GATESUP

Layer 2 VPN Tunneling

Why Do We Need gATESUP?

TJust as there is road traffic in the world for people to move from one point to another, the online environment has its own traffic system for the transfer of data. These data, build up over time; During transmission, it may encounter some threats such as theft, copying, or misuse. Therefore, confidentiality and security should be given importance. System and network security are especially important for users who provide remote access. Gatesup provides high data security and features such as encryption algorithms, decryption, VPN, and multiple authentications to data between two different networks where two-way data transfer is provided. With the masked IP, it ensures the protection of important information on your computer, such as your location information, from malicious people. It can also work with different security products within the network. In addition to security, it makes it possible to access inaccessible remote network addresses using the infrastructure of other protocols. For example, it removes georestrictions so you can pretend to be in other countries and access files more easily. Places incompatible data into another compatible data format. Additionally, it can be supported on a wide variety of platforms while providing cost-effective access for remote workers. Due to It being popular and easy, there’s plenty of support information which is available. It contains flexible, lightweight, and customizable features. So those qualifications make GATESUP much more stable and reliable.

0%
of companies started working remotely with VPN.
0%
VPN usage by companies increased by

Added value

GATESUP is a new generation Layer 2-3 certificate-based VPN solution that is equipped with the latest security technologies, has a web-based management interface and runs on original software. It provides fast, controlled, and secure data transfer with the 3G LTE support module that will meet the needs of remote working. It allows privacy, security, visualization, reporting and tracking of data.It has simultaneous multi-authentication capability and dynamic IP address. It allows all tunnel configurations and stable product management on a single platform. Active-active and active-redundant working structure will bring a control mechanism according to the weight and condition of the line.

While supporting the MESH topology, multiple tunnels can be used as a single tunnel, and while tunnel traffic is determined, the tunnels have simultaneous operation and load distribution. The quality of the tunnel line can be measured. With CPU Core, tunnels can be connected and looping on the tunnel is prevented. Yetkilendirmeler ve erişim kısıtlamaları içeren yönetim politikalarına sahiptir.It has management policies that include authorizations and access restrictions. Allows the use of LAG and LACP. Performs advanced network segmentation.

BENEFITS & FEATURES

Next generation Layer 2 VPN solution running on original software equipped with the latest security technologies

GATESUP is a cyber security platform that provides high-security tunnel access between two points and is equipped with high-security technologies. It provides solutions for needs such as multicast or unicast data transmission, single VLAN or multiple VLAN transport, secure transfer of span (mirror) traffic to another point and increasing the domain of security products. It creates a layer that uses certificate-based, high encryption algorithms and provides high performance.

CERTIFICATE-BASED LAYER-2 VPN SOLUTION

GATE PLATFORM

  • Rapid data transfer with controlled UDP
  • Certificate-based high security and certificate management
  • Policy generation on the basis of source, target, and service on the firewall module
  • Faster transmission in Multicast, Unicast, and Span traffic types
  • Easy configuration with the web-based management interface
  • Creating VLAN id-based policy with VPN AWR
  • Visualization and reporting of traffic and statistical data
  • ZTP support with central management module
  • Support for multi-VLAN transport and STP protection against loop formation
  • Easy scaling with Docker architecture

GATE TUNNEL

  • Multiple tunnels can work like a single tunnel
  • Ability to distribute traffic between multiple tunnels with SD-WAN approachcc
  • Reserves some tunnels in case of need
  • Ability to assign CPU cores separately for each tunnel
  • Ability to write routing policy based on source and target
  • STP protection in loop situations that may occur on the tunnel
  • Ability to assign tags for Native VLAN
  • Ability to control traffic on the basis of VLAN id and MAC
  • Multiple port use for a single tunnel or Team tunnel
  • Ability to generate certificates and implement revoke operations
  • Ensuring sensitive data privacy with TLS 1.3

SYSTEM SETUP

SYSTEM SETUP

LAYER 2 VPN

LAYER 2 VPN

  • CENTRAL POLICY MANAGEMENT
  • CENTRAL TUNNEL MANAGEMENT
  • CENTRAL CERTIFICATE MANAGEMENT
  • HIGH LEVEL SECURITY
  • FAST AND SECURE TRANSMISSION
  • EASY DISTRIBUTION (ZTP)
  • CYBER HYGIENE COMPATIBILITY

  • CENTRAL POLICY MANAGEMENT
  • CENTRAL TUNNEL MANAGEMENT
  • CENTRAL CERTIFICATE MANAGEMENT
  • HIGH LEVEL SECURITY
  • FAST AND SECURE TRANSMISSION
  • EASY DISTRIBUTION (ZTP)
  • CYBER HYGIENE COMPATIBILITY

SYSTEM SETUP

SYSTEM SETUP

Working on cost-effective customized hardware needed in industrial environments, GATESUP can also work on virtualization platforms (VMware, Hyper‐V, KVM).

  • Software updates are made via web panel or SSH.
  • System resource usage and traffic statistics on the interface can be viewed via SNMPv3.
  • Records can be transferred to SIEM solution via Syslog.
POINT 1 (CENTER)
  • Fixed IPv4 address
  • Strong encryption and certificate validation with cryptographic algorithms
  • Rapid data transmission with TLS 1.3 Controlled UDP for data privacy and integrity
POINT 2 (BRANCH OFFICE)
  • Dynamic IPv4 address
  • Strong encryption and certificate validation with cryptographic algorithms
  • Fast data transmission with TLS 1.3 Controlled UDP for data privacy and integrity

NETWORK DESIGN

NETWORK DESIGN

Your Content Goes HereMultiple VLAN transport has been done over WAN and both points can communicate in the same Broadcast domain.

Real traffic, multicast traffic, unicast traffic and mirror traffic can be carried over the network design

Your Content Goes HereMultiple VLAN transport has been done over WAN and both points can communicate in the same Broadcast domain.

Real traffic, multicast traffic, unicast traffic and mirror traffic can be carried over the network design