Linux & Open Source Software can lower costs, improve reliability and increase the Return on Investment (ROI).

Is your organization ready for Linux & Open Source Technologies?

Get a free Assessment & find out. CLICK HERE
CALL US ON : +94 11 7634115, +94 714034053 DOWNLOAD OUR BROCHURE

Voice Over IP / Security Products

Voice Over IP / Security Products

Ceylon Linux Firewall

CeyGate firewall is the most affordable firewall based on the Linux operating system. Linux is the right choice for security systems. CeyGate Firewall includes a hardened Linux operating system, that boots from a 256MB USB flash device. Designed for ease of use, CeyGate firewall is configured via a web-based GUI, and requires absolutely no knowledge of Linux to use. CeyGate firewall provides additional functionalities such as web and mail content filtering, VPN gateway and bandwidth management (QoS).

Firewall device's root file system boots from read-only media and provides the High Performance Architecture. Web-based GUI enables users to change the firewall rule-base at any time.

CeyGate customers will get a free Installation and configuration according to their need in Sri Lanka. Overseas customers will get the fullest technical support with no cost.

The CeyGate firewall appliance is designed to meet all the security features that are needed for any complex network. CeyGate is an affordable, rack mountable appliance with following features.

Multiple interfaces per security zone
Zones increase tremendous flexibility, scalability and added security.

Ease of Policy management
Web interface help the administrators to manage security policies easily and consistently.

Policy-based NAT
CeyGate supports many-to-one, many-to-many, one-to-many NAT and inbound Port address Translation.

Hardened OS
Powerful next-generation CeylonLinux Operating System that boots from a 256MB USB flash device is used to design CeyGate Firewall.

Multiple Configurable Interfaces according to the customers need
With CeyGate firewall network administrators can create additional WANs, LANs, DMZs and custom-defined zones for greater network configuration flexibility and internal security.


Virtual Private Network (VPN) Gateway

Ceylon Linux VPN (Virtual Private Network) gateway uses a variety of data encryption methods to create a secure communications “tunnel” over the public Internet.

Multiple Architectures
To accommodate the needs of branch offices, home users, and “road warriors”, the VPN gateway supports a variety of VPN architectures, including Net-to-Net, Host-to-Net, and Host-to-Host.

Broad Protocol and Client support
Ceylon Linux VPN gateway supports a broad range of VPN protocols like IPSec, L2TP over IPSec, and PPTP.

Administrators can select from a broad range of VPN clients, including the native Windows and Windows Mobile PPTP and L2TP over IPSec clients, the Mac OS X VPN client, and other VPN clients that follow the IPSec standard.
Certificate Authority
The Ceylon Linux Security Gateway includes an internal certificate authority with authentication based on PKI-trustchain. This enables the use of digital certificates without requiring that certificates be generated centrally and distributed to remote sites.

Certificates from external and public Certificate Authorities can also be used. X509 CRL support means that Certificate Revocation Lists can be imported to revoke disabled or expired certificates.

IPSec Dead Peer Detection
Ceylon Linux VPN gateway automatically detects when IPSec gateways and clients become unavailable, so that network outages and IPSec peer crashes can be detected and remedied quickly.

Simplified Remote Access
Dynamic IP addresses and DNS/WINS server addresses, taken from a virtual address pool or provided by an DHCP server, can be distributed automatically to simplify remote access. IPSec client configurations can be distributed from a central point, simplifying mass rollouts of IPSec VPNs. 


Ceylon Linux Viruswall

Our Viruswall scans Email traffic & Web traffic ensuring virus free network.

Ceylon Linux Virus Protection for the Web and Email detects and blocks viruses in files downloaded from the web & emails. It scans all HTTP, POP3, SMTP, IMAP traffic and FTP downloads initiated from a browser or/and email client programs.

Ceylon Linux Virus Protection for the Web & Email also scans email messages and attachments from web-based email services such as MSN Hotmail, Yahoo! Mail, and Google Gmail. Because these emails don’t go through the corporate email server, they are never scanned by conventional anti-virus packages.

As more computer users utilize web-based email services in addition to corporate email accounts, scanning web traffic becomes critical to keeping viruses from infecting corporate networks.


Ceylon Linux Spamwall

Ceylon Linux Spam Protection application detects and blocks unsolicited emails.

It uses multiple detection methods to pinpoint spam types while minimizing “false positives”.

It performs a series of tests and assigns a “spam score” to each message indicating the probability that the message is unsolicited. Messages whose score exceeds thresholds set by the administrator are dropped, returned to the sender, passed to the recipient with a warning, or quarantined.

Accurate Identification of Spam

Sender Address Verification: Messages are tested to determine if they come from legitimate email addresses.
Realtime Blackhole Lists (RBLs) and spam databases: Email addresses are checked against databases of known spammers.
Header Analysis: The header section of emails are checked for false or altered information and addresses with invalid characters.
Body Analysis (Heuristics): Words and word patterns typical of spam are identified.
SPF record checking: Rejects emails coming from a false “Mail From” address.
URL Scanning: URLs within emails are checked against a database of known spam URLs.
Greylisting: Unknown mail servers are asked to resend messages before they are accepted.
BATV Reverse Path Signing: Blocks emails from being “bounced back” to an email server unless they really originated there.
Whitelist and Blacklist: The administrator can list email sources known to be legitimate and illegitimate.


Ceylon Linux Voice Gateway

Ceylon Linux voice gateway is based on the Open Standard SIP Express Router (SER) and Asterisk. It can serve as a SIP Proxy, VoIP PBX, VoIP gateway

Copyrights © 2004 - 2016 Ceylon Linux (Pvt) Ltd