Typical Applications of Next Generation Firewall
With intrusion prevention technology based on deep application, protocol detection, and attack principle analysis, FS NSG Series NGFW can effectively filter viruses, Trojan, worms, spyware, vulnerability attacks, escape attacks, and other security threats. It provides enterprises with L2-L7 layer network comprehensive security protection provides excellent security protection performance. The NSG series can be deployed in various industries such as government, finance, enterprise, education, etc. And it is widely used in multiple network application scenarios such as the edge of an enterprise network, servers protection, and branch VPN interconnection.
Edge Security of Enterprise Network
- High export bandwidth requires strong NAT performance.
- Lots of outgoing links, complicated outbound environment.
- Massive applications need to be released externally, occupying a lot of public IP.
- Need to guarantee the bandwidth of key businesses and services with limited bandwidth.
- The control of internet behavior is being challenged.Need to defend against Internet security threats effectively.
- High performance, scalable NAT/PAT technology.
- Professional link load balancing and application drainage technology.
- SmartDNS technology.
- Powerful application identification and rich traffic control strategies.
- Support real-name NAT logging and auditing.
- Comprehensive threat monitoring and defense.
Branches VPN Interconnection
- Too many branches, resulting in low operation and maintenance
- capacity of most branches.
- No security guarantee for data transmission between branches and headquarters.
- Too many business travelers require remote access to their organizations' networks.
- Need to control the access permissions of users and occupied resources.
- Centralized deployment, monitoring, and management.
- Data encryption and verification to prevent data leakage.
- Rich VPN interconnection technologies to realize multi-scene interconnection.
- Access control based on employee identity.
Intranet Isolation
- It is necessary to prevent unauthorized access and malicious attacks in the private network.
- Need to prevent intrusion attacks, virus infections, and other threats from other units.
- Need to control the access and log audit among users in the network.
- Perform flexible access control and intrusion detection and defense in the private network following the authority of all units.
- Smart threat detection and defense to prevent infiltration attacks, malicious programs, Trojan, virus and other threats from other units.
- Supports rich log functions, provides local log storage,and secure records leap to the eye.