What the product enables you to do
This product is a Gigabit Ethernet firewall that
is suitable for use in small and medium-sized
enterprise networks.
Transparent mode firewall function
With the transparent mode firewall function, you
can improve security easily even in an environment
where its network configuration cannot be changed
often. The product can be installed without making
changes to the existing network configuration,
allowing you to add the firewall function without
stopping the operation.
Security advice function
The security advice function consists of three
functions: diagnosis, monitoring, and reporting
functions.
The “diagnosis function” checks for vulnerable
configurations before the operation is started.
The “monitoring function” monitors for intrusion
and attack attempts by attackers during operation.
You can see the network status intuitively by
viewing traffic and how errors occur with the
“reporting function“.
URL filter function
When all or parts of a URL is registered as keywords,
the URL filter function can limit access to URLs
containing strings that match any of the keywords.
Furthermore, the filter can deny access from certain
hosts or networks when source IP addresses are
specified during filter setup. It can also limit Web
access over HTTPS when the product runs as a
proxy server.
This allows you to limit Web access from network
users in your organization easily and appropriately.
DHCP terminal authentication function
When terminals are configured as allowed terminals
(registered terminals) or not-allowed terminals
(unregistered terminals), the function can check
if the terminals are allowed to access or not and
control which network each terminal can access.
Each terminal can be configured to have different
access rights. For example, registered terminals
can be configured to allow access to all networks in
and outside of the company, whereas unregistered
terminals can be configured to limit access to
specific segments in the company.
Policy-based filtering settings
A hierarchical definition of policies in security
settings makes it easy to understand what the
policies are intended for and easy to manage them.
You can create a rough rule and then go into details
gradually.
Getting information on and limiting use of file
sharing software
The product supports detecting and blocking traffic
from the file sharing software “Winny” and “Share”.
When Intrusion Detection System of the firewall is
enabled, the product can detect packets used by
“Winny” and “Share”, discard those packets, and
break their communication. In addition, if “Winny”
and “Share” packets are detected, they are logged to
the history records for Intrusion Detection System.
The product can thus help identify terminals that
have used “Winny” or “Share”.
Gigabit Ethernet and 3G/LTE mobile
communication support
The product is equipped with a dedicated WAN
port that can be connected to an FTTH, CATV,
or ADSL broadband modem. In addition, mobile
Internet can also be utilized by connecting a 3G/
LTE mobile network data communication terminal
to the USB port.
12 | FWX120 User's Manual