Описание товара
Подробности
App-Centric Policy Enforcement
Associate firewall policies with the applications users are accessing for increased policy efficiency
SSL Termination
Fully terminate SSL traffic allowing inspection and policy enforcement, thereby preventing viruses, trojans, or network attacks
Dynamic Security Logic
Automatically mitigate traffic based on location and from known bad or questionable IP addresses.
Actionable Intelligence
Quickly view attack violations in detailed reports and logs with unsurpassed granularity into Layers 2-7 DoS attacks that ensure PCI security logging requirements
Centralized Management
Deploy, manage and update firewall policies across the enterprise from a single-pane view with BIG-IQ
Дополнительная информация
Firewall
- Protocol anomaly detection Yes—SYN/ICMP/ACK/UDP/TCP/IP**/DNS/ARP L4
- DoS and DDoS protection Yes
- SSL DoS and DDoS protection Yes
- DNS and DDoS protection Yes
- HTTP DoS and DDoS protection Yes
- SSL reverse proxy Yes
- IP reputation* and geolocation Yes—including identifying Tor proxies, malware, and command-and-control (C&C) servers
- Central management with role-based access control Yes—with BIG-IQ Security
- SNMP reporting Yes
- DDoS traffic sampling Yes
IPsec
- Site-to-site Yes
- Keying methods Manual, Internet Key Exchange (IKEv1 and IKEv2)
- Authentication methods Preshared key, RSA signature
- Diffie-Hellman groups 1, 2, 5, 14, 15, 16, 17, 18
- Encryption algorithms 3DES, AES-128, AES-192, AES-256, AES-GCM-128, AES-GCM-256
- Hash/HMAC algorithms SHA-1, AES-GMAC-128, AES-GMAC-192, AES-GMAC-256
Platform Features
- Multi-tenancy Yes—with vCMP
- High availability Yes—active-passive or active-active
SSL VPN
- Remote access Yes—with BIG-IP APM