Tarigh 2017-11-29T11:50:04+00:00

Unified Threat Management UTM

Tarigh UTM properties

Security Firewall
  • Stateful Packet Filter
  • NAT/PAT
  • Publishing
  • Filtering based on IP, MAC and FQDN Addresses
  • Time Based Rules
  • Content Filtering
  • Support of zones
  • Grouping Addresses
  • Using IP and port ranges
  • DOS and Flooding  protection
VPN
(IPSec)
  • Subnet to Subnet
  • AH and ESP Protocols
  • Proprietary Algorithm (Paya)
  • Standard Algorithm (AES,3DES)
  • IKE V1.0 and V2.0
  • NAT Traversal
  • Automatic & Manual Key
  • DH Groups 2,14,15,16
  • Protected sensitive information including keys with Security Token
  • Peer authentication methods: Preshared Key, Public Key
  • Support Road Warrior
IDS/IPS
  • Support Various Signatures
  • Create Custom Signatures
  • Sensor Definition
  • Automatic & Manually Signatures Update
  • All/TCP/UDP/ICMP Alerts
  • Policy Based Alert Archieving
High Availability
  • Active-Passive
  • Device Failure Detection
  • Link Failure Detection
  • Configuration Synchronization
Networking Bandwidth Management
  • Dynamic Shaping (HTB protocol)
  • Dynamic Sharing (SFQ protocol)
Networking
  • Static & Dynamic Routing (RIP,OSPF)
  • DHCP Server
  • DNS Forwarder
  • 802.1q VLAN Support
  • PPPoE
  • Bridge
Monitoring Logs
  • Attack Logs
  • System Logs
  • Network Logs
  • Send to external Syslog Server
  • Logs archiving
  • Export Logs
Reports
  • IDPS Attack Alerts
  • Top 10 Attacks
  • Top 10 Victims
  • Top 10 Attackers
  • Top 10 Protocols
  • Traffic Live Sessions
  • Firewall Rules Statistical Information
  • System Resources
 Protocols
  • SNMP v2/v3
  • NetFlow (Statistical IP Network Traffic)
System Settings 
  • Object Definition
  • Reset to Factory Settings
  • Backup Configuration
Notification
  •  Alert & Notification System
Time Server 
  •  Synchronize With Remote NTP Server
 Security Token
  • Protection of Sensitive Information
  • Two Factor Authentication of Manager
Operational Mode 
  •  Layer 2 (Bridge Mode)
  • Layer 3 (Router/NAT Gateway Mode)
Management Console 
  •  Graphical (Token Based)
  • Command Line (Token Based)

 Tarigh FV properties

Security Firewall
  • Stateful Packet Filter
  • NAT/PAT
  • Publishing
  • Filtering based on IP, MAC and FQDN Addresses
  • Time Based Rules
  • Content Filtering
  • Support of zones
  • Grouping Addresses
  • Using IP and port ranges
  • DOS and Flooding  protection
VPN
(IPSec)
  • Subnet to Subnet
  • AH and ESP Protocols
  • Proprietary Algorithm (Paya)
  • Standard Algorithm (AES,3DES)
  • IKE V1.0 and V2.0
  • NAT Traversal
  • Automatic & Manual Key
  • DH Groups 2,14,15,16
  • Protected sensitive information including keys with Security Token
  • Peer authentication methods: Preshared Key, Public Key
  • Support Road Warrior
High Availability
  •  Active-Passive
  • Device Failure Detection
  • Link Failure Detection
  • Configuration Synchronization
Networking Bandwidth Management
  • Dynamic Shaping (HTB protocol)
  • Dynamic Sharing (SFQ protocol)
Networking
  • Static & Dynamic Routing (RIP,OSPF)
  • DHCP Server
  • DNS Forwarder
  • 802.1q VLAN Support
  • PPPoE
  • Bridge
Monitoring Logs
  • System Logs
  • Network Logs
  • Send to external Syslog Server
  • Logs archiving
  • Export Logs
Reports
  • Traffic Live Sessions
  • Firewall Rules Statistical Information
  • System Resources
 Protocols
  • SNMP v2/v3
  • NetFlow (Statistical IP Network Traffic)
System Settings 
  • Object Definition
  • Reset to Factory Settings
  • Backup Configuration
Notification
  •  Alert & Notification System
Time Server 
  •  Synchronize With Remote NTP Server
 Security Token
  • Protection of Sensitive Information
  • Two Factor Authentication of Manager
Operational Mode 
  •  Layer 2 (Bridge Mode)
  • Layer 3 (Router/NAT Gateway Mode)
Management Console 
  •  Graphical (Token Based)
  • Command Line (Token Based)

 

Tarigh UTM models
Models TU70 TU150 TU350 TU450 TU470
Concurrent Sessions 500.000 1.500.000 3.000.000 4.000.000 4.000.000
Maximum New Session Per Second 13.000 50.000 90.000 140.000 140.000
Firewall Throughput 1.2 Gbps 2 Gbps 4 Gbps 4 Gbps 6 Gbps
IDPS Throughput 90 Mbps 500 Mbps 1 Gbps 3 Gbps 3 Gbps
VPN Throughput(AES Algorithm) 75 Mbps 400 Mbps 900 Mbps 1 Gbps 1 Gbps
Network Interfaces 6* 10/100/1000 4 * 10/100/1000 8 * 10/100/1000 8 * 10/100/1000 8 * 10/100/1000 4 * SFP
Tarigh FV models
Models TG70 TG150 TG350 TG450 TG470
Concurrent Sessions 500.000 1.500.000 3.000.000 4.000.000 4.000.000
Maximum New Session Per Second 13.000 50.000 90.000 140.000 140.000
Firewall Throughput 1.2 Gbps 2 Gbps 4 Gbps 4 Gbps 6 Gbps
VPN Throughput(AES Algorithm) 75 Mbps 400 Mbps 900 Mbps 1 Gbps 1 Gbps
Network Interfaces 6* 10/100/1000 4 * 10/100/1000 8 * 10/100/1000 8 * 10/100/1000 8 * 10/100/1000 4 * SFP

Tarigh security system are used in different scenarios to make organization network safe:

To protect organization network

– To prevent unauthorized traffic login to different areas of the organization’s network by using firewall

– To detect attacks and malicious codes as well as prevent their intrusion by Tarigh detection and intrusion prevention system

To secure inter-network connections of an organization

– To prevent unauthorized traffic login to different areas of the organization’s network by using firewall

– To encrypt and provide the accuracy of transferred packages between different subnets of an organization by using Tarigh virtual private network

Tarigh product as a unified threat management provides the ability to offer various security services in a unified and centralized format. This product is placed in the connection point between local network and public networks such as internet, it also protects local network against cyber-attacks.

 

 security  network
Stateful Packet Filter

Detection and intrusion prevention (IDS/IPS)

VPN (IPSec)

Automatic key management (V2/V3 IKE)

Exclusive Tunneling mechanism in 3 layers

High accessibility (Active-Passive)

Usability in second and third layers of network

Domestic security Token

Domestic cipher algorithm

Domestic authentication protocol

Bandwidth Management (sharing, shaping)

Static and dynamic tracking (RIP, OSPF)

Applying in bridge mode

q VLAN802,1

PPPoE

DHCP Server

DNS Forwarder

 Reporting  System
The occurrence of attacks

The most done attacks

The most systems that are under attacks

The most rusher systems

The most used protocols in attacks

The active session

The consummation sources of system

Statistical data about the performance of the firewall

The consummation sources of system

The network traffic statistics (NetFlow)

The graphical management console

Command-based management console

Return to factory settings

Backup system of setting

Concurrency with time server

Events
To submit events related to attacks

To submit system and security events

The ability to archive

The ability to send for foreign Syslog Server

The ability to issue

 

In fact, security gateway is a VPN gateway. This product not only provides security and network services of virtual private network, fire wall and bandwidth management, but also secures organization connections to its diffused offices and other organizations that today are based on public networks such as internet or PDN by establishing security tunnels. Tarigh security gateway is offered by “Tarigh FV” brand name.


 Security  Network
Stateful Packet Filter

Virtual private network (IPSec)

Automatic key management v3/2IKE v

Exclusive Tunneling mechanism in 3 layers

High accessibility  (Active-Passive)

Domestic security Token

Domestic cipher algorithm

Domestic authentication protocol

Bandwidth Management (sharing, shaping)

Static and dynamic tracking (RIP, OSPF)

Applying in bridge mode

q VLAN802,1

PPPoE
DHCP Server
DNS Forwarder

SNMP v2/v3

 Reporting  System
Enabled session

Statistical data about the performance of the firewall

The consummation sources of system

The network traffic statistics (NetFlow)

The graphical management console

Command-based management console

Return to factory settings

Backup system of setting

Usability in second and third layers of network

Concurrency with time server

 Events
To submit system and security events

The ability to archive

The ability to send for foreign Syslog Server

The ability to issue

 

The following various events are produced in Tarigh system:

  • –          Events related to firewall-          Events and alarms related to detection and intrusion prevention system-          Events of virtual private network-          Events of high availability service-          Different systematic events

NTLM system is used to analysis different Tarigh events

NTLM is a system to manage events and analysis traffic. This system takes Tarigh Event System and not only analysis but also, provides their results in form of different statistical reports. Some of these reports are as follow:

    • Analysis of done attacks
    • Analysis of attack type
    • Source of attack issuance
    • The aims of attack in network
    • Traffics that passes from firewall
    • Deleted traffics by firewall
    • Analysis of security tunnels’ status
    • Analysis of events of high availability system

In this product, user is able to define and establish different analytical and statistical reports:

Top Attack’s Mechanism                                                              Top Attack’s Protocol

Reconnaissance Attacks

Generated Alerts

Log & Alert Messages

Web Attack’s