Sign in
Ningxia Region | Beijing Region
Your Saved List Sell in Amazon Web Services Marketplace Marketplace Global Region Amazon Web Services Home Help

Hillstone CloudEdge - 5.5R8P6

Hillstone CloudEdge - 5.5R8P6

Sold by: 西云数据 Latest Version: 5.5R8P6

This version has been removed and is no longer available to new customers.

Product Overview

1. Fully adaptable software firewall
In a cloud computing environment, the user's computing, storage, and data resources are all virtual running on the server
On board, when considering the design of security protection, Hillstone CloudEdge can be implemented quickly on the virtual machine
Live deployment, supporting mainstream virtualization monitoring in VMware, KVM, Hyper-V, XEN, etc.
Runs on a device and can be connected to a virtual network in series or on a single arm (e.g. virtual application server front end)
A gateway for a VPC network, or a boundary gateway for a VPC network), provides specialized services for virtual networks or applications
Perimeter network security protection function.
Deploying devices in the form of virtual machines can overcome the limitations of physical firewalls in a cloud computing environment
It can be deployed closer to the VM to filter the internal traffic of the VM host to achieve
At the same time, it is safe and protected for north-south and east-west traffic. At the same time, users can connect according to the network
Build requirements, flexibly allocate and manage network resources, etc., and can flexibly migrate and recharge as needed
Leverage the advantages of cloud computing.
2. Has professional NGFW safety protection functions
Hillstone CloudEdge Computing Firewall has the same operating system as NGFW. It has rich network security protection functions, protects against cyber threats, and can meet many enterprise branches and public clouds
Cybersecurity requirements in tenant environments.
● It has fine application management and control, which can provide users with multi-dimensional application risk analysis and screening,
And flexible security controls, including policy blocking, session restrictions, application draining, and intelligent traffic
management etc. At the same time, it also has intrusion prevention, virus filtering, attack protection, links and servers
Functions such as load balancing and NAT meet customer requirements for secure access, attack protection, and application identification
and requirements such as control.
● It has VPN access capabilities, including IPSec VPN, SSL VPN, L2TP VPN,
A secure encrypted tunnel can be established with a physical firewall or cloud computing firewall to ensure remote security of data
Full transmission. It can provide network administrators with a secure access channel for remote back-office management, or it can be mixed
The establishment of Heyun provides a safe, reliable, and cost-effective secure interconnection channel.
● Has HA networking capabilities to meet configuration and session synchronization requirements to achieve high reliability
Redundant deployment ensures uninterrupted continuous operation of the user's business.
● Support collaboration with the Hillstone Threat Intelligence Center to achieve cloud-based threat intelligence capabilities and
Local security devices work together to improve the threat detection and defense capabilities of local security products.



Sold by


Operating System

Linux/Unix, Other 5.5R8P6

Delivery Methods

  • Amazon Machine Image

Pricing Information

Usage Information

Support Information

Customer Reviews