Datasheet

Benefits
Integrated Internet
Security Appliance with
Unified Threat
Management
zywall
5/35/70
utm series
New Era for SMB Security
Network Protection
ł
High performance with 8-in-1
Security
ł
Exclusive ZyXEL SecuASIC
TM
accelerating technology
ł
Protection from Spyware, Phishing,
Viruses, and Spam
ł
IM (Instant messaging),
P2P (Peer-to-peer) Applications,
and Granular Control
UTM is an Emerging Trend in Network Security
Gone are the days when a dedicated firewall is sufficient to fend off hackers from cooperate networks.
Unified Threat Management (UTM) is an emerging trend in the network security appliance market. Always
on the cutting edge, ZyXELs ZyWALL 5/35/70 UTM series is capable of outperforming the current ZyWALL
5/35/70 series by up to 20 times with just a ZyWALL Turbo Card. This new technology introduces a new all-
in-one network security device that provides content filtering, anti-virus, anti-spam and intrusion detection
services traditionally handled by multiple systems.
High-performance All-in-one Design
From a business perspective, IT managers should consider an enterprise approach for comprehensive
security. They can now utilize all-in-one appliances, such as ZyXELs 8-in-1 UTM solution, for solid protection
and performance. All of the following features are now offered in one box and controlled through a single
unified interface: Anti-Virus, IDP, Anti-Spam, Firewall, VPN, Load Balancing, Bandwidth Management and
Content Filtering.
Empowering ZyWALL Performance with Turbo Card
Take advantage of secure protection from virus attacks, hackers, and spam. Imagine, no more worrying
about spyware, adware, or other potential threats to your computer and valuable data. Make the Internet
safe for your PCs and Network.
Upgradeable Design with ZyWALL Turbo Card within 6-Step
In an increasingly complex network environment the integrated ZyWALL UTM provides streamlined
management efforts, easy installation, and multiple layers of network protection.
Specifications
System Specifications
Firewall (ICSA Certified)
IP Protocol/Packet Filter
• DoS and DDoS Protections
• Stateful Packet Inspection
• Real time E-mail alerts
• Reports and Logs
Transparent Firewall
VPN (ICSA Certified)
• Manual key, IKE
• PKI (X.509)
• Encryption (DES, 3DES and AES)
• Authentication (SHA-1 and MD5)
• IPSec NAT Traversal
• Xauth User Authentication (Internal Database
and External RADIUS)
• DH1/2, RSA signature
Anti-Virus/IDP
(Intrusion Detection and Prevention)
Enabled and Activated by a ZyWALL Turbo Card
(ZyXEL SecuASIC inside)
Virus, Worm, trojan, backdoor, buffer overflow
and port scan protection
P2P, IM, web attack, protection
Automatic/scheduling signatures update
• Real-time attack alerts and logs
Anti-Spam
• Spam, Phishing prevention
Configurable white and black lists
SMTP, POP3 support
External Spam database
Content Filtering
Web page blocking by URL keyword
• IKE + PKI support
• External database content filtering
• Java/ActiveX /Cookie/News blocking
Traffic Management
• Guaranteed/Maximum Bandwidth
• Policy-based Traffic shaping
• Priority-bandwidth utilization
• Load Balancing
(ZyWALL 35/70/35 UTM/70 UTM available)
• Bandwidth Management
• Static Routes
High Availability (ZyWALL 35/70/35
UTM/70 UTM available)
• Auto fail-over, fail-back
• Dial Backup
Dual WAN ports for WAN backup and
Load Balancing
System Management
• Embedded Web Configurator (HTTP and HTTPS)
• Menu-driven SMT (System Management
Terminal) management
• CLI (Command Line Interpreter)
Remote Management via Telnet or Web
• SNMP manageable
• Firmware Upgrade
(web configurator, TFTP/FTP/SFTP)
ZyXEL Centralized Network Management
(Vantage CNM) support
Logging/Monitoring
• Centralized Logs
• Attack alert
• System status monitoring
• Syslog
Protocol Support
• PPP (Point-to-Point Protocol) link layer protocol
Transparent bridging for unsupported network
layer protocols
• DHCP Server/Client/Relay
• RIP I/RIP II
• ICMP
• SNMP v1 and v2c with MIB II support (RFC 1213)
• IP Multicasting IGMP v1 and v2
• IGMP Proxy
• UPnP
Hardware Specifications
Power Specification
• ZyWALL 70/70 UTM: 100 ~ 240 VAC
• ZyWALL 5/35/5 UTM/35 UTM: 12V DC
Fuse Specification
• ZyWALL 70/70 UTM: T 0.5 Amp, 250 VAC
Physical Specification
• Reset Button: Restores factory default settings
• Console: RS-232 DB9F
• Dial Backup: RS-232 DB9M
• Extension Card Slot: For installing an optional
ZyXEL wireless LAN card or a ZyWALL Turbo Card
Ethernet Interface
ZyWALL 5/5 UTM
LAN/DMZ: 4 ports auto MDI/MDI-X
10/100 Mbps Ethernet
WAN: 1 port auto MDI/MDI-X
10/100 Mbps Ethernet
ZyWALL 35/35 UTM
LAN/DMZ: 4 ports auto MDI/MDI-X
10/100 Mbps Ethernet
WAN: 2 ports auto MDI/MDI-X
10/100 Mbps Ethernet
ZyWALL 70/70 UTM
LAN: 1 port auto MDI/MDI-X
10/100 Mbps Ethernet
• DMZ: 4 ports auto MDI/MDI-X
10/100 Mbps Ethernet
WAN: 2 ports auto MDI/MDI-X
10/100 Mbps Ethernet
Dimensions
• ZyWALL 5/5 UTM
242(W) x 175(D) x 35.5(H) mm
• ZyWALL 35/35 UTM
242(W) x 175(D) x 35.5(H) mm
• ZyWALL 70/70 UTM
355(W) x 200(D) x 55(H) mm
Weight
• ZyWALL 5/5 UTM: 1,200g
• ZyWALL 35/35 UTM: 1,200g
• ZyWALL 70/70 UTM: 2,600g
Environmental Specification
Operation Temperature: 0ºC ~ 50ºC
Storage Temperature -30ºC ~ 60ºC
Operation Humidity: 20% ~ 95% RH
(non-condensing)
• Storage Humidity: 20% ~ 95% RH
(non-condensing)
Certification
EMC: FCC Class B, CE-EMC Class B, C-Tick Class B,
VCCI Class B
• Safety: CSA International, CE EN60950-1
Feature MatrixFeature Matrix
*
Firmware upgradeable for future enhancement
65-100-001507G 12/05
Copyright © 2005 ZyXEL Communications Corp. All rights reserved. ZyXEL, ZyXEL logo and ZyNOS are registered trademarks of ZyXEL Communications Corp. All other brands,
product names, or trademarks mentioned are the property of their respective owners. All specifications are subject to change without notice.
For more product information, visit us on the web www.ZyXEL.com
Corporate Headquarters
ZyXEL Communications Corp.
Tel: +886-3-578-3942
Fax: +886-3-578-2439
Email: sales@zyxel.com.tw
http://www.zyxel.com
http://www.zyxel.com.tw
Tel: +7 (095) 542-8920
Fax: +7 (095) 542-8925
Email: info@zyxel.ru
http://www.zyxel.ru
ZyXEL Russia
Tel: +1-714-632-0882
Fax: +1-714-632-0858
Email: sales@zyxel.com
http://www.us.zyxel.com
ZyXEL North America
Tel: +45 39 55 07 00
Fax: +45 39 55 07 07
Email: sales@zyxel.dk
http://www.zyxel.dk
ZyXEL Denmark A/S
Tel: +380 44 494 49 31
Fax: +380 44 494 49 32
Email: sales@ua.zyxel.com
http://www.ua.zyxel.com
ZyXEL Ukraine
Tel:
+33 (0)4 72 52 97 97
Fax:
+33 (0)4 72 52 19 20
Email: info@zyxel.fr
http://www.zyxel.fr
ZyXEL France SARL
Tel: +36-1-336-1646
Fax: +36-1-325-9100
Email: info@zyxel.hu
http://www.zyxel.hu
ZyXEL Hungary ZyXEL Sweden A/S
Tel: +46 (0) 31 744 77 00
Fax: +46 (0) 31 744 77 01
Email: sales@zyxel.se
http://www.zyxel.se
Tel: +420 241 091 350
Fax: +420 241 091 359
Email: info@zyxel.cz
http://www.zyxel.cz
ZyXEL Czech s.r.o.
Tel: +47 22 80 61 80
Fax: +47 22 80 61 81
Email: sales@zyxel.no
http://www.zyxel.no
ZyXEL Norway A/S
Tel: +34 902 195 420
Fax: +34 913 005 345
Email: sales@zyxel.es
http://www.zyxel.es
ZyXEL Spain
Tel: +44 (0) 1344 303044
Fax: +44 (0) 1344 303034
Email: sales@zyxel.co.uk
http://www.zyxel.co.uk
ZyXEL UK Ltd.
Tel:
+358-9-4780 8400
Fax:
+358-9-4780 8448
Email: sales@zyxel.fi
http://www.zyxel.fi
ZyXEL Finland Oy
Tel: +49 (0) 2405-6909 0
Fax: +49 (0) 2405-6909 99
Email: sales@zyxel.de
http://www.zyxel.de
ZyXEL Germany GmbH.
Tel: +7-327-2-590-699
Fax: +7-327-2-590-689
Email: sales@zyxel.kz
http://www.zyxel.kz
ZyXEL Kazakhstan
ZyXELs Solution to Top 4 Security Headaches
As network threats emerge with greater complexity, traditional passive methods of fnetwork defense has become obsolete. What you
need is intelligent network security solutions that respond to threats and take proactive actions.
The following describes the four security problems on IT managers’ top-unwanted list.
File Sharing and Messaging
Application Abuse
With numerous file-sharing and instant messaging (IM) applications,
it is easier for company employees to share files and chat online
during work hours. Rapid file sharing not only compromises
network safety with the sharing of questionable file containing
malicious viruses, but may also violate copyright issues and create
legal hassles. Although the convenience of IM applications reduces
communication cost between business partners, it could hamper
business productivity when its use is non-work related.
Virus Attacks
Malicious virus and worm attacks could cripple
corporate networks and halt business transactions.
In addition to severe financial impact, you also risk
the lost of confidential, important information.
Unsolicited Spams
As mass-mailing software and companies mushroomed on
the Internet, your network is bombarded with massive
amount of junk mails (aka. spam). Without intelligent
detection and proactive blocking, users have to go through
the tedious and time-consuming task of sieving through
the overflowing mailbox. Worse yet, these unwanted mails
usually contain inappropriate, luring or even criminal
messages that would mislead your employees. Simply put,
spam mails mean serious productivity loss.
Rampant Non-Work Related
Surfing, Spyware, Phishing
Every employee uses the Internet for personal reasons
at one point or another during work hours. Be they
browsing through news headlines or visiting websites
with questionable contents, they are exposing their
computers to threats of invisible spyware or phishing.
These hard-to-detect, self-embed software gather
personal data or steal confidential business information
all without the knowledge of the users.
Powered by Kaspersky, BlueCoat, Mailshell, ZyNOS4, ICSA Firewall, ICSA VPN
Z
yWALL
P
1
8
0M
b
ps
30M
b
ps
U
n
l
imite
d
2
,
0
4
8
1
1x
LAN
, 1x
WAN
n/a
n/a
5VD
C
n/a
n/a
1
x
x
130g
x
x*
n/a
x
x
x
x*
n/a
x
x
x
x
x
x
n/a
n/a
n/a
x*
x*
x*
x*
x*
x*
x*
n/a
n/a
n/a
n/a
n/a
n/a
x
x
x
n/a
n/a
n/a
x
x
x
Z
y
WALL
2
1
2M
b
p
s
2.2M
b
p
s
Un
l
imite
d
1,
0
4
8
2
4
x
LAN
, 1x
WAN
n
/
a
x
1
2VD
C
n
/
a
x
1
8
1 x 1
28
x
36
330g
x
n
/
a
x
x
x
x
n
/
a
x
x
x
x
x
x
x
x
x
x (B
l
uecoat
)
n
/
a
n
/
a
n
/
a
n
/
a
n
/
a
n
/
a
n
/
a
n
/
a
n
/
a
n
/
a
x
x
n
/
a
x
x
x
n
/
a
n
/
a
n
/
a
x
x
x
Z
y
WALL
5
6
5M
b
p
s
2
5M
b
p
s
Un
l
imite
d
4
,
000
10
4xLAN
/
DMZ, 1xWA
N
W
ire
l
ess Car
d
Z
yWALL Tur
b
o Car
d
(
UTM Upgra
d
e
)
x
1
2VD
C
x
x
2
4
2
x 175 x
3
5.
5
1,
200g
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x (B
l
uecoat
)
U
TM Upgra
d
ea
ble
U
TM Upgra
d
ea
ble
U
TM Upgra
d
ea
ble
U
TM Upgra
d
ea
ble
x
x
x
x
x
x
x
x
n
/
a
x
x
x
x
x
x
x
x
x
Z
y
WALL
70
90M
b
p
s
4
0M
b
p
s
U
n
l
imite
d
10
,
000
100
1
xLAN, 4x
D
MZ, 2xWAN
W
ire
l
ess Car
d
ZyWALL Tur
b
o Car
d
(
UTM Upgra
d
e)
x
1
00 ~ 240VD
C
x
n
/
a
3
55 x
200
x 55
2
,
600
g
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
(B
l
uecoat)
U
TM Upgra
d
ea
bl
e
U
TM Upgra
d
ea
bl
e
U
TM Upgra
d
ea
bl
e
U
TM Upgra
d
ea
bl
e
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Z
y
WALL
5
UTM
6
5M
b
p
s
2
5M
b
p
s
U
n
l
imite
d
4
,
000
10
4
xLAN
/
DMZ, 1xWAN
ZyWALL Tur
b
o Car
d
x
1
2VD
C
x
x
2
4
2
x 175 x
3
5.5
1
,
200
g
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
(B
l
uecoat
)
x
x
x
x
x
x
x
x
x
x
x
x
n/
a
x
x
x
n/
a
n/
a
n/
a
x
x
x
Z
y
WALL
35
UTM
7
0M
b
ps
30M
b
ps
U
n
l
imite
d
10
,
000
3
5
4
xLAN
/
DMZ, 2xWAN
Z
yWALL Tur
b
o Car
d
x
12VD
C
x
x
2
4
2
x 175 x
3
5.5
1
,
200g
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x (B
l
uecoat)
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
n/
a
n/
a
n/
a
x
x
x
Z
y
WALL
70
UTM
9
0M
b
p
s
4
0M
b
p
s
Un
l
imite
d
10
,
000
1
00
1
xLAN, 4x
D
MZ, 2xWA
N
Z
yWALL Tur
b
o Car
d
x
1
00 ~ 240VD
C
x
n/
a
3
55 x
200
x 55
2
,
600g
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
(B
l
uecoat)
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
n/
a
n/
a
n/
a
x
x
x
Z
y
WALL
35
70M
b
p
s
30M
b
p
s
Un
l
imite
d
10
,
000
3
5
4xLAN
/
DMZ, 2xWAN
Wire
l
ess Car
d
Z
yWALL Tur
b
o Car
d
(
UTM Upgra
d
e
)
x
1
2VD
C
x
x
2
4
2
x 175 x
3
5.
5
1,
200g
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x (B
l
uecoat
)
UTM Upgra
d
ea
ble
UTM Upgra
d
ea
ble
UTM Upgra
d
ea
ble
UTM Upgra
d
ea
ble
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Mo
d
e
l
nam
e
Performance
Firewall Throughput
VPN 3DES/AES Throughput
User Licenses
Concurrent Sessions
Simaltaneous IPSec VPN connectionc
Physical Specification
Ports (10/100Mbps Auto
sensing & MDI/MDIX)
Extension Card Slot
RS-232 console
Power Supply
Rack-Mounted
Wall-Mounted
Dimensions (W x D x H, mm)
Weight
Mode of Operation
Routing/NAT/SUA Mode
Transparent Mode
Dial Backup
Firewall (ICSA Certified)
IP Protocol/Packet Filter
DoS and DDoS protections
Stateful Packet Inspection
Transparent Firewall
Web Content Filtering
VPN (ICSA Certified)
Manual key, IKE
PKI (X.509)
Encryption (DES, 3DES and AES)
Authentication (SHA-1 and MD5)
IPSec NAT Traversal
Xauth User Authentication
(Internal Database and External RADIUS)
Content Filtering
Internal Content Filtering
(Java, Cookies, Active X blocking)
Internal Content Filtering
(URL/Keyword blocking)
External Database Content Filtering
Anti-Virus/IDP
Virus, worm, trojan, backdoor,
buffer overflow, port scan protections
P2P, IM, web attack protections
Automatic/Scheduling
signature update
Real-time attack Alerts and Logs
Anti-SPAM
SPAM, Phishing prevention
Configurable White/Black list
SMTP, POP3 support
Traffic Management
Guaranteed/Maximum Bandwith
Policy-based Traffic shaping
Priority-bandwidth utilization
High Availability (HA)
Auto fail-over, fail-back
Dial Backup
Dual WAN ports for WAN backup
and Load Balance
System Management
WebGUI (HTTP and HTTPS)
Firmware Upgrade (WebGUI, TFTP/FTP/SFTP)
Vantage CNM
Wireless
IEEE 802.11b Compliant
IEEE 802.11g Compliant
IEEE 802.1x Authentication
(Internal Database and External RADIUS)
Logging/Monitoring
Centralized Logs
Attack alert
System status monitoring
coverback
inside

Summary of content (4 pages)