VIGEIRZQBEI SERIES
VIGORZ930 SERIES
DUAL-WAN SECURITY FIREWALL
Dual-WAN with policy-based load-balance and fail-over
Flexible bandwidth management to optimize bandwidth usage
Object-based firewall preventing external attacks and simplifying the Internet access policy settings
Hardware-based VPN platform for high performance remote data access
802.11n (Draft-n) improves wireless speed and coverage
VoIP capabilities with twin analogue phone ports, one ISDN port dedicated to ISDN phone and one ISDN port
configurable for ISDN phone / line
Y ¥ Y Y Y Y
The Vigor2930 is a dual-WAN router with policy-based load- Firewall
balance, fail-over and BoD (Bandwidth on Demand); it also CSM (Content Security Management) for IM / P2P Applications
features advanced bandwidth control mechanisms such as Multi-NAT, DMZ Host, Port-Redirection and Open Port
IP-layer QoS, NAT session limitation, bandwidth borrowed, etc., Policy-based Firewall
to allow easy, flexible and reliable access control and bandwidth MAC Address Filter .
SPI (Stateful Packet Inspection)
management.
Dos / DDoS Prevention
IP Address Anti-spoofing
E-Mail Alert and Logging via Syslog
Bind IP to MAC address
The SPI (Stateful Packet Inspection) firewall uses object-based
design to make settings of firewall policies easy. The CSM
(Content Security Management) feature enadles more precise and
efficient access control for IM (Instant Messenger) and P2P (Peer Wireless Access Point (for n model)
IPSec with AES / DES / 3DES for encryption and MD5 / SHA-1
for authentication.
to Peer) applications. Furthermore, functions such as DoS / DDoS = |[EEEB02.11n Compliant
(Denial of Service / Distributed DoS) and URL / Web content = Wireless Client List
filtering minimize security threats both inside and outside the “Access Point Discovery
network = WDS (Wireless Distribution System)
= Wireless LAN Isolation
= Wireless Rate-Control
With hardware-based implementation of the VPN protocols, the = 64/128-bit WEP
Vigor2930 supports up to 100 VPN tunnels in compliance with = WPA/WPA2 ВЕ | |
advanced protocols such as IPSec / PPTP / L2TP / L2TP over ” 802.1X Authentication with RADIUS Client
= Hidden SSID
E
MAC Address Access Control
Vigor2930 "n" models conform to IEEE 802.11n Draft-n Content Filter
standards. They support WEP / WPA / WPA2 encryption, MAG = URL Keyword Blocking (White List and Black List)
address control, wireless LAN isolation, wireless VLAN and = Java Applet, Cookies, Active X, Compressed, Executable,
802.1X authentication. The wireless rate control function can Multimedia File Blocking
N ; = Web Content Filter (SurfControl)
adjust the data rate of each wireless station (client). WDS can = Time Schedule Control
help users to extend wireless coverage easily.
* Firmware Lipgradeable
Vigor2930 “V" models provide twin analogue phone ports. “S”
models support two ISDN ports. Combining the characteristics
of “V” and “S” models, “VS” models can offer two ISDN ports
additionally besides analogue phone ports, ISDN SO port is
dedicated to for ISDN phone; another ISDN port is configurable
for ISDN line and phone. It supports multiple SIP registrars with
highly flexible configuration and call handling options.
Dual-WAN
= Outbound Policy-Based Load-Balance
= BoD (Bandwidth on Demand)
= WAN Connection Fail-over
WAN Protocol
DHCP Client
Static IP
PPPoE
PPTP
L2TP*
= BPA
VIGOROUS BROADBAND ACCESS
Broadband 1“
VIGORZ930 SERIES
DUAL-WAN SECURITY FIREWALL
VoIP (for V model)
Protocol: SIP, RTP / RTCP
One Dozen SIP Registrars
G.168 Line Echo-cancellation
Automatic Gain Control
Jitter Buffer (125ms)
Voice Codec:
* G.711A/ulaw
* G.723.1
* G.726
* G.729A/B
* VAD / CNG
Tone Generation and Detection: DTMF, Dial, Busy,
Ring Back, Call Progress
DTMF Tone:
* In Band / Out Band (RFC-2833) / SIP Info
FAX / Modem Support :
* G.711 Pass-Through
* T.38 for FAX
Supplemental Services :
Call Hold / Retrieve
Gall Waiting
Call Waiting with Caller ID
Call Transfer
Call Forwarding (Always, Busy and No Answer)
DND (Do Not Disturb)
Call Barring (Incoming / Qutgoing)
WMI (Message Waiting Indicator) (RFC-3842)
Hotline
ISDN Loop-Through (VS model only)
ISDN On-Net/Off-Net (VS model only)
* E + a в * &® o +
VPN
Upto 100 VPN Tunnels
Protocol : PPTP, IPSec, L2TP, L2TP over IPSec
Encryption : MPPE and Hardware-based AES / DES / 3DES
Authentication : Hardware-based MD5, SHA-1
IKE Authentication : Pre-shared Key and Digital Signature (X.509)
LAN-to-LAN, Teleworker-to-L AN
DHCP over IPSec
NAT-Traversal (NAT-T)
Dead Peer Detection (DPD)
VPN Pass-Through
Bandwidth Management
QoS:
* Guarantee Bandwidth for VolP
* (Class-based Bandwidth Guarantee by User-defined Traffic
Categories
« DiffServ Code Point Classifying
+ 4-level Priority for each Direction (Inbound / Outbound)
« Bandwidth Borrowed
Bandwidth / Session Limitation
| ко у ¡SON Phone
sur JO
|
' = | ===
EA = Analouge Phone
GEESE IEEE EEEE
ISDN PEX
>
Exterior line
EEE EEE EEE EEE EEE EEE EER =?
991-9293000-00
VoIP
Network Management
Web-based User Interface (HTTP / HTTPS)
Quick Start Wizard
GLI (Command Line Interface, Telnet / SSH*)
Administration Access Control
Configuration Backup / Restore
Builtin Diagnostic Function
Firmware Upgrade via TFTP / FTP
Logging via Syslog
SNMP Management MIB-Il
Network Features
DHCP Client / Relay / Server
IGMP Proxy / Snooping
Port-based VLAN
Dynamic DNS
NTP Client
Gall Scheduling
RADIUS Client
DNS Cache /Proxy
UPnP
Routing Protocol:
* Static Routing
* НР \/2
ISDN (for S model)
One ISDN Port Fixed for ISDN Phone and One ISDN Port
Configurable for ISDN Phone / Line
Euro ISDN Compatible
Automatic ISDN Backup
Support 64 /128Kbps (multilink-PPP) / BOD
(Bandwidth On Demand)
Remote Dial-In / LAN-to-LAN Connection
Remote Activation
Bypass the Upper and Lower ISDN Port During Power Cut
Model Comparison Chart
VoIP ISDN S0 Wireless AP
Vigor2930 — — —
Vigor2930n — —
Vigor2930Vn O — O
Vigor2930VS e O —
Vigor2930VSn O ® ®
www, draytek.com [email protected] Tel:+886 3 597 2727 Fax:+BE6 3 597 2121
Trademarks and brand names are the properties of their respective owners.
The scape of delivery and other details are subject lo change without prior notice
Wireless Security
* WPA/ WPAZ
* 64/128-bit WEP Encryption
* МАС Address Blocking
* Hidden SSID
* 802.1x Authentication
Dual-WAN
ECO FE
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement