Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CloudEdge

Hillstone CloudEdge:
Virtual Next-Generation Firewall
Hillstone Virtual Next-Generation Firewall, CloudEdge, embedded with Hillstone Networks StoneOS
operation system, is deployed as a virtual machine, and provides advanced security services for
applications and users in any virtualized environment. It provides comprehensive security features
including granular application identification and control, VPN, intrusion prevention, antivirus, attack
defense and cloud-sandbox to fully keep a business secure and operational. It provides price-per-
formance solutions for both public and private cloud customers, and can be rapidly provisioned
and deployed at scale.

Product Highlights
Highly Compatible with Virtual Environments Advanced Threat Protection Capability
In virtual environments, compute, storage, and data resources CloudEdge shares a base technology with Hillstone Next-Gen-
run on virtual machines. Hillstone CloudEdge supports major eration Firewall (NGFW). It can satisfy the network security
hypervisor technologies including ESXi, KVM, Hyper-V, and requirements of both public cloud and private cloud users.
Xen server, and can be rapidly deployed on a virtual machine, Hillstone CloudEdge provides fine-grained control of web
to provide advanced security services for virtual networks applications regardless of port, protocol, or evasive action.
or virtualized applications. Deployed as a virtual appliance, It can identify and prevent potential threats associated with
CloudEdge can overcome the limitation of physical firewalls, high-risk applications while providing policy-based control
and inspect all traffic inside the virtual network, to protect over applications, users, and user-groups. In addition, Cloud-
both North-South and East-West traffic. In addition, users can Edge incorporates a unified threat detection engine that
flexibly deploy and manage network resources based on the shares packet details with multiple security engines (AD, IPS,
requirements of network topologies, and thereby fully lever- URL filtering, Antivirus, Cloud-sandbox etc.), which signifi-
age the advantage of virtualization. cantly enhance security efficiency while reducing network
latency.

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 1


Hillstone CloudEdge: Virtual Next-Generation Firewall

Product Highlights (Continued)


Visualized Security Management with Cloud Deployment Automation and Service Orchestration
Management Platform
Hillstone CloudEdge provides multiple integrated solutions to
Hillstone CloudEdge provides exclusive security segmentation address the needs and requirements of cloud platforms and
and policy protection for independent tenants in cloud deploy- has already been deployed into multiple test and production
ments. It can realize instant recovery based on the snapshot cloud environments to serve diverse industries and customer
system. If a virtual appliance has an issue or outage, it can be requirements. Hillstone CloudEdge’s automation deployment
recovered via the snapshot of a saved configuration, and start and license management functions enable the cloud user
a new virtual firewall on the original or a new virtual machine. to have the capability of self-service and self-management
The CloudEdge graphical management interface has mul- based on their business needs without interruption from
tiple logging query functions, which can effectively monitor cloud administrators. Orchestration ensures each Cloud-
and track the network status; and a reporting function that Edge can be deployed and configured automatically. License
provides real-time details of traffic and security events. These management ensures CloudEdge can automatically enter
tools help administrators fully visualize and grasp the network operation mode. Hillstone CloudEdge REST API supports
operation status, and improve operational efficiency. system configuration, security policy configuration, interfaces
and network configurations, to integrate with major cloud
management platforms.

Features
Network Services • Comprehensive DNS policy URL Filtering
• Dynamic routing (OSPF, BGP, RIPv2) • Schedules: one-time and recurring • Flow-based web filtering inspection
• Static and Policy routing • Manually defined web filtering based on URL, web
• Route controlled by application Intrusion Prevention content and MIME header
• Built-in DHCP, NTP, DNS Server and DNS proxy • Protocol anomaly detection, rate-based detection, • Dynamic web filtering with cloud-based real-time
custom signatures, manual, automatic push or categorization database: over 140 million URLs
• Tap mode – connects to SPAN port
pull signature updates, integrated threat encyclo- with 64 categories (8 of which are security related)
• Interface modes: sniffer, port aggregated, pedia
loopback, VLANS (802.1Q and Trunking) • Additional web filtering features:
• IPS Actions: default, monitor, block, reset
• L2/L3 switching & routing (attackers IP or victim IP, incoming interface) with - Filter Java Applet, ActiveX or cookie
• Virtual wire (Layer 1) transparent inline expiry time - Block HTTP Post
deployment • Packet logging option - Log search keywords
• Filter Based Selection: severity, target, OS, appli- - Exempt scanning encrypted connections on
Firewall certain categories for privacy
cation or protocol
• Operating modes: NAT/route, transparent (bridge), • Web filtering profile override: allows administrator
and mixed mode • IP exemption from specific IPS signatures
• IDS sniffer mode to temporarily assign different profiles to user/
• Policy objects: predefined, custom, and object group/IP
grouping • IPv4 and IPv6 rate based DoS protection with
threshold settings against TCP Syn flood, TCP/ • Web filter local categories and category rating
• Security policy based on application, role and override
geo-location UDP/SCTP port scan, ICMP sweep, TCP/UDP/
SCIP/ICMP session flooding (source/destination)
• Application Level Gateways and session support: Cloud Sandbox
MSRCP, PPTP, RAS, RSH, SIP, FTP, TFTP, HTTP, • Active bypass with bypass interfaces
• Upload malicious files to cloud sandbox for
dcerpc, dns-tcp, dns-udp, H.245 0, H.245 1, H.323 • Predefined prevention configuration analysis
• NAT and ALG support: NAT46, NAT64, NAT444, • Support protocols including HTTP/HTTPS, POP3,
Antivirus
SNAT, DNAT, PAT, Full Cone NAT, STUN IMAP, SMTP and FTP
• Manual, automatic push or pull signature updates
• NAT configuration: per policy and central NAT • Support file types including PE, ZIP, RAR, Office,
table • Flow-based antivirus: protocols include HTTP, PDF, APK, JAR and SWF
SMTP, POP3, IMAP, FTP/SFTP
• VoIP: SIP/H.323/SCCP NAT traversal, RTP pin • File transfer direction and file size control
holing • Compressed file virus scanning
• Provide complete behavior analysis report for
• Global policy management view Attack Defense malicious files
• Security policy redundancy inspection, policy • Abnormal protocol attack defense • Global threat intelligence sharing, real-time threat
group, policy configuration rollback blocking
• Anti-DoS/DDoS, including SYN Flood, DNS Query
• Policy Assistant for easy detailed policy Flood defense • Support detection only mode without uploading
deployment files
• ARP attack defense
• Policy analyzing and invalid policy cleanup

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 2


Hillstone CloudEdge: Virtual Next-Generation Firewall

Features (Continued)

Botnet C&C Prevention • Bandwidth allocation based on URL category and GRE over IPSEC
• Discover intranet botnet host by monitoring C&C • Bandwidth limit by delaying access for user or IP • View and manage IPSEC and SSL VPN connec-
connections and block further advanced threats • Automatic expiration cleanup and manual cleanup tions
such as botnet and ransomware of user used traffic • PnPVPN
• Regularly update the botnet server addresses
Server Load Balancing High Availability
• Prevention for C&C IP and domain
• Weighted hashing, weighted least-connection, and • Redundant heartbeat interfaces
• Support TCP, HTTP, and DNS traffic detection weighted round-robin • Active/Active and Active/Passive mode
• IP and domain whitelists • Session protection, session persistence and • Standalone session synchronization
session status monitoring • HA reserved management interface
IP Reputation
• Server health check, session monitoring and • Failover:
• Identify and filter traffic from risky IPs such as
session protection
botnet hosts, spammers, Tor nodes, breached - Port, local & remote link monitoring
hosts, and brute force attacks Link Load Balancing - Stateful failover
• Logging, dropping packets, or blocking for • Bi-directional link load balancing - Sub-second failover
different types of risky IP traffic
• Outbound link load balancing includes policy - Failure notification
• Periodical IP reputation signature database based routing, ECMP and weighted, embedded
upgrade • Deployment options:
ISP routing and dynamic detection
- HA with link aggregation
Endpoint Identification and Control • Inbound link load balancing supports SmartDNS
- Full mesh HA
and dynamic detection
• Support to identify endpoint IP, endpoint quantity, - Geographically dispersed HA
on-line time, off-line time, and on-line duration • Automatic link switching based on bandwidth,
latency, jitter, connectivity, application etc. SSL Decryption
• Support 10 operating systems including Windows,
iOS, Android, etc. • Link health inspection with ARP, PING, and DNS • Application identification for SSL encrypted traffic
• Support query based on IP, endpoint quantity, VPN • IPS enablement for SSL encrypted traffic
control policy and status etc. • AV enablement for SSL encrypted traffic
• IPSec VPN:
• Support the identification of accessed endpoints • URL filter for SSL encrypted traffic
quantity across layer 3, logging and interference - IPSEC Phase 1 mode: aggressive and main ID
protection mode • SSL Encrypted traffic whitelist
on overrun IP
- Peer acceptance options: any ID, specific ID, ID • SSL proxy offload mode
• Redirect page display after custom interference
operation in dialup user group
- Supports IKEv1 and IKEv2 (RFC 4306) User and Device Identity
• Supports blocking operations on overrun IP • Local user database
- Authentication method: certificate and
Data Security pre-shared key • Remote user authentication: TACACS+, LDAP,
- IKE mode configuration support (as server or Radius, Active
• File transfer control based on file type, size and
name client) • Single-sign-on: Windows AD
• File protocol identification, including HTTP, FTP, - DHCP over IPSEC • 2-factor authentication: 3rd party support,
SMTP and POP3 - Configurable IKE encryption key expiry, NAT integrated token server with physical and SMS
• File signature and suffix identification for over 100 traversal keep alive frequency • User and device-based policies
file types - Phase 1/Phase 2 Proposal encryption: DES, • User group synchronization based on AD and
• Content filtering for HTTP-GET, HTTP-POST, FTP 3DES, AES128, AES192, AES256 LDAP
and SMTP protocols - Phase 1/Phase 2 Proposal authentication: • Support for 802.1X, SSO Proxy
• IM identification and network behavior audit MD5, SHA1, SHA256, SHA384, SHA512 • WebAuth page customization
• Filter files transmitted by HTTPS using SSL Proxy - Phase 1/Phase 2 Diffie-Hellman support: 1,2,5 • Interface based authentication
- XAuth as server mode and for dialup users • Agentless ADSSO (AD Polling)
Application Control
- Dead peer detection • Use authentication synchronization based on
• Over 4,000 applications that can be filtered by SSO-monitor
- Replay detection
name, category, subcategory, technology and risk
- Autokey keep-alive for Phase 2 SA • Support MAC-based user authentication
• Each application contains a description, risk
factors, dependencies, typical ports used, and • IPSEC VPN realm support: allows multiple custom
Administration
URLs for additional reference SSL VPN logins associated with user groups (URL
paths, design) • Management access: HTTP/HTTPS, SSH, telnet,
• Actions: block, reset session, monitor, traffic console
shaping • IPSEC VPN configuration options: route-based or
policy based • Central Management: Hillstone Security Manager
• Identify and control cloud applications in the cloud (HSM), web service APIs
• IPSEC VPN deployment modes: gateway-to-
• Provide multi-dimensional monitoring and • System Integration: SNMP, syslog, alliance
gateway, full mesh, hub-and-spoke, redundant
statistics for cloud applications, including risk partnerships
tunnel, VPN termination in transparent mode
category and characteristics
• One time login prevents concurrent logins with the • Rapid deployment: USB auto-install, local and
Quality of Service (QoS) same username remote script execution
• Max/guaranteed bandwidth tunnels or IP/user • SSL portal concurrent users limiting • Dynamic real-time dashboard status and drill-in
basis monitoring widgets
• SSL VPN port forwarding module encrypts client
• Tunnel allocation based on security domain, data and sends the data to the application server • Language support: English
interface, address, user/user group, server/server • Supports clients that run iOS, Android, and
group, application/app group, TOS, VLAN
Logs & Reporting
Windows XP/Vista including 64-bit Windows OS
• Logging facilities: local memory and storage (if
• Bandwidth allocated by time, priority, or equal • Host integrity checking and OS checking prior to available), multiple syslog servers and multiple
bandwidth sharing SSL tunnel connections Hillstone Security Audit (HSA) platforms
• Type of Service (TOS) and Differentiated Services • MAC host check per portal • Encrypted logging and log integrity with HSA
(DiffServ) support • Cache cleaning option prior to ending SSL VPN scheduled batch log uploading
• Prioritized allocation of remaining bandwidth session • Reliable logging using TCP option (RFC 3195)
• Maximum concurrent connections per IP • L2TP client and server mode, L2TP over IPSEC,

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 3


Hillstone CloudEdge: Virtual Next-Generation Firewall

Features (Continued)
• Detailed traffic logs: forwarded, violated sessions, monitoring SNAT, security policy
local traffic, invalid packets, URL etc. • Support traffic information collection and • Configuration: Interface configuration, Routing
• Comprehensive event logs: system and adminis- forwarding via Netflow (v9.0) configuration, Zone configuration
trative activity audits, routing & networking, VPN,
user authentications, WiFi related events License Management Virtualization
• IP and service port name resolution option • Automatic license activation/deactivation • Hypervisor: KVM, VMware ESXi, Xen, AMI (AWS),
• Brief traffic log format option • Public cloud or private cloud users with internet Hyper-V
• Three predefined reports: Security, Flow and access • Public Cloud: AWS, Azure, AliCloud etc.
Network reports • License movement with device • Cloud Management Platform: Openstack Liberty
• User defined reporting and above versions, VMware vCenter 5.5 and
CloudView above versions etc.
• Reports can be exported in PDF, Word and HTML
• Cloud-based security monitoring • Array AVX Series Network Functions Platform
via Email and FTP
• 24/7 access from web or mobile application
Statistics and Monitoring • Device status, traffic and threat monitoring
• Application, URL, threat events statistic and • Cloud-based log retention and reporting
monitoring
• Real-time traffic statistic and analytics REST API
• System information such as concurrent session, • Sign-on, device monitoring
CPU, Memory and temperature • Address book, service book, application book
• iQOS traffic statistic and monitoring, link status • Application policy, AV policy, IPS policy, DNAT/

Specifications
VM01 VM02 VM04

Core (Min) 2 2 4
Memory (Min) 2 GB 4 GB 8 GB
Storage (Min) 4 GB 4 GB 4 GB
Network Interfaces 10 10 10
Firewall Throughput (vNIC/SR-IOV) 2 Gbps / 10 Gbps 4 Gbps / 20 Gbps 8 Gbps / 30 Gbps
IPS Throughput (vNIC/SR-IOV) 1 Gbps / 3 Gbps 2 Gbps / 5 Gbps 4 Gbps / 7 Gbps
AV Throughput (vNIC/SR-IOV) 800 Mbps / 1 Gbps 1.6 Gbps / 2 Gbps 3.2 Gbps / 4 Gbps
IMIX Throughput (vNIC/SR-IOV)  550 Mbps / 1.6 Gbps 1.3 Gbps / 2.1 Gbps  1.3 Gbps / 2.6 Gbps
NGFW Throughput (vNIC/SR-IOV)  700 Mbps / 1.5 Gbps 1.4 Gbps / 2.5 Gbps 2.8 Gbps / 3.5 Gbps
Threat Protection Throughput (vNIC/SR-IOV)  400 Mbps / 500 Mbps 800 Mbps / 1 Gbps 1.6 Gbps / 2 Gbps
IPsec VPN Throughput (vNIC/SR-IOV) 200 Mbps / 400 Mbps 400 Mbps / 800 Mbps 800 Mbps / 2 Gbps
New Sessions / Second(vNIC/SR-IOV) 20,000 / 30,000 40,000 / 50,000 80,000 / 100,000
Maximum Concurrent Sessions 100,000 500,000 5 Million
IPSec VPN Tunnels (Max.) 100 500 10,000
SSL VPN Users (Max.) 100 500 2,000

NOTES:
The Performance above were observed using a Dell R720 Server (Intel(R) Xeon(R) CPU E5-2680 v2 @ 2.70 GHz, 64GB memory, 4 x 10 GE interfaces) , VMXnet3 under VMware
environment. SR-IOV was observed under KVM.
Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R7. Results may vary based on StoneOS® version and deployment.

www.HillstoneNet.com
© 2020 Hillstone Networks All Rights Reserved.
Version: EX-08.01-CloudEdge-5.5R7-1020-EN-01

You might also like