You are on page 1of 5

CloudEdge

Hillstone CloudEdge:
Virtual Next-Generation Firewall
Hillstone Virtual Next-Generation Firewall, CloudEdge, embedded with Hillstone Networks StoneOS
operation system, is deployed as a virtual machine, and provides advanced security services for
applications and users in any virtualized environment. It provides comprehensive security features
including granular application identification and control, VPN, intrusion prevention, antivirus, attack
defense and cloud-sandbox to fully keep a business secure and operational. As part of the ZTNA
solution, it also supports granular control for the application access with eliminated implicit trust
and continuous verification. Hillstone CloudEdge provides price-performance solutions for both
public and private cloud customers, and can be rapidly provisioned and deployed at scale.

Product Highlights
Highly Compatible with Virtual Environments Advanced Threat Protection Capability
In virtual environments, compute, storage, and data resources CloudEdge shares a base technology with Hillstone Next-Gen-
run on virtual machines. Hillstone CloudEdge supports major eration Firewall (NGFW). It can satisfy the network security
hypervisor technologies including ESXi, KVM, Hyper-V, and requirements of both public cloud and private cloud users.
Xen server, and can be rapidly deployed on a virtual machine, Hillstone CloudEdge provides fine-grained control of web
to provide advanced security services for virtual networks applications regardless of port, protocol, or evasive action.
or virtualized applications. Deployed as a virtual appliance, It can identify and prevent potential threats associated with
CloudEdge can overcome the limitation of physical firewalls, high-risk applications while providing policy-based control
and inspect all traffic inside the virtual network, to protect over applications, users, and user-groups. In addition, Cloud-
both North-South and East-West traffic. In addition, users can Edge incorporates a unified threat detection engine that
flexibly deploy and manage network resources based on the shares packet details with multiple security engines (AD, IPS,
requirements of network topologies, and thereby fully leverage URL filtering, Antivirus, Cloud-sandbox etc.), which signifi-
the advantage of virtualization. cantly enhance security efficiency while reducing network
latency. In addition, Hillstone CloudEdge leverages machine

www.HillstoneNet.com © 2023 Hillstone Networks All Rights Reserved. | 1


Hillstone CloudEdge: Virtual Next-Generation Firewall

Product Highlights (Continued)


learning technology for intelligent security protection against Deployment Automation and Service Orchestration
known and unknown threats, such as intelligent DDoS, DGA,
Hillstone CloudEdge provides multiple integrated solutions to
and encrypted traffic detection without decryption.
address the needs and requirements of cloud platforms and
has already been deployed into multiple test and production
Visualized Security Management with Cloud
cloud environments to serve diverse industries and customer
Management Platform
requirements. Hillstone CloudEdge’s automation deployment
Hillstone CloudEdge provides exclusive security segmentation and license management functions enable the cloud user
and policy protection for independent tenants in cloud deploy- to have the capability of self-service and self-management
ments. It can realize instant recovery based on the snapshot based on their business needs without interruption from
system. If a virtual appliance has an issue or outage, it can be cloud administrators. Orchestration ensures each Cloud-
recovered via the snapshot of a saved configuration, and start Edge can be deployed and configured automatically. License
a new virtual firewall on the original or a new virtual machine. management ensures CloudEdge can automatically enter
The CloudEdge graphical management interface has mul- operation mode. Hillstone CloudEdge REST API supports
tiple logging query functions, which can effectively monitor system configuration, security policy configuration, interfaces
and track the network status; and a reporting function that and network configurations, to integrate with major cloud
provides real-time details of traffic and security events. These management platforms.
tools help administrators fully visualize and grasp the network
operation status, and improve operational efficiency.

Features
Network Services • Security policy redundancy inspection, policy • Support protection of sensitive file scanning attack
• Dynamic routing (OSPF, BGP with graceful restart, group, policy configuration rollback • Support reverse shell detection
RIPv2) • Policy Assistant for service based or application
• Static and Policy routing based policy recommendation Antivirus
• Route controlled by application • Policy analyzing and invalid policy cleanup • Manual, automatic push or pull signature updates
• Built-in DHCP, NTP, DNS Server and DNS proxy • Comprehensive DNS policy • Flow-based antivirus: protocols include HTTP,
• Schedules: one-time and recurring SMTP, POP3, IMAP, FTP/SFTP
• Tap mode – connects to SPAN port
• Support NAT redundancy detection • Compressed file virus scanning
• Interface modes: sniffer, port aggregated,
loopback, VLANS (802.1Q and Trunking) Attack Defense
Intrusion Prevention
• L2/L3 switching & routing • Abnormal protocol attack defense
• Protocol anomaly detection, rate-based detection,
• Virtual wire (Layer 1) transparent inline custom signatures, manual, automatic push or • Intelligent Anti-DoS/DDoS with ML-based baseline
deployment pull signature updates, integrated threat encyclo- establishment, including SYN flood, DNS Query
pedia Flood defense, SIP flood, etc.
Firewall
• IPS Actions: default, monitor, block, reset • ARP attack defense
• Operating modes: NAT/route, transparent (bridge),
(attackers IP or victim IP, incoming interface) with • Support allow list for destination IP address
and mixed mode
expiry time
• Policy objects: predefined, custom, and object URL Filtering
• Packet logging option
grouping
• Filter Based Selection: severity, target, OS, appli- • Flow-based web filtering inspection
• Security policy based on application, role and
cation or protocol • Manually defined web filtering based on URL, web
geo-location
• IP exemption from specific IPS signatures content and MIME header
• Application Level Gateways and session support:
• IDS sniffer mode • Dynamic web filtering with cloud-based real-time
MSRCP, PPTP, RAS, RSH, SIP, FTP, TFTP, HTTP,
categorization database: over 140 million URLs
dcerpc, dns-tcp, dns-udp, H.245 0, H.245 1, H.323, • IPv4 and IPv6 rate based DoS protection with
with 64 categories (8 of which are security related)
tcp full proxy threshold settings against TCP Syn flood, TCP/
UDP/SCTP port scan, ICMP sweep, TCP/UDP/ • Additional web filtering features:
• NAT and ALG support: NAT46, NAT64, NAT444,
SNAT, DNAT, PAT, Full Cone NAT (IPv4 and IPv6), SCIP/ICMP session flooding (source/destination) - Filter Java Applet, ActiveX or cookie
STUN • Active bypass with bypass interfaces - Block HTTP Post
• NAT configuration: per policy and central NAT • Predefined prevention configuration - Log search keywords
table • Detect abnormal encrypted traffic without - Exempt scanning encrypted connections on
• VoIP: SIP/H.323/SCCP NAT traversal, RTP pin decryption certain categories for privacy
holing • Support protection of brute force attacks including • Web filtering profile override: allows administrator
• Global policy management view VNC, RDP, SSH, LDAP, IMAP, SMB to temporarily assign different profiles to user/

www.HillstoneNet.com © 2023 Hillstone Networks All Rights Reserved. | 2


Hillstone CloudEdge: Virtual Next-Generation Firewall

Features (Continued)
group/IP • Over 6,000 applications that can be filtered by - Dead peer detection
• Web filter local categories and category rating name, category, subcategory, technology and risk - Replay detection
override • Each application contains a description, risk - Autokey keep-alive for Phase 2 SA
factors, dependencies, typical ports used, and
Cloud Sandbox • IPSEC VPN realm support: allows multiple custom
URLs for additional reference
SSL VPN logins associated with user groups (URL
• Upload malicious files to cloud sandbox for • Actions: block, reset session, monitor, traffic paths, design)
analysis shaping
• IPsec VPN supports configuration guide. Configu-
• Support protocols including HTTP/HTTPS, POP3, • Identify and control cloud applications in the cloud ration options: route-based or policy based
IMAP, SMTP and FTP • Provide multi-dimensional monitoring and • IPSEC VPN deployment modes: gateway-to-
• Support file types including PE, ZIP, RAR, Office, statistics for cloud applications, including risk gateway, full mesh, hub-and-spoke, redundant
PDF, APK, JAR and SWF category and characteristics tunnel, VPN termination in transparent mode
• File transfer direction and file size control • IPSec supports custom ports
Quality of Service (QoS)
• Provide complete behavior analysis report for • IPSec VPN supports DPD On-Demand mode
malicious files • Max/guaranteed bandwidth tunnels or IP/user
basis • LLB and failover support over IPSec tunnels
• Global threat intelligence sharing, real-time threat
blocking • Tunnel allocation based on security domain, • One time login prevents concurrent logins with the
interface, address, user/user group, server/server same username
• Support detection only mode without uploading
group, application/app group, TOS, VLAN • SSL portal concurrent users limiting
files
• Bandwidth allocated by time, priority, or equal • SSL VPN port forwarding module encrypts client
Botnet C&C Prevention bandwidth sharing data and sends the data to the application server
• Discover intranet botnet host by monitoring C&C • Type of Service (TOS) and Differentiated Services • Supports clients that run iOS, Android, Microsoft
connections and block further advanced threats (DiffServ) and traffic-class support Windows, macOS and Linux
such as botnet and ransomware • Prioritized allocation of remaining bandwidth • Host integrity checking and OS checking prior to
• Regularly update the botnet server addresses • Maximum concurrent connections per IP SSL tunnel connections
• Prevention for C&C IP and domain • Bandwidth allocation based on URL category • MAC host check per portal
• Support TCP, HTTP, and DNS traffic detection • Bandwidth limit by delaying access for user or IP • Cache cleaning option prior to ending SSL VPN
• IP and domain whitelists • Automatic expiration cleanup and manual cleanup session
• DGA Domain detection of user used traffic • L2TP client and server mode, L2TP over IPSEC,
and GRE over IPSEC
IP Reputation Server Load Balancing • View and manage IPSEC and SSL VPN connec-
• Identify and filter traffic from risky IPs such as • Weighted hashing, weighted least-connection, and tions
botnet hosts, spammers, Tor nodes, breached weighted round-robin • PnPVPN
hosts, and brute force attacks • Session protection, session persistence and
• Logging, dropping packets, or blocking for different session status monitoring High Availability
types of risky IP traffic • Server health check, session monitoring and • Redundant heartbeat interfaces with IPv6 ready
• Periodical IP reputation signature database session protection • Active/Active peer mode with Hillstone Virtual
upgrade Redundancy Protocol (HSVRP) support, and
Link Load Balancing Active/Passive mode
Endpoint Identification and Control • Bi-directional link load balancing • Standalone session synchronization
• Support to identify endpoint IP, endpoint quantity, • Outbound link load balancing includes policy • HA reserved management interface
on-line time, off-line time, and on-line duration based routing, ECMP and weighted, embedded • Failover:
• Support 10 operating systems including Windows, ISP routing and dynamic detection
- Port, local & remote link monitoring
iOS, Android, etc. • Inbound link load balancing supports SmartDNS
and dynamic detection - Stateful failover
• Support query based on IP, endpoint quantity,
control policy and status etc. • Automatic link switching based on bandwidth, - Sub-second failover
• Support the identification of accessed endpoints latency, jitter, connectivity, application etc. - Failure notification
quantity across layer 3, logging and interference • Link health inspection with ARP, PING, and DNS • Deployment options:
on overrun IP - HA with link aggregation
• Redirect page display after custom interference VPN - Full mesh HA
operation • IPSec VPN: - Geographically dispersed HA
• Supports blocking operations on overrun IP - IPSEC Phase 1 mode: aggressive and main ID
• User identification and traffic control for remote protection mode SSL Decryption
desktop services of Windows Server - Peer acceptance options: any ID, specific ID, ID • Application identification for SSL encrypted traffic
in dialup user group • IPS enablement for SSL encrypted traffic
Data Security - Supports IKEv1 and IKEv2 (RFC 4306) • AV enablement for SSL encrypted traffic
• File transfer control based on file type, size and - Authentication method: certificate and
name • URL filter for SSL encrypted traffic
pre-shared key
• File protocol identification, including HTTP, FTP, • SSL Encrypted traffic whitelist
- IKE mode configuration support (as server or
SMTP and POP3 • SSL proxy offload mode
client)
• File signature and suffix identification for over 100 • SSL proxy supports IP whitelist and predefined
- DHCP over IPSEC
file types whitelist
- Configurable IKE encryption key expiry, NAT
• Content filtering for HTTP-GET, HTTP-POST, FTP • SSL proxy supports session re-use
traversal keep alive frequency
and SMTP protocols • Support AD/LDAP server connection via SSL
- Phase 1/Phase 2 Proposal encryption: DES,
• Content filtering for predefined keywords and file encryption
3DES, AES128, AES192, AES256
contents • Support TLS v1.2, TLS v1.3
- Phase 1/Phase 2 Proposal authentication:
• IM identification and network behavior audit MD5, SHA1, SHA256, SHA384, SHA512 • Support application identification, DLP, IPS
• Filter files transmitted by HTTPS using SSL Proxy sandbox, AV for SSL proxy decrypted traffic of
- Phase 1/Phase 2 Diffie-Hellman support: 1,2,5
SMTPS/POP3S/IMAPS
Application Control - XAuth as server mode and for dialup users

www.HillstoneNet.com © 2023 Hillstone Networks All Rights Reserved. | 3


Hillstone CloudEdge: Virtual Next-Generation Firewall

Features (Continued)

User and Device Identity CPU, Memory and temperature SSL VPN, IPS, URL filtering, app monitoring, IP
• Local user database • iQOS traffic statistic and monitoring, link status reputation, QoS
• Remote user authentication: TACACS+, LDAP, monitoring • VSYS monitoring and statistic, app monitoring, IP
Radius, Active • Support traffic information collection and reputation, AV, QoS
• Single-sign-on: Windows AD forwarding via Netflow (v9.0)
Zero Trust Network Access(ZTNA)
• 2-factor authentication: 3rd party support, License Management • Support end-user access with a Zero-Trust
integrated token server with physical and SMS principle
• Automatic license activation/deactivation
• User and device-based policies • ZTNA tags support account password and
• Public cloud or private cloud users with internet
• User group synchronization based on AD and access terminal status
LDAP • Support Zero-Trust policy configuration based
• License movement with device
• Support for 802.1X, SSO Proxy on ZTNA tags and application resources, with
• Proxy support to LMS server
• WebAuth page customization optional security protection and data security
• Interface based authentication CloudView • Support application resource management
• Agentless ADSSO (AD Polling) • Cloud-based security monitoring • Support application resource configuration based
• Use authentication synchronization based on • 24/7 access from web or mobile application on domain name
SSO-monitor • Device status, traffic and threat monitoring • Support dynamic adjustment of authorization in
• Support MAC-based user authentication policy when the endpoint state changes
• Cloud-based log retention and reporting
• Support application publishing, and displaying
Administration REST API authorized applications to end-users over ZTNA
• Management access: HTTP/HTTPS, SSH, telnet, portal
• Sign-on, device monitoring
console • Support single packet authentication (SPA)
• Address book, service book, application book
• Central Management: Hillstone Security Manager • Support domain name level permission
• Application policy, AV policy, IPS policy, DNAT/
(HSM), web service APIs management
SNAT, security policy
• System Integration: SNMP, syslog, alliance partner- • Support auto-selection of the optimal gateway
• Configuration: Interface configuration, Routing
ships • Support smooth transition from current SSL VPN
configuration, Zone configuration
• Rapid deployment: USB auto-install, local and to ZTNA solution
remote script execution Virtualization • Support operating systems including iOS, Android,
• Dynamic real-time dashboard status and drill-in • Hypervisor: KVM, VMware ESXi, Xen, AMI (AWS), Microsoft Windows, MacOS and Linux
monitoring widgets Hyper-V • Support centralized ZTNA management by HSM,
• Language support: English • Public Cloud: AWS, Azure, AliCloud etc. including upload monitoring data and statistics,
• Support user data of AWS • Cloud Management Platform: Openstack Liberty and accept the configuration delivered
• Administrator authentication: Active Directory and and above versions, VMware vCenter 5.5 and
LDAP above versions etc.
• Array AVX Series Network Functions Platform
Logs & Reporting
• Logging facilities: local memory and storage (if
available), multiple syslog servers and multiple IPv6
Hillstone Security Audit (HSA) platforms • Management over IPv6, IPv6 logging and HA and
• Encrypted logging and log integrity with HSA HA peermode, twin-mode AA and AP
scheduled batch log uploading • IPv6 tunneling: DNS64/NAT64, IPv6 ISATAP, IPv6
• Reliable logging using TCP option (RFC 3195) GRE, IPv6 over IPv4 GRE, 6RD
• Detailed traffic logs: forwarded, violated sessions, • IPv6 routing including static routing, policy routing,
local traffic, invalid packets, URL etc. ISIS, RIPng, OSPFv3 and BGP4+
• Comprehensive event logs: system and adminis- • IPv6 support on LLB
trative activity audits, routing & networking, VPN, • IPS, Application identification, URL filtering,
user authentications, WiFi related events Antivirus, Access control, ND attack defense, iQoS,
• IP and service port name resolution option SSL VPN
• Brief traffic log format option • IPv6 Radius and sso-radius support
• Three predefined reports: Security, Flow and • IPv6 is supported in Active Directory whitelist
Network reports • IPv6 support on the following ALGs: TFTP, FTP,
• User defined reporting RSH, HTTP, SIP, SQLNETv2, RTSP, MSRPC,
• Reports can be exported in PDF, Word and HTML SUNRPC
via Email and FTP • Track address detection
• IPv6 DNS, DNS64
Statistics and Monitoring
• Application, URL, threat events statistic and VSYS (only available on rackmount models)
monitoring • System resource allocation to each VSYS
• Real-time traffic statistic and analytics • CPU virtualization
• System information such as concurrent session, • Non-root VSYS support firewall, IPsec VPN,

www.HillstoneNet.com © 2023 Hillstone Networks All Rights Reserved. | 4


Hillstone CloudEdge: Virtual Next-Generation Firewall

Specifications
VM01-IN VM02-IN VM04-IN VM08-IN

Core (Min) 2 2 4 8
Memory (Min) 2 GB 4 GB 8 GB 16 GB
Storage (Min) 4 GB 4 GB 4 GB 4 GB
Network Interfaces 10 10 10 10
Firewall Throughput (vNIC/SR-IOV) 2 Gbps / 10 Gbps 4 Gbps / 20 Gbps 8 Gbps / 30 Gbps 10 Gbps / 80 Gbps
IPS Throughput (vNIC/SR-IOV) 1 Gbps / 3 Gbps 2 Gbps / 5 Gbps 4 Gbps / 7 Gbps 6 Gbps / 14 Gbps
AV Throughput (vNIC/SR-IOV) 800 Mbps / 1 Gbps 1.6 Gbps / 2 Gbps 3.2 Gbps / 4 Gbps 6 Gbps / 10 Gbps
IMIX Throughput (vNIC/SR-IOV) 550 Mbps / 1.6 Gbps 1.3 Gbps / 2.1 Gbps 1.3 Gbps / 2.6 Gbps 1.6 Gbps / 3.2 Gbps
NGFW Throughput (vNIC/SR-IOV) 700 Mbps / 1.5 Gbps 1.4 Gbps / 2.5 Gbps 2.8 Gbps / 3.5 Gbps 4.2 Gbps / 7 Gbps
Threat Protection Throughput (vNIC/SR-IOV) 400 Mbps / 500 Mbps 800 Mbps / 1 Gbps 1.6 Gbps / 2 Gbps 3 Gbps / 7 Gbps
IPsec VPN Throughput (vNIC/SR-IOV) 200 Mbps / 400 Mbps 400 Mbps / 800 Mbps 800 Mbps / 2 Gbps 3 Gbps / 5 Gbps
New Sessions / Second(vNIC/SR-IOV) 20,000 / 30,000 40,000 / 50,000 80,000 / 100,000 160,000 / 200,000
Maximum Concurrent Sessions 100,000 500,000 5 Million 10 Million
IPSec VPN Tunnels (Max.) 100 500 10,000 20,000
SSL VPN Users (Max.) 100 500 2,000 4,000

NOTES:
The Performance above were observed using a Dell R720 Server (Intel(R) Xeon(R) CPU E5-2680 v2 @ 2.70 GHz, 64GB memory, 4 x 10 GE interfaces) , VMXnet3 under VMware
environment. SR-IOV was observed under KVM.
Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R9. Results may vary based on StoneOS® version and deployment.

www.HillstoneNet.com
© 2023 Hillstone Networks All Rights Reserved.
Version: EX-08.01-CloudEdge-5.5R10-0323-EN-01

You might also like