Here you can compare the prices for wireless routers DELL, get acquainted with photos and technical characteristics (for example Supports ISDN connection, Intel inside, Downstream data rate, Upstream data rate, MAC address table, Processor frequency) and buy a liked model wireless routers in one of the reliable online stores.
TZ 200 Wireless-N TotalSecure, 100 Mbps, WLAN 802.11 b/g/n, Fast Ethernet, USB 3G Adapter/Modem, 910g
The new TZ 200 Series builds upon the TZ 100, delivering critical business continuity and flexibility through several advanced features. The TZ 200 adds critical failover capabilities that can provide 24x7 access and keep your organization up and running, with support for USB-based 3G failover, USB-based analog modem failover and box-to-box failover.
While the TZ 100 supports SSL VPN, the TZ 200 comes pre-bundled with two concurrent SSL VPN tunnels and is upgradeable to 10. The TZ 200 also supports Dell SonicWALL Comprehensive Anti-Spam Service including sophisticated per-user mailbox quarantine capabilities as a complement to UTM, adding customization at a lower cost.
The higher-performance TZ 200 significantly boosts memory and processor power to support all these additional features while running 40% faster than the TZ 100. The TZ 200 Wireless-N version incorporates high-speed 802.11n. The entire TZ 200 Series delivers powerful, enterprise-class features that are normally only found in enterprise-priced offerings, all available for a low total cost of ownership.
- Uncompromising performance, applying real-time scanning over state-of-the-art high-speed architecture, delivers up to Gigabit Ethernet speeds. - SonicWALL Reassembly-Free Deep Packet Inspection™ provides enterprise-class protection for key Internet services such as Web, e-mail, file transfers, Windows services and messaging. - SonicWALL Unified Threat Management (UTM) delivers real-time gateway protection against the latest viruses, spyware, intrusions, software vulnerabilities and other malicious code. - SonicWALL Comprehensive Anti-Spam Service utilizes real-time sender IP reputation analysis and cloud-based Advanced Content Management techniques to remove spam, phishing and virus laden messages from inbound SMTP-based e-mail before they reach your network. This service eliminates the need for less effective, slow responding and error prone real-time black list services. - SonicWALL Application Firewall offers granular application-level access controls to manage bandwidth and prevent leaks of sensitive or proprietary information. - Modular 3G wireless broadband and analog modem support can be used as either a primary or secondary WAN connection for business continuity or rapid deployment in remote locations. - Secure 802.11b/g/n wireless LAN (WLAN) technologies provide secure high-speed wireless connectivity with SonicWALL’s wireless security enforcement. - Advanced IPSec and SSL VPN connectivity options provide secure, high-speed office-to-office and individual user remote access. - SonicWALL PortShield port-level security offers flexible protection from traffic on the WAN, DMZ, and devices inside your network by easily grouping ports into logical units. - Automated failover and failback ensures continuous uptime of VPN tunnels by diverting traffic over alternate WAN or WLAN connections in the event of primary connection failure. - Intuitive configuration wizards simplify even the most complicated tasks, including VPN set-up, NAT configuration and public server configuration. - Robust Voice and Video over IP (VoIP) capabilities offer secure, standards-based support for sending voice (audio), streaming video and other media over IP-based networks. - Global Management System (GMS) provides comprehensive global management and reporting tools for simplified configuration, enforcement and management from a central location. Uncompromising performance, applying real-time scanning over state-of-the-art high-speed architecture, delivers up to Gigabit Ethernet speeds.
By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.