SERVICES

Services

F5 Cloud-Based Information Security Application Solution

Service Introduction


As influenced by the advent of cloud service era, enterprises have become more and more open to cloud services. Unlike in the past when enterprises only move non-core business tasks to the cloud, nowadays more and more enterprises are gradually moving their core business tasks there and building enterprise private or hybrid cloud to provide application services, and security has become the most important function module as enterprises shift to the cloud. The information security protection mechanism of cloud services focuses more on the application itself and the availability of cloud platform, which is different from traditional data centers that focus on each layer of physical security.

Chief cloud-based information security application solution deploys its infrastructure in Chief Cloud IDC and combines cloud-based F5 applications to provide enterprise customers with a cloud solution that is easy to deploy and complies with enterprise information security guidelines. Enterprise users are able to enjoy international grade of information security services provided by F5 applications with only monthly rental, and use applications such as load-balancing, firewall, WAF, anti-DDoS and mobile secure access. Chief also provides license rental of software-version F5 applications so that it can fulfill customer’s overall information security requirement in a hybrid cloud structure.

Service Structure

 

Service Features

F5 Cloud-Based Information Security Application Solution

  • Enjoy international grade of information security services provided by F5 applications.
  • Integrate with Chief Cloud Platform for easy deployment.
  • Only monthly rental is required, and the cost can be expensed.
  • Flexibly choose between different information security applications such as F5 SLB, WAF, FW, and SSL.
  • 7x24 customer service is available at Chief Telecom.

 

License Rental of Software-Version F5 Applications

  • Enjoy international grade of information security services provided by F5 applications.
  • Licenses can also be used on the user’s private cloud environment (VMWare/KVM platform).
  • Monthly rental solution is available at Chief Telecom, and the cost can be expensed.
  • Flexibly choose between different information security applications such as F5 SLB, WAF, FW, and SSL.

 

Service Specifications

Service

LTM (Server Load Balance)

AFM (Network Firewall)

ASM (Web Application Firewall)

APM (Remote Access VPN)

Bandwidth

200M/1G supported

200M/1G supported

200M/1G supported

200M/1G supported

Information Security Functions

Server Load Balance

  1. Application load balance.
  2. Content cache.
  3. Compression.
  4. IP geo location network access policy.

SSL Offloading

Network Firewall

  1. Network firewall.
  2. Dynamic IP blacklist.
  3. NAT gateway.
  4. IPSec site-to-site VPN.

L3/L4 DDoS Protection

  1. L3/L4 DDoS protection.
  2. IP geo location network access policy.
  3. IP reputation network access policy.

NAT

  1. Network Address Translation.
  2. NAPT, DNAT, PBA.

Web Application Firewall

  1. Web application firewall.
  2. OWASP Top 10 protection.
  3. WAF policy self-learning engine.
  4. XML firewall.
  5. IP geo location network access policy.
  6. Web socket application protection.

L7 DDoS Protection

  1. Web application DDoS protection.
  2. BOT attack detection.
  3. Highly-loaded webpage detection.

Remote Access VPN

  1. SSL VPN.
  2. IPSEC site-site VPN.
  3. Multi-factor authentication integration.
  4. Mobile devices access gateway.

Cloud Federation SSO

  1. Single sign on (SSO).
  2. Cloud application ID integration.

 

Service

Better Version (LTM+AFM+DNS)

Best Version  

Bandwidth

200M/1G supported

200M/1G supported

Information Security Functions

Server Load Balance

  1. Application load balance.
  2. Content cache.
  3. Compression.
  4. IP geo location network access policy.

SSL Offloading

GSLB Multi Live Datacenter

  1. Multi live datacenter
  2. IP geo location network access policy.

Intelligence DNS Service (DNS Express/DNS Cache)

  1. DNS offloading.
  2. IP geo location network access policy.

Network Firewall

  1. Network firewall.
  2. Dynamic IP blacklist.
  3. NAT gateway.
  4. IPSec site-to-site VPN.

DNS DDoS Protection

  1. DNS flooding protection.
  2. DNS query protection.
  3. IP geo location network access policy.

DNS Firewall

  1. DNS firewall protection policy.
  2. IP geo location network access policy.

L3/L4 DDoS Protection

  1. L3/L4 DDoS protection.
  2. IP geo location network access policy.
  3. IP reputation network access policy.

NAT

  1. Network address translation.
  2. NAPT, DNAT, PBA.
  • LTM function.
  • DNS function.
  • AFM function.
  • ASM function.
  • APM function.
  • Free consulting service of 4 hours for basic information security implementing and planning.


Target Users

  • Those who need to build private cloud structure on public clouds.
  • Those who need to deploy information security protection for management on private cloud environment.
  • Those who need to self-manage and constantly adjust cloud firewall policies.
  • Those who need to self-manage cloud applications and deploy load-balancing.
  • Those who need to deploy WAF on cloud applications.
  • Those who hope to reduce the capital investment on enterprise information security equipment.
  • Those who need to have enterprise cloud applications in compliance with information security guidelines.


How to Apply

  • Apply through Chief Telecom’s sales representatives directly.
  • Call Chief Telecom Customer Service Center at 070-1017-1800.
  • Leave your contact methods at Chief Telecom’s official website, and a dedicated contact window will be in touch.