GajShield GS160nu Firewall

Firewall Throughput  Specification
Ethernet Interfaces
6 Ports of 1Gbps Copper
Concurrent Sessions 8500000
New Sessions/Second 135000
Firewall Throughput 22 Gbps
VPN Throughput 1.8 Gbps
NGFW Throughput 3.75 Gbps
Antivirus Throughput 3.1 Gbps
IPS Throughput 4.4 Gbps
Number of Expendable Slots 1
VPN Tunnels 4000
Configurable WAN / DMZ / LAN ports Yes
ICSA Labs certified Yes
High Availability (HA) Active-Active, Active-Passive
Category:

Description

GajShield GS160nu Firewall

GajShield Data Security Firewall Appliance

GajShield GS160nu Data Security Firewall understands data and provide deeper data visibility, and a broader threat surface manageability. The firewall features a context based data security approach which allows for greater control over data transaction and prevents Data Exploitation. GS160nu is ICSA Labs certified and provides state of the art security for enterprises.

GS160nu Data Security Firewall is ICSA Labs Certified supports High Availability with Active-Active and Active-Passive HA. It can also be easily managed using GajShield’s Centralised Firewall Management System.

Features

  • Data Security Health
  • Understands Data
  • Threat Surface Management
  • Data Leak Prevention
  • On Appliance reporting
  • complete visibility
  • firewall, Application Filtering, BYOD Policy
  • Network behavior analysis, Policy based ISP
  • Load Balancing
  • Bandwidth Management and more.
  • Application Identification Engine
  •  Advance Contextual Data Classification Engine
  •  Apply Visibility and Data Aware Policy  Identify policy violation and protect against data exploitation
  • Network based data leak prevention Prevent data leak on G Suit, Office 365, Popular Social Media, Web etc.
  •   Protect business critical data
  •  Scan for Data Leak on all outbound communication  Alert on Data Security Policy violation
  •  Block Password Protected zip and PDF file uploads
  •  Block file uploads based on File Content, file type and size
  •  Time scheduling for DLP policies
  •  Visibility on Information sent as attachments on popular
  • Webmail, Blogs, web uploads, SaaS, etc.
  • View Content of mail for Gmail, Outlook, Office 365, Rediff,Yahoo etc. Visibility of data transaction over HTTP, HTTPS, SMTP, SMTPS-SSL & Web Chats
  •  Data Transaction on SMTP mail, popular Web Mail and browser-based SaaS application
  •  View attachments attached with the mail  View webmail draft attachments information
  •  visibility of evasive applications like P2P and Skype
  • application accessed by users
  •  Identifies Who is accessing, which application,
  •  Visibility of application usage and data transaction on application  Data transfer reporting (By Host, Group & IP Address)
  •  Log of Data sent through  Web Browser based SaaS SMTP mails
  • Network  Data Transaction logs from HTTP, HTTPS, SMTP, SMTPS-SSL & Web Chats
  •  Log Data context of the Popular webmail sites such as Gmail,
  • Office 365, Yahoo and Rediff mail including To, CC, BCC

Virtual Private Network (VPN) – Secure Connectivity

GajShield gives Industry Leading IPSec, L2TP and PPTP VPN as well as High Availability for IPSec. It also provides the provision for setting up a security association (SA) in IPSec protocol suite by supporting Internet Key Exchange protocol IKEv1 or IKEv2 (depending on the version). GajShield aims to further secure the network by offering additional features in VPN such as IPSec NAT traversal, PFS support, Dead Peer detection and Cloud based policy enforcement for enterprise traffic.

Benefits :-

  • Save from Man in the middle attacks by integrating Strong Authentication with RSA SecureID, VASCO tokens, LDAP, Radius, Active Directory, Pre-shared key, Digital Certificates and Xauth to avoid any kind of intervention in the network and the communication.
  • Strong Encryption by using 3DES, AES encryption and Hash Algorithms like MD5, SHA1 and SHA2 for encryption purposes.
  • VPN Logs provides the detailed reports of the IPSec VPN tunnel up/down and Active VPN users. These logs can be used to monitor the details such as IP Address, Status of the VPN and the type of VPN by the users who are connected to the VPN.

Multi Wan Management – ISP Load Balancing/Failover

GajShield’s ISP Load Balancing & Failover enables organizations to control and broadcast traffic over multiple internet links. It also offers the distribution of vital applications over strong internet links whereas lessly important applications over broadband connections.

Benefits :-

  • ISP Link Redundancy – Failover manages the traffic while providing valuable failover capabilities such as continuously monitors the health of the available internet connections, checks the status of all the internet links, senses the failures in real-time and automatically redirects the traffic to the functioning internet links.
  • Service-based ISP load balancing or failover provides granular options to specify the primary internet link and multiple secondary internet links for each different service. For example ISP2 is set as primary for the VPN, incase of failure of ISP2 VPN service will be automatically redirected to secondary ISP that is either ISP1 or ISP3 as per the defined policies.
  • Load balances traffic based on weighted round-robin distribution which distributes the traffic throughout multiple internet links and provides the flexibility to utilize the total bandwidth of all the internet links avoiding bandwidth blockages while reducing the cost of unproductive bandwidth usage.
  • Integrated reporting and Alerts that contains current, daily, monthly and yearly reports as well as dynamic analysis of ISP usage, what applications are being used through which ISPs and by whom.
  • ISP failover and heavy traffic notifications on email keeps administrators informed about the internet link interruptions that demands immediate troubleshooting.

High Availability

High Availability implementation is the most important strategy when setting up strong protection systems, lower the downtime, reducing the service interruptions and increasing the productivity are your high priorities. GajShield Data Security Firewall offers High availability with Active-Active and Active-Passive State synchronization for organizations.

Benefits :-

  • Stateful Failover empowers a router to keep processing and forwarding firewall session packets without requiring adjustment or reconfiguration of any remote peer in case of an intended or accidental failure occurs.
  • Email Alerts to report the existing status of High Availability and modifications in states from Master to Backup or vice versa.
  • Configuration Auto Synchronization syncs the entire configuration made on Master or Primary Firewall to Backup or Secondary Firewall.

 Contextual Intelligence Engine

GajShield’s Data Security Firewall uses its latest and the greatest technologies like the Contextual Intelligence Engine and combines it with advanced reporting capabilities of GajOS: Bulwark to secure the organizations from threats that are developed and are often left unnoticed. GajShield Data Security Firewalls perform Data Layer inspection with the help of Contextual Intelligence Engine to create data context and analyze a broader range of parameters with greater in-depth data layer visibility.

Benefits :-

  • Complete visibility of the applications and bandwidth used for uploading and downloading along with the Granular Reports of What files have been uploaded and downloaded, By Whom, When and Where it is uploaded or from where it is downloaded and by using Which application.
  • Advanced Network Visibility by analyzing the parameters such as Email ID, Sender ID, recipient ID, CC & BCC mentions, Mail Subject, Mail Body, Signature, File Content, downloader, uploader etc. across web traffic and SaaS applications, the GajShield Data Security Firewall determines the safety and legitimacy of communications & transactions and takes necessary actions to prevent data exploitation and mitigates the impact of a zero-day attacks.

 Secured Guest Management

GajShield’s Secured Guest Management system helps organizations to easily manage guest users in a scalable as well as cost effective way whether they are connecting from wired, wireless or using mobile internet. To manage large sets of guest users turned out to be easy with its auto expiry feature. Its reporting system provides detailed usage information and helps to detect any harm caused by them.

Benefits :-

  • Guest login portal is the medium used by guests to login to access the Internet. Guests who want to connect their laptop or smartphone with your organization’s internet will immediately be redirected to this portal. This portal can be tailored as per the organization and gives the very first impression of your company to the guest users.
  • Create Guest Users Manually or Let them Self-Register through their mobile number. IT Administrators can manually add the guests or group of guests with desired security policies like URL, DLP, Application Filter Policies or can also provide the provision for guests to self-register with his/her mobile number. Once a guest registers then he/she receives a one-time access code / username and password on the mobile phone via SMS and guests can activate the account by using received username & password.
  • Guest Administration Portal works as a control centre for IT staff. It provides a detailed reporting system built with intelligence to identify anomalies and misuse of policies.
  • Add Guest Users in bulk by uploading a CSV File.
  • Delete Multiple Guest Users manually or enable Auto-Delete which deletes users automatically once the validity expires.
  • View Guest User Registration and Auto-Delete Logs The use of activation through the mobile number enables traceability of the guest’s activity in the network as the identity of the guest will be automatically validated through the mobile subscription.
  • Applying Bandwidth Capping / Queue / Time Quota on guest users saves the unwanted bandwidth utilization and also allows you to route the traffic of guest users through different ISPs so that primary ISP bandwidth can be utilized without any misuse and interruptions.
  • Apply BYOD restriction and Limit access to the guest users by configuring the guest network on a distinct port of GajShield Firewall or by providing user credentials through GajShield’s Data Security Firewall via SMS. This credential expires after a pre-configured / pre-defined time.

* Requirements  – 

  • To send credentials i.e. Username and Password through SMS requires integrations with SMS Gateway. The organisation will have to procure the SMS Gateway from favorable service provider. Credentials can be sent via email also.
  • GajShield Data Security Firewalls provides preset API parameters for multiple service providers. The service providers that are not mentioned in GajShield API parameters; customers have to obtain and configure it on GajShield Firewalls.

SD-WAN

GajShield Data Security Firewalls allows customers to concentrate on their security and network access and extend the benefits to their distributed branches, network edges and device edge protection. GajShield security device consists of GajShield Data Security Firewall, Anti Malware with Advanced Threat Protection, Secure Access using VPN to offer integration of branch location services.

Benefits :-

  • Best-Of-Breed software-driven networking that offers high-performance as well as advanced protection.
  • Enhances User Experience, Security & Application Performance by Centralized Control function to securely and intelligently route traffic across the WAN.
  • Reduces Costs upto 90% by replacing traditional and expensive private WAN connections.

Centralized Management System (CMS)

The GajShield Centralised Management System is a solution for the organizations that are having multiple locations and such organizations may have a number of devices each for a particular location. To manage the security through all of these devices individually, deploying policies differently ends up being challenging and at the same time a complicated process.

The Centralized Management System gives a comprehensive platform for creating and managing security policies, offering real-time visibility, monitoring and alerts. CMS enables network admins to control and manage GajShield Firewalls including network policies,Data Leak Prevention, URL filtering, Application Filtering, Gateway Antivirus, Gateway Antispam, IPS, ISP Failover, Load Balancing and software updates of different locations through a single centralized dashboard.

Benefits :-

  • Centralised policy management to manage all aspects of device configuration from a single central console and also allows you to push global policies, view all firewall traffic, and generate reports.
  • Quick Deployment GajShield enables organizations to transport GajShield Data Security Firewall appliances to each remote site without configuring them. Once this appliance is plugged into the network, it automatically gets connected to the Centralized Management Server. The server authenticates the remote device within a few seconds and once it gets authenticated then the admin can apply the security policies from CMS which eliminates the need of going on-site.
  • Lowers the Cost of Setup and Operation by offering a centralized management system through which multiple firewalls can be configured and managed through a single dashboard. This saves the huge time of IT admin and eliminates the need for admin’s on-site visits which saves the huge cost of an organization at the same time as well as increases productivity.
  • Increases ROI by replacing the MPS connections with VPN and broadband internet services to connect multiple locations with each other which lowers the WAN costs by up to 90%.
  • Better Performance in terms of speediest application steering and unique application identification performance delivered by GajShield Security Architecture which is backed by multi-core architecture. This also comprises deep secure sockets layer (SSL)/transport layer security (TLS) inspection with the minimum performance degradation.

 Multi-Cloud Security

A GajShield Data Security Firewall detects the critical data by going beyond the application layer visibility which results in preventing data leaks even when shared on cloud and web based applications like Gmail, Rediff Mail, Google Drive, Microsoft One-Dive, Yahoo, Social Media platforms like Facebook etc.

Benefits :-

  • Control Collaborative Applications with the ability of strongly analyzing contextual data of web applications and to deploy granular data security policies that enable the organizations restrict such collaborative business applications to commercial use only. This helps the organization to achieve the following things :

* Use of only Corporate Login on Gmail, Rediff Mail, Google Drive, Microsoft One-Dive, Yahoo, Social Media platforms like Facebook etc.

*Preventing to send mail without mentioning the manager in CC.

*Block the Personal ID Use on SaaS applications.

*Control on sending Mails to predefined IDs/Domains only.

*Control of Data Uploads based on file type, content, size and more.

*Stops the data leak from such applications.

*Provides View Mode in which one can access the application or data but will not be able to perform any action.

  • Data Leak Prevention of GajShield Data Security Firewall offers an additional security with its Context based DLP Engine which allows an organization to observe data and prevent data leaks. Gajshield’s DLP systems act as enforcers of data security policies here. GajShieldData Leak Prevention solution identifies, monitors and protects the data in motion on your network through deep content inspection and a contextual security analysis of transactions.
  • Advanced Threat Protection that serves to protect an organization’s network from zero-day attacks and advanced threats. Artificial Intelligence merged with Advanced Threat Protection provides extreme value into the detection of malicious and suspicious traffic, blocking zero-day attacks and protecting your network from cyber threats. GajShield Firewall also protects the organization from external threats by using Advanced Threat Protection and Intelligent Sandboxing technique.
  • Secured Connectivity using high-speed VPN connection provided by the combination of Contextual Intelligence Engine and Security Policies implemented in GajShieldData Security Firewall to connect with Cloud applications and Data centers securely.
  • Deep Visibility is the main factor in cyber security and thus having just a summary is not sufficient. GajOS Bulwark provides in-depth reporting for deep visibility throughout the network.

Buy GajShield Firewall online from Firewall Firm’s IT Monteur Store

Sales Number : +91 95 8290 7788
Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net
Support Email : support@itmonteur.net

Register & Request Quote
Submit Support Ticket