We have launched the new version of the DrayTek website, and this content is no longer being maintained.
You will find more information on our new site; however, we will keep this page for a few months.

Go to the new website
I got it.

We have launched the new version of the DrayTek website, and this content is no longer being maintained.
You will find more information on our new site; however, we will keep this page for a few months.

VigorPro 5500 blank.jpg blank.jpg blank.jpg blank.jpg blank.jpg blank.jpg blank.jpg blank.jpg blank.jpg

VigorPro 5500

  • 多功能的整合威脅管理(UTM)
  • 支援及時性防毒防駭與網路加解密的硬體加速結構
  • 偵測到垃圾郵件,病毒,遭受攻擊時,及時EMAIL/Syslog Alert反應
  • 具有封包串流的檢測技術
  • 及時的線上內容過濾
  • 低成本在維護和管理費用



    VigorPro 5500 系列,採用多項整合功能,能同時進行郵件,網頁內容,P2P 等多項應用即時掃描,進行最安全的保護。

    傳統方式保護電腦為免於病毒或惡意程式攻擊,都需要每一個主機都安裝軟體,為了安裝這些軟體在主機上是一個相當耗費時間的。為了評估危險程度,掃描引擎與病毒資料庫都需要持續地更新。而對於工作莘苦的IT人員而言那是非常花錢而且惱人的事。好在,VigorPro 5500 作為全面性的閘道防火牆,很自然地阻擋了任何網路層的攻擊,經由使用者預設的指令,可對危險因子給予適當的處置。

    VigorPro 5500 採用 DrayTek 獨一無二的 MSSI (多重堆疊封包檢測)機制,進行封包的過濾,並結合特制的 PC 病毒通知軟體,在用戶端傳送病毒資料的同時,立即的給予傳送者通知,可立刻給予處理,避免危險資料再傳送。




    硬體介面 WAN 2x 10/100 Base-Tx RJ45 ports
    LAN 5x 10/100/1000 Base-Tx RJ45 ports
    溫度 Operating : 0°C ~ 45°C
    Storage : -25°C ~ 70°C
    溼度 10% ~ 90% ( non-condensing )
    最大消耗功率 15 Watt
    尺寸 L273 * W166 * H44.6 ( mm )
    電源 AC 100~240V, 50/60Hz


    1. Anti-Virus
    • Scan SMTP, POP3, HTTP, IMAP, FTP
    • Scan ZIP / GZIP / BZIP2
    • Scan encrypted VPN tunnels
    • Automatic virus signature update
    • Automatic alert when signature update service expired
    • Real-time e-mail/syslog alert when virus is detected
    2. Anti-Intrusion
    • Rule-based detection list
    • Pass / Disallow / Reset when intrusion is detected
    • Automatic intrusion signature update
    • Automatic alert when signature update service expired
    • Real-time e-mail/syslog alert when under attack
    3. Anti-Spam
    • Real-time scan SMTP, POP3
    • Automatic alert when license expired
    • Real-time syslog alert when spam is detected
    • Multi-language detection
    • Multi-type ( graphic, document, HTML ) detection
    • Single / Double byte coding detection
    • No user limitation
    4. Dual-WAN
    • Outbound Policy-Based Load-Balance
    • BoD ( Bandwidth on Demand )
    • WAN Connection Fail-over
    5. WAN Protocol
    • DHCP Client
    • Static IP
    • PPPoE
    • PPTP
    • L2TP *
    • BPA
    6. VPN
    • Up to 200 VPN Tunnels
    • Protocol : PPTP, IPSec, L2TP, L2TP over IPSec
    • Encryption : MPPE and Hardware-Based AES / DES / 3DES
    • Authentication : Hardware-Based MD5, SHA-1
    • IKE Authentication : Pre-Shared Key and Digital Signature ( X.509 )
    • LAN-to-LAN, Teleworker-to-LAN
    • DHCP over IPSec
    • NAT-Traversal ( NAT-T )
    • Dead Peer Detection ( DPD )
    • VPN Pass-Through
    7. Firewall Facilities
    • SPI ( Stateful Packet Inspection )
    • CSM ( Content Security Management ) for IM/P2P Application
    • Multi-NAT, DMZ Host, Port Redirection and Open Port
    • Policy-Based IP Packet Filter
    • DoS / DDoS Prevention
    • IP Address Anti-Spoofing
    • E-Mail Alert and Logging via Syslog
    • Bind IP to MAC Address
    8. Network Features
    • DHCP Client / Relay / Server
    • Dynamic DNS
    • NTP Client
    • Call Scheduling
    • RADIUS Client
    • DNS Cache/Proxy
    • UPnP
    • Port-Based VLAN
    • Routing Protocol : Static Routing , RIP V2
    9. Network Management
    • Web-Based User Interface ( HTTP/ HTTPS )
    • Quick Start Wizard
    • CLI ( Command Line Interface, Telnet / SSH * )
    • Administration Access Control
    • Configuration Backup / Restore
    • Built-in Diagnostic Function
    • Firmware Upgrade via TFTP/FTP
    • Logging via Syslog
    • SNMP Management with MIB-II
    10. Content Filter
    • URL Keyword Blocking ( White List and Black List )
    • Java Applet, Cookies, Active X, Compressed, Executable, Multimedia File Blocking
    • Time Schedule Control
    11. Bandwidth Management
    • Class-based Bandwidth Guarantee by User-Defined Traffic categories
    • DiffServ Code Point Classifying
    • 4-level Priority for Each Direction ( Inbound / Outbound )
    • Bandwidth Borrowed
    • Bandwidth / Session Limitation

    備註: 以上規格皆屬理論值,實際數據以客戶實際測試為主


    Legacy firewall devices have their limitations on networking protection and are often dedicated. The vulnerabilities of contemporary networks ranging from Web surfing, e-mail, FTP, to various instant messaging and P2P softwares, present a heavy burden for network administrators.

    VigorPro 5500, serving as UTM equipment of the new generation, can fulfill your requirements for secure networks.

    Figure 1 . Back Panel

    All-in-one Unified Security Firewall
    Conventional firewalls are blind to today's attacks, and also cannot detect inappropriate e-mail. The most common solution is complex, costly collection of independent systems to deal with each of these threats along with network-level intrusions and attacks. The VigorPro 5500 is capable of providing a complete complement of integrated services including :
    • Anti-Virus
    • Intrusion prevention
    • Intrusion Detection
    • Anti-Spam ( Commtouch® )
    • VPN
    • SPI Firewall

    Hardware-accelerated, Real-time Response
    The VigorPro 5500 employs a unique, hardware-accelerated architecture the provides the ability to perform real-time security without slowing critical network applications, such as Web traffic. Software-based anti-virus systems, which are designed for scanning non-real-time email messages, are too slow to be used to scan Web traffic or other real-time network applications.

    Network-level Protection
    Conventional way to protection against virus or malicious program, it required each host to install software on the host. To install software on a large number of hosts is a time consuming process. To evaluate for vulnerabilities, both scan engine and virus database needs constant upgrade. It is very costly and annoying for IT personnel with high maintenance. While VigorPro 5500 works as firewall as well as internet gateway, so by nature VigorPro 5500 blocks any attacks at the point of network entry. Through the user interface, the security administrator can monitor and instruct the VigorPro 5500 to look for any vulnerability in network-level. Provide protection of all hosts inside network edge before threats intrude.

    Content-based Inline Inspection
    Conventional firewalls only inspect packets connection behavior to against any connection-based attack. While the content-based threats today. such as virus, worms, Trojans or banned content, which spread faster and do more damage. Conventional firewalls bypass the widely spread content-based threat and expose internal network to outside world. VigorPro 5500 deploys DrayTek's unique MSSI™ ( Multi-stack Stateful Inspection) mechanism. With MSSI™ , VigorPro 5500 inspects packet streams, compares any suspected content or behavior with build-in database in real-time, and provide inline anti-virus and anti-intrusion protection.