Overview
ShareTech NU series is the next phase of technology change which will help service providers to launch the services in a single click, delivering exceptional performance, superior multi-layered threat protection, and role-based administration to SMBs.
NU-840H carries advanced protection across your network security deployments: deep packet inspection (DPI), IPS, SSL inspection, web filtering, QoS, virus scanning, spam filtering, and two-factor authentication (2FA) to prevent potential attacks launched by hackers and legitimate authorized users from accessing the network. Moreover, high availability (HA) is supported to ensure smooth network operation.
NU-840H goes beyond traditional firewalls and brings a new approach to the way administrators define their firewalls with 6 Gigabit Ethernet ports. One Gigabit Ethernet port is dedicated to management, and the other 5 Ethernet ports can be user-defined into LAN, WAN, or DMZ. To enhance internal security, NU-840H unifies and deploys consistent security policies across both wired and wireless networks, and centrally manages and monitors internal wireless APs and switches. ShareTech also introduces a cloud-based service system providing a new way to deploy, operate, and manage distributed networking appliances. When anomalies occur in network traffic, the system sends notifications to IT administrators and helps them to resolve issues quickly.
Guardian of Gateway Security
ShareTech NU Series fully integrates firewall, deep packet inspection (DPI), virus scanning, ISP, SSL inspection, and blocking, moreover, extended APT prevention and IPS detection are provided to stay one step ahead for improved compliance and security.
Stateful packet inspection (SPI) firewall technology examines the packet header and destination port for authentication and checks the entire packet’s content before determining whether to allow its passage into the network. SPI firewalls can drop any packet that is identified as potentially dangerous and automatically blocks DoS, DDOS, and UDP Flood attacks.
Web filtering to block HTTP/HTTPS access
Intrusion prevention system (IPS)
Application control
Virus scanning and spam filtering
Network traffic monitoring and Co-Defense
A Compact x86 Network Appliance with Intel Processors Reinforces Internal Management
NU-840H is a real-world firewall based on a 4 Core Intel-branded processor, with 6 Gigabit Ethernet ports, firewall throughput up to 4.2 Gbps, and improved VPN throughput of 650 Mbps.
Supports SD-WAN
ShareTech supports SD-WAN with IPSec VPN, which promises to remove the constraints of legacy connectivity technology. Flexible WAN connectivity allows for the efficient use of bandwidth between sites and the data center by reducing latency and using multiple routes to help reduce costs. With ShareTech SD-WAN, geographic boundaries get erased, and all data of an organization stays connected. Employees will always have access to their data no matter what happens with their internet connections so that they'll never have to worry about missing important emails or ERP data.
Deep Packet Inspection (DPI) and Application Control
Unique DPI performs traffic signature analysis by inspecting all packets for new application signatures, scoring up the signatures, and appending them to the relevant database. More importantly, having recorded these collected data will be available for future audits.
Supports for protocols and applications, including video streaming, peer-to-peer communication, social networking, and instant messaging
Detailed control over file sharing, remote control, VoIP, online games, browsers, etc.
SSL/HTTPS inspection
Cloud database updates
Single-Pane-of-Glass Dashboard
The ShareTech dashboard is available through the GUI and presents a graphic view of the real-time system information. It allows administrators to have visibility into UTM information and includes server status, indicators for events, connection activity, and performance alters. The continuous monitoring allows the analyst to identify important data without having to log into multiple devices. Problems can be rapidly identified to increase potential concerns.
Complete VPN Solutions
VPN connections provide data confidentiality, data integrity, and data authentication. At the same time, popular protocols such as web, SMTP, and POP3 that contain packets transmitting within tunnels can be controlled.
Supports IPSec, PPTP, L2TP, SSL, and GRE Tunnels
Supports DES, 3DES, and AES encryption and SHA-1/MD5 authentication algorithms
SSL VPN mobility client for Android and Apple iOS
Supports Auto VPN (Server & Client)
Controls connectivity of remote sites from the central site
Central Management (CMS, Eye Cloud, and AP management)
A central management system (CMS) designed for multi-site network security appliance deployments allows administrators to remotely restart, reboot, and monitor devices. Moreover, Eye Cloud, a cloud service platform, provides users user-friendly interface to support instant equipment maintenance and management. It is an all-inclusive solution to monitor various networking appliances deployed in either external or internal networks such as UTM, wireless APs, or switches. When an anomaly occurs, administrators will be notified of the problem.
Features
1U x86 Rackmount Network Appliances Powered by Intel Processor
ShareTech NU Series adopts x86 platforms allowing UTM systems to execute multiple instructions in a single cycle. With its broad compatibility with existing operating systems and software, it provides steadfast security without any performance impact. Add-on connectivity modules offer excellent performance. Moreover, the NU Series supports restoring the operating system from a USB drive. The x86 employs a CISC approach for higher performance capabilities. Hence, advanced security features of UTM can be fully performed to protect business networks against multi-faceted cyber threats.
Anti-Virus
Clam AV is available by default for virus scanning which can detect millions of viruses, worms, and Trojans. Once suspicious emails are detected, the administrator can decide to delete or block them. Moreover, websites will be scanned once the function of anti-virus is enabled in policy. Customers may purchase Kaspersky protection for their security needs.
Intrusion Prevention System (IPS)
Built-in IPS inspects the packets from OSI layers 4-7 (transport to application layer) and blocks concealed malicious code and worms delivered in TCP/IP protocols. As soon as an attack is suspected, IT administrators will be notified immediately, and later an extensive range of reports will be available for analysis. ShareTech regularly updates the predefined attack signature database and makes it available as an IPS security package.
ShareTech Sandstorm (Malicious Programs Filtering System)
To detect unknown attached files, such as Word, Excel, PowerPoint, PDF, ZIP, or RAR format, IT administrators can apply ShareTech Sandstorm inspection with four types of security inspection: file hash, Web URL, domain, and IP. Threatening emails will be quarantined and will not have the opportunity to affect the operation of the email system.
WAF
To minimize the risks of web application attacks, an organization should adopt a multi-layered approach to web application security. A web application firewall (WAF) functions as an intermediary that monitors and controls incoming and outgoing traffic to and from a web application, detecting and blocking attacks before they reach the web application. It operates at the application layer (L7) and protects against cross-site scripting (XSS) attacks, SQL injection attacks, remote command execution (REC) attacks, and webshell uploads to avoid severe consequences.
IP Traffic Streams Analysis
Outgoing/incoming concurrent sessions, upload/download flow, and time duration are flow parameters collected for packet-based traffic analysis. Using a combination of pattern matching can determine whether an activity is performing normally or abnormally. If employees are violating the rules and exceeding more downloading flow, IT administrators are allowed to define the trusted IP list and take appropriate actions to block network access, limit maximum bandwidth, block ports on switches (Co-Defense), or simply receive a notification.
Anti-Spam and Shared Signatures
ShareTech NU Series employs multi-spam filters: ST-IP network rating, Bayesian filtering, spam characteristics filtering, fingerprinting, auto-learning, and personal B/W list. It also gives administrators the flexibility to enforce custom filtering. These help industries create their database by importing the latest spam updates. Following actions like forward, delete, and quarantine can be taken on the mail identified as spam. Moreover, the shared signatures mechanism shares the signature of an early receiver with the rest of the group so that higher spam detection accuracy can be obtained.
Mail Gateway
For companies that have deployed mail servers in their network environments but lack advanced filtering, NU Series can be placed at the gateway to secure your email and get simple and powerful protection from spam, viruses, and malware.
Content Filtering
IT administrators can configure Web filtering profiles that block URLs to inappropriate webpages like violence and pornography and hacking attacks like malware and viruses. Moreover, the NU Series filters out ActiveX objects, Cookies, or Java applets that may pose a security threat in certain situations. Both keywords and URLs of specified websites can be added to Blacklist and Whitelist.
User Authentication
In addition to local user authentication, more authentication methods are supported, such as Active Directory (AD), POPs, and Radius. These methods help to identify verified users and allow them to access accounts and networks securely. Unauthorized users will be blocked from accessing sensitive data and resources. Multiple authentications prompt administrators to respond to one or more authentication challenges. For example, local authentication is used for a single, isolated network, AD is used for on-prem Windows-based architecture, and POP3 and Radius are used for cross-platform.
Multi-Factor Authentication (MFA)
MFA is an authentication method that requires users to provide two or more verification factors than just a password to gain access to a resource. Users activate 2-factor authentication and install Google/Microsoft Authenticator on their smartphones. It generates a six-digit number, which changes every 30 seconds. Users must enter the code before it expires. Even traditional username and password combinations are getting less effective, MFA can be enabled for account management, online authentication, and SSL VPN to prevent costly security breaches.
Advanced URL Control and Database
Advanced URL database collects millions of URLs and updates every period. All these URLs and their contents were analyzed and classified, including Pornography & Violence, Network & Cloud Service, Organizations & Education, Security Risks & Criminal, Life Information, and Others. IT administrators can block any category in the database with ease without entering keywords or desired URL addresses one by one. By default, NU-840H contains 1-year URL license. Customers may renew the license for an instantly updated database.
Advanced Application Control and Database
To prevent data leakage and ensure regulatory compliance, access to unrelated applications during working hours should be controlled. The advanced application database contains 1000+ modernized applications like P2P, VOIP, GoToMyPC, Webpages, Games, Media Player, Bit Torrent, Foxy (Gnutella), stock market, Instant Messaging, Xunlei, Gator, Yahoo Manager, Virus and Malware, filename extension, Kazaa, Facebook, Zalo, etc. By default, NU-840H contains 1-year application license. Customers may renew the license for an instantly updated database.
AP Management
By supporting SNMP or Telnet/SSH, the NU Series can be a wireless controller, grouping remote wireless APs and assigning the same configurations. ShareTech provides greater flexibility in integrating different branded wireless APs. Admins can obtain brief information about login IP address, MAC address, the amount of time, and the number of users per SSID. Moreover, admins can debug, improve user experiences, and optimize wireless connectivity by remotely restarting an AP managed by firewalls.
Switch Co-Defense
ShareTech provides flexibility in integrating different branded switches. Admins can know the deployment of the switch architecture and the usage status of each node through the network topology. The Co-Defense feature keeps attackers outside the internal network. The IP address, MAC address, and attack time will be recorded to discover of the infected device instantly. If the traffic (such as abnormal traffic, sessions, and IPS) exceeds the limit quota, the system will notify the admins and close the abnormal port to minimize the impact.
QoS
QoS offers more agile bandwidth management for industries and organizations. Since bandwidth can be limited using source IP in both directions, all the servers and users can be configured with their minimum and maximum bandwidth. The remaining bandwidth will be allotted to the other users according to their configuration. Moreover, an efficient priority scheme can be available for minimum/maximum bandwidth guarantee.
Inbound/Outbound Load Balance
The NU Series supports outbound and inbound load balancing, providing businesses with at least 2 WAN links. Multi-homing load balancing is supported to spread a business's Internet traffic among multiple access links to increase the aggregate throughput and to divert traffic away from non-functional links when they fail. An additional 3G/4G/LTE USB can also be attached to one of the USB ports to add a backup wireless connectivity.
Dashboard (Optional)
The ShareTech dashboard is a single platform that can be used to track, analyze, and report on data in real time with the help of data visualization. It displays server status, Threat Intelligence Analysis (anti-virus, anti-spam, IPS, DOS Defense, URL control, APP control, WAF anomaly), dynamic sessions, flow analysis, WEB service, mail service, GEO IP, DNS query, etc. Drill-down provides deeper insights into the data you need to analyze. Reports can be directly exported in PDF or PNG format which helps IT administrators track and diagnose.
VPN
Remote-access VPNs allow secure access to corporate resources by establishing an encrypted tunnel across the Internet. ShareTech offers IPSec, PPTP, L2TP, and SSL VPN technologies on a single platform. Site-to-site IPsec VPN allows headquarters and their branch offices to be on the same network and share resources among offices. Point-to-point PPTP VPN, natively supported by Windows, is easy to set up and maintain and requires user-level authentication. L2TP which encrypts the authentication process and avoids your transmission being intercepted is a bit more powerful than PPTP. Moreover, SSL VPN provides remote-access connectivity from almost any Internet-enabled location using a web browser and its native SSL encryption.
Specification
BASIC FIREWALL
|
l Routing: Supports static/dynamic route, designated gateway group, and default gateway.
l IPv4/v6: Supports IPv4, IPv6, and IPv4/IPv6 dual-stack. Admins can quickly swap between at the click of a button.
l IEEE VLAN 802.1Q: The Intranet can be divided into multiple segments, isolating different traffic logically.
l GEO IP: Geo IP restriction allows admins to configure a geolocation-based policy by specifying source and destination locations.
l Network Services: The NU Series supports Client/Server DHCP, DDNS, SNMP, and DNS Server and Proxy.
l Denial of Service (DoS) and Distributed Denial of Service (DDoS) prevention: TCP SYN flood attacks, UDP flood attacks, and ICMP flood attacks can all be mitigated by blocking bad bot traffic before it reaches the targeted site.
l VPN: Supports IPSec, PPTP, L2TP VPN, SSL VPN, and IP Tunnel.
l SD-WAN: SD-WAN can combine from the designated gateway or VPN tunnels, enable optimized traffic routing over multiple transport links, and select a route for applications based upon configured policies and priorities.
l IP Tunnel: A secure VPN can be created via IP Tunnel between two ShareTech UTMs, and traffic passed through the VPN can be monitored.
l Auto IPSec VPN: To create an IPSec VPN between two sites having massive/dynamic IP addresses, Auto VPN can reduce the complexity of deployment and increase stability.
l Loggings: The NU Series includes loggings for system operation and status, wizard, login/logout, system anomaly & control, configuration, networking, policies, objects, services, advanced protection, IPS, WAF, email security, content record, VPN, etc.
|
NETWORK & EMAIL PROTECTION
|
l Clam AntiVirus: Supports ClamAV, an open-source anti-virus engine that detects millions of trojans, viruses, malware, and other malicious threats.
l Kaspersky AntiVirus: Supports built-in 1-year Kaspersky license (NU-860 models and above)
l Intrusion Prevention System (IPS) & Signature Database: Supports IPS that proactively detects intrusion behaviors and matches the signature database. IPS Protection’s severity level is defined as LOW, MEDIUM, and HIGH.
l Sandstorm: The NU Series supports four types of security inspection: file hash, Web URL, domain, and IP.
l WAF: Cyberattacks are classified into 19 categories. The NU Series supports a host-based WAF that sits between external users and web applications to block and log requests.
l Anomaly IP Analysis: Flow/behavior-based anomaly detection allows both up and down sessions to be analyzed. An anomaly can be blocked, recorded, and notified to subscribers.
l Email Filtering & Logging: The NU Series supports incoming/outgoing/received email scanning for virus/spam/auditing/backup, queries on SMTP communication logs, infected email quarantine, and queries on email logs.
|
WEB PROTECTION
|
l Transport Layer Security (TLS): TLSv1.3 inspection on IPv4 and IPv6
l Deep packet inspection (DPI): DPI is a form of packet filtering that locates, classifies, and reroutes packets. It has higher detection accuracy than port-based TCP/UDP.
l WEB Service: Supports HTTPS scanning in anti-virus, SSL certificate installation, loggings for HTTPS proxy action, and certificate allowlist.
l URL Filtering: A third-party database sorts malicious URLs into six categories. Users can renew the license to get real-time updates or periodically apply firmware upgrades for free updates.
l Application Control: A third-party database sorts applications into 17 categories. Users can renew the license to get real-time updates or periodically apply firmware upgrades for free updates.
|
ACCESS CONTROLS & FLOW MANAGEMENT
|
l Authentication: The system can authenticate users with accounts on hosts, POP3/IMAP, Radius, and AD servers. Admins can add users to groups, view logs, and get status information.
l Two-Factor Authentication (2FA): Two-factor authentication can add an additional layer of login security to user accounts, authentication, and SSL VPN access. Users can download mobile security apps (Google/Microsoft authenticator) to generate codes for 2FA.
l Load Balance: Inbound and outbound can be reviewed to make sure traffic patterns are expected. Admins can set up traffic rules in priority order so that all traffic can be evenly distributed among multiple WAN links.
l QoS: Ensure an adequate bandwidth for high-priority tasks and applications, maximum bandwidth limits, and priority levels.
|
INTRANET PROTECTION
|
l Switch Co-Defense: Common SNMP switches and advanced L2/L3 switches (a topology included that gives an instant view of the operational status and speed of each port) can be centrally managed. Zyxel switches support IP Source Guard (static IP-MAC-Port binding) to perform DHCP Snooping. Moreover, the PoE schedule can be configured via UTM to manage power consumption.
l AP Management: It displays the status of AP and online users. Quick deployment (config. files) can be delivered for large numbers of access points.
l Intranet Protection: ARP spoofing prevention, IP & MAC spoofing prevention, notification, and block status.
|
CENTRAL ORCHESTRATION
|
l Cloud-Based service system (Eye Cloud): ShareTech-branded devices can be remotely monitored and efficiently maintained. Multi-region Wireless APs and switches can be accessed via UTMs as well. Flexible options (Free, VIP, and Distributor) are offered to match requirements. HQ admins can customize tasks based on sites and then select UTM series, devices, config. files/firmware, and intervals. Tasks can be published and targeted to relevant locations in real time. (Supported version: NU v9.0.2.4 or above)
l Server-Side and Client-Side CMS: The NU Series supports regularly passing data from the client side to the server side. The system makes periodic backups (config. file) automatically.
l Dashboard: A real-time Dashboard reporting module is built in the NU series (Available in SSD storage models) (optional module for NU-840H and NU-860H), showing a graphical presentation of the current status.
|
OTHERS
|
l Operation Mode: Transparent Bridge, Transparent Routing, and NAT.
l Operation Management Interface: Management interface and Dashboard GUI. (Available in SSD storage models) (optional module for NU-840H and NU-860H)
l Diagnostic Tools: Standard net tools such as Ping, Traceroute, DNS lookup, and port scanners are available to help users identify and fix connection problems. Test widgets like IP Route, Wake Up, SNMP, and IPv6 tools can test your connection and readiness.
l Remote Log Server: Log data can be forwarded in the Syslog format to a remote Syslog server that receives, categorizes and stores log messages for advanced analysis.
l Initial Setup Wizard: The wizard simplifies the configuration process by setting up LAN, WAN, URL Blacklisting, Security Settings, and Email Management. (Available in NU-840 and NU-860 models)
l Distributed administration: Authority can be delegated to one or more administrators, such as Admins and assistant admins. Admins can assign three types of privileges (READ, WRITE, and ALL privileges).
l Custom Password Policy: Password length and complexity requirements, unable to reuse old passwords, and change passwords at regular intervals.
l Interrupt: Hardware interrupts (via CPU) and software interrupts (via ZONE) are supported, allowing the CPU to perform specific tasks. IT administrators can optimize system performance and troubleshoot issues more effectively.
l Offline Signature Update via USB drives: Supports the following items: IPS, the default APP Blocklistings, anti-virus (ClamAV & Kaspersky), and Sandstorm.
l Backup & Restore: Offers USB system backup, system backup, and auto backup (Available in SSD storage models). A system recovery can be ready to minimize the damage imposed by an incident.
l UPS: Provides backup power as quickly as possible in the event of data loss and some protection from power quality issues.
l E-Bulletin Board: Ensure all users read important messages before accessing a webpage.
l LAN Bypass: Supports at least 1 pair of LAN bypass as a fault-tolerance to protect business communication in the event of a power outage. (NU-860 models and above)
l High Availability (HA): Supports Hot-Standy (Active-Passive) mode.
l Web Interface Languages: English, Traditional Chinese, and Simplified Chinese.
l LCM Display: Equipped with a parallel LCM display with 4-key buttons. (NU-860 models and above)
l Warranty : Warranty terms vary by region. Please contact our local distributor for specific details.
|
Compatibility List
Co-Defense Switch Compatibility List
SNMP
。AG-2824T
。ML-9324
。ML-9308
。3Com-4210
。GS1920-48HP
。GS1920-48
。GS1920-24HP
。GS1920-24
。GS1900-24
。GS1900-8HP
。GS1900-8
。XS1930-10
。XS1930-28HP
Switch
。Cisco3560e
。Cisco3750
。H3C-S5100
。H3C-S7506R
。SGI-2404
。Juniper-ex2200
。ML-9528
。GS2210-48
。GS2210-24HP
。GS2210-24
。XGS3700-48
。XGS3700-24
。DGS1510-28X
。Cisco-C2960L-24TS-LL
。GS2220-28
。GS2220-50
。XGS2210-52
AP Management Wireless Acess Points Compatibility List
。NWA5121-NI
。NWA5123-AC HD
。NWA1123-ACv2
。NWA1123-ACv3
。NWA1123-AC HD
。NWA1123-AC PRO
。NWA110AX
。NWA50AX
。NWA90AX
。WAX510D
。WAX610D
。Netgear WAC510
3G/4G USB Compatibility List
。DLINK DWM-222 A1
。HUAWEI E3372h
。HUAWEI E161 (3G only)
Uninterruptible Power Supply (UPS) Compatibility List
。APC Smart-UPS 3000
。APC Back-UPS Pro 700
。APC Back-UPS 1100
。Flight Technic FT-1000BS
。EATON 5E 650