Skip to main content
Types of firewalls
Last update:

Types of firewalls

You can rent two types of firewalls:

Comparison of hardware and virtual firewalls

HardwareVirtual
In what form is providedRack-mounted, publicly and locally networked firewallLicensed firewall image.
You deploy the image yourself in the product of your choice — on a cloud server, public or private cloud based on VMware
FSTEC certificationType A certificates (Continent and UserGate models are certified)Type B certificates
Change configuration (number of vCPUs, RAM and disk size)Order another model and reconfigureOrder service again and reconfigure the server on which the image is deployed. No reconfiguration required
Connectivity with protected infrastructure in one private subnetPossible with dedicated servers in the same pool. In other cases, you must use global routerPossible with cloud servers in the same pool or virtual machines in the same VMware organization to organize connectivity. In other cases, you must use global router
What is included in the priceHardware firewall with public addressFirewall image with license for selected functionality. Infrastructure on which the image is deployed is charged separately

Hardware firewalls

SelectelFortinet FG-100EFortinet FG-500EUserGate C150UserGate D200UserGate D500Cisco 5508Continent 4 IPC-R550CheckPoint Quantum Spark 1800
DOE Throughput,
Gbps
4.97,4363.818200.567.5
17 for 1518 UDP
IPS throughput,
Gbps
0.930.41.820.12525.5
IPSec VPN throughput,
Gbps
1,96420314160.17514
SSL-VPN throughput,
Gbps
2.260.255314160,1252
Available interfaces2×1GE RJ4516×1GE RJ458×1GE RJ45
2×10GE SFP
8×1GE RJ455×1GE RJ45
2×1GE SFP
5×1GE RJ45
2×1GE SFP
8×1GE RJ454×1GE RJ45
2x10G SFP
2xCombo RJ45
2xCombo SFP
16×1GE RJ45
FSTEC Certification

Virtual firewalls

In order for throughput to reach the advertised values, the server on which the image will be deployed must meet configuration requirements.

UserGate VE100UserGate VE250UserGate VE500UserGate VE1000UserGate VE2000UserGate VE4000UserGate VE6000
DOE bandwidth, UDP,
Gbps
0.889101111,512
Recommended number of usersup to 100up to 250up to 500up to 1,000up to 2,000up to 4,000up to 6,000
Simultaneous TCPsessions2 000 0002 000 0005 000 0008 000 00016 000 00020 000 00024 000 000
New sessions per second24 000100 000120 000130 000150 000155 000160 000
SSL Inspection,
Gbps
0.050.30.320,350.60.650.7
IPS throughput,
Gbps
0.61.31.351.41.82.12.4
Content filtering (when ordering optional ATP module),
Gbps
0.151.31.51.82.52.83.1
L7 Application Control (when ordering optional ATP module),
Gbps
0.71.51.71.82.52.83.1
Stream Anivirus (when ordering optional module Stream Anivirus),
Gbps
0.151.31.51.82.52.83.1
FSTEC Certification

Configuration requirements

Specifies the required parameters of the server on which the corresponding image will be deployed. The server of the selected configuration is not included in the price of the virtual firewall and is billed separately.

UserGate VE100UserGate VE250UserGate VE500UserGate VE1000UserGate VE2000UserGate VE4000UserGate VE6000
Ports 10/100/1000Base-Tup to 8up to 8up to 8up to 8up to 8up to 8up to 8
10GBase SFP+ PortsUp to 8 when using VMXNET3 virtual adapters
vCPU,
cores
24681624up to 32
RAM,
GB
881616323264
Disk,
GB
100300300300300300 300500

UserGate VE add-on modules

Additional modules allow you to extend the functionality of UserGate VE firewall to include advanced traffic filtering and protection from external threats.

Additional modules are not included in the price of the image and are charged extra. You can add them when ordering a firewall, or add them to an existing one by creating a ticket.

Fault-tolerant clusterSolution for assembling two nodes into a fault-tolerant cluster in Active-Passive mode
Advanced Threat Protection (ATP)Content and Internet traffic filtering based on morphological analysis in accordance with the requirements of the Russian legislation, blocking advertising and controlling access to social networks
Stream Antivirus (AV)Checking traffic for malicious code by analyzing signatures of received files and applications. Allows you to block the bulk of malicious files and has virtually no impact on system performance. Information from various computer incident response centers, including the Bank of Russia's FinCERT and the NCCI's GOV-CERT
Mail SecurityProtecting email from spam and viruses. Filtering is performed in several stages — by connections, source address, destination address, and email content. The IP address of the spam sender's SMTP server is blocked at the stage of creating an SMTP connection, thus offloading other methods of checking mail for spam and viruses