SlideShare a Scribd company logo
     
Support authentication with combination of AD, Local
password, LDAP/RADIUS, Certificate/USB key, dynamic
token, hardware ID, SMS.
Support importing user accounts via CSV file.
Allow import of local/external CA-authenticated certificate.
- Private account for single user.
- Public account that allow access for multiple users.
On-screen keyboard; CAPTCHA, password security
options, etc.
Endpoint detection and scanning of operating system,
registry file, personal firewall, anti-virus files,
user-customized security rules and other security policies
prior to user login, and during the SSLVPN session.
Detects if the endpoint is suffering Man-in-the-middle
attack before it is connected to the internal network and
send out alert if any attack is detected.
Options to disconnect other Internet connections when the
SSLVPN tunnel created.
Provides secure virtual desktop workspace where all data
and I/O traffics are encrypted, monitored and controlled.
Under secure desktop environment, applications, data and
external devices are restricted according to security
policies. Activities like USB key using, printing, file saving,
file copying, file sharing ... etc can also be controlled.
Support for creating up to 253 independent secure portals,
by which different user groups are able to enjoy different
SSL VPN access addresses, authentication methods,
application resource, administrators, etc.
Support for hiding, masquerading of SSL VPN resource
path to protect resource security.
Secure safety and deletion of sensitive data after session
termination.
Bind user’s application account and his/her SSL VPN
account together for unified authorization and simplified
account administration.
Cache data at byte level to ensure the SSLVPN data traffic
is de-duplicated,greatly reduces the demanded bandwidth
of remote access.
Conduct LZO, GZIP/ZLIB compression to TCP and Web
applications to decrease the data transmission volume.
Specifically optimizing accesses to web resource by
adopting web cache.
Streamline data packets under high packet loss and
network latency network environment such as such as
wireless, cross-border.
Dynamic reduction of web pages and images sizes
displayed on mobile devices resulting in faster
performance and better user experience.
Automatically choose the healthy and quickest link for
remote access when a network has multiple operators’
lines.
If resource is available in multiple servers, SSL VPN
appearance will delivers reliable access and performance
through intelligent balancing of computing resources for
user.
Delivers the virtual graphical interfaces of applications to
remote users so that users can operate on the applications
simply via a browser, while all the calculations/operations
take place in server-end.
- Enable BYOD: Smart phone and tablet users can access
all kinds of applications freely; PC users do not need to
pre-installapplicationclientsbeforeaccessingC/Sbased
applications.
- Options to enable/disable network drives, clipboard,
printers of endpoints
Authentication
SSL Account
importing
CA authentication
Account attribution
options
Account security
enhancement policies
User Authentication
Host Checker
Man-in-the-middle
Attack Detection
Dedicated SSL VPN
Tunnel
Virtual Secure Portal
Secure desktop
(local virtualization)
Resource path hiding
Cache Cleanup
Account Binding
Byte Cache
Streaming
Compression
Web cache
High-speed Transfer
Protocol (HTP)
Webpage Access
Optimization
Intelligent Link
Selection
Resource Load
Balancer
Security Protection
Rapidity and Access Performance
Remote application
(application
virtualization)
Remote application
features
Remote application
features
Application Virtualization
- Support virtual printer mapping
- Support local resource invocation
- Various operation optimization policies to mobile devices
including local input methods mapping, virtual mouse,
magnifier, scrolling tool, tab card, etc.
- Support access private resources and public resource on
storage servers
- Built-in load balancer for remote application servers on
basis of number of sessions , CPU, memory , I / O,
integrated performance, etc. Provides secure virtual
desktop workspace where all data and I/O traffic are
encrypted, monitored and controlled. Under secure
desktop environment, applications, data and peripherals
activities are restricted according to security policies.
Controlled activites include USB key, printer, file save, file
copy, file share ... etc.
Integrate with your business Apps to enhance security,
manageability and usability by providing SDK package.
- Redirect traffics of business Apps to SSL VPN tunnel for
authentication, transmission, resource authorization and
logging security.
- Support Apps data storage encryption to avoid data
losses in case of mobile device dropping.
- Provide flexible integration mode of APP Direct, APP
Proxy, EC Proxy to meet application deployment needs.
Allow personal SSLVPN setups and activities history check
through the system tray.
Allow user to access the SSL VPN resource without
entering in the usernames/passwords when the user get
authenticated by SSLVPN.
- Windows, Linux, Mac OS iOS, and Android OS.
- IE, Opera, Firefox, Safari, Google Chrome and other
browsers that support https.
Web app, TCP app, L3VPN; Full support to all kinds of B/S,
C/S applications.
Fully customizable sign-in page.
Capable to broadcast corporate notifications to all
connected SSLVPN users.
- Support for setting TCP session limitation based on user.
- Support for setting inbound and outbound bandwidth
limitation based on user.
- Display real-time status including CPU, link traffic,
network throughput, concurrent sessions, byte cache
status, etc.
- Online user information: access time, authentication
methods,concurrent sessions,traffic flow,IP address,etc.
- Alarm, error, debugging, system management logs; back
up logs can dump and save externally;
- Syslog support.
Enable tunnel auto switch when used with multiple Internet
link deployments.
Supports robust clustering of different hardware models
with the capability of up to 20 nodes.
Enabling of multiple Sangfor SSL VPN devices clustered in
cloud or multi-datacenter environment.
Support HA and the session synchronization.
Hardware bypass.
Built-in IPsec VPN.
Support PPTP connection from iPhone, iPad, Android
devices, etc.
Built-in Firewall.
Gateway, Bridge.
SSL VPN System Tray
EasyApp
EasyApp features
Single-Sign-On
Endpoint usability
EasyAPP
Cross Platform
Support
Resource
Compatibility
Sign-in Page
Customization
Message broadcasting
Logging & Reporting
Bandwidth control
Link Stability
Asymmetrical Cluster
Cluster Cloud
HA Deployment
Bypass
IPsec VPN
PPTP VPN
Firewall
Deployment
Appliance management
Stability
Network and Deployment
SANGFOR® SSL VPN Product Features
SANGFOR TECHNOLOGIES INC. info@sangfor.net www.sangfor.net Tel: +1-408-520-7898
www.sangfor.net
Rapidity, Security, Virtualization, EasyApp
SANGFOR SSL VPN solution can be a convenient and effective way of landing a large number of
security mechanisms and end-user groups in achieving safe and efficient remote access to
enterprise applications, ensuring application system availability for remote workforce while
preventing business data exposed to risks of Internet attacks directly.
Rapidity: One of the fastest SSL VPN solutions by virtue of acceleration technologies.
Security: Identity, endpoint, transmission and resource authorization provides security protection
for secure business connectivity.
Virtualization: Do more with less by SANGFOR SSL VPN’s remote application module for applica-
tion virtualization solution.
EasyAPP: Integrate with your business Apps to enhance security, manageability and usability.
SANGFOR®
SSL VPN
Product Family
M5000-S-I M5400-S-I M5500-S-I M5600-S-I M5800-S-I M5900-S-I
Profile 1U 1U 2U 2U 2U 2U
RAM 1G 2G 2G 4G 4G 8G
HD Capacity N/A 500G 500G 500G 500G 500G
Concurrent Users 100 1200 2600 3800 5000 16000
Power and Physical Specifications
Dual Power Supplies N/A N/A N/A √ √ √
Power [Watt] (Typical) 60W 250W 250W 300W 300W 300W
Temperature -10~ 50℃-10~ 50℃-10~ 50℃-10~ 50℃-10~ 50℃-10~ 50℃
Relative Humidity 5%~95%
non-condensing
5%~95%
non-condensing
5%~95%
non-condensing
5%~95%
non-condensing
5%~95%
non-condensing
5%~95%
non-condensing
System Dimensions
(W×L×H mm3
)
430x300x44.5 430x430x44.5 440x500x89 440x500x89 440x500x89 440x600x89
System Weight 4.25 Kg 7.0 Kg 10.9 Kg 18.0Kg 19.0Kg 20.0 Kg
Network Interfaces
Compliance and certificate
10/100/1000
Base -T(WAN)
2 4 4 4 4 2
10/100/1000
Base -T(LAN)
1 1 1 1 1 1
10/100/1000
Base -T(DMZ)
1 1 1 1 1 1
SFP N/A N/A 2 4 4 4
Serial Port RJ45×1 RJ45×2 RJ45×2 RJ45×1 RJ45×1 RJ45×1
Compliance CE, FCC
M5100-S-I
1U
1G
500G
300
N/A
60W
-10~ 50℃
5%~95%
non-condensing
430x300x44.5
4.25 Kg
2
1
1
N/A
RJ45×1
CE, FCC CE, FCC CE, FCC CE, FCC CE, FCC CE, FCC
Model
VPN
SSL

More Related Content

What's hot

Los descendientes de Adán
Los descendientes de AdánLos descendientes de Adán
Los descendientes de Adán
Yanet Caldas
 
Business continuity planning
Business continuity planningBusiness continuity planning
Business continuity planningSandeep Kashyap
 
Herramientas financieras cun
Herramientas financieras cunHerramientas financieras cun
Herramientas financieras cunroberypaola
 
Seguridad de la información
Seguridad de la informaciónSeguridad de la información
Seguridad de la información
Universidad de Los Andes (ULA)
 
Ibm security guardium
Ibm security guardiumIbm security guardium
Ibm security guardium
CMR WORLD TECH
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
Denitsa Dimova
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
 
Cumplimiento Circular G-140-2009-Perú
Cumplimiento Circular G-140-2009-PerúCumplimiento Circular G-140-2009-Perú
Cumplimiento Circular G-140-2009-PerúAranda Software
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
Network Intelligence India
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
hashnees
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
DataWorks Summit
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
SHRIYARAI4
 
[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본
hyundai-mnsoft
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
SlideTeam
 
IBM QRadar BB & Rules
IBM QRadar BB & RulesIBM QRadar BB & Rules
IBM QRadar BB & Rules
Muhammad Abdel Aal
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdf
PencilData
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
 
Seguridad de la informacion
Seguridad de la informacionSeguridad de la informacion
Seguridad de la informacion
Giovanita Caira
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
Donald E. Hester
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 

What's hot (20)

Los descendientes de Adán
Los descendientes de AdánLos descendientes de Adán
Los descendientes de Adán
 
Business continuity planning
Business continuity planningBusiness continuity planning
Business continuity planning
 
Herramientas financieras cun
Herramientas financieras cunHerramientas financieras cun
Herramientas financieras cun
 
Seguridad de la información
Seguridad de la informaciónSeguridad de la información
Seguridad de la información
 
Ibm security guardium
Ibm security guardiumIbm security guardium
Ibm security guardium
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Cumplimiento Circular G-140-2009-Perú
Cumplimiento Circular G-140-2009-PerúCumplimiento Circular G-140-2009-Perú
Cumplimiento Circular G-140-2009-Perú
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
IBM QRadar BB & Rules
IBM QRadar BB & RulesIBM QRadar BB & Rules
IBM QRadar BB & Rules
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdf
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Seguridad de la informacion
Seguridad de la informacionSeguridad de la informacion
Seguridad de la informacion
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 

Similar to Sangfor SSL VPN Datasheet

Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
Sangfor Technologies USA
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
Array Networks
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways
Array Networks
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
jasonlan
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
Rodrigo Martini
 
Data power use cases
Data power use casesData power use cases
Data power use casessflynn073
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
Manjesh N
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.sflynn073
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetBaqar Kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetBaqar kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetMaliha Ali
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetbakar kazmi
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
Huu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
Huu Hieu
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetMaliha Ali
 

Similar to Sangfor SSL VPN Datasheet (20)

Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Data power use cases
Data power use casesData power use cases
Data power use cases
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 

More from Sangfor Technologies USA

Sangfor EasyConnect Brochure 2015 (Full)
Sangfor EasyConnect Brochure 2015 (Full)Sangfor EasyConnect Brochure 2015 (Full)
Sangfor EasyConnect Brochure 2015 (Full)
Sangfor Technologies USA
 
EasyConnect reviewed by ITSMDaily
EasyConnect reviewed by ITSMDailyEasyConnect reviewed by ITSMDaily
EasyConnect reviewed by ITSMDaily
Sangfor Technologies USA
 
Sangfor wan optimization data sheet 2015
Sangfor wan optimization data sheet 2015Sangfor wan optimization data sheet 2015
Sangfor wan optimization data sheet 2015
Sangfor Technologies USA
 
Sangfor wan-optimization-brochure-2015
Sangfor wan-optimization-brochure-2015Sangfor wan-optimization-brochure-2015
Sangfor wan-optimization-brochure-2015
Sangfor Technologies USA
 
When to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-programWhen to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-program
Sangfor Technologies USA
 
How to-sell-wan-optimization-sangfor-technologies-partner-program
How to-sell-wan-optimization-sangfor-technologies-partner-programHow to-sell-wan-optimization-sangfor-technologies-partner-program
How to-sell-wan-optimization-sangfor-technologies-partner-program
Sangfor Technologies USA
 
Sangfor wan optimization aquinas high school case study
Sangfor wan optimization aquinas high school case studySangfor wan optimization aquinas high school case study
Sangfor wan optimization aquinas high school case study
Sangfor Technologies USA
 
Sangfor internet access management unified care services case study
Sangfor internet access management unified care services case studySangfor internet access management unified care services case study
Sangfor internet access management unified care services case study
Sangfor Technologies USA
 
Sangfor wan optimization data sheet
Sangfor wan optimization data sheetSangfor wan optimization data sheet
Sangfor wan optimization data sheet
Sangfor Technologies USA
 

More from Sangfor Technologies USA (9)

Sangfor EasyConnect Brochure 2015 (Full)
Sangfor EasyConnect Brochure 2015 (Full)Sangfor EasyConnect Brochure 2015 (Full)
Sangfor EasyConnect Brochure 2015 (Full)
 
EasyConnect reviewed by ITSMDaily
EasyConnect reviewed by ITSMDailyEasyConnect reviewed by ITSMDaily
EasyConnect reviewed by ITSMDaily
 
Sangfor wan optimization data sheet 2015
Sangfor wan optimization data sheet 2015Sangfor wan optimization data sheet 2015
Sangfor wan optimization data sheet 2015
 
Sangfor wan-optimization-brochure-2015
Sangfor wan-optimization-brochure-2015Sangfor wan-optimization-brochure-2015
Sangfor wan-optimization-brochure-2015
 
When to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-programWhen to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-program
 
How to-sell-wan-optimization-sangfor-technologies-partner-program
How to-sell-wan-optimization-sangfor-technologies-partner-programHow to-sell-wan-optimization-sangfor-technologies-partner-program
How to-sell-wan-optimization-sangfor-technologies-partner-program
 
Sangfor wan optimization aquinas high school case study
Sangfor wan optimization aquinas high school case studySangfor wan optimization aquinas high school case study
Sangfor wan optimization aquinas high school case study
 
Sangfor internet access management unified care services case study
Sangfor internet access management unified care services case studySangfor internet access management unified care services case study
Sangfor internet access management unified care services case study
 
Sangfor wan optimization data sheet
Sangfor wan optimization data sheetSangfor wan optimization data sheet
Sangfor wan optimization data sheet
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Sangfor SSL VPN Datasheet

  • 1.       Support authentication with combination of AD, Local password, LDAP/RADIUS, Certificate/USB key, dynamic token, hardware ID, SMS. Support importing user accounts via CSV file. Allow import of local/external CA-authenticated certificate. - Private account for single user. - Public account that allow access for multiple users. On-screen keyboard; CAPTCHA, password security options, etc. Endpoint detection and scanning of operating system, registry file, personal firewall, anti-virus files, user-customized security rules and other security policies prior to user login, and during the SSLVPN session. Detects if the endpoint is suffering Man-in-the-middle attack before it is connected to the internal network and send out alert if any attack is detected. Options to disconnect other Internet connections when the SSLVPN tunnel created. Provides secure virtual desktop workspace where all data and I/O traffics are encrypted, monitored and controlled. Under secure desktop environment, applications, data and external devices are restricted according to security policies. Activities like USB key using, printing, file saving, file copying, file sharing ... etc can also be controlled. Support for creating up to 253 independent secure portals, by which different user groups are able to enjoy different SSL VPN access addresses, authentication methods, application resource, administrators, etc. Support for hiding, masquerading of SSL VPN resource path to protect resource security. Secure safety and deletion of sensitive data after session termination. Bind user’s application account and his/her SSL VPN account together for unified authorization and simplified account administration. Cache data at byte level to ensure the SSLVPN data traffic is de-duplicated,greatly reduces the demanded bandwidth of remote access. Conduct LZO, GZIP/ZLIB compression to TCP and Web applications to decrease the data transmission volume. Specifically optimizing accesses to web resource by adopting web cache. Streamline data packets under high packet loss and network latency network environment such as such as wireless, cross-border. Dynamic reduction of web pages and images sizes displayed on mobile devices resulting in faster performance and better user experience. Automatically choose the healthy and quickest link for remote access when a network has multiple operators’ lines. If resource is available in multiple servers, SSL VPN appearance will delivers reliable access and performance through intelligent balancing of computing resources for user. Delivers the virtual graphical interfaces of applications to remote users so that users can operate on the applications simply via a browser, while all the calculations/operations take place in server-end. - Enable BYOD: Smart phone and tablet users can access all kinds of applications freely; PC users do not need to pre-installapplicationclientsbeforeaccessingC/Sbased applications. - Options to enable/disable network drives, clipboard, printers of endpoints Authentication SSL Account importing CA authentication Account attribution options Account security enhancement policies User Authentication Host Checker Man-in-the-middle Attack Detection Dedicated SSL VPN Tunnel Virtual Secure Portal Secure desktop (local virtualization) Resource path hiding Cache Cleanup Account Binding Byte Cache Streaming Compression Web cache High-speed Transfer Protocol (HTP) Webpage Access Optimization Intelligent Link Selection Resource Load Balancer Security Protection Rapidity and Access Performance Remote application (application virtualization) Remote application features Remote application features Application Virtualization - Support virtual printer mapping - Support local resource invocation - Various operation optimization policies to mobile devices including local input methods mapping, virtual mouse, magnifier, scrolling tool, tab card, etc. - Support access private resources and public resource on storage servers - Built-in load balancer for remote application servers on basis of number of sessions , CPU, memory , I / O, integrated performance, etc. Provides secure virtual desktop workspace where all data and I/O traffic are encrypted, monitored and controlled. Under secure desktop environment, applications, data and peripherals activities are restricted according to security policies. Controlled activites include USB key, printer, file save, file copy, file share ... etc. Integrate with your business Apps to enhance security, manageability and usability by providing SDK package. - Redirect traffics of business Apps to SSL VPN tunnel for authentication, transmission, resource authorization and logging security. - Support Apps data storage encryption to avoid data losses in case of mobile device dropping. - Provide flexible integration mode of APP Direct, APP Proxy, EC Proxy to meet application deployment needs. Allow personal SSLVPN setups and activities history check through the system tray. Allow user to access the SSL VPN resource without entering in the usernames/passwords when the user get authenticated by SSLVPN. - Windows, Linux, Mac OS iOS, and Android OS. - IE, Opera, Firefox, Safari, Google Chrome and other browsers that support https. Web app, TCP app, L3VPN; Full support to all kinds of B/S, C/S applications. Fully customizable sign-in page. Capable to broadcast corporate notifications to all connected SSLVPN users. - Support for setting TCP session limitation based on user. - Support for setting inbound and outbound bandwidth limitation based on user. - Display real-time status including CPU, link traffic, network throughput, concurrent sessions, byte cache status, etc. - Online user information: access time, authentication methods,concurrent sessions,traffic flow,IP address,etc. - Alarm, error, debugging, system management logs; back up logs can dump and save externally; - Syslog support. Enable tunnel auto switch when used with multiple Internet link deployments. Supports robust clustering of different hardware models with the capability of up to 20 nodes. Enabling of multiple Sangfor SSL VPN devices clustered in cloud or multi-datacenter environment. Support HA and the session synchronization. Hardware bypass. Built-in IPsec VPN. Support PPTP connection from iPhone, iPad, Android devices, etc. Built-in Firewall. Gateway, Bridge. SSL VPN System Tray EasyApp EasyApp features Single-Sign-On Endpoint usability EasyAPP Cross Platform Support Resource Compatibility Sign-in Page Customization Message broadcasting Logging & Reporting Bandwidth control Link Stability Asymmetrical Cluster Cluster Cloud HA Deployment Bypass IPsec VPN PPTP VPN Firewall Deployment Appliance management Stability Network and Deployment SANGFOR® SSL VPN Product Features SANGFOR TECHNOLOGIES INC. info@sangfor.net www.sangfor.net Tel: +1-408-520-7898
  • 2. www.sangfor.net Rapidity, Security, Virtualization, EasyApp SANGFOR SSL VPN solution can be a convenient and effective way of landing a large number of security mechanisms and end-user groups in achieving safe and efficient remote access to enterprise applications, ensuring application system availability for remote workforce while preventing business data exposed to risks of Internet attacks directly. Rapidity: One of the fastest SSL VPN solutions by virtue of acceleration technologies. Security: Identity, endpoint, transmission and resource authorization provides security protection for secure business connectivity. Virtualization: Do more with less by SANGFOR SSL VPN’s remote application module for applica- tion virtualization solution. EasyAPP: Integrate with your business Apps to enhance security, manageability and usability. SANGFOR® SSL VPN Product Family M5000-S-I M5400-S-I M5500-S-I M5600-S-I M5800-S-I M5900-S-I Profile 1U 1U 2U 2U 2U 2U RAM 1G 2G 2G 4G 4G 8G HD Capacity N/A 500G 500G 500G 500G 500G Concurrent Users 100 1200 2600 3800 5000 16000 Power and Physical Specifications Dual Power Supplies N/A N/A N/A √ √ √ Power [Watt] (Typical) 60W 250W 250W 300W 300W 300W Temperature -10~ 50℃-10~ 50℃-10~ 50℃-10~ 50℃-10~ 50℃-10~ 50℃ Relative Humidity 5%~95% non-condensing 5%~95% non-condensing 5%~95% non-condensing 5%~95% non-condensing 5%~95% non-condensing 5%~95% non-condensing System Dimensions (W×L×H mm3 ) 430x300x44.5 430x430x44.5 440x500x89 440x500x89 440x500x89 440x600x89 System Weight 4.25 Kg 7.0 Kg 10.9 Kg 18.0Kg 19.0Kg 20.0 Kg Network Interfaces Compliance and certificate 10/100/1000 Base -T(WAN) 2 4 4 4 4 2 10/100/1000 Base -T(LAN) 1 1 1 1 1 1 10/100/1000 Base -T(DMZ) 1 1 1 1 1 1 SFP N/A N/A 2 4 4 4 Serial Port RJ45×1 RJ45×2 RJ45×2 RJ45×1 RJ45×1 RJ45×1 Compliance CE, FCC M5100-S-I 1U 1G 500G 300 N/A 60W -10~ 50℃ 5%~95% non-condensing 430x300x44.5 4.25 Kg 2 1 1 N/A RJ45×1 CE, FCC CE, FCC CE, FCC CE, FCC CE, FCC CE, FCC Model VPN SSL