contents

hardware
 
Acrosser to Provide The Best UTM Solution Platform

Unified Threat Management is an emerging trend in the firewall appliance security market. It is the evolution of the traditional firewall into a product that not only guards against intrusion but performs content filtering, spam filtering, intrusion detection and anti-virus duties traditionally handled by multiple systems.

The principal advantages of UTM are simplicity, streamlined installation and use, and the ability to update all the security functions or programs concurrently. As the nature and diversity of Internet threats evolves and grows more complex, UTM products can be tailored to keep up with them all. This eliminates the need for systems administrators to maintain multiple security programs over time.

ACROSSER provides the platform to run the company's proprietary software as UTM to deliver a set of extensible services for comprehensive security, easy RF planning, advanced over-the-air QoS for converged data, voice, and video networks, zero-loss handoff mobility, and location-based applications to the AP.

ACROSSER Technology offers networking appliance in Micro Box which is AR-M0898 is suitable for UTM due to the following:
1. AES Encryption: PadLock performs AES Encryption using the in-built ACE engine at a rate of up to 22 Gb/s and supports 5 modes of AES;
2. SHA-1/SHA-256 Secure Hash: Provides evidence if message is tampered or altered VIA PadLock can in real-time perform Secure Hash computations to hard drive, memory and network data;
3. Montgomery Multiplier: Used to accelerate the modulus calculation required by RSA encryption algorithms;
4. Random Number Generators: It is necessary for truly secure encryption and VIA PadLock uses Quantum uncertainty principle to generate statistically unpredictable random numbers. Up to a rate of 200 million bits per second;
5. PXE (PRE-BOOT EXECUTION ENVIRONMENT): Acrosser Networking Series Products can support build-in ROM with Pre-Boot Execution Environment (PXE). Then you can control remote client even though this machine is off;
6. LAN by-passed: In networking market, there are some issues which software cannot conquer system environment. One is power-off, another one is system crash, and last one is system hold.
7. Auto-MDIX: Console Re-direction: It allows administrators to monitor and manage POST (Power-On Self Test) information from a console by redirecting keyboard input and display output through the serial port.

AR-M0898 specifications:
- CPU:VIA C7 Processor
- System Chipset:VIA CN700 + VT8251
- System Memory:2 x 200-pin DDR2 400/533 SO-DIMM up to 2GB

I/O:
- WatchDog Timer:Software programmable 1-63 Seconds
- CRT:1 x VGA port for pin header
- Serial port:1 x RS-232(COM1), 1 x RE-232(COM2)(Pin header)
- GPIO:8 x Independent I/O Lines

Storage:
- Compact Flash
- Ultra DMA for 40 pins connector, DMA for 44 pins connector, support 2 EIDE devices.
- SATA Interface

Ethernet:
- AR-M0898A:2 x 10/100 Mbps, 2 x GIGA LAN
- AR-M0898B:4 x 10/100 Mbps
- By-Passed:LAN1, LAN2 (optional)

Power Requirement:
- DC:Single voltage + 12V (default), ATX (optional)

Environment:
- Operating Temp.:0 to 40 Degrees Celsius
- Storage Temp.:-20 to 80 Degrees Celsius
- Relative Humidity:5 to 90% @ 40 oC non-condensing
- Supporting OS:Windows XP, Windows XPe, Linux.



write your comments about the article :: © 2007 Computing News :: home page