Turn any location into a secure location with Remote Ethernet Devices (RED). If you have branch offices, retail locations, remote outposts or otherwise need to extend your secure network easily and affordably beyond your main facility, Sophos Remote Ethernet Devices are the ideal solution. Uniquely simple and imminently affordable, RED provides an elegant solution to building a secure distributed network.
Sophos RED 15w - Security appliance - 4 ports - GigE - Wi-Fi - Dual Band - desktop (Voltage: AC 120/230 V (50/60 Hz))
Data Link Protocol:
- Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.11b, IEEE 802.11a, IEEE 802.11g, IEEE 802.11n
- Maximum number of users: unlimited
- Port status, power, WAN, LAN, Internet
- Routing, 2T2R MIMO technology
- 4 x 1000Base-T - RJ-45
- 1 x 1000Base-T - RJ-45 (WAN)
- 1 x USB 2.0 - Type A
- 1 x console - RJ-45
- FCC Class B certified, UL, VCCI, CCC, RCM
Power Consumption Operational:
Service & Support:
- Limited warranty - 1 year
Min Operating Temperature:
Max Operating Temperature:
Humidity Range Operating:
- 10 - 90% (non-condensing)
- Plug-and-protect deployment
Sophos RED makes extending your secure network to other locations easy. It requires no technical skills at the remote site; simply enter the RED device ID into your Sophos appliance and ship it. As soon as it's plugged in and connected to the Internet, it will contact your firewall and establish a secure dedicated VPN tunnel. It's that easy.
- Flexible configuration
Set up your RED devices to tunnel all traffic from the remote location back to the firewall, controlling DHCP and other network elements of the remote network. Or you may choose to only route inter-office network traffic via RED, while enabling direct Internet access from the remote location.
- Secure encrypted tunnel
All data between the RED and your firewall is encrypted to the strong AES-256 levels ensuring a tamper- and hack-proof, secure connection.
- Easy centralized management
Since RED is effectively a virtual Ethernet cable connecting your remote locations, centralized management of your distributed network is as easy as managing a single location. You can choose to apply the same firewall, web and other security policies across both local and remote traffic. Or you can create custom policies by location.
No Reviews are available at this time