NG Firewall
Functionalities
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • Application control
  • Decrypting SSL traffic
  • URL filtering
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
N/A
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
N/A
  • SSL VPN remote access
  • Application control
  • Протоколы IPv4/IPv6
  • Сокрытие адресов с NAT
  • DHCP
  • IPSec Site to Site VPN туннели
  • Stateful TCP/IP stack
  • URL-фильтрация
  • Конфигурация статической и динамической маршрутизации
  • Application control
  • Decrypting SSL traffic
  • URL filtering
Data Leak Prevention
N/AN/AAvaliableN/AN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Context-aware policy
AvaliableN/AAvaliableAvaliableN/AN/AN/AAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
DDOS protection
AvaliableN/AN/AN/AAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AAvaliableN/AN/A
Network behavior analysis support
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/A
Sandboxing support
AvaliableN/AAvaliableAvaliableN/AN/AN/AN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Antivirus and antispyware functions
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AN/AAvaliable
IDS/IPS availability
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/A
Bot protection
AvaliableN/AAvaliableAvaliableN/AN/AN/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableAvaliableN/AAvaliableN/A
Application level attacks protection (Application Intelligence)
AvaliableN/AAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/A
Two-factor authentication (2FA)
N/AN/AAvaliableN/AN/AAvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/AN/AAvaliableN/AN/AN/A
Certificates based authentication
AvaliableN/AAvaliableAvaliableN/AAvaliableN/AN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/A
Available proxy modes
  • Reverse proxy
  • DNS proxy
N/A
  • Reverse proxy
  • Reverse proxy
N/AN/AN/A
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
N/A
  • Reverse proxy
  • Reverse proxy
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
  • DNS proxy
  • DNS proxy
  • Reverse proxy
  • DNS proxy
N/A
  • Reverse proxy
  • DNS proxy
  • DNS proxy
Management
  • Bandwidth
  • Configuration console
N/A
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
N/A
  • Bandwidth
N/A
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
N/A
  • Bandwidth
  • Configuration console
  • Bandwidth
Deployment options
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
N/A
  • High availability
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
N/A
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
N/A
Integrations
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
N/A
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
N/A
  • Active Directory
  • Threat Intelligence
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
N/A
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • IAM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Active Directory
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
N/A
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
N/A
OS and hardware
AvaliableN/AN/AN/AAvaliableN/AN/AAvaliableN/AN/AN/AAvaliableAvaliableN/AN/AN/AN/AN/AN/A
NG Firewall
Functionalities
Data Leak Prevention
Context-aware policy
DDOS protection
Network behavior analysis support
Sandboxing support
Antivirus and antispyware functions
IDS/IPS availability
Bot protection
Application level attacks protection (Application Intelligence)
Two-factor authentication (2FA)
Certificates based authentication
Available proxy modes
Management
Deployment options
Integrations
OS and hardware