Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Industrial Control System Firewall

Deep Inspection of Industrial Protocols | Behavior-Based Policy Enforcement | High Stability | High Reliability

Product Overview

Topsec Industrial Control System Firewall (ToplFW) is a border security protection product designed for the production intranet environment of industrial internet. It is developed based on an industrial-grade full-parallel and multi-core processing architecture platform and an NGTOS system with independent intellectual property rights. It integrates the security functions such as access control, in-depth industrial protocol resolution, whitelist policy management, self-learning, industrial control intrusion prevention, antivirus, intelligent bypass, and ddoS attack protection. TopIFW can protect the production intranets against unauthorized access, unauthorized operations, intrusion attacks, virus infections, ddoS attacks and other security threats, improving the overall cyber security protection capability and ensuring the continuous and stable operation of production business.

Activity & Announcement
Advantages
Deep-Layered Business Protection Mechanism

Leveraging its extensive expertise in the industrial control field, Topsec has developed a whitelist-based "four-dimensional" in-depth protection technology for industrial command-level security. This technology performs advanced filtering and protection by validating the "integrity," "function codes," "address ranges," and "process parameter ranges" of industrial control protocols. It effectively detects suspicious commands and malicious data, ensuring the secure operation of industrial control networks and devices through access control, behavioral analysis, and data verification.

Intelligent AI Protocol Identification Technology

Equipped with an ai-powered protocol identification engine, the system supports the recognition of 76+ industrial protocols. It employs multiple identification techniques, including: single-packet signature recognition、statistical feature recognition、multi-packet correlation analysis、deep parsing-based identification.This comprehensive approach meets the diverse application and protocol management needs of industrial enterprises.

Comprehensive Threat Defense Capabilities

The system integrates a dedicated industrial attack signature database and malware detection engine, covering over 80% of known industrial control threats, including:Intrusions targeting scada, plc, and dcs systems、malware infections、buffer overflow attacks、denial-of-Service (ddoS) attacks.By accurately identifying and blocking these threats, it prevents security risks from spreading and ensures stable industrial control system operations.

Robust Network Adaptability

To address the evolving demands of modern industrial networks, topsec enhances standard networking functions with industrial-specific features, such as: virtual private networks (vpns)、ipv6 support、virtual wire switching、dual-system hot backup、link aggregation、load balancing、traffic management. These capabilities enable seamless integration into complex industrial environments, reducing additional infrastructure investments and supporting the growth of industrial internet of things applications.

2025
2024
2024
2023
2023
2023
2022
Ranked third with a 9.4% market share.

Achieved a market share of 9.4%, ranking #3 in the CCID "White Paper on China's Industrial Cybersecurity Market, 2025"

Ranked third with an 8.9% market share.

Achieved a market share of 8.9%, ranking #3 in the CCID "White Paper on China's Industrial Cybersecurity Market, 2024"

June 2024

Ranked in the IDC report "China Industrial Firewall Market Share,

Achieving strong growth against headwinds.

Defying Headwinds with Strong Growth" with a market share of 7.7%, annual revenue of RMB 128 million, and YoY growth of +39.4%

December 2023

Recognized as a Market Leader in the CCID "White Paper on China's Industrial Cybersecurity Market, 2023"

May 2023

Ranked in the IDC report "China Industrial Firewall Market Share,

Gaining momentum and unlocking potential.

Gaining Momentum and Unlocking Potential" with a market share of 6.8%, annual revenue of USD 13.6 million, and YoY growth of +51.0%

Applications
Scenario Description

Deployed in inline mode between the Process Monitoring Layer and the Field Control Layer, the solution enforces application-specific security policies to protect critical control devices such as PLCs, DCSs, and RTUs.

Key Challenges Addressed
  • Implements a one-to-one protection mechanism combined with "Four-Dimensional Integrated" deep inspection technology at the industrial protocol command level, enabling precise identification and defense against sophisticated, instruction-level threats.
  • Establishes a communication whitelist based on network-layer security policies, effectively blocking unauthorized communication between untrusted hosts and critical control devices.
  • Provides active defense against DDoS attacks, preventing malicious traffic from reaching controllers and ensuring stable operation and safe production of critical infrastructure.
Scenario Description

Deployed in inline mode between the Production Management Layer and the Process Monitoring Layer, the solution provides logical segmentation among different production zones within the same network tier. It establishes secure security zones to prevent cross-zone interference and operational impact.

Key Challenges Addressed
  • Applies deep industrial protocol filtering and protection technologies to enforce fine-grained access control over commands or operations issued from the production management layer, effectively blocking anomalous data and unauthorized actions.
  • Creates defined security zones with isolation barriers between domains, preventing illegitimate inter-zone communications and halting the lateral spread of threats—confining security risks within isolated segments and reducing the overall likelihood of system-wide compromise.
  • Integrates multiple attack detection techniques to continuously monitor and actively defend against reconnaissance scans and cyberattacks targeting the process monitoring network, ensuring the safety and stable operation of critical underlying processes.
Scenario Description

Equipped with IPSec VPN capability, the solution establishes end-to-end encrypted communication tunnels between the central management site and remote industrial locations. Combined with industrial protocol–level security policies, it ensures dual protection for both data transmission and control commands.

Key Challenges Addressed
  • Encrypts all data transmitted to/from remote sites via VPN, ensuring confidentiality and integrity during transit—and effectively preventing data interception or leakage.
  • Enforces command-level access control policies for industrial protocols, mitigating risks such as impersonation attacks and unauthorized wireless access, thereby enhancing the security of remote operations.
  • Integrates multiple attack detection technologies to continuously monitor and actively block reconnaissance scans, intrusion attempts, and other threats targeting the process monitoring network—safeguarding the stability and security of underlying industrial operations.
Specification
0 > 0 > 0 >
TIF-42106-DINE TIF-5122A-NGE
Firewall Throughput 2Gbps 3Gbps
Application Control Throughput (64K HTTP/Enterprise Mix) 1.8Gbps 2.6Gbps
IPS Throughput (64K HTTP/Enterprise Mix) 1.4Gbps 2.2Gbps
Max IPsec VPN Tunnels 1,000 2,000
Concurrent Sessions 500,000 1,000,000
New Sessions/Sec 20,000 30,000
Fixed I/O Ports 6x GE 8x GE,2x SFP ,2 x SFP+
Form Factor DIN Rail 1U
RAM 8GB 16GB
Storage 1TB 4TB
Power Specification 36W, Dual DC 150W, Single AC
Power Supply DC 9-36V AC 100-240V,50/60 Hz
Working Temperature -40~70℃ 0~40℃
Relative Humidity 5~95%,Non-Condensing 20~90%,Non-Condensing
Weight 2.5Kg 7.8Kg
Dimensions (W × D × H, mm) 80×132.5×167.3 440×510×44
Success Case