DCN NEXT GENERATION FIREWALL
DCN NEXT GENERATION FIREWALL
DCFW-1800 SERIES NEXT GENERATION FIREWALL
The DCN Next Generation Firewall (NGFW) provides comprehensive and granular visibility and control of applications. It can identify and prevent potential threats associated with high-risk applications while providing policy-based control over applications, users, and user-groups. Policies can be defined that guarantee bandwidth to mission-critical applications while restricting or blocking unauthorized or malicious applications. The DCN NGFW incorporates comprehensive network security and advanced firewall features, provides superior performance, excellent energy efficiency, and comprehensive threat prevention capability
-
- Granular Application Identification and Control, The DCFW-1800E NGFW provides fine-grained control of web applications regardless of port, protocol, or evasive action. It can identify and prevent potential threats associated with high-risk applications while providing policy-based control over applications, users, and user-groups. Security Policies can be defined that guarantee bandwidth to mission-critical applications while restricting or blocking unauthorized or malicious applications.
-
Control Comprehensive Threat Detection and Prevention, The DCFW-1800E NGFW provides real-time protection for applications from network attacks including viruses, spyware, worms, botnets, ARP spoofing, DoS/DDoS, Trojans, buffer overflows, and SQL injections. It incorporates a unified threat detection engine that shares packet details with multiple security engines (AD, IPS, URL filtering, Anti-Virus, etc.), which significantly enhances the protection efficiency and reduces network latency.
-
Network Services
Dynamic routing (OSPF, BGP, RIPv2)
Static and Policy routing
Route controlled by an application
Built-in DHCP, NTP, DNS Server, and DNS proxy
Tap mode – connects to SPAN port
Interface modes: sniffer, port aggregated, loopback, VLANS (802.1Q and Trunking)
L2/L3 switching & routing
Virtual wire (Layer 1) transparent inline deployment
-
Firewall, Operating modes: NAT/route, transparent (bridge), and mixed-mode
Policy objects: predefined, custom, and object grouping
Security policy based on application, role, and geo-location
Application Level Gateways and session support: MSRCP, PPTP, RAS, RSH, SIP, FTP, TFTP, HTTP, DCE/RPC, DNS-TCP, DNS-UDP, H.245 0, H.245 1, H.323
NAT and ALG support: NAT46, NAT64, NAT444, SNAT, DNAT, PAT, Full Cone NAT, STUN
NAT configuration: per policy and central NAT table
VoIP: SIP/H.323/SCCP NAT traversal, RTP pin holing
Global policy management view
Security policy redundancy inspection
Schedules: one-time and recurring
-
Intrusion Prevention, Protocol anomaly detection, rate-based detection, custom signatures, manual, automatic push or pull signature updates, integrated threat encyclopediaIPS Actions: default, monitor, block, reset (attackers IP or victim IP, incoming interface) with an expiry time
Packet logging option
Filter Based Selection: severity, target, OS, application or protocol
IP exemption from specific IPS signatures
IDS sniffer mode
IPv4 and IPv6 rate-based DoS protection with threshold settings against TCP Syn flood, TCP/UDP/SCTP port scan, ICMP sweep, TCP/UDP/SCIP/ICMP session flooding (source/destination)
Active bypass with bypass interfaces
Predefined prevention configuration
-
Anti-Virus• Manual, automatic push or pull signature updates• Flow-based Antivirus: protocols include HTTP, SMTP, POP3, IMAP, FTP/SFTP• Compressed file virus scanning
-
Attack Defense• Abnormal protocol attack defense• Anti-DoS/DDoS, including SYN Flood, DNS Query Flood defense• ARP attack defense
-
URL Filtering• Flow-based web filtering inspection• Manually defined web filtering based on URL, web content, and MIME header• Dynamic web filtering with cloud-based real-time categorization database: over 140 million URLs with 64 categories (8 of which are security related)• Additional web filtering features:- Filter Java Applet, ActiveX, or cookie- Block HTTP Post- Log search keywords- Exempt scanning encrypted connections on certain categories for privacy• Web filtering profile override: allows the administrator to temporarily assign different profiles to user/group/IP• Web filter local categories and category rating override
Key Features
-
- IP Reputation
• Botnet server IP blocking with global IP reputation database
-
SSL Decryption• Application identification for SSL encrypted traffic• IPS enablement for SSL encrypted traffic• AV enablement for SSL encrypted traffic• URL filter for SSL encrypted traffic• SSL Encrypted traffic whitelist• SSL proxy offload mode
-
Endpoint Identification• Support to identify endpoint IP, endpoint quantity, on-line time, off-line time, and on-line duration• Support 2 operation systems• Support query based on IP and endpoint quantity
-
File Transfer Control• File transfer control based on the file name, type, and size• File protocol identification, including HTTP, HTTPS, FTP, SMTP, POP3, and SMB protocols• File signature and suffix identification for over 100 file types
-
Application Control • Over 3,000 applications that can be filtered by name, category, subcategory, technology, and risk• Each application contains a description, risk factors, dependencies, typical ports used, and URLs for additional reference• Actions: block, reset session, monitor, traffic shaping• Identify and control cloud applications in the cloud• Provide multi-dimensional monitoring and statistics for cloud applications, including risk category and characteristics
-
Quality of Service (QoS) • Max/guaranteed bandwidth tunnels or IP/user basis• Tunnel allocation based on security domain, interface, address, user/user group, server/server group, application/app group, TOS, VLAN• Bandwidth allocated by time, priority, or equal bandwidth sharing• Type of Service (TOS) and Differentiated Services (DiffServ) support• Prioritized allocation of remaining bandwidth• Maximum concurrent connections per IP
-
Server Load balancing• Weighted hashing, weighted least-connection, and weighted round-robin• Session protection, session persistence, and session status monitoring• Server health check, session monitoring, and session protection
-
Link Load balancing• Bi-directional link load balancing• Outbound link load balancing includes policy-based routing, ECMP and weighted, embedded ISP routing and dynamic detection• Inbound link load balancing supports Smart DNS and dynamic detection• Automatic link switching based on bandwidth, latency, jitter, connectivity, application, etc.• Link health inspection with ARP, PING, and DNS
-
VPN• IPSec VPN- IPSEC Phase 1 mode: aggressive and main ID protection mode- Peer acceptance options: any ID, specific ID, ID in a dialup user group- Supports IKEv1 and IKEv2 (RFC 4306)- Authentication method: certificate and pre-shared key- IKE mode configuration support (as server or client)- DHCP over IPSEC- Configurable IKE encryption key expiry, NAT traversal keep-alive frequency- Phase 1/Phase 2 Proposal encryption: DES, 3DES, AES128, AES192, AES256- Phase 1/Phase 2 Proposal authentication: MD5, SHA1, SHA256, SHA384, SHA512- Phase 1/Phase 2 Diffie-Hellman support: 1,2,5- XAuth as server mode and for dialup users- Dead peer detection- Replay detection- Autokey keep-alive for Phase 2 SA• IPSEC VPN realm support: allows multiple custom SSL VPN logins associated with user groups (URL paths, design)• IPSEC VPN configuration options: route-based or policy-based• IPSEC VPN deployment modes: gateway-to-gateway, full mesh, hub-and-spoke, redundant tunnel, VPN termination in transparent mode• One-time login prevents concurrent logins with the same username• SSL portal concurrent users limiting• SSL VPN port forwarding module encrypts client data and sends the data to the application server• Supports clients that run iOS, Android, and Windows XP/Vista including 64-bit Windows OS• Host integrity checking and OS checking before SSL tunnel connections• MAC host check per portal• Cache cleaning option before ending SSL VPN session• L2TP client and server mode, L2TP over IPSEC, and GRE over IPSEC• View and manage IPSEC and SSL VPN connections• PnPVPN
-
IPv6• Management over IPv6, IPv6 logging, and HA• IPv6 tunneling, DNS64/NAT64, etc• IPv6 routing protocols, static routing, policy routing, ISIS, RIPng, OSPFv3, and BGP4+• IPS, Application identification, Access control, ND attack defenseVSYS• System resource allocation to each VSYS• CPU virtualization• Non-root VSYS support firewall, IPSec VPN, SSL VPN, IPS, URL filtering• VSYS monitoring and statistic
-
High Availability• Redundant heartbeat interfaces• Active/Active and Active/Passive• Standalone session synchronization• HA reserved management interface• Failover:- Port, local & remote link monitoring- Stateful failover- Sub-second failover- Failure notification• Deployment options:- HA with link aggregation- Full mesh HA- Geographically dispersed HA
-
User and Device Identity• Local user database• Remote user authentication: TACACS+, LDAP, Radius, Active• Single-sign-on: Windows AD• 2-factor authentication: 3rd party support, integrated token server with physical and SMS• User and device-based policies• User group synchronization based on AD and LDAP• Support for 802.1X, SSO Proxy
-
Administration• Management access: HTTP/HTTPS, SSH, telnet, console• Central Management: DCN Security Manager, web service APIs• System Integration: SNMP, Syslog, alliance partnerships• Rapid deployment: USB auto-install, local and remote script execution• Dynamic real-time dashboard status and drill-in monitoring widgets• Language support: English
-
Logs & Reporting• Logging facilities: local memory and storage (if available), multiple Syslog servers• Encrypted logging and scheduled batch log uploading• Reliable logging using TCP option (RFC 3195)• Detailed traffic logs: forwarded, violated sessions, local traffic, invalid packets, URL, etc.• Comprehensive event logs: system and administrative activity audits, routing & networking, VPN, user authentications• IP and service port name resolution option• Brief traffic log format option• Three predefined reports: Security, Flow, and network reports• User-defined reporting• Reports can be exported in PDF via Email and FTP