©2007 D-Link India Ltd. All rights reserved. www.dlink.co.in UTM solution for a medium size Call Center Medium Size call center Both inbound and outbound.

Slides:



Advertisements
Similar presentations
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Advertisements

Business Solutions Network Security Solutions Gateway Security
DMZ (De-Militarized Zone)
Introducing Quick Heal Terminator.
We are Network Security. Products for enterprises and data centers.
Integration of PAP site 17 th July 10. Requirements of PAP SITE  Bandwidth drop  Router  RJ45 cables  Switch  Gateway  Nodes  Ups  9urack.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
300Mbps n Wireless Gigabit Router
2008 NetDefend Firewall Series Technical Training Firewall Fundamental - Part 2 ©Copyright All rights reserved.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wi-Fi Structures.
Hardware Firewall Feature © N. Ganesan, Ph.D.. Chapter Objectives Show the configuration of a hardware firewall such as Dlink DI 604 Illustrate the sharing.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
M2M Gateway Features Jari Lahti, CTO
Gigabit Multi-Homing VPN Security Router
Network Diagram with International Standard
Unified Services Router Sales Guide Apr, Content Unified Services Router Introduction Product Introduction and Market Status Performance Overview.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Module 6: NAT As a Solution for Internet Connectivity.
D-Link Confidential Sales guide for 3G wireless router DWR-113 D-Link Confidential WRPD, Amy Wang, 16 th Sep., 2010.
Proposed Network Configuration
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Networking Components Christopher Biles LTEC Assignment 3.
Module 3: Planning and Troubleshooting Routing and Switching.
Scenario & Hands-on 7-1 VPN Configuration-PPTP
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
EAGLE EAGLE - Functionalities Modular Ports : WAN PortSecured Port Twisted PairTwiited PairFX Multi Mode FX Single Mode FX Long Haul 1 RS232 Serial Port.
Basic Configuration-Modify LAN IP address for DFL Firewall
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Cooperative Education – Networking Spring 2010 Network Team Saigon Institute of Technology.
Jamel Callands Austin Chaet Carson Gallimore.  Downloading  Recommended Specifications  Features  Reporting and Monitoring  Questions.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
EMEA Partners XTM Network Training
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
D-Link Confidential Sales guide for 3G wireless router DWR-131.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Cooperative Education – Networking Fall 2009 Network Team Saigon Institute of Technology.
Overview WIALAN Applications Products Administration system
©2007 D-Link India Ltd. All rights reserved. Nirmaan Bharati Business Reasons Head office in Lucknow Branch/Nodal Offices located.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
UTM ( Unified Threat Management) Firewalls  Firewall Throughput: 150 Mbps  VPN Performance: 45 Mbps (3DES/AES)  1 x 10/100/1000 Ethernet WAN Port 
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
BTC Network Systems A Division of Becerra Trading Company This Information is confidential and proprietary to BTC Network Systems BTC is an Information.
Security fundamentals
Network Security Solution
UTM Content Security Gateway
Barracuda Firewall The Next-Generation Firewall for Everyone
UTM (Unified Threat Management) Firewalls
SPECIAL OFFER NetDefend UTM Firewall RRP€ 1063 SP€ 932 DFL-870
Configuring Network Devices
Goals Introduce the Windows Server 2003 family of operating systems
Firewalls Routers, Switches, Hubs VPNs
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

©2007 D-Link India Ltd. All rights reserved. UTM solution for a medium size Call Center Medium Size call center Both inbound and outbound Only domestic Calling Collections and web hosting services Multiple processes

©2007 D-Link India Ltd. All rights reserved. Business Reason Access control and web content Filtering required to effectively use the internet bandwidth for business.

©2007 D-Link India Ltd. All rights reserved. Technologies Issues Providing Solution No control over internet traffic. Security threat to organization’s information system assets. No load sharing and balancing on ISP links. No automatic internet link failover mechanism hence no link redundancy even though paying for 2 links. Virus threats even though AV server in the network.

©2007 D-Link India Ltd. All rights reserved. Business Issues Faced Sonic Wall a dedicated Security development company. Strong presence in industry as security leader. Convinced Customer from Sonic wall to D-Link Major Threat from Competitor from price point of view

©2007 D-Link India Ltd. All rights reserved. Bill of Material Product codeDescriptionQty.Unit Unit Price Total Price DFL-860Network Security UTM Firewall with subscriptions 2Nos DFL-860- WCF-12 DFL-860 Net Defend WCF Subscription for 12 Months2Nos

©2007 D-Link India Ltd. All rights reserved. Technical Analysis Cont. Product ListD-LinkSonicWall Feature ListDFL-800Pro WAN FE1 WAN FE Interfaces Fast Ethernet interfaces (FE)1 DMZ FE1 LAN FE 7 LAN FE2 Configurable FE System Firewall Throughput150Mbps200Mbps VPN Throughput60Mbps50Mbps IPS Hardware based Software based AV Hardware based Software based Performance Concurrent Sessions25,00032,000 Policies1,000(Enhanced OS) PPPoEyes Transparent modeyesEnhanced OS only

©2007 D-Link India Ltd. All rights reserved. Technical Analysis Cont. NAT, PATyes Dynamic Routing ProtocolOSPFRIPv2/OSPF Firewall System H.323 NAT Traversalyes Enhanced OS only Time-Scheduled Policiesyes Application Layer Gateway (ALG)yes Zone Defenseyes DHCP Server/Clientyes DHCP Relayyes Networking Policy-base routingyes Enhanced OS only IEEE 802.1q VLANyes Enhanced OS only IP Multicast support*IGMP v3 Enhanced OS only Encryption Method:

©2007 D-Link India Ltd. All rights reserved. (DES/3DES/AES/Twofish/Blowfish/CAST -128) Include All MethodOnly DES/3DES/AES Dedicated VPN tunnel30050 VPN PPTP/L2TP ServeryesOnly L2TP Hub and Spokeyes IPSec NAT Traversalyes Console InterfaceRS-232 Web UI InterfaceHTTP, HTTPS System Command line/SSH*yes SSH: Enhanced OS only Management Upgrade and Config backup/restoreyes Trust host for remote managementyes Central Management SystemIn the futureSonicWall GMS Build-in Databaseyes External Database Technical Analysis Cont.