Anti-DDoS Optimization

WiJungle Anti-DDoS Standalone & Dedicated appliance now supports : 1. Load Balance : Support both TCP and UDP based application including lightweight MQTT, Web Socket or other protocols for machine to machine connectivity between IoT appliances such as small sensors, mobile devices etc.. Allows auto-discover and auto-scale workloads deployed in public […]

IPS Optimization

WiJungle IPS now supports : 1. Intrusion Prevention System: WiJungle IDPS have signature and anomaly base intrusion detection and prevention system with more than 98000+ signatures. It can detect, respond to and alert any unauthorized activityas well as detect incidents that originate from inside the network perimeter as well as from outside […]

How RSVP works?

Resource Reservation Protocol (RSVP) is a transport layer protocol designed to reserve network resources and can be used to deliver specific levels of QoS for application data streams. Resource reservation enables businesses to divide network resources by traffic of different types and origins, define limits, and guarantee bandwidth. In WiJungle, Navigate […]

Optimization

WiJungle proprietary operating system having separate data,control and management plane now supports : 1. FastPath packet optimization : it improves firewall throughput performance by automatically putting trusted and secure packets on the fast path where they don’t have to be processed by the firewall policy engine for identification and destination. […]

Supported WAN Protocols

Your corporate environment is connected to the Internet, so how does it work? Chances are you use one of these 3 WAN Protocols: HDLC, PPP, or Frame-relay. Let’s explore how they works. HDLC HDLC stands for High-Level Data Link Control protocol. It is a bit-oriented, synchronous data link layer protocol […]

WAF Optimization

WiJungle now supports : 1. Load Balance : Support both TCP and UDP based application including lightweight MQTT, Web Socket or other protocols for machine to machine connectivity between IoT appliances such as small sensors, mobile devices etc.. Allows auto-discover and auto-scale workloads deployed in public cloud along with GSLB. Prefetch […]

How to create Route based IPsec VPN

In this mode, routing table can be used to send the specific traffic into the IPsec connection. It attaches an Virtual Tunnel Interface(VTI) to a single connection which is dynamically added into interfaces. We can perform below operations on this interface: 1. Set Interface IP Address 2. Use in Static […]

DPI SSL Sessions & TLS/SSL throughput

Concurrent SSL DPI Sessions It depicts the maximum number of concurrent SSL Decryption session an appliance can support. Please find the DPI SSL Sessions values as below: 1. U1000 – 380,000 2. U1500 – 390,000 3. V2000 – 400,000 4. U3500 – 600,000 5. U5000 – 640,000 6. U7500V – […]

How to configure 802.3ad Link Aggregation?

Link aggregation(802.3ad) allows you to combine two or more physical interfaces together to form an aggregated link. This new link has the bandwidth of all the links combined. If a link in the group fails, traffic is automatically transferred to the remaining interfaces with the only noticeable effect being reduced […]