|
 |
| |
 |
| * POWER-1 APPLIANCE SPECIFICATIONS |
| |
Power-1 5070 |
Power-1 9070 |
| Software edition |
NGX R65 Power |
NGX R65 Power |
| Firewall throughput |
9.0 Gbps |
14.0 Gbps |
| VPN throughput |
2.4 Gbps |
3.7 Gbps |
| Concurrent sessions |
1.1 Million |
1.1 Million |
| Users supported |
Unlimited |
Unlimited |
| VLANs |
256 |
256 |
| Intrusion Prevention |
4.5 Gbps |
6.1 Gbps |
| Storage capacity |
160 GB |
2x 160 GB |
| Physical Specifications |
|
| Enclosure |
2U |
2U |
| Dimensions(standard) |
17x20X3.46 in |
17x20X3.46 in |
| Dimensions(metric) |
431x509.5x88mm |
431x509.5x88mm |
| Weight |
14.5kg 31.9 Ibs |
16.5kg
36.3 Ibs |
GbE(10/100/1000) interfaces |
8 + 4 optional |
12 + 4 optional |
| 10 GbE interfaces |
2 optional |
4 optional |
| NIC options |
4x1 GbE copper, SR fiber (single mode) 2x10 GbE SR/LR fiber (single mode) |
4x1 GbE copper, SR fiber
(single mode)
2x10 GbE SR/LR fiber
(single mode) |
| Management/Sync ports |
2 |
2 |
Dual,hot-swappable power supplies |
Yes |
Yes |
| Removable hard drives |
1 |
2(hot swappable) |
Operating environment range |
Temperature:5¢ª to 40¢ª C, Humidity: 10%-85% non-condensing, Altitude:2,500m |
| Power input |
100~ 240V; 50~60Hz |
100~ 240V; 50~60Hz |
| Power consumption |
250W (max.) |
400W (max.) |
| Compliance |
UL 60950; FCC Part 15, Subpart B, Class A; EN 55024;
EN55022; VCCI V-3AS/NZS 3548:1995; CNS 13438 Class A (test passed; country approval pending); KN22KN61000-4 Series, TTA; IC-950; ROHS |
|
| - Notes: |
 |
Intusion prevention throughput is tesred using a blend of traffic similar to that seen on lntermet routers |
 |
Spare parts, lights-out management, and NIC modules(line cards) available |
 |
All Power-1 models come with a 3-year hardware warranty |
| |
| * Power-1 Appliances(Security for high-performance environments) |
| |
Check Point Power-1¢â appliances enable enable organizations to maximize security
in high-performance environments such as large campuses or data centers.
They combine firewall, IPSec VPN, and intrusion Prevention with advanced.
acceleration technologies, delivering a high-performance security platform for
multi-Gbps environments. |
| |
| Industry-leading firewall |
VPN/firewall protection secures hunndreds of
applications and protocols including VoIP,
instant messaging (IM), and Peer-to-Peer(P2P)
applications |
| VPN (slte-to-slte, remote access) |
Feature-rich, easy-to-configure IPSec and SSL VPNs* |
| Centrallzed, multlslte management |
Streamlines policy management for all sites via single console |
| Intruslon prevention system (IPS) |
Advanced IPS with both signature-and protocol-anomaly-based detection |
High avallability, load balancing,
and dynamic routing |
Reliability for critical applications and sites |
| Web application Security* |
Protection against WEB attacks such as buffer
overflow, SQL injection and cross-site scrioting |
| web fiitering* |
Best-of-breed Web filtering protects against
threats such as spyware, viruses, and inappropriate Web content |
Messaging security,
Including email security
and anti-spam* |
Protection against the three major messaging
attack vestors:spam, malware delivered in
messages, and attacks against the messaging
infrastructure |
|
| |
|
| |
* Available as an optional license |
| |
| |
Power-1 5075 |
Power-1 9075 |
Power-1 11000 series |
| 11065 |
11075 |
11085 |
| Software Edition |
R65, R70 |
R65, R70 |
R70 |
R70 |
R70 |
| 10/100/1000 Port |
10/14 |
14/18 |
14/18 |
14/18 |
14/18 |
| Firewall Throughput©÷ |
9 Gbps |
16 Gbps |
15 Gbps |
20 Gbps |
25 Gbps |
| VPN Throughput©÷ |
2.4 Gbps |
3.7 Gbps |
3.7 Gbps |
4 Gbps |
4.5 Gbps |
| Concurrent Sessions |
1.2 million |
1.2 million |
1.2 million |
1.2 million |
1.2 million |
| IPS Throughput©÷ |
7.5 Gbps©ø |
10 Gbps©ø |
10 Gbps©ø |
12 Gbps©ø |
15 Gbps©ø |
| Licensed Users |
Unlimited |
Unlimited |
Unlimited |
Unlimited |
Unlimited |
| VLANs |
1024©ù |
1024©ù |
1024©ù |
1024©ù |
1024©ù |
| UTM Out of the Box |
Optional |
Optional |
Optional |
Optional |
Optional |
| Security Acceleration |
Yes |
Yes |
Yes |
Yes |
Yes |
Integrated Multigateway Management |
- |
- |
- |
- |
- |
| Storage |
160 GB |
2x 160 GB |
2x 250 GB |
2x 250 GB |
2x 250 GB |
| Enclosure |
2U |
2U |
2U |
2U |
2U |
Dimensions (standard) |
17X20 3.46 in |
17X20
3.46 in |
17X22.8
3.46 in |
17X22.8
3.46 in |
17X22.8
3.46 in |
| Dimensions(metric) |
431X509.5 88mm |
431X509.5
88mm |
431X580
88mm |
431X580
88mm |
431X580
88mm |
| Weight |
14.5kg (31.9 Ibs) |
16.5kg
(36.3 Ibs) |
23.4kg
(51.6 Ibs) |
23.4kg
(51.6 Ibs) |
23.4kg
(51.6 Ibs) |
Operating Environment |
Temperature:5¢ª to 40¢ª C, Humidity: 10%-85% non-condensing |
| Power Input |
100/240V, 50/60Hz |
| Pwer Supply Spec(Max) |
250 W |
400W |
500W |
500W |
500W |
|
| |
|
| |
* Power-1 security specifications |
| |
| |
Protection Details |
| Firewall |
|
| Protocol/application support |
Secures more than 200 applications and protocols |
| VoIP protection |
SIP, H.323, MGCP, and SIP with NAT support |
Instant Messaging control |
MSN, Yahoo, ICQ, and skype(including over HTTP and SSL) |
| Peer-to-peer blocking |
Kazaa, Gnutella, BitTorrent, eMule, IRC(including over HTTP) |
| Network Address Translation |
Static/hide NAT support with manual or automatic rules |
| IPSec VPN |
|
| Encryption support |
AES 128-256 bit, 3DES 56-168 bit |
| Authentication methods |
Password, RADIUS, TACACS, X.509, SecurID |
| Certificate authority |
INtegrated X.509 certificate authority |
| VPN communities |
Automatically sets up site-to-site connections when objects are created |
| Topology support |
Star and mesh |
| Route-based VPN |
Utilizes virtual tunnel interfaces, numbered/unnumbered interfaces |
| VPN agent |
Check Point Endpoint Security¢â,VPN-1 SecureClient¢â,
VPN-1 SecuRenote¢ç |
| SSL VPN |
|
| SSL-based remote access |
Fully integrated SSL gateway provides on-demand
SSL-based remote access |
| SSL-based endpoint scanning |
Scans endpoint for compliance/malware are prior to
admission to the network |
| Intrusion Prevention |
Blocks attacks such as Dos, port scanning, IP/ICMP/TCP-related |
| Network-layer Protection |
Blocks attacks such as DNS cache poisoning, FTP bounce,
improper commands, and more |
| Detection methods |
Signature- and protocol-anomaly based |
| Networking |
|
| Dynamic routing support |
OSPF, BGP, RIP v1 and 2, Multicast: PIM-SM, PIM-DM, DVMRP |
| DHCP support |
SecurePlatform¢â DHCP server and relay |
| ISP redundancy |
Protocol-based, source/destination,and port route decisions |
| Performance and availability |
|
| High availability |
Active/passive and active/active |
| Load balancing |
integrated ClusterXL¢ç smart load balancing |
| Quality of Service |
FloodGate-1¢ç for granular Qos |
| ISP redundancy |
Automatically reroutes traffic to second interface |
| Traffic acceleration |
SecureXL¢â accelerates security decisions |
| Multi-core acceleration |
CoreXL¢â balances security decisions across multiple cores |
|
|
 |
 |
|