

Has the ability to maintain continuous and stable operation in the face of various failures and load changes, supporting dual-machine hot backup protocols such as VRRP, VGMP, and HRP, and providing multiple dual-machine deployment modes. It supports HELLO packet and fault detection mechanisms; when the active firewall fails, the standby firewall can automatically take over to ensure the continuity of network communication.

Built-in Web application protection function supports configuring anti-attack strategies for internal network Web servers, resisting various Web application attacks such as OS command injection, SQL injection, cross-site scripting (XSS) attacks, server vulnerability attacks, PHP code injection, malicious access violating HTTP protocols, buffer overflow, worms, and Trojan backdoors. It effectively protects Web servers through built-in default templates and automatic learning functions.

Integrates functions such as firewall, Intrusion Prevention System (IPS), Anti-Virus (AV), Anti-Denial of Service (Anti-DDoS), URL filtering, and Web page filtering, capable of defending against 0Day and unknown threat attacks; has X-Forwarded-For parsing capability to identify the original IP address of accessing clients in application proxy or load balancing mode; supports comprehensive policy editing, allowing policy matching from multiple dimensions such as source security zone, destination security zone, and five-tuple to obtain policy hit information.

Can identify specific applications in network traffic, including HTTP, HTTPS, FTP, FTPS, DNS, SSH, RDP, SIP, H.323, etc.; supports custom port editing for applications, and formulates blacklist/whitelist protection strategies and refined access control strategies based on application identification.

Integrates SD-WAN technology, enabling one-click completion of multi-branch VPN networking and zero-configuration launch of branch terminals, meeting the needs of multi-branch VPN networking and business migration to the cloud.
Provides integrated security protection based on users and applications, with user authentication and 4-7 layer security protection executed in parallel to achieve multi-dimensional and comprehensive protection. After passing through the integrated engine, data is processed in parallel by threat intrusion detection, virus scanning, Web security, and content filtering engines, effectively resisting threats such as Trojans, worms, SQL injection, and XSS attacks, ensuring file transmission security and blocking access to malicious websites and illegal links.
Built-in Web security protection module includes security rules, content keyword filtering, HTTP protocol compliance check, and URL parameter compliance check. It can resist various injection attacks such as SQL injection, XSS attacks, LFI/RFI/RCE attacks, and PHP code injection, prevent risks such as hacker scanning and source code leakage, and improve website stability and service quality.
Built-in SD-WAN module, suitable for scenarios such as headquarters-branch networking and business migration to the cloud. It reshapes modern enterprise networks through Software-Defined Wide Area Network (SD-WAN) technology, providing the reliability and efficiency required by businesses with functions such as real-time dynamic path selection, WAN optimization, dynamic VPN tunnels, stateful firewall, and end-to-end QoS.
01

Suitable for Internet exits and server frontends of government agencies, universities, financial institutions, and enterprises. It reconstructs traditional firewall functions from the perspectives of business, users, applications, and behaviors, providing intelligent control methods such as user policies, application policies, and behavior policies to solve problems that traditional firewalls are difficult to address.
Contact number: +8613810035865
Enterprise Email: liuyl@topwalk.com
Address: Building 3, Courtyard 6, Jianfeng Road (South Extension), Haidian District, Beijing
All Rights Reserved by TRS Topwalk Information Technology Co., Ltd.