Pliki cookies
D-Link używa cookies i podobnych technologii w celach statystycznych oraz świadczenia usług.
Korzystając z naszej strony godzisz się na Politykę prywatności. Dowiedz się więcej.
Tak, rozumiem


Karta produktu
Wersja Data Typ Rozmiar pliku
Instrukcja obsługi
Wersja Opis Data Typ Rozmiar pliku
Show moreShow less
Instrukcja instalacji
Wersja Opis Data Typ Rozmiar pliku
Show moreShow less
Oprogramowanie / Firmware
NIE NALEŻY aktualizować oprogramowania w urządzeniach D-Link korzystać z połączenia bezprzewodowego. Prosimy korzystać z połączenia przewodowego.
Wersja Opis Data
Firmware GPL Release Source
Show moreShow less
Pliki do pobrania
Wersja Opis Data
Show moreShow less

Real Transparent Mode Implementation
  • Easy Installation with No Change to Existing Network Architecture
  • Interoperability with third-party network devices

Hardware-Based Layer 7 Payload Inspection
  • High-Performance Processing via ASIC Content Processing Chip

Granular Management by Hosts, IPs, Groups and Subnets
  • Transparent Control of IM, P2P, File Transfers, Streaming Media, Personal Mail
  • Discreet Control of Internet Activities Through Application of Policy-Based Actions on Hosts, Groups, IP Addresses, Subnets

Transparent Blocking of Trojan, Spyware, Illegal Agents, and Network Worms
  • Prevention of Malicious Traffic Spreading on the Network

Victim Identification
  • Isolation of Trouble Spots for Troubleshooting

Hardware Bypass
  • No Single Points of Failure, Maximized Network Connection in Case of Hardware Crash

Log/Analysis Report
  • Easily Readable Reports Printable in HTML Formats

DOS/DDOS Protection, Stealth Mode
  • Protection from Various Kinds of DOS/DDOS Attacks
  • No Response to ICMP Packets in Stealth Mode

IM/P2P Management
  • Control/management of IM applications
  • Control/management of P2P applications
  • Policy setting by IP, host name, group or subnet  

Layer 7 Applications Management
  • Control/Management of Mile Transfers
  • Control/Management of Streaming Media
  • Control/Management of Web Applications
  • Control/Management of Email for Personal Use
  • User-Defined Application Control

Health Checking
  • Detection/Blocking of Malicious Programs such as Spyware, SoftEther, Network Worms
  • Victim Identification in Intranet
  • D-Link Zone Defense Mechanism1 to Prevent Malicious Programs from Spreading on Network when Used in Conjunction with Certain D-Link Mananged Switches

Real-Time Monitor and Report
  • Real-time Traffic Monitoring
  • Multi-Layer TOP N Reports

  • Plug-and-play Installation with No Change to Existing Network
  • Transparent In-line mode, Seamless Integration with Other Network Devices
  • Java Web-Based Setup Wizard
  • Hardware Bypass Mechanism to Maximize Network Connectivity
  • Stealth Mode for Interface

  • 4,000 Concurrent TCP sessions
  • Up to 150 Concurrent Users
  • Up to 22Mbps Throughput (All Functions Enabled)
  • Up to 80Mbps Throughput (Bypass Mode)

Power Input
  • Internal Universal Power Supply

  • Standard 19-Inch Rackmount, 1U Height
  • 17.3” x 9.8” x 1.75”

Operating Temperature
  • 32°F to 140°F

Storage Temperature
  • -4°F to 158°F

  • UL/CUL
  • LVD (EN60950)

  • FCC Class A
  • CE Class A
  • C-Tick

Operating Humidity
  • 5% to 95% (non-condensing)

  • 1-Year

1 Future firmware upgrade.