTP/ICMP/TCP/UDP
Antivir:
ZyXEL ICSA certified antivirus or antivirus Kaspersky
Stream-based antivirus
It covers current viruses from the list of Wild List
Scans HTTP/FTP/SMTP/POP3/IMAP4
No limit on file size
Support lists Blacklist/Whitelist
Hybrid VPN:
IPSec VPN certified by ICSA
Encryption: AES/3DES/DES
Authentication: SHA-1/MD5
Key Management: Manual Key/IKE
Technology Perfect Forward Secrecy: DH Group 1/2/5
NAT in the context of IPSec VPN
Dead Peer Detection/Relay Detection
Support for certificate PKI (X.509) certificates Recording (CMP/SCEP)
Xauth Authentication
Support for L2TP over IPSec
SSL VPN:
Neklientský secure remote access (reverse proxy mode)
SecuExtender (Full Tunnel Mode)
Unified Rules of Use
Support for two-factor authentication
Customizable interface (user portal)
Application Patrol:
Scalable application access settings IM/P2P
Timesheets, bandwidth management
Settings based on the user (user-aware)
Statistical listings in real time
Bandwidth management:
Setting priorities
Shapování data stream based on the rules
Maximum/guaranteed bandwidth
Hire bandwidth
Antispam:
Protection zones by
Transparent interception of mail via SMTP/POP3 protocols
Support lists Blacklist/Whitelist
Support DNSBL checking
Statistical listings
High Availability (high availability):
Device HA (active/passive mode)
Failure detection device
Monitoring connection
Configuring Auto-Sync
The distribution of the data stream across multiple WAN connections
VPN HA (backup remote VPN gateway)
Content Filtering:
URL blocking, keyword blocking
Exception List (Blacklist and Whitelist)
Blocking Java applets, cookies and Active X components
Network connection:
Routing mode/bridge mode/mixed mode
Grouping port Layer 2
Ethernet/PPPoE/PPTP
Tagged VLAN (802.1Q)
Virtual interface (alias interface)
Based routing rules (with a resolution of users, user-aware)
NAT-based rules (SNAT/DNAT)
RIP v1/v2
OSPF
IP multicasting (IGMP v1/v2)
DHCP client/server/relay
Built-in DNS server
Dynamic DNS
Authentication:
Internal User Database
Microsoft Windows Active Directory
The external user database LDAP/RADIUS
Forced user authentication (transparent authentication)
System Management:
Role-based administration
Multiple Administrator Login
Multi-language web interface (HTTPS/HTTP)
Object-oriented configuration
Command line interface (console/web console/SSH/TELNET)
Comprehensive local logging
Syslog (send to up to 4 servers)
Warning over email (sending up to 2 servers)
SNMP v2c (MIB-II)
Monitoring data stream in real time
Restoring the previous configuration system (rollback)
Text configuration file
Upgrade the firmware via FTP/FTP-TLS/Web GUI
Advanced listings (Vantage Report)
Centralized Network Management (Vantage CNM)
Support 3G:
Advanced Wireless Security Transmission with WEP encryption and WPA/WPA2 Support
Dimensions:
242 x 175 x 35.5 mm
Weight:
1.2 kg
Power:
Input: 100 ~ 240 V, 1.2 A, 50 ~ 60 Hz
Output: 12 V; 3.5 A
Specifications can be changed without notice. Images are for illustrative purposes only.
We use 8 categories of cookies on our website:
Technical cookies
These are strictly necessary for the functioning of the website and the features you choose to use. Without them, our website would not work; you wouldn't be able to log in to your user account, for example.Functionality cookies
These cookies allow us to remember your basic choices and improve the user experience. These include remembering your preferred language or allowing you to stay logged in permanently.Social media cookies
These cookies allow us to easily link you to your social media profile and, for example, allow you to share products and services with your friends and family.Content personalisation
These cookies allow us to show you content and ads according to the information we have about you to best meet your needs. This includes what content you have viewed, or on what device you are accessing our website.Non-personalised advertising
These cookies allow us to show you general ads for products and services.Personalised advertising
Thanks to these cookies, we and our partners can offer you relevant products and services based on your purchases, your shopping behaviour and your preferences.Audience metrics
These cookies allow us to optimise our site for your convenience based on how you use it. The aim is to remember or anticipate your choices. This includes, for example, the use of features, their location, or the behaviour on the page.Third party cookies
These are third party cookies, and you can find out more about them and our partners here.By giving your consent to the processing of cookies, functionality and analytical cookies will be installed on the device you use to browse the website (click on the "I understand" button for both categories, or you can select only one of the categories by clicking on the "Settings" button). We always install technical cookies on your device, even without your explicit consent, because without them our website would simply not work.
You can revoke your consent to the processing of cookies. In connection with our company's cookie processing, you also have the following rights: the right to access cookies, delete, modify, supplement and correct them, restrict processing and the right to lodge a complaint with the Office for Personal Data Protection. Read more about your rights.
For even more detailed information about how we process cookies, please see our Personal Data Protection Policy.