Billion Electric Company BiGuard Series manual Remote

Page 4

Data: Input ID’s information, like domain name www.ipsectest.com.

Network: Set the Any local address, subnet or single address of the local network.

~Any Local Address: All IP address of the local network

~Subnet: The subnet of the local network. For example, IP: 192.168.100.0 with netmask 255.255.255.0 specifies one class C subnet starting from 192.168.100.1 (i.e. 192.168.100.1 through to 192.168.100.254).

~Single Address: The IP address of the local host.

Remote:

Secure Gateway Address (or hostname): The IP address or hostname of the remote VPN device that is connected and establishes a VPN tunnel. It must be filled in with VPN Client IP address or public IP address of the router behind which the VPN Client is (“vpnclient.dyndns.org” in our example).

ID: Select remote ID type

Data: Input ID’s information, like domain name www.ipsectest.com.

Network: Set the IP address, subnet or address range of the remote network. In our example, you must add FQUN (biguardsupport@billion.com) for the VPN Client.

Proposal:

Secure Association: (SA) is a method of establishing a security policy between two points. There are three methods of creating a Secure Association, each varying in degrees of security and speed of negotiation.

~Main Mode: Uses the automated Internet Key Exchange (IKE) setup; most secure method with the highest level of security.

~Aggressive Mode: Uses the automated Internet Key Exchange (IKE) setup; mid-level security. Speed is faster than Main mode.

~Manual Key: Manual; standard level of security. It is the fastest of the three methods.

Method: There are two methods of checking the authentication information, AH (authentication header) and ESP (Encapsulating Security Payload). Use ESP for greater security so that data will be encrypted and authenticated. Using AH data will be authenticated but not encrypted.

Encryption: Select the encryption method from the pull-down menu. There are several options, DES, 3DESand AES (128, 192 and 256). 3DES and AES are more powerful but increase latency.

~DES: Stands for Data Encryption Standard, it uses 56 bits as an encryption method.

~3DES: Stands for Triple Data Encryption Standard, it uses 168 (56*3) bits as an encryption method.

~AES: Stands for Advanced Encryption Standards, you can use 128, 192 or 256 bits as encryption method.

Authentication: Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit. There are two options, Message Digest 5 (MD5), and Secure Hash Algorithm (SHA1). SHA1 is more resistant to brute-force attacks than MD5, however it is slower.

~MD5: A one-way hashing algorithm that produces a 128−bit hash.

~SHA1: A one-way hashing algorithm that produces a 160−bit hash.

Image 4
Contents BiGuard C01 Network Topology Billion BiGuard VPN enabled devices VPN Configuration LocalRemote Page BiGuard VPN Client Configuration Phase 1 Configuration Page Page BiGuard VPN Client Configuration Phase 2 Configuration Page Open IPSec VPN Tunnels Configuration Wizard Page Page Page Page MD5 SHA1 Appendix B Product Support and Contact Information

BiGuard Series specifications

Billion Electric Company has established itself as a leader in the development of advanced networking technologies, and one of its notable offerings is the BiGuard Series. Designed specifically for the expanding demands of modern network security, the BiGuard Series comprises high-performance security appliances that cater to both small to medium-sized enterprises and larger corporations. With cyber threats evolving rapidly, these devices are engineered to provide robust security while ensuring seamless connectivity.

One of the key features of the BiGuard Series is its integrated unified threat management (UTM) functionality. This allows organizations to consolidate multiple security measures into a single device, including firewall protection, intrusion detection and prevention, antivirus and anti-malware protections, and web filtering. By utilizing UTM, businesses can significantly reduce their overall hardware and management costs while enhancing their security posture.

The BiGuard Series also boasts advanced networking capabilities. With support for both IPv4 and IPv6, organizations can future-proof their networks as they transition to newer protocols. The devices come equipped with multiple WAN and LAN ports, enabling load balancing and failover capabilities to ensure high availability and reliability of the network. This is particularly important for businesses that rely heavily on uptime for their operations.

Another standout feature is the BiGuard Series' intuitive user interface. The devices include a web-based management console that offers deep visibility into network activities, allowing administrators to monitor traffic, manage devices, and configure security policies from a centralized location. This ease of use empowers IT teams to respond quickly to potential threats and make informed decisions about their network security.

In terms of performance, the BiGuard Series utilizes high-speed processing and optimized security algorithms to deliver minimal latency and optimal throughput. This ensures that users can enjoy uninterrupted service while maintaining the highest levels of protection against cyber threats. Additionally, the series supports advanced technologies such as SSL VPN, which allows secure remote access for employees working from home or on the go.

Lastly, the BiGuard Series is designed with scalability in mind. As organizations grow, so do their network requirements. The flexibility of the BiGuard Series allows for easy upgrades and expansions, making it a future-ready solution for businesses looking to enhance their cybersecurity measures without overhauling their existing infrastructure.

In conclusion, the Billion Electric Company BiGuard Series stands out with its comprehensive security features, advanced networking capabilities, user-friendly management interface, and scalability, making it an ideal choice for organizations seeking to secure their network in an increasingly complex threat landscape.