This item has been added to your cart.
Should I order it along with the items in my shopping cart?
Product Introduction
The firewall solution is a “network boundary protection system” that logically separates network areas
within a ship and effectively blocks unauthorized traffic and cyber attacks from inside and outside.
It prevents the spread of network security incidents and supports safe inter-area communication
through policy-based traffic control, abnormal communication detection, and rapid section isolation functions.
In accordance with the IACS UR E26 guidelines, ship systems require various security systems such as
network separation, protection device operation, and isolation in the event of a breach,
and the firewall solution can generate a separate report with policy application details
along with immediate notification when a blocking event occurs.
Product Features
- Traffic separation and policy-based control between network zones
- Real-time detection and blocking of unauthorized communication and attack traffic
- Immediate isolation of specific network sections when anomalies are detected
- Automatic storage of policies, events, and blocking history
- Automatic generation of traffic and policy change history reports
Product Introduction
The firewall solution is a “network boundary protection system” that logically separates network areas
within a ship and effectively blocks unauthorized traffic and cyber attacks from inside and outside.
It prevents the spread of network security incidents and supports safe inter-area communication
through policy-based traffic control, abnormal communication detection, and rapid section isolation functions.
In accordance with the IACS UR E26 guidelines, ship systems require various security systems such as
network separation, protection device operation, and isolation in the event of a breach,
and the firewall solution can generate a separate report with policy application details
along with immediate notification when a blocking event occurs.
Product Features
- Traffic separation and policy-based control between network zones
- Real-time detection and blocking of unauthorized communication and attack traffic
- Immediate isolation of specific network sections when anomalies are detected
- Automatic storage of policies, events, and blocking history
- Automatic generation of traffic and policy change history reports









