راهکارهای جامع و قابل اتکا ICR

نام «به بُد» از ترکیب «به» به معنی بهترین و «بُد» به معنای پاسدار و نگاهبان انتخاب شده است. به بُد Platform امنیتی بومی‌سازی شده است که تمامی عملکردهای امنیتی تجهیزات گران‌قیمت دیواره­آتش و UTM را تأمین می­نماید. در زیر رئوس برخی از قابلیت­های این رده از محصولات مرور شده است.

به بُد – دیواره آتش
به بُد – دیواره آتش

Firewall

  • Limit simultaneous connections on a per-rule basis
  • Advanced passive OS/network fingerprinting & per OS rule-sets
  • Log traffic matching each rule.
  • Highly flexible policy routing possible by selecting gateway on a per-rule basis (for load balancing, failover, multiple WAN, etc.)
  • Grouping and naming of IPs, networks and ports
  • Packet normalization – normalization of packets so there are no ambiguities in interpretation by the ultimate destination of the packet.
  • Disable filter
  • On a per-rule basis:
    • Limit simultaneous client connections
    • Limit states per host
    • Limit new connections per second
    • Define state timeout
    • Define state type
  • State table optimization options
  • Network Address Translation (NAT) & Port Address Translation (PAT)
  • Stateful Redundancy
  • Load Balancing

Reporting and Monitoring

RRD Graphs

  • CPU utilization
  • Total throughput
  • Firewall states
  • Individual throughput for all interfaces
  • Packets per second rates for all interfaces
  • WAN interface gateway(s) ping response times
  • Traffic shaper queues on systems with traffic shaping enabled

Real Time monitoring reports

Dynamic DNS

Advanced Captive Portal

  • Protections against denial of service.
  • Disconnect clients who are idle for more than the defined number of minutes.
  • Force disconnect of all clients after the defined number of minutes.
  • RADIUS capabilities
  • HTTP or HTTPS
  • Pass-through MAC and IP addresses

DHCP Server and Relay

Wireless Access Point (Must install a Wi-Fi interface)

URL Filtering

Traffic Shaping

Anti-Virus filtering web access with the use of HAVP

Cache as a Transparent Proxy

Sniffers, Packet Capture, IDS

Remote Configuration Backup

Secure Remote firewall Administration

  • Use a VPN
  • Restricted Firewall Access
  • Use HTTPS
  • Move the WebGUI to an Alternate port

Restrict access to management interface

Copying Logs to a Remote Host with Syslog

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *