Hillstone VFW CloudEdge V5.5R8 EN

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CloudEdge

Hillstone CloudEdge:
Virtual Next-Generation Firewall
Hillstone Virtual Next-Generation Firewall, CloudEdge, embedded with Hillstone Networks StoneOS
operation system, is deployed as a virtual machine, and provides advanced security services for
applications and users in any virtualized environment. It provides comprehensive security features
including granular application identification and control, VPN, intrusion prevention, antivirus, attack
defense and cloud-sandbox to fully keep a business secure and operational. It provides price-per-
formance solutions for both public and private cloud customers, and can be rapidly provisioned
and deployed at scale.

Product Highlights
Highly Compatible with Virtual Environments Advanced Threat Protection Capability
In virtual environments, compute, storage, and data resources CloudEdge shares a base technology with Hillstone Next-Gen-
run on virtual machines. Hillstone CloudEdge supports major eration Firewall (NGFW). It can satisfy the network security
hypervisor technologies including ESXi, KVM, Hyper-V, and requirements of both public cloud and private cloud users.
Xen server, and can be rapidly deployed on a virtual machine, Hillstone CloudEdge provides fine-grained control of web
to provide advanced security services for virtual networks applications regardless of port, protocol, or evasive action.
or virtualized applications. Deployed as a virtual appliance, It can identify and prevent potential threats associated with
CloudEdge can overcome the limitation of physical firewalls, high-risk applications while providing policy-based control
and inspect all traffic inside the virtual network, to protect over applications, users, and user-groups. In addition, Cloud-
both North-South and East-West traffic. In addition, users can Edge incorporates a unified threat detection engine that
flexibly deploy and manage network resources based on the shares packet details with multiple security engines (AD, IPS,
requirements of network topologies, and thereby fully lever- URL filtering, Antivirus, Cloud-sandbox etc.), which signifi-
age the advantage of virtualization. cantly enhance security efficiency while reducing network
latency.

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 1


Hillstone CloudEdge: Virtual Next-Generation Firewall

Product Highlights (Continued)


Visualized Security Management with Cloud Deployment Automation and Service Orchestration
Management Platform
Hillstone CloudEdge provides multiple integrated solutions to
Hillstone CloudEdge provides exclusive security segmentation address the needs and requirements of cloud platforms and
and policy protection for independent tenants in cloud deploy- has already been deployed into multiple test and production
ments. It can realize instant recovery based on the snapshot cloud environments to serve diverse industries and customer
system. If a virtual appliance has an issue or outage, it can be requirements. Hillstone CloudEdge’s automation deployment
recovered via the snapshot of a saved configuration, and start and license management functions enable the cloud user
a new virtual firewall on the original or a new virtual machine. to have the capability of self-service and self-management
The CloudEdge graphical management interface has mul- based on their business needs without interruption from
tiple logging query functions, which can effectively monitor cloud administrators. Orchestration ensures each Cloud-
and track the network status; and a reporting function that Edge can be deployed and configured automatically. License
provides real-time details of traffic and security events. These management ensures CloudEdge can automatically enter
tools help administrators fully visualize and grasp the network operation mode. Hillstone CloudEdge REST API supports
operation status, and improve operational efficiency. system configuration, security policy configuration, interfaces
and network configurations, to integrate with major cloud
management platforms.

Features
Network Services • Comprehensive DNS policy URL Filtering
• Dynamic routing (OSPF, BGP, RIPv2) • Schedules: one-time and recurring • Flow-based web filtering inspection
• Static and Policy routing • Manually defined web filtering based on URL, web
• Route controlled by application Intrusion Prevention content and MIME header
• Built-in DHCP, NTP, DNS Server and DNS proxy • Protocol anomaly detection, rate-based detection, • Dynamic web filtering with cloud-based real-time
custom signatures, manual, automatic push or categorization database: over 140 million URLs
• Tap mode – connects to SPAN port
pull signature updates, integrated threat encyclo- with 64 categories (8 of which are security related)
• Interface modes: sniffer, port aggregated, pedia
loopback, VLANS (802.1Q and Trunking) • Additional web filtering features:
• IPS Actions: default, monitor, block, reset
• L2/L3 switching & routing (attackers IP or victim IP, incoming interface) with - Filter Java Applet, ActiveX or cookie
• Virtual wire (Layer 1) transparent inline expiry time - Block HTTP Post
deployment • Packet logging option - Log search keywords
• Filter Based Selection: severity, target, OS, appli- - Exempt scanning encrypted connections on
Firewall certain categories for privacy
cation or protocol
• Operating modes: NAT/route, transparent (bridge), • Web filtering profile override: allows administrator
and mixed mode • IP exemption from specific IPS signatures
• IDS sniffer mode to temporarily assign different profiles to user/
• Policy objects: predefined, custom, and object group/IP
grouping • IPv4 and IPv6 rate based DoS protection with
threshold settings against TCP Syn flood, TCP/ • Web filter local categories and category rating
• Security policy based on application, role and override
geo-location UDP/SCTP port scan, ICMP sweep, TCP/UDP/
SCIP/ICMP session flooding (source/destination)
• Application Level Gateways and session support: Cloud Sandbox
MSRCP, PPTP, RAS, RSH, SIP, FTP, TFTP, HTTP, • Active bypass with bypass interfaces
• Upload malicious files to cloud sandbox for
dcerpc, dns-tcp, dns-udp, H.245 0, H.245 1, H.323 • Predefined prevention configuration analysis
• NAT and ALG support: NAT46, NAT64, NAT444, • Support protocols including HTTP/HTTPS, POP3,
Antivirus
SNAT, DNAT, PAT, Full Cone NAT, STUN IMAP, SMTP and FTP
• Manual, automatic push or pull signature updates
• NAT configuration: per policy and central NAT • Support file types including PE, ZIP, RAR, Office,
table • Flow-based antivirus: protocols include HTTP, PDF, APK, JAR and SWF
SMTP, POP3, IMAP, FTP/SFTP
• VoIP: SIP/H.323/SCCP NAT traversal, RTP pin • File transfer direction and file size control
holing • Compressed file virus scanning
• Provide complete behavior analysis report for
• Global policy management view Attack Defense malicious files
• Security policy redundancy inspection, policy • Abnormal protocol attack defense • Global threat intelligence sharing, real-time threat
group, policy configuration rollback blocking
• Anti-DoS/DDoS, including SYN Flood, DNS Query
• Policy Assistant for easy detailed policy Flood defense • Support detection only mode without uploading
deployment files
• ARP attack defense
• Policy analyzing and invalid policy cleanup
• Support allow list for destination IP address

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 2


Hillstone CloudEdge: Virtual Next-Generation Firewall

Features (Continued)

Botnet C&C Prevention • Prioritized allocation of remaining bandwidth • Cache cleaning option prior to ending SSL VPN
• Maximum concurrent connections per IP session
• Discover intranet botnet host by monitoring C&C
connections and block further advanced threats • Bandwidth allocation based on URL category • L2TP client and server mode, L2TP over IPSEC,
such as botnet and ransomware and GRE over IPSEC
• Bandwidth limit by delaying access for user or IP
• Regularly update the botnet server addresses • View and manage IPSEC and SSL VPN connec-
• Automatic expiration cleanup and manual cleanup
tions
• Prevention for C&C IP and domain of user used traffic
• PnPVPN
• Support TCP, HTTP, and DNS traffic detection
Server Load Balancing
• IP and domain whitelists High Availability
• Weighted hashing, weighted least-connection, and
weighted round-robin • Redundant heartbeat interfaces with IPv6 ready
IP Reputation
• Session protection, session persistence and • Active/Active and Active/Passive mode
• Identify and filter traffic from risky IPs such as
botnet hosts, spammers, Tor nodes, breached session status monitoring • Standalone session synchronization
hosts, and brute force attacks • Server health check, session monitoring and • HA reserved management interface
• Logging, dropping packets, or blocking for session protection • Failover:
different types of risky IP traffic - Port, local & remote link monitoring
Link Load Balancing
• Periodical IP reputation signature database - Stateful failover
upgrade • Bi-directional link load balancing
- Sub-second failover
• Outbound link load balancing includes policy
Endpoint Identification and Control based routing, ECMP and weighted, embedded - Failure notification
• Support to identify endpoint IP, endpoint quantity, ISP routing and dynamic detection • Deployment options:
on-line time, off-line time, and on-line duration • Inbound link load balancing supports SmartDNS - HA with link aggregation
• Support 10 operating systems including Windows, and dynamic detection - Full mesh HA
iOS, Android, etc. • Automatic link switching based on bandwidth, - Geographically dispersed HA
• Support query based on IP, endpoint quantity, latency, jitter, connectivity, application etc.
control policy and status etc. • Link health inspection with ARP, PING, and DNS SSL Decryption
• Support the identification of accessed endpoints • Application identification for SSL encrypted traffic
quantity across layer 3, logging and interference VPN • IPS enablement for SSL encrypted traffic
on overrun IP • IPSec VPN:
• AV enablement for SSL encrypted traffic
• Redirect page display after custom interference - IPSEC Phase 1 mode: aggressive and main ID
• URL filter for SSL encrypted traffic
operation protection mode
• SSL Encrypted traffic whitelist
• Supports blocking operations on overrun IP - Peer acceptance options: any ID, specific ID, ID
in dialup user group • SSL proxy offload mode
• User identification and traffic control for remote
- Supports IKEv1 and IKEv2 (RFC 4306) • Support application identification, DLP, IPS
desktop services of Windows Server
sandbox, AV for SSL proxy decrypted traffic of
- Authentication method: certificate and
Data Security SMTPS/POP3S/IMAPS
pre-shared key
• File transfer control based on file type, size and - IKE mode configuration support (as server or User and Device Identity
name client) • Local user database
• File protocol identification, including HTTP, FTP, - DHCP over IPSEC • Remote user authentication: TACACS+, LDAP,
SMTP and POP3 - Configurable IKE encryption key expiry, NAT Radius, Active
• File signature and suffix identification for over 100 traversal keep alive frequency • Single-sign-on: Windows AD
file types - Phase 1/Phase 2 Proposal encryption: DES, • 2-factor authentication: 3rd party support,
• Content filtering for HTTP-GET, HTTP-POST, FTP 3DES, AES128, AES192, AES256 integrated token server with physical and SMS
and SMTP protocols - Phase 1/Phase 2 Proposal authentication: • User and device-based policies
• IM identification and network behavior audit MD5, SHA1, SHA256, SHA384, SHA512
• User group synchronization based on AD and
• Filter files transmitted by HTTPS using SSL Proxy - Phase 1/Phase 2 Diffie-Hellman support: 1,2,5 LDAP
- XAuth as server mode and for dialup users • Support for 802.1X, SSO Proxy
Application Control
- Dead peer detection • WebAuth page customization
• Over 4,000 applications that can be filtered by
name, category, subcategory, technology and risk - Replay detection • Interface based authentication
• Each application contains a description, risk - Autokey keep-alive for Phase 2 SA • Agentless ADSSO (AD Polling)
factors, dependencies, typical ports used, and • IPSEC VPN realm support: allows multiple custom • Use authentication synchronization based on
URLs for additional reference SSL VPN logins associated with user groups (URL SSO-monitor
• Actions: block, reset session, monitor, traffic paths, design)
• Support MAC-based user authentication
shaping • IPSEC VPN configuration options: route-based or
• Identify and control cloud applications in the cloud policy based Administration
• Provide multi-dimensional monitoring and • IPSEC VPN deployment modes: gateway-to- • Management access: HTTP/HTTPS, SSH, telnet,
statistics for cloud applications, including risk gateway, full mesh, hub-and-spoke, redundant console
category and characteristics tunnel, VPN termination in transparent mode
• Central Management: Hillstone Security Manager
• One time login prevents concurrent logins with the (HSM), web service APIs
Quality of Service (QoS) same username
• System Integration: SNMP, syslog, alliance
• Max/guaranteed bandwidth tunnels or IP/user • SSL portal concurrent users limiting partnerships
basis • SSL VPN port forwarding module encrypts client • Rapid deployment: USB auto-install, local and
• Tunnel allocation based on security domain, data and sends the data to the application server remote script execution
interface, address, user/user group, server/server • Supports clients that run iOS, Android, and
group, application/app group, TOS, VLAN • Dynamic real-time dashboard status and drill-in
Windows XP/Vista including 64-bit Windows OS monitoring widgets
• Bandwidth allocated by time, priority, or equal • Host integrity checking and OS checking prior to
bandwidth sharing • Language support: English
SSL tunnel connections
• Type of Service (TOS) and Differentiated Services • Support user data of AWS
• MAC host check per portal
(DiffServ) support

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 3


Hillstone CloudEdge: Virtual Next-Generation Firewall

Features (Continued)
Logs & Reporting License Management IPv6
• Logging facilities: local memory and storage (if • Automatic license activation/deactivation • Management over IPv6, IPv6 logging and HA
available), multiple syslog servers and multiple • Public cloud or private cloud users with internet • IPv6 tunneling: DNS64/NAT64, IPv6 ISATAP, IPv6
Hillstone Security Audit (HSA) platforms access GRE, IPv6 over IPv4 GRE
• Encrypted logging and log integrity with HSA • License movement with device • IPv6 routing including static routing, policy routing,
scheduled batch log uploading • Proxy support to LMS server ISIS, RIPng, OSPFv3 and BGP4+
• Reliable logging using TCP option (RFC 3195) • IPS, Application identification, URL filtering,
• Detailed traffic logs: forwarded, violated sessions, CloudView Antivirus, Access control, ND attack defense, iQoS
local traffic, invalid packets, URL etc. • Cloud-based security monitoring • Track address detection
• Comprehensive event logs: system and adminis- • 24/7 access from web or mobile application • IPv6 DNS, DNS64
trative activity audits, routing & networking, VPN, • Device status, traffic and threat monitoring
user authentications, WiFi related events • Cloud-based log retention and reporting
• IP and service port name resolution option
• Brief traffic log format option REST API
• Three predefined reports: Security, Flow and • Sign-on, device monitoring
Network reports • Address book, service book, application book
• User defined reporting • Application policy, AV policy, IPS policy, DNAT/
• Reports can be exported in PDF, Word and HTML SNAT, security policy
via Email and FTP • Configuration: Interface configuration, Routing
configuration, Zone configuration
Statistics and Monitoring
• Application, URL, threat events statistic and Virtualization
monitoring • Hypervisor: KVM, VMware ESXi, Xen, AMI (AWS),
• Real-time traffic statistic and analytics Hyper-V
• System information such as concurrent session, • Public Cloud: AWS, Azure, AliCloud etc.
CPU, Memory and temperature • Cloud Management Platform: Openstack Liberty
• iQOS traffic statistic and monitoring, link status and above versions, VMware vCenter 5.5 and
monitoring above versions etc.
• Support traffic information collection and • Array AVX Series Network Functions Platform
forwarding via Netflow (v9.0)

Specifications
VM01 VM02 VM04 VM08

Core (Min) 2 2 4 8
Memory (Min) 2 GB 4 GB 8 GB 16 GB
Storage (Min) 4 GB 4 GB 4 GB 4 GB
Network Interfaces 10 10 10 10
Firewall Throughput (vNIC/SR-IOV) 2 Gbps / 10 Gbps 4 Gbps / 20 Gbps 8 Gbps / 30 Gbps 10 Gbps / 80 Gbps
IPS Throughput (vNIC/SR-IOV) 1 Gbps / 3 Gbps 2 Gbps / 5 Gbps 4 Gbps / 7 Gbps 6 Gbps / 14 Gbps
AV Throughput (vNIC/SR-IOV) 800 Mbps / 1 Gbps 1.6 Gbps / 2 Gbps 3.2 Gbps / 4 Gbps 6 Gbps / 10 Gbps
IMIX Throughput (vNIC/SR-IOV)  550 Mbps / 1.6 Gbps 1.3 Gbps / 2.1 Gbps  1.3 Gbps / 2.6 Gbps 1.6 Mbps / 3.2 Gbps
NGFW Throughput (vNIC/SR-IOV)  700 Mbps / 1.5 Gbps 1.4 Gbps / 2.5 Gbps 2.8 Gbps / 3.5 Gbps 4.2 Gbps / 7 Gbps
Threat Protection Throughput (vNIC/SR-IOV)  400 Mbps / 500 Mbps 800 Mbps / 1 Gbps 1.6 Gbps / 2 Gbps 3 Gbps / 7 Gbps
IPsec VPN Throughput (vNIC/SR-IOV) 200 Mbps / 400 Mbps 400 Mbps / 800 Mbps 800 Mbps / 2 Gbps 3 Gbps / 5 Gbps
New Sessions / Second(vNIC/SR-IOV) 20,000 / 30,000 40,000 / 50,000 80,000 / 100,000 160,000 / 200,000
Maximum Concurrent Sessions 100,000 500,000 5 Million 10 Million
IPSec VPN Tunnels (Max.) 100 500 10,000 20,000
SSL VPN Users (Max.) 100 500 2,000 4,000

NOTES:
The Performance above were observed using a Dell R720 Server (Intel(R) Xeon(R) CPU E5-2680 v2 @ 2.70 GHz, 64GB memory, 4 x 10 GE interfaces) , VMXnet3 under VMware
environment. SR-IOV was observed under KVM.
Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R8. Results may vary based on StoneOS® version and deployment.

www.HillstoneNet.com
© 2020 Hillstone Networks All Rights Reserved.
Version: EX-08.01-CloudEdge-5.5R8-1120-EN-01

You might also like