unified threat management is an emerging trend in the firewall appliance security market. it is the evolution of the traditional firewall into a product that not only guards against intrusion but performs content filtering, spam filtering, intrusion detection and anti-virus duties traditionally handled by multiple systems.
the principal advantages of utm are simplicity, streamlined installation and use, and the ability to update all the security functions or programs concurrently. as the nature and diversity of internet threats evolves and grows more complex, utm products can be tailored to keep up with them all. this eliminates the need for systems administrators to maintain multiple security programs over time.
acrosser provides the platform to run the company’s proprietary software as utm to deliver a set of extensible services for comprehensive security, easy rf planning, advanced over-the-air qos for converged data, voice, and video networks, zero-loss handoff mobility, and location-based applications to the ap.
acrosser technology offers networking appliance in micro box which is ar-m0898 is suitable for utm due to the following：
1. aes encryption
padlock™ performs aes encryption using the in-built ace engine at a rate of up to 22 gb/s and supports 5 modes of aes
2. sha-1/sha-256 secure hash：
provides evidence if message is tampered or altered via padlock can in real-time perform secure hash computations to hard drive, memory and network data
3. montgomery multiplier：
used to accelerate the modulus calculation required by rsa encryption algorithms
4. random number generators：
it is necessary for truly secure encryption and via padlock uses quantum uncertainty principle to generate statistically unpredictable random numbers.
up to a rate of 200 million bits per second
5. pxe (pre-boot execution environment)：
acrosser networking series products can support build-in rom with pre-boot execution environment (pxe). then you can control remote client even though this machine is off.
6. lan by-passed：
in networking market, there are some issues which software cannot conquer system environment. one is power-off, another one is system crash, and last one is system hold.
all of situations will cause the functions of software are failed (figure 2). and internet service will be off when all of three services are down.
console re-direction: it allows administrators to monitor and manage post (power-on self test) information from a console by redirecting keyboard input and display output through the serial port.
cpu：via c7 processor
system chipset：via cn700 vt8251
system memory：2 x 200-pin ddr2 400/533 so-dimm up to 2gb
watchdog timer：software programmable 1-63 seconds
crt：1 x vga port for pin header
serial port：1 x rs-232(com1), 1 x re-232(com2)(pin header)
gpio：8 x independent i/o lines
ultra dma for 40 pins connector, dma for 44 pins connector, support 2 eide devices.
ar-m0898a：2 x 10/100 mbps, 2 x giga lan
ar-m0898b：4 x 10/100 mbps
by-passed：lan1, lan2 (optional)
dc：single voltage 12v (default), atx (optional)
operating temp.：0 to 40 degrees celsius
storage temp.：-20 to 80 degrees celsius
relative humidity：5 to 90% @ 40 oc non-condensing
supporting os：windows xp, windows xpe, linux
founded in 1987, acrosser is one of the world’s leading suppliers of industrial computing hardware in taiwan. making life easier by taking advantage of advanced automated technology, acrosser is the first to develop the revolutionary rom/sram disk card, which solves the disk-drive stability problems that plague early industrial automation solutions. acrosser’s broad product lines helps customers succeed in areas such as networking, industrial automation, pos/poi/kiosk/atm, and multimedia. more information about acrosser is available at .