Toshiba Magnia with Astaro Security Linux
June 01, 2003
Toshiba America Information Systems and Astaro Corp.Product:
- Ease of Use:
- Value for Money:
- Overall Rating:
Easy to set up and manage, with good graphical reporting facilities.
Does not inspect FTPcontent.
A stylish-looking appliance that addresses the major internet-related security concerns of the small or medium business.
Based on a Toshiba Magnia SG20 solution developer kit, this unit runs a special version of Linux created by Astaro. It includes a firewall, VPN, DHCP server, traffic management and content filter. The latter includes web blocking and anti-spam.
The firewall uses stateful packet inspection and includes proxies for HTTP, HTTPS, SMTP, POP3, DNS, IDENT and SOCKS. It has user authentication and offers protection from the most common forms of DoS attacks. Of course, it provides network address translation. In addition it detects port scanning.
The IPsec VPN offers a wide choice of encryption algorithms: triple-DES, AES, Blowfish, Twofish, Serpent, MD5, SHA1 and SHA2. To support the VPN there is PKI management of X.509 certificates. Alternatively, you can enable the PPTP VPN, which uses up to 128-bit MPPE encryption.
Content control includes the filtering of dangerous web content, such as ActiveX, cookies and other web-based malware, plus a spam-protection toolkit, which includes the ability to accept or reject attachments based on file extension, for example. You can set up user-definable search strings to reject offending HTTP, SMTP and POP3 traffic, whether spam or merely inappropriate content. The anti-spam supports the use of heuristics as well as published real-time blackhole lists and can reject, delete or quarantine suspect messages. There is a daily updated URL-blocking list for http and hourly updated virus signatures for scanning SMTP traffic using the optional Kaspersky anti-virus engine.
The traffic management facility provides load balancing QoS using the hierarchical token bucket system and you can prioritize traffic by network, service, and protocol. The load balancing feature can spread the load across multiple web servers using a 'round robin' queuing system.
Remote management is possible using a 128-bit encrypted web-browser-based interface. Using this graphical WebAdmin utility, set up and configuration is easy. Reporting is also very good with some useful graphical output.
The Toshiba Magnia SG20 appliance hardware is small, neat and stylish. It has a small LCD status display on the front panel and a button to scroll through the menus. The back panel is uncluttered with an Ethernet WAN port, a seven-port switch for connecting the internal network devices, a wireless LAN slot for a WLAN PC-card and a printer port.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Microsoft update left Azure Linux virtual machines open to hacking
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry