Topwalk-TBG
Topwalk-TBG
Topwalk-TBG

Topwalk Boundary Security Access Gateway (Topwalk-TBG) is a high-performance cryptographic device independently developed by Topwalk Information Technology Co., Ltd. It features a secure and comprehensive key management mechanism, supporting multiple domestic cryptographic algorithms such as SM1, SM2, SM3, and SM4. Integrating cluster technology, load balancing technology, IPSec, SSL and other technologies, the device fully supports various applications above the network layer without changing the existing network structure and application mode. It provides core security authentication services such as high-performance, multi-task parallel encrypted transmission and identity authentication for various business systems, ensuring the confidentiality, integrity and validity of transmitted information.

Home > Network security >
Core Values

Certificate and Connection Management

Certificate and Connection Management
CA Management: Compatible with X.509 V3 standard and China crypto standard, such as RSA, AES, SM2, SM4, etc., with personalized interactive experience users can easily implement multi-CA in multi-site.
 
Connection Management: base on traffic, package and time, support NAT, anonymous mode ISAKMP.

Authentication and Encryption

Authentication and Encryption

Offers one-way/two-way authentication options with flexible handshake strategies, adapting to B/S and C/S applications (such as FTP, Telnet)

Access Control and High Availability

Access Control and High Availability

- Access Control: Implements fine-grained permission management based on URLs to meet the access needs of different user roles;)

- High Availability: Features dual-machine hot backup and cluster load balancing capabilities, improving encryption efficiency through hardware acceleration.

Client Support and System Maintenance

Client Support and System Maintenance

- Client Support: Provides cross-platform VPN clients (compatible with Windows and mobile devices) with detailed log tracking;)

- System Maintenance: Supports configuration backup/restoration, factory settings restoration, real-time resource monitoring, log management integrated with SYSLOG, and online software upgrades.

Security and Self-Inspection

Security and Self-Inspection

- Authentication and Encryption: Offers one-way/two-way authentication options with flexible handshake strategies, adapting to B/S and C/S applications (such as FTP, Telnet);

- Management and Monitoring: Supports centralized Web-based management and role-based access control, compatible with SNMP remote monitoring, and optimizes SSL handshake through OCSP Stapling.

Management and Monitoring

Management and Monitoring

Supports centralized Web-based management and role-based access control, compatible with SNMP remote monitoring, and optimizes SSL handshake through OCSP Stapling.

Product Advantages
National Cryptographic Standard Support and IP Protocol Compatibility
National Cryptographic Standard Support and IP Protocol Compatibility

- National Cryptographic Standard Support: Complies with the specifications of the State Cryptography Administration, compatible with SM2/RSA encryption algorithms and national/internationally general symmetric and hash algorithms;

- IP Protocol Compatibility: Provides end-to-end encrypted channels, supports any protocol, and builds logical networks through virtual IPs.

Fine-Grained Access Control and Multi-Line Optimization
Fine-Grained Access Control and Multi-Line Optimization

- Fine-Grained Access Control: Implements fine-grained resource access policies based on roles, source IPs and other conditions;

- Multi-Line Optimization: Automatically achieves load balancing and line backup, adapting to multi-line environments, flexibly distributing traffic to ensure business stability.

Integrated Firewall and Customized OS
Integrated Firewall and Customized OS

- Integrated Firewall: Built-in high-performance stateful firewall that only opens necessary ports to protect back-end servers from attacks;

- Customized OS: Adopts a streamlined and customized Linux system to enhance system security and operational efficiency.

Security Protocol Compliance
Security Protocol Compliance

Complies with the IPSec/SSL VPN specifications of the State Cryptography Administration to ensure secure key exchange.

Powerful Parallel Processing Capability
Powerful Parallel Processing Capability

Supports simultaneous management of multiple security nodes and tunnels to improve overall processing efficiency.

Application Scenarios

01

Application Scenarios

Application Scenarios

Topwalk Access Control System implements network access control by bypassing core switches. Tailored to diverse network environments, it activates 802.1X authentication, policy-based routing, or VLAN isolation to deliver consistent security access protection across multi-branch deployments and varied application scenarios. The system effectively blocks unauthorized devices from network entry, enforces mandatory security protocols for terminal access, and enables granular access control for complex network topologies — all without requiring modifications to the existing network architecture. It is fully compliant with the security access requirements stipulated in the Level Protection framework.