AccessEnforcer UTM Firewall Throughput

  • AccessEnforcer Model

  • Throughput

    (security features enabled)

Calyptix throughput tests are different

Some firewall vendors make bold claims about their throughput speeds but fail to explain how the results were achieved. Others are open about their methodology but fail to conduct realistic tests.

Here are the steps we follow:

  1. The AccessEnforcer UTM firewall is connected via ethernet cable to two computers.
  2. Multiple security services are enabled on the AccessEnforcer.
  3. The test is performed as one computer sends traffic and the second receives traffic.
  4. The average throughput speed is calculated across three tests.
  5. The average is rounded down to a suitable number for the final result.

The following security features are active during the tests:

  • Intrusion prevention (IPS)
  • Spam filtering
  • POP3 email filtering
  • HTTP web filtering
  • HTTPS web filtering
  • Instant Message filtering

Tested with Accuracy in Mind

Since AccessEnforcer is a UTM firewall, and not a simple network router, we feel that enabling these features during throughput tests yields results that more accurately reflect the speeds our customers can expect in the field.

Remember that every network is different, and the AccessEnforcer UTM firewall is tested in a controlled environment. Actual throughput speeds will vary on your network.

More About AccessEnforcer UTM Firewall Models

View More