Description
Specifications
|
Item |
DCME-720 |
||||
|
Hardware |
|||||
|
CPU |
Architecture |
Intel Multi-core |
|||
|
Frequency |
2.4GHz |
||||
|
Memory |
4G DDR III |
||||
|
FLASH |
64G SSD |
||||
|
Interface |
10/100/1000M Base-T |
17 |
|||
|
SFP/RJ45 Combo |
4 |
||||
|
Management port |
1 RS-232 (RJ-45) console, 2 USB2.0 port |
||||
|
Led |
Power/ system Run/ port status |
||||
|
Temperature |
Operating 0℃-40℃ Storage -20℃-65℃ |
||||
|
Humidity |
Operating 10%-85% Non-condensing Storage 5%-95% Non-condensing |
||||
|
Power Supply |
Redundancy |
|
Yes |
||
|
Range |
AC 100~240V, 47~63Hz |
||||
|
Performance |
|||||
|
Suggested Concurrent users |
5000 |
||||
|
Suggested Export Bandwidth |
2800M |
||||
|
Bidirectional Throughput |
64 bytes |
850Mbps |
|||
|
1518 bytes |
6000Mbps |
||||
|
NAT |
New session per second |
40,000 |
|||
|
Max concurrent session |
1000K |
||||
|
VPN |
IPSec Throughput |
800M |
|||
|
Max IPSec channel |
1000 |
||||
|
Max L2TP access users |
500 |
||||
|
Max SSL VPN access users |
500 |
||||
|
Max Web authentication users |
3000 |
||||
|
Wi-Fi Access Controller |
Default manageable APs |
24 |
|||
|
Maximum manageable APs |
1024 |
||||
|
Software Features |
Description |
|
Working mode |
Routing/ NAT/ Bridge |
| Network | PPPoE client, PPPoE chap / pap / any three authentication methods, PPPoE client reconnection |
| DHCP Server, Client, relay | |
| DNS server, proxy | |
| DDNS | |
|
Routing |
Static routing, static routing with priority, RIP |
| PBR (based on source address, source port, a destination address, protocol, and other strategies), support next-hop IP or interface | |
| Equivalent multi-route load balancing, and bandwidth load automatically adjust the proportion of each route, to achieve load balancing based on the line. | |
| Multilink backup function, schedule link state detection, and automatic switching and back between links | |
|
NAT |
Source NAT Static / Dynamic |
| 1:1 NAT1: N NATN: N NATServer Load BalancingMulti-protocol NAT ALG | |
|
Deep packet inspection |
Control and rate-limit on Popular P2P application including BT, eMule, eDonkey |
| Control and rate-limit on popular IM applications including Yahoo, GTalk, etc. | |
| URL filtering, QQ audit | |
|
QoS |
IP-based bandwidth control |
| Application-based bandwidth control | |
| Flow-based bandwidth control | |
| Bandwidth guarantee, bandwidth reservation, flexible bandwidth allocation | |
| 2 levels of bandwidth control (IP and application bandwidth control, port-based) | |
|
Attack protection |
ARP attack defense mechanisms (arp learning, free arp, arp protection) |
| IP-MAC binding, manual and automatic | |
| DoS, DDoS attack protection | |
| Flood protection: ICMP flood, UDP flood, SYN flood | |
| DNS queries flood protection: DNS queries & DNS recursive query flooding attack protection | |
| Malformed packet protection | |
| IP anomaly detection, TCP anomaly detection | |
| IP address scanning attack prevention, port scan protection | |
| Denial of Service Protection: Ping of Death, Teardrop, IP fragmentation, IP options, Smurf or Fraggle, Land, ICMP big packet | |
|
Session control |
based on interface, source IP, destination IP, and applications (new sessions per second and the number of concurrent sessions) |
| Timing session control | |
|
Access controller |
802.11, 802.11a, 802.11b, 802.11g, 802.11n, 802.11d, 802.11h, 802.11i, 802.11e, 802.11k |
| CAPWAP | |
| Wi-Fi management, configuration, monitor | |
|
System |
Dual image |
| Firmware upgrade via WEB and TFTP | |
| Configuration backup and restore | |
| SNMPv1/v2 | |
| HTTPS\HTTP\TELNET\SSH | |
| NTP | |
| Web configuration wizard | |
| WEB authentication | |
| Object management based on IP addresses, protocols, schedule, and interface | |
|
Log and monitor statistics |
Monitoring and statistics on interface traffic |
| Monitoring and statistics on IP traffic | |
| Monitoring and statistics on session number based on IP address | |
| Monitoring and statistics on bandwidth and session number based on applications | |
| Monitoring and statistics on the number of attacks | |
| Monitoring and statistics on IP, application, and attacks based on Security domain | |
|
Event log / traffic log / configuration log / alarm log / security log |
|
| USB log backup | |
| High reliability | Support link load balancing, link backup |
| Multiple link failure detection mechanism |



