Networking
Networking features |
Ethernet 10/100/1000 |
Wake-on-LAN ready |
N |
Network ready |
Y |
Processor
Processor frequency |
2 GHz |
Storage
Number of hard drives installed |
1 |
Hard drive capacity |
80 GB |
Additionally
Ethernet LAN (RJ-45) ports quantity |
2 |
Security Gateway 80
Small and medium sized companies in particular opt for plug-and-play and secure appliance solutions with pre-integrated server components.
The true advantages of Linux is in its reliability, its outstanding performance and its independence from proprietary manufacturer software. Linux offers you a higher level of security and has proven to be less vulnerable to virus and malware attacks.
The Simply Linux approach
1. Fast and optimal integration
The Collax server is ready to use shortly after its start; simple and easy to understand, the server is quickly integrated with your existing infrastructures. All functions are available with a uniform, easy to use user interface, enabling you access to a secure and reliable network infrastructure at a fraction of the usual costs.
2. Everything is ‘on board’
The Collax server offers you a comprehensive package of network functions. Only the best components for your specific tasks are applied – based on thousands of proven Open Source applications – offering guaranteed qualityand stability. In addition, a range of optional high-quality software add-ons is available to you (e.g. mail functions, content filters, surf protection, VPN). More detailed information on the available modules can be found at www.collax.com.
3. Always up-to-date
Our Engineers and developers ensure that the latest software versions will be available for your Collax Server. This continuous updating process provides the highest degree of guarantee and convenience.
4. Count on us
Our experienced Linux and network specialist partners provide you with optimal support and accessibility.
The CSG offers a Unified Threat Management solution that protects you from Internet attacks with cascaded spam protection, IPSec-based VPN, sophisticated virus protection, Intrusion Detection System (IDS), and Intrusion Prevention System (IPS).