GajShield GS85nu V2 Firewall

Firewall Throughput Specification
Ethernet Interfaces
8 Ports of 1Gbps Copper,2 Ports of 10Gbps SFP+
Concurrent Sessions 8000000
New Sessions/Second 90000
Firewall Throughput 8.5 Gbps
VPN Throughput 1.4 Gbps
NGFW Throughput 1.5 Gbps
Antivirus Throughput 1.85 Gbps
IPS Throughput 2.75 Gbps
Firewall IMIX Throughput 4.2 Gbps
VPN Tunnels 2660
Configurable WAN / DMZ / LAN ports Yes
ICSALabs certified Yes
High Availability (HA) Active-Active, Active-Passive
Category:

Description

GajShield GS85nu V2 Firewall

Product Description

Product Details:

  • GajShield GS85nu V2 Data Security Firewall understands data and provide deeper data visibility, and a broader threat surface manageability. The firewall features a context based data security approach which allows for greater control over data transaction and prevents Data Exploitation. GS85nu is ICSA Labs certified and provides state of the art security for enterprises.
  • GS85nu Data Security Firewall is ICSA Labs Certified supports High Availability with Active-Active and Active-Passive HA. It can also be easily managed using GajShield’s Centralised Firewall Management System.

Features

  • Data Security Health
  • Understands Data
  • Threat Surface Management
  • Data Leak Prevention
  • On Appliance reporting
  • complete visibility
  • firewall, Application Filtering, BYOD Policy
  • Network behavior analysis, Policy based ISP
  • Load Balancing
  • Bandwidth Management and more.
  • Application Identification Engine
  •  Advance Contextual Data Classification Engine
  •  Apply Visibility and Data Aware Policy  Identify policy violation and protect against data exploitation
  • Network based data leak prevention Prevent data leak on G Suit, Office 365, Popular Social Media, Web etc.
  •   Protect business critical data
  •  Scan for Data Leak on all outbound communication  Alert on Data Security Policy violation
  •  Block Password Protected zip and PDF file uploads
  •  Block file uploads based on File Content, file type and size
  •  Time scheduling for DLP policies
  •  Visibility on Information sent as attachments on popular
  • Webmail, Blogs, web uploads, SaaS, etc.
  • View Content of mail for Gmail, Outlook, Office 365, Rediff,Yahoo etc. Visibility of data transaction over HTTP, HTTPS, SMTP, SMTPS-SSL & Web Chats
  •  Data Transaction on SMTP mail, popular Web Mail and browser-based SaaS application
  •  View attachments attached with the mail  View webmail draft attachments information
  •  visibility of evasive applications like P2P and Skype
  • application accessed by users
  •  Identifies Who is accessing, which application,
  •  Visibility of application usage and data transaction on application  Data transfer reporting (By Host, Group & IP Address)
  •  Log of Data sent through  Web Browser based SaaS SMTP mails
  • Network  Data Transaction logs from HTTP, HTTPS, SMTP, SMTPS-SSL & Web Chats
  •  Log Data context of the Popular webmail sites such as Gmail,
  • Office 365, Yahoo and Rediff mail including To, CC, BCC

Virtual Private Network (VPN) – Secure Connectivity

GajShield gives Industry Leading IPSec, L2TP and PPTP VPN as well as High Availability for IPSec. It also provides the provision for setting up a security association (SA) in IPSec protocol suite by supporting Internet Key Exchange protocol IKEv1 or IKEv2 (depending on the version). GajShield aims to further secure the network by offering additional features in VPN such as IPSec NAT traversal, PFS support, Dead Peer detection and Cloud based policy enforcement for enterprise traffic.

Benefits :-

  • Save from Man in the middle attacks by integrating Strong Authentication with RSA SecureID, VASCO tokens, LDAP, Radius, Active Directory, Pre-shared key, Digital Certificates and Xauth to avoid any kind of intervention in the network and the communication.
  • Strong Encryption by using 3DES, AES encryption and Hash Algorithms like MD5, SHA1 and SHA2 for encryption purposes.
  • VPN Logs provides the detailed reports of the IPSec VPN tunnel up/down and Active VPN users. These logs can be used to monitor the details such as IP Address, Status of the VPN and the type of VPN by the users who are connected to the VPN.

Multi Wan Management – ISP Load Balancing/Failover

GajShield’s ISP Load Balancing & Failover enables organizations to control and broadcast traffic over multiple internet links. It also offers the distribution of vital applications over strong internet links whereas lessly important applications over broadband connections.

Benefits :-

  • ISP Link Redundancy – Failover manages the traffic while providing valuable failover capabilities such as continuously monitors the health of the available internet connections, checks the status of all the internet links, senses the failures in real-time and automatically redirects the traffic to the functioning internet links.
  • Service-based ISP load balancing or failover provides granular options to specify the primary internet link and multiple secondary internet links for each different service. For example ISP2 is set as primary for the VPN, incase of failure of ISP2 VPN service will be automatically redirected to secondary ISP that is either ISP1 or ISP3 as per the defined policies.
  • Load balances traffic based on weighted round-robin distribution which distributes the traffic throughout multiple internet links and provides the flexibility to utilize the total bandwidth of all the internet links avoiding bandwidth blockages while reducing the cost of unproductive bandwidth usage.
  • Integrated reporting and Alerts that contains current, daily, monthly and yearly reports as well as dynamic analysis of ISP usage, what applications are being used through which ISPs and by whom.
  • ISP failover and heavy traffic notifications on email keeps administrators informed about the internet link interruptions that demands immediate troubleshooting.

High Availability

High Availability implementation is the most important strategy when setting up strong protection systems, lower the downtime, reducing the service interruptions and increasing the productivity are your high priorities. GajShield Data Security Firewall offers High availability with Active-Active and Active-Passive State synchronization for organizations.

Benefits :-

  • Stateful Failover empowers a router to keep processing and forwarding firewall session packets without requiring adjustment or reconfiguration of any remote peer in case of an intended or accidental failure occurs.
  • Email Alerts to report the existing status of High Availability and modifications in states from Master to Backup or vice versa.
  • Configuration Auto Synchronization syncs the entire configuration made on Master or Primary Firewall to Backup or Secondary Firewall.

 Contextual Intelligence Engine

GajShield’s Data Security Firewall uses its latest and the greatest technologies like the Contextual Intelligence Engine and combines it with advanced reporting capabilities of GajOS: Bulwark to secure the organizations from threats that are developed and are often left unnoticed. GajShield Data Security Firewalls perform Data Layer inspection with the help of Contextual Intelligence Engine to create data context and analyze a broader range of parameters with greater in-depth data layer visibility.

Benefits :-

  • Complete visibility of the applications and bandwidth used for uploading and downloading along with the Granular Reports of What files have been uploaded and downloaded, By Whom, When and Where it is uploaded or from where it is downloaded and by using Which application.
  • Advanced Network Visibility by analyzing the parameters such as Email ID, Sender ID, recipient ID, CC & BCC mentions, Mail Subject, Mail Body, Signature, File Content, downloader, uploader etc. across web traffic and SaaS applications, the GajShield Data Security Firewall determines the safety and legitimacy of communications & transactions and takes necessary actions to prevent data exploitation and mitigates the impact of a zero-day attacks.

 Secured Guest Management

GajShield’s Secured Guest Management system helps organizations to easily manage guest users in a scalable as well as cost effective way whether they are connecting from wired, wireless or using mobile internet. To manage large sets of guest users turned out to be easy with its auto expiry feature. Its reporting system provides detailed usage information and helps to detect any harm caused by them.

Benefits :-

  • Guest login portal is the medium used by guests to login to access the Internet. Guests who want to connect their laptop or smartphone with your organization’s internet will immediately be redirected to this portal. This portal can be tailored as per the organization and gives the very first impression of your company to the guest users.
  • Create Guest Users Manually or Let them Self-Register through their mobile number. IT Administrators can manually add the guests or group of guests with desired security policies like URL, DLP, Application Filter Policies or can also provide the provision for guests to self-register with his/her mobile number. Once a guest registers then he/she receives a one-time access code / username and password on the mobile phone via SMS and guests can activate the account by using received username & password.
  • Guest Administration Portal works as a control centre for IT staff. It provides a detailed reporting system built with intelligence to identify anomalies and misuse of policies.
  • Add Guest Users in bulk by uploading a CSV File.
  • Delete Multiple Guest Users manually or enable Auto-Delete which deletes users automatically once the validity expires.
  • View Guest User Registration and Auto-Delete Logs The use of activation through the mobile number enables traceability of the guest’s activity in the network as the identity of the guest will be automatically validated through the mobile subscription.
  • Applying Bandwidth Capping / Queue / Time Quota on guest users saves the unwanted bandwidth utilization and also allows you to route the traffic of guest users through different ISPs so that primary ISP bandwidth can be utilized without any misuse and interruptions.
  • Apply BYOD restriction and Limit access to the guest users by configuring the guest network on a distinct port of GajShield Firewall or by providing user credentials through GajShield’s Data Security Firewall via SMS. This credential expires after a pre-configured / pre-defined time.

* Requirements  – 

  • To send credentials i.e. Username and Password through SMS requires integrations with SMS Gateway. The organisation will have to procure the SMS Gateway from favorable service provider. Credentials can be sent via email also.
  • GajShield Data Security Firewalls provides preset API parameters for multiple service providers. The service providers that are not mentioned in GajShield API parameters; customers have to obtain and configure it on GajShield Firewalls.

SD-WAN

GajShield Data Security Firewalls allows customers to concentrate on their security and network access and extend the benefits to their distributed branches, network edges and device edge protection. GajShield security device consists of GajShield Data Security Firewall, Anti Malware with Advanced Threat Protection, Secure Access using VPN to offer integration of branch location services.

Benefits :-

  • Best-Of-Breed software-driven networking that offers high-performance as well as advanced protection.
  • Enhances User Experience, Security & Application Performance by Centralized Control function to securely and intelligently route traffic across the WAN.
  • Reduces Costs upto 90% by replacing traditional and expensive private WAN connections.

Buy GajShield Firewall online from Firewall Firm’s IT Monteur Store

Sales Number : +91 95 8290 7788
Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net
Support Email : support@itmonteur.net

Register & Request Quote
Submit Support Ticket