Network Gateway Requirements Analysis
Netgate Michael Bobbin (The Computer)suretyMagazine's editor-in-chief) said, "There's only one way to ensure that a system is truly secure: disconnect thereticulation, which may be becoming a real solution." In government, defense, energy and many other important areas, data confidentiality, network stability, business continuity requirements are extremely high, rock-solid security is particularly critical. Market demand has given rise to innovation in security technology, in the mid-1990s the Russian Ry Jones first put forward the concept of "AirGap" isolation, and then, Israel developed a successful physical isolation card, to achieve the security of isolation between the network; then, the United States, Whale Communications Company and Israel SpearHead has launched the e-Gap and NetGap products, the use of proprietary hardware to achieve two networks in the case of non-connectivity of data security exchanges and resource sharing, so that the security isolation technology from the simple realization of the "network isolation prohibits the exchange of" development to the "security isolation and reliable, reliable, and reliable, and reliable, and reliable, and reliable, and reliable, and safe". "Secure isolation and reliable, controllable exchange". According to the relevant national policies and the highest standards, our company has developed the Tianqing security isolation and information exchange system GAP-6000 series products (referred to as the network gate), which provides the most comprehensive and secure solution for the users' network isolation and security by virtue of its powerful functions, excellent performance, and perfect customer service organizations and guarantee system all over the country.
Products
Tianqing Safety IsolationThe GAP-6000 series products of the information exchange system are the result of Qixingchen Group's strong technical advantages and many years of experience in the field of information exchange.information securityAccumulation of product development, in strict compliance with the design specifications of the relevant national authorities, with completely independent intellectual property rights of the security isolation and information exchange system. The product utilizes the isolation and exchange matrix technology to realize the security isolation between two networks or application systems. The product can be deployed at the network boundary, connecting two or more networks with the same or different security levels, realizing security isolation between two or more networks without affecting the data exchange between them, thus realizing high security between networks. The product is mainly used in government, health care, energy, finance, public security, petroleum, petrochemical and other fields of information system security construction, to realize the security isolation between networks or application systems.
Functional Features
- suretyThe "2 + 1" system architecture, i.e., "intranet host" + "switching isolation matrix" + "extranet host "to realize real security isolation;
- Secure internal and external network independent management mechanism, internal and external network using independent operating system, mutual distrust, to provide double protection;
- Intranet/extranet host-specific proprietary intellectual property operating system, solidified in hardware, tamper-proof;
- User-friendly graphical interface, secure HTTPS remote management with password and certificate authentication methods;
- High-speed security isolation chip and switching chip, double ferry transmission technology, strongly improve the performance of data exchange;
- Parallel processing, thread pooling and other technologies within the system improve the efficiency of content inspection, filtering, protocol analysis and virus scanning;
- Intelligent full-text content filtering, full-text data reduction of isolated exchange messages, in-depth detection and filtering of text content, protocol formats, etc;
- Efficient Virus Filtering Technology, a self-developed protection engine that combines eigenvalue detection and heuristic detection to efficiently filter multiple forms of viruses;
typical application
Schematic diagram of a typical deployment of the product:

Figure 1 Public Security Video Access Deployment Diagram
Case Notes:
The product is deployed between the public security ICT network and the public security video surveillance network to ensure the security isolation between the two networks, and at the same time, through the video transmission function, it can recognize the legitimate video protocols, and effectively ferry the video images and related surveillance video signaling to the opposite end of the network.

Figure 2 Schematic diagram of tax office network and intranet security isolation deployment
Case Notes:
The online electronic tax declaration system is divided into three parts on the tax side: the extranet acceptance platform, the intranet processing platform and the intranet declaration database. The product is deployed between the extranet acceptance platform and the intranet processing platform, and the data on the tax specialized networkserver (computer)Useful data can be accessed through the network gate for preservation, while also ensuring the security of the intranet database and the safe isolation of the extranet.

Figure 3 Manufacturer separates the production network from the office network by means of a gate.
Case Notes:
The product is deployed between the enterprise's management network and production network, mainly used to ensure the effective isolation of the production network from other networks, while at the same time to meet the necessary data retrieval and collection of office network business. The data to be exchanged between the production network and the office network are the data in the real-time database and the monitoring video data. Through the network gate can not only meet the one-way transmission requirements of the database, but also ensure the two-way communication of the video, and the content and flow of data exchange between the two networks can also be clearly defined.
network interface | Standard 2U chassis, dual redundant power supply; the whole machine is equipped with LCD screen and equipment health monitoring sound and light alarm device; internal network interface: standard 1 management port, 1 HA interface, 4 10/100/1000M Base-TX network interface, 4 Gigabit SFP slot, 2 10GbE SFP+ slot external network interface: standard 1 management port, 1 HA interface, 4 10/100/1000M Base-TX network interface, 4 Gigabit SFP slot, 2 10GbE SFP+ slot external network interface: standard 1 management port, 1 HA interface, 4 10/100/1000M Base-TX network interface, 4 Gigabit SFP slot, 2 10GbE SFP+ slot 1000M Base-TX network interface, 4 Gigabit SFP slots, 2 10 Gigabit SFP+ slots |
performances | Throughput ≥ 7Gbps, maximum number of concurrent connections ≥ 350,000, delay ≤ 1ms |
system architecture | The "2+1" system architecture, i.e., consists of two host systems and one special hardware for isolation and exchange; the isolation and exchange matrix is realized based on a special chip, which ensures that the internal and external network isolation cards are disconnected from the internal and external network systems during the time of data transfer. |
redundancy system | Internal and external network host system respectively support dual-system boot, and can be configured directly on the WEB interface startup sequence, in the event of system A failure, you can switch to system B at any time; and support for system (including configuration) backup; support for restoring the factory version function, a key to restore the system to the factory state |
network and interface | Supports IPV6/IPV4 dual-stack access |
Supports interface redundancy mode settings including: polling, hot standby, link aggregation protocols | |
Mandatory Access Control | Supports two authentication methods: WEB authentication method and dedicated client (user authentication client). |
Access control by checking the user's client version and process | |
Optional Function Modules | Database synchronization, file synchronization, FTP synchronization, email transmission, secure browsing, video transmission, etc. |