"Requested_prod_id","Requested_GTIN(EAN/UPC)","Requested_Icecat_id","ErrorMessage","Supplier","Prod_id","Icecat_id","GTIN(EAN/UPC)","Category","CatId","ProductFamily","ProductSeries","Model","Updated","Quality","On_Market","Product_Views","HighPic","HighPic Resolution","LowPic","Pic500x500","ThumbPic","Folder_PDF","Folder_Manual_PDF","ProductTitle","ShortDesc","ShortSummaryDescription","LongSummaryDescription","LongDesc","ProductGallery","ProductGallery Resolution","ProductGallery ExpirationDate","360","EU Energy Label","EU Product Fiche","PDF","Video/mp4","Other Multimedia","ProductMultimediaObject ExpirationDate","ReasonsToBuy","Spec 1","Spec 2" "","","343051","","D-Link","DFL-M510","343051","","Gateways/Controllers","833","","","Information Security Gateway","20221021101432","ICECAT","1","40393","https://images.icecat.biz/img/norm/high/15743_343051-8638.jpg","285x200","https://images.icecat.biz/img/norm/low/15743_343051-8638.jpg","https://images.icecat.biz/img/gallery_mediums/img_343051_medium_1480938970_8445_26422.jpg","https://images.icecat.biz/thumbs/343051.jpg","","","D-Link Information Security Gateway gateway/controller","Information Security Gateway","D-Link Information Security Gateway, 1x Ethernet WAN 1x Ethernet LAN","D-Link Information Security Gateway. I/O ports: 1x Ethernet WAN 1x Ethernet LAN","The D-Link NetDefend DFL-M510 Information Security Gateway (ISG) is an entirely new type of security device designed to protect your network from the emerging risks. Your business is facing Internet threats posed by an increasing use of instant messages (IM) and peer-to-peer (P2P) applications. Without effective management and control mechanisms, it can be vulnerable to a wide variety of menaces including viruses and worms, leakage of confidential information, corporate and regulatory compliance violations, and even identity theft. \r\n\r\nThe NetDefend Information Security Gateway (ISG) can help address these threats and identify unmanaged, unauthorized IM and P2P use on your network, so you can effectively control and manage information flows from your company to the outside world. The information traffic flow that you are able to control and manage includes instant messaging, peer-to-peer applications, file transfers, Email and steaming media from the Intranet.\r\n\r\nIM/P2P and Bandwidth Management\r\nThe NetDefend Information Security Gateway (ISG) allows you better manage your employees' Internet activities and prevent possible misuse of IM and P2P applications. Implementation can be based on company policies, and operation is both automatic and transparent, bringing tangible benefits that include proper utilization of precious network bandwidth and prevention of possible leaks of company secrets through unauthorized and unmanaged use of IM and Email.\r\n\r\nMalicious Traffic Prevention\r\nHackers and scammers are becoming more sophisticated in their approach to vulnerable networks, distributing not just viruses and malicious agents, but putting together blended attacks, increasing perimeter security for other scam methods, multiplying mutations of initial attacks and migrating new threats. The D-Link NetDefend Information Security Gateway can prevent these serious threats by blocking illegal agents hidden in your network's normal traffic, eliminating harmful programs, identifying victims and providing a Zone Defense Mechanism* to quarantine infected computers. You can detect and drop traffic with health concerns, including Trojan, illegal agents and Network Worms, based on policy rules applied to specific groups, hosts, IPs and subnets.\r\n\r\nSeamless Integration\r\nThe NetDefend Information Security Gateway (ISG) integrates easily with industry-standard network infrastructure, including third-party network devices, offering maximum flexibility and control. It is deployed between your company's internal network and a network firewall, and can be installed in the in-line mode without causing any change to your current network architecture. It implements a hardware bypass function that avoids single points of failure and maximizes network connection in the advent event of hardware crash.\r\n\r\nWith hardware-based Layer 7 payload inspection, this device provides high-performance processing of information security. You can leverage your existing investments by adding anti-virus and anti-IM spam, identity authentication and management, session logging and archiving, and detection and usage reporting. All these will help improve your office productivity, reduce your business legal liability, optimize the use of your IT resources and enhance your company's overall network security.\r\n\r\nFeatures:\r\nSupports Most IM/P2P Applications \r\nBlocks Viruses over IM/SPIM \r\nPrevents Misuse of IM/P2P Applications \r\nControls File Transfer/Streaming Media Over HTTP \r\nControls Personal Mail \r\nControls Web Usage \r\nQoS Bandwidth Management \r\nBlocks Spyware, Network Worms, Trojan, Softether, Illegal Agents \r\nIdentifies Victims \r\nProtects Against DOS/DDOS \r\nZone-Defense Mechanism* \r\nMonitors Traffic Real Time \r\nHardware-Based Layer 7 Payload Inspection \r\nHardware Bypass to Maximize Network Uptime \r\n1 Ethernet WAN Port, 1 Ethernet LAN Port \r\nFront Panel LCD/Key Pad to Display Status/Monitoring Information \r\nUser Limit - 150","https://images.icecat.biz/img/norm/high/15743_343051-8638.jpg","285x200","","","","","","","","","","Ports & interfaces","I/O ports: 1x Ethernet WAN \n1x Ethernet LAN"