Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Filtering Gateway

The system is featured by plug-and-play, high detection rate of popular viruses, and simple and effective defense against viruses outside the network.

Product Overview

As the first line of defense for network-wide malware protection, the Topsec Filtering Gateway (TopFilter) proactively identifies and blocks viruses, trojans, spyware, and other malicious code in real time at network gateways and key chokepoints. The system provides real-time prompt alerts, virus outbreak alarms, detailed logs and reports, provides unified upgrade services, and supports fully transparent plug-and-play and multi-link protection, making it a simple, effective, and reliable gateway-level malware defense solution.

Activity & Announcement
Advantages
Powerful Malware Detection & Defense

The gateway employs multi-layered scanning capable of detecting viruses hidden within compressed or obfuscated files. It utilizes content-based application protocol identification and true file-type verification to prevent evasion techniques. With signature database updates provided at least once daily, it maintains a high detection rate and robust defensive capabilities against the latest threats.

Dual-Scan Engine for Efficiency and Security

Featuring both Quick Scan and Deep Scan engines, the system intelligently selects the appropriate detection mode based on the network protocol or specific application scenario. This ensures an optimal balance between thorough security inspection and network performance efficiency.

Intelligent Multi-Link Operation Mode

Designed for plug-and-play simplicity, the system operates transparently in complex network environments. It provides comprehensive malware detection and filtering for both IPv4 and IPv6 dual-stack networks, supporting multiple WAN links and security zones simultaneously.

Precise Threat Location & Visualized Management

The system delivers real-time alerts, outbreak warnings, detailed logs, and graphical reports. This allows administrators to gain immediate visibility into the threat landscape, pinpoint infection sources and affected hosts, and take targeted remediation or preventive actions.

Applications
Scenario

Deployed directly in the traffic path at network boundaries (e.g., internet gateways) or between internal zones, TopFilter acts as an active enforcement point. It inspects all traffic in real-time, blocking malicious content before it can enter or spread within the protected network.

Issues Resolved
  • Blocks malware at the network perimeter, preventing initial ingress.
  • Stops internal propagation by scanning traffic between network segments.
  • Provides immediate alerts and locates the source of infections for rapid containment.
  • Generates comprehensive logs for compliance and forensics.
Scenario

Deployed to receive a copy of traffic (via port mirroring/SPAN), TopFilter operates in a passive, monitoring mode. This is ideal for initial threat assessment, auditing existing security, or environments where inline deployment is not feasible.

Issues Resolved
  • Detects malware activity entering or leaving the network without impacting traffic flow.
  • Provides detailed analysis reports on threat prevalence and infection attempts.
  • Offers visibility into network hygiene and the effectiveness of other security controls.
  • Helps locate infected hosts and malware sources for manual remediation.
Value to Customers
Proactive Threat Blocking at the Gateway

By intercepting malware at the network edge or key internal junctions, TopFilter prevents infections before they reach endpoints and servers. This safeguards critical data from theft, corruption, or encryption (ransomware), ensuring business continuity and data integrity.

Simplified Operations with Transparent Deployment

The plug-and-play, transparent bridge mode requires no changes to existing network IP addresses or complex configurations. This enables rapid deployment and significantly reduces the day-to-day management overhead for IT teams.

Cost-Effective, Centralized Protection

Consolidating malware defense at a few strategic points (gateways, core switches) is far more efficient than managing protection on every endpoint. This centralized approach reduces hardware, software licensing, and management costs while providing consistent, network-wide security.

Specification
0 > 0 >
Model NGTF-43826-E
Firewall Throughput 3Gbps
Anti-Virus Throughput  800Mbps
Concurrent Sessions 2,500,000
Fixed I/O Ports 8 x GE , 2 x SFP , 2 x SFP+
Available Slots for Expansion Modules 2
RAM 16GB
Storage  4TB
USB Ports 2
Form Factor 2U
Dimensions (W × D × H, mm) 440×510×88.9
Power Specification 150W, Dual AC
Power Supply AC 100-240V,50/60 Hz
Weight 10Kg
Working Temperature 0~40℃
Relative Humidity 20~90%, Non-Condensing