Desktop Models
Compare the different NetWall platforms and choose the desktop model that best fits your specific needs.
NetWall E10 | NetWall E20 | NetWall E80 | ||||
---|---|---|---|---|---|---|
![]() |
![]() |
![]() |
||||
Feature | Standard | Standard | Pro | Standard | Pro | |
Firewall performance | 1 Gbps | 1 Gbps | 2 Gbps | 2 Gbps | 4 Gbps | |
VPN performance | 100 Mbps | 50 Mbps | 100 Mbps | 500 Mbps | 1 Gbps | |
Concurrent Connections | 16,000 | 8,000 | 16,000 | 250,000 | 500,000 | |
Current VPN Tunnels (IPsec) | 10 | 10 | 25 | 100 | 200 | |
Ethernet Interfaces | ||||||
Virtual Interfaces (IEEE 802.1q/802.1ad) | 16 | 4 | 8 | 64 | 128 | |
Virtual Routers | 2 | 1 | 1 | 5 | 10 | |
High Availability Support | |
|
||||
Clavister OS | Clavister cOS Core | |||||
Hardware Specifications | ||||||
Rack-mountable | No | Rack-kit included | ||||
Power-supply | External PSU, 100-240 VAC, 50-60 Hz | 100-240VAC, 50-60 Hz | ||||
Recommended Use-Cases | ||||||
Typical environments | Small offices, branch-offices, CPE |
Explore some of the Solutions provided
with the Clavister NetWall
Resources
Download product datasheets, videos, white papers and more.
Name | Video link |
---|---|
Government | ![]() |
True Next Generation Firewall | ![]() |
Cybercrime and Ransomware | ![]() |
Protect against DDoS attacks | ![]() |
Name | Download links |
---|---|
Virtualization and Cloud Security | ![]() ![]() ![]() |
Has Prism scattered trust in IT security? | ![]() |
DoS and DDoS Protection with Clavister | ![]() ![]() ![]() |
More through leadership articles | DeCrypted News |

Desktop Models
Compact, fast and extremely powerful, these appliances deliver security performance for remote offices or as CPEs.

Rack-mounted Models
For the larger enterprise users, these appliances give best in class protection for even the biggest companies.

Virtual Models
Clavister has been a pioneer in virtual products since 2008. Find out how virtual NGFWs might be the answer for your needs.

Security Subscriptions
Clavister’s services and knowledge products help you realize the full potential of your newly secured network.