PER-208-T

Targitas SD-WAN Router

Targitas SD-WAN, is an integrated software-defined wide area network system development and optimization software which makes orchestration from branch to backbone area. Targitas connects your corporate networks (MPLS, LTE, enterprise internet) to remote destinations.

Key advantages include:
• Cloud-based management that provides telemetry to the central network controller.
• Online real-time traffic management over the WAN.
• Improving business application performance.
• Reducing costs with removing expensive routing hardware.
• Eliminates poor network performance and downtime.

  • Zero Touch Provisioning (ZTP)
  • Point-to-point VPN Tunneling
  • SSL VPN
  • IPSec VPN
  • Bandwidth
  • SD-WAN Controller
  • Dynamic Routing, RIP, OSPF, BGP, MPLS, VPLS, LDP
  • Central Orchestration

  • Preparing vEdge Targitas devices in remote services automatically and quickly
  • End-to-end visibility with a centralized management
  • Web-scale , SDN router/firewall orchestration software in cloud architecture
  • It is independent of internet service providers. In this way, we use the services more effectively through the cloud. Targitas SD-WAN can dramatically reduce overall network costs and provide better performance with higher bandwidth and better quality of experience.
  • Optimal performance with WAN virtualization
  • Lower response time, less traffic bandwidth across more requests with web-caching
  • Data-compression to prevent unnecessary storage of data, so availability of more space on disc
  • With Data Deduplication, a single copy of repeating data on a block or file basis is stored to save storage space and / or bandwidth
  • Single-click Orchestration: Virtualization and auto configuration of routing and security policies provide one-click.
  • The SD-WAN controller manages all WAN connections and devices in remote locations from a single center with a single interface and single software.
  • Create Branch Connectivity in Minutes with scalability
  • OSPF, BGP, ve RIPv1/v2, EIGRP
  • IP/MPLS
  • Label Distribution Protocol
  • MPLS L3VPN ve L2VPN (VPLS)
  • GRE, EGRE, MGRE, NVGRE, EOIP, GIF, IPSEC
  • SNMP v1/v2/v3
  • Vxlan (Positioned as VTEP-GW)
  • IGMP v1 / v2 for multicast applications, IGMP proxy support
  • IPv4 and IPv6 dynamic routing
  • IPSEC Authentication supports MD5, sha1, sha256 and sha 512 Encryption supports 3des, aes(128,192,256), aesctr(128,192,256) and blowfish
  • NAT (Nat Address Translation)
  • Dhcp Server/Client
  • VLAN, VXLAN, Dynamic VLAN, TRUNK, PPPoE, IEEE 802.1x, Loopback, Q-in-Q
  • Static Routing
  • Trunk (LACP)
  • VPN performance reporting
  • Application-level visibility and reporting
  • Real-time reporting and monitoring of network problems
  • Monitoring network status report telemetrically backward network status report
  • Monitor and manage WAN bandwidth consumption per client
  • Monitor and manage bandwidth of video streaming, file transfer, applications
  • Direct and optimal access to cloud-based applications
  • Compute and monitor end-to-end performance of applications
  • Monitoring of a package by activating a debug/trace on the device
  • Access Control Lists (ACL-Access Control List) are provided.
  • Target-source IP and MAC addresses, TCP and UDP ports, IP protocol types, traffic can be blocked according to DSCP values.̧
  • Access control rules can be applied on VLAN, port or Layer 3 basis.
  • Time-based ACL
  • Targitas supports policy based routing. Thus, based on ACL, traffic is routed to a different port in the normal routing table.
  • Activating Debug/trace based on ACL
  • Targitas works in harmony with the Converged / Hyper Converged architecture.
  • SD-WAN enables economical expansion of bandwidth.
  • Improves other network performance elements such as delay, error ratio, and uptime.
  • L3 TCP ACK Priority
  • QOS with TOS & COS
  • Stateful Packet Filter
  • Rules according to Access Control Criteria
  • Zone-based rules
  • Policy-based rules
  • DIVERT
  • SYN Flood Attack Prevention
  • Anti-Spoof
  • Brute-force Prevention
  • Sending log to remote server
  • Connection limits per rule
  • Package limitation by number of connections
  • Verify source reachable
  • OS-based Rules
  • TOS & COS
  • Time-based Access Management
  • IPv4 and IPv6 DoS Policies Per Rule
  • Signature categories more than 30
  • Unlimited custom signature categories
  • Integrated firewall with IPS Policies
  • Real-time attack monitoring and tracking
  • Protocol Anomaly Detection
  • DDOS Attack Prevention
  • With redundancy, we balance application requests across multiple servers. So, we prevent overloading.
  • Low latency with redundancy
  • Redundancy is achieved through low latency and High availability if one of the multiple used WAN connections fail.
  • "Active-Active" and "Active-Passive" redundancy
  • Provides a redundant cloud network.
  • Create restore points
  • Backup on a single click
  • Monitor detailed backup informations
  • The point-to-point VPN provides secure access to information between two or more points.
  • Supported protocols are GRE, EGRE, MGRE, NVGRE, EOIP, GIF, IPSEC.
  • SSL VPN
  • Audit logging user, date-time, ip, config criteria
  • Sending alarms via e-mail
  • The device can be managed from the web, console and ssh interface or with its own security application.
  • It supports Radius and TACACS features for user control.
  • With AAA (Authentication, Authorization, and Accounting), access to device administrators is controlled. The commands entered are limited according to user rights.
  • Software upgrade control exists on web user interface. The administrator can perform these updates manually.
  • Optimize Application Performance
  • Virtualized Network Services
  • Reduce IT Costs
  • Zero Touch Provisioning
  • Business Agility and Responsiveness
  • All-in-one (Tagitas SD-WAN supports switching,routing, load-balancing) and firewalling simultaneously
  • Bandwidth Growth

Targitas SD-WAN

Increase Cost Savings
Direct Internet Connectivity
Better Application Performance with Cloud Access
Improved Network Management
Effective Network Bandwidth
Orchestration and Control

Traditional WAN

Expensive Bandwidth
More ISP Dependent
Unpredictable Application Performance
Complexity
Lack of WAN bandwidth
Control Edges Separately
Model BAR-104-T BAR-106-T PER-208-T PER-212-T VMR-100
10/100/1000 Ethernet Port 4 6 8 12 -
Routing Capacity 4 Mpps 6 Mpps 8 Mpps 12 Mpps -
Ipv4 & Ipv6 Support + + + + +
Vlan 4094 4094 4094 4094 4094
IPSEC Authentication : MD5, sha1, sha256 and sha 512 support
Encryption: 3des, aes(128,192,256), aesctr(128,192,256) and blowfish support.
Authentication : MD5, sha1, sha256 and sha 512 support
Encryption: 3des, aes(128,192,256), aesctr(128,192,256) and blowfish support.
Authentication : MD5, sha1, sha256 and sha 512 support
Encryption: 3des, aes(128,192,256), aesctr(128,192,256) and blowfish support.
Authentication : MD5, sha1, sha256 and sha 512 support
Encryption: 3des, aes(128,192,256), aesctr(128,192,256) and blowfish support.
Authentication : MD5, sha1, sha256 and sha 512 support
Encryption: 3des, aes(128,192,256), aesctr(128,192,256) and blowfish support.
IPSEC Performance 800Mbit/s 1.4 Gbps 2.4 Gbps 4.2 Gbps 6 Gbps
Layer 3 IP Routing IPv4 and IPv6 dynamic routes OSPF, BGP, and RIPv1/v2, EIGRP IP/MPLS Label Distribution Protocol MPLS L3VPN and L2VPN (VPLS) IPv4 and IPv6 dynamic routes OSPF, BGP, and RIPv1/v2, EIGRP IP/MPLS Label Distribution Protocol MPLS L3VPN and L2VPN (VPLS) IPv4 and IPv6 dynamic routes OSPF, BGP, and RIPv1/v2, EIGRP IP/MPLS Label Distribution Protocol MPLS L3VPN and L2VPN (VPLS) IPv4 and IPv6 dynamic routes OSPF, BGP, and RIPv1/v2, EIGRP IP/MPLS Label Distribution Protocol MPLS L3VPN and L2VPN (VPLS) IPv4 and IPv6 dynamic routes OSPF, BGP, and RIPv1/v2, EIGRP IP/MPLS Label Distribution Protocol MPLS L3VPN and L2VPN (VPLS)
VPN GRE, EGRE, MGRE, NVGRE, EOIP, GIF, IPSEC GRE, EGRE, MGRE, NVGRE, EOIP, GIF, IPSEC GRE, EGRE, MGRE, NVGRE, EOIP, GIF, IPSEC GRE, EGRE, MGRE, NVGRE, EOIP, GIF, IPSEC GRE, EGRE, MGRE, NVGRE, EOIP, GIF, IPSEC
Multicast IGMP v1/v2, IGMP Proxy IGMP v1/v2, IGMP Proxy IGMP v1/v2, IGMP Proxy IGMP v1/v2, IGMP Proxy IGMP v1/v2, IGMP Proxy
NAT (Nat Address Translation) + + + + +
Routing + + + + +
Policy Based Routing + + + + +
Bandwidth (Quality Of Service) L2 / L3 / L4 Guaranteed bandwidth, bandwidth limitation, packet marking for each type of traffic that is parsed based on ACL and DSCP bits. L2 / L3 / L4 Guaranteed bandwidth, bandwidth limitation, packet marking for each type of traffic that is parsed based on ACL and DSCP bits. L2 / L3 / L4 Guaranteed bandwidth, bandwidth limitation, packet marking for each type of traffic that is parsed based on ACL and DSCP bits. L2 / L3 / L4 Guaranteed bandwidth, bandwidth limitation, packet marking for each type of traffic that is parsed based on ACL and DSCP bits. L2 / L3 / L4 Guaranteed bandwidth, bandwidth limitation, packet marking for each type of traffic that is parsed based on ACL and DSCP bits.
Dhcp Server/Client + + + + +
Throughput Performance 4 Gbps 6 Gbps 8 Gbps 12 Gbps +
VPN Performance 2 Gbps 4 Gbps 6 Gbps 8 Gbps 10 Gbps
VRF 256 256 256 256 256
PPPoE-server + + + + +
PPPoE Client 4096 4096 4096 4096 4096
Hardware
Temperature and Humidity It works in 0-40 ° C temperature range and 5-% 95% humidity range It works in 0-40 ° C temperature range and 5-% 95% humidity range It works in 0-40 ° C temperature range and 5-% 95% humidity range It works in 0-40 ° C temperature range and 5-% 95% humidity range It works in 0-40 ° C temperature range and 5-% 95% humidity range
USB 2.0 and USB 3.0 + + + + +
Capacity 4GB RAM and 60GB Disc 8GB RAM and 128GB Disc 8GB RAM and 256GB Disc 16GB RAM and 512GB Disc 32GB RAM and 1TB Disc