Udgivet: 2008-04-03, anmeldelse af: pcmag.com
- Identity-based network perimeter security. Can assign bandwidth, Web content filtering and security policies per user or per host. Customizable error messages. Flexible port configuration can include WAN failover (rare in this price range).
- Setup is difficult. Ports not labeled. Config requires digging deep into the interface. Weak printed documentation.
- The Cyberoam CR 25i isnt the easiest network perimeter security solution to implement, but it gives you a level of control over network security that goes beyond what similar appliances typically offer....
Læs hele anmeldelsen »
|