Search ...

Close

  • Products
    • Capacitors
      • Power Capacitors
        • High voltage capacitors
        • Electronic regulator for compensation of reactive energy
        • Low voltage power factor correction capacitors
        • Induction heating capacitors
        • Capacitors for audio-frequency remote control
      • Capacitors for Renewable Technology
      • Capacitors for consumption devices
        • Components for radio-interference suppression
        • Filters for radio-interference suppression
        • Capacitors for use in automotive industry
        • Capacitors In Electronics
    • Low Voltage Switchgear
      • Industry installations
        • Motor Protection Switches
        • Contactors
        • Overvoltage Protection
        • Moulded Case Circuit Breakers
        • Proximity switches and sensors
          • Inductive proximity switches
          • Capacitive proximity switches
          • Inducitve proximity sensor with analog output
      • Building installations
        • Bistable Switches
        • Installation Contactors
        • Residual Current Circuit Breakers
        • Miniature Circuit Breakers
        • Switch disconnectors
        • Time and monitoring relays
          • Monitoring and control relays
          • Time relays
    • Electrical Measuring Instruments
      • [NEW SERIES] Universal measuring devices
        • Power monitoring devices
        • Measuring/Supervision Transducers
      • Universal measuring devices
        • Power monitoring devices
        • Measuring/Supervision Transducers
        • Accessories
          • Shunts
      • Energy meters
        • Smart energy meters
        • Energy Meters with Power Display
      • Communication Converters
      • Synchronization devices
      • Analogue meters
        • Digital Meters with LED Display
      • Portable meters
        • Portable electric meters
        • Educational Programme
      • Hour meters and pulse counters
      • Current Measuring Transformers
      • Software
    • Power Automation and Protection
      • Protection And Control Relays
      • Automation and SCADA
      • System Communication Equipment
      • Software
    • Professional Batteries
      • Zinc air-alkaline batteries
      • Zinc air-saline batteries
    • Cores
    • Antenna Systems
      • Radio Antennas
      • TV antennas
        • LOG Antennas
          • UHF antennas
          • VHF antennas
          • VHF/UHF antennas
        • YAGI Antennas
          • TV YAGI UHF Antennas
          • YAGI UHF - series DTM
          • YAGI UHF - series DTX
          • TV YAGI VHF Antennas
        • Indoor Antennas
      • Mobile and Data Networks Antennas
        • 400 MHz (TETRA, LTE 450, LoRa 433)
        • 700-900 MHz (2G/3G/4G-LTE/5G)
        • 700-3800 MHz Wideband (2G/3G/4G-LTE/5G)
      • Antennas Accessories
    • Telecommunications
      • Microwave Transmission
      • Optical Transmission
      • Power Line Carrier Communications
    • Software
  • Solutions
    • ISKRA SHIPYARD Šibenik
    • Traffic solutions
      • Urban traffic automation
      • Motorway traffic automation
      • Smart traffic
      • Smart Street lighting system
      • Railway Traffic Automation
      • Recent Projects
    • Energy solutions
      • Digital grid
      • Distributed Smart Grid Data Monitoring Solution
      • Site Energy Monitoring Solution
      • Power and Industrial Automation
      • Power System Protection and Control
      • Power Factor Correction
      • Smart Grid
    • Telecommunication solutions
      • Microwave transmission solutions
      • Optical Transmission Solutions
      • IP Networks
    • Vehicle solutions
      • Electric vehicle charging stations
      • Electric vehicle solution
    • Tools and machine manufacture
    • Electroplating
      • Nickel Plating
      • Chrome Plating
      • Silver Plating
      • Tin Plating
      • Acid Zinc Plating
      • Copper Plating
    • Laboratories
  • About us
    • Iskra’s Strategic Milestones
    • Our Mission and Vision
    • Virtual show room
    • Quality policy and environmental management
    • Downloads
      • General Catalogues
      • General Purchase Terms and Conditions
      • General Sales Conditions
    • Company Information
    • Contact
      • Where We Are
      • Become our distributor
      • Become our supplier
      • Iskra Makedonija
    • Sustainability
    • Terms and conditions
  • FAQ
  1. Solutions
  2. Telecommunication solutions
  3. IP Networks
  4. IP Security

IP Security

IP Security

IP Security

The enormous expansion of communication technologies and instant access to information over Internet made network security an important or even the most important network quality. A normal firewall in a network and between the networks does not suffice for traffic control and traffic limiting anymore. Demand for better network security brought with it new security appliances and new security tools. Furthermore, as the number of security related appliances grew, the need to consolidate a number of devices and tools into a single appliance has become apparent and thus Unified Threat Management (UTM) firewalls were born. UTM firewalls not only limit traffic and allow a secure remote access but also enable Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack protection, Intrusion Prevention System (IPS) functionality, antivirus functionality, antispam functionality and webfiltering functionality.
Enterprises, financial institutions and Service Providers commonly use special IPS and Deep Packet Inspection (DPI) appliances besides the integrated UTM appliances. They are used with extremely high bandwidth connections and can be integrated into business systems.
We install effective security solutions for enterprises and Service Providers made by the world's leading manufacturers that are being consistently graded as the best in their class. Our confidence comes from years of experience which enable us to design, implement and maintain security solutions that meet the customer's needs and are simple to manage.


A UTM firewall test case


The problem
A company has HQ and a few dozen branch offices. These branch offices need to be securely connected to the HQ where the servers and the databases are located. There is also a growing need for remote work. The new solution should have a high level of security and its implementation and maintenance should be cost-efficient. The solution should support a future transition to IPv6.
The company also needs a secure Internet access that will be checked for viruses, worms, spam, etc. Also, a non-productive web use during business hours should be limited up to a certain degree.


The solution
Routers or firewalls that support IPsec VPN functionality will be installed at the remote offices and each of them should have an Internet connection. A fast Internet connection and a more powerful router or a UTM firewall should be installed at the HQ that will function as an IPsec tunnels concentrator. The VPN network will be built around a hub-and-spoke model. The VPN tunnels will be encrypted using a 3DES or AES encryption. Digital certificate authentication will be used for increased security. Furthermore, for better security and simpler management all the remote offices' communications will go through the HQ.
 
The Internet traffic is being checked by the UTM firewall for possible malicious traffic (viruses, worms, spam, etc.). The company's security policy defines the limitations that are imposed by the UTM firewall upon the non-productive web use.
The VPN client functionality is enabled on the firewall, which gives remote users a secure access to the HQ's servers. The authentication and access limiting for the VPN clients can be integrated with the internal AD/LDAP/RADIUS servers. VPN client functionality is also used to allow business partners access to the company's network.


The Advantages
By using a broadband Internet connection and an IPsec VPN solution the customer avoids using costly leased lines. Security and integrity of the data that is being transferred between the HQ and the remote offices is nonetheless guaranteed, which means that the IPsec VPN network can be used for confidential business data traffic between the branch offices. The company can use client/server applications to lower the necessary amount of computer hardware at the remote offices.
The benefit of the UTM firewall is a secured network that is protected from viruses, worms, spam, etc. at all business locations. Non-productive web use during business hours is also effectively limited.

 

Traffic limiting and prioritization using a DPI (Deep Packet Inspection) technology test case
The company has several offices that are connected to the HQ using a VPN network. The business is facing a problem of occasional errors when working with interactive applications (business applications, VoIP, videoconferencing, etc.). The network is being protected by a stateful firewall that is limiting traffic. Even though a very restrictive policy is being enforced, sometimes the network slows down and some downtime is noted.


The solution
When inspecting packet traffic the normal firewalls only see an IP address and its header. That means that they classify any TCP port 80 as an allowed http traffic, even when it really is a Peer-to-peer (P2P) traffic that is using up a lot of bandwidth. But the DPI (Deep Packet Inspection) appliance monitors the network traffic on higher layers of the ISO OSI model (layers 4 to 7). After installing of a DPI appliance in the network the company can use the appliance to prioritize important traffic (VoIP, video, business applications) and limit the bandwidth to the less important applications (BitTorent, Youtube, etc.). It can also deny any traffic for these unwanted applications. The DPI appliance can analyze static and dynamic port traffic, analyze the behavior of various applications and recognize their signatures.


The Advantages
By installing a DPI appliance the customer gets a faster and more reliable network. The appliance's tools can be used to control traffic and make reports that allow a thorough analysis of the entire network traffic. The DPI appliance also identifies and blocks complex network threats (DDoS, DoS attacks, etc.) that commonly are not stopped by the normal firewalls.

Back Solution request

Solution request

Sign Up For Our E-News

Newsletter signup

designed and developed Kabi