create value for improving information technology abilities of the enterprise

under the guidance of user demand,provide the best service to customers
Next generation firewall and VPN
Suzhou Metalogic Information Technology Co.,Ltd   2018-09-26 11:13:21 Author:SystemMaster
NGFW compares with traditional firewalls:
Different modules need to switch the interface to configure or view the log.
For example, some firewalls control four and seven layers of functionality to enter different interfaces to configure and view logs.
Because they are four layers, adding modules, not seven layers、
It's a four-layer firewall that only works on the edge of the network.
The modules are connected in series and need to pass through all modules in sequence. And low efficiency, high performance consumption.
IPS Misreporting Rate

UTM (Unified Threat Management)NGFW (Next generation firewall)


NGFW can be applied to recognize App-ID. You can not use an IP address or port. Although the four-layer firewall appears to have application control, if the port is open, it will still be released.
Mobile applications can also be identified.
Without a Mac address, NGFW can recognize User-ID for users and combine with domain users.
NGFW can recognize Content-ID with content and can disassemble packets.
UTM is a four-story firewall and NGFW is a seven-story firewall.
Differences in Internet behavior Management:
For domestic software, such as stocks
Records and audits with content, such as QQ conversations
Statements recorded are more in line with domestic practice
NGFW can be applied to recognize App-ID. You can not use an IP address or port. Although the four-layer firewall appears to have application control, if the port is open, it will still be released.
Mobile applications can also be identified.
Without the Mac address, NGFW can recognize User-ID for users and combine with domain users.
NGFW can recognize Content-ID with content and can disassemble packets.
UTM is a four-story firewall and NGFW is a seven-story firewall.
Only 20M, no virus library, no signature, and almost no consumption of native CPU.
Attack on viruses or malware, so it is not anti-virus, but to intercept and anti-virus while the virus is running. Preventive rather than therapeutic.
Today's extortion software and viruses always find the signature after the outbreak, so they can not cope with rapid variants. Traps has a strong advantage before patches and signatures.
Traps
The only product in the world that has a physical machine sandbox in the cloud. Some viruses or malware will detect whether they are running in a virtual machine, and if they are a virtual machine, they will not be exposed.

VPN (IPSEC /MPLS)

Enterprise application extension