温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/products/nqx/technical-specifications
点击访问原文链接

NQX technical specifications

NQX technical specifications About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers NQX™ Benefits Use cases Tech specs Buy NQX NQX™ Quantum-safe encryption Technical details

Learn more about NQX technologies for DDoS protection, encrypted data flow, and branch connectivity.

 

How does NQX work? NQX software delivers quantum-safe encryption for L2 (data link layer) and L3 (network layer) VPN data transport, DDoS protection, and flexible branch connectivity for Ethernet frames and IP packets. NQX software provides high-performance packet processing for rule-based forwarding, encryption/decryption, and filtering for Ethernet-based IPv4/IPv6 networks.

NQX appliances support various branch connectivity solutions by providing copper and optical 1 and 10 gigabit Ethernet interfaces. NQX Central Manager allows configuring appliance functions, including creation and distribution of encryption keys.

The easy-to-use web-based interface helps operational personnel with their daily work of maintaining VPN network.

NQX includes interfaces for third-party systems for easy integration for syslog servers as well for asset and observatory tools.

NQX high-level setup Interconnecting data centers Building VPN connections through public (Layer 3) or private (Layer 2) networks. One appliance can be used for both layers at the same time. Appliances can be clustered on sites where high availability is needed. General protection for private LANs from the Internet Access rules. All nodes, keys, and connections are managed from a single Central Manager system. Hardware options NQX Nano For branch and small offices

6x 10/100/1000M RJ45 Ethernet 6 Gbps throughput, 3 Gbps IPsec L2/L3, 200k flows/sec NQX Desktop For medium offices and small datacenters

6x 10/100/1000M RJ45 Ethernet,
expandable with 2 port 10G SFP+ 20 Gbps throughput 10 Gbps IPsec L2/L3 200k flows/sec NQX 1U For medium datacenters and headquarters

8-24x RJ45 Ethernet, 0-16x 1G SFP, 4-12x Ethernet 10G SFP+ 60 Gbps throughput 30 Gbps IPsec L2/L3 300k flows/sec NQX Server For large datacenters and cloud solutions

4-port Ethernet 1G / 10G SFP+ 40 Gbps throughput 30 Gbps IPsec L2/L3 300k flows/sec Detailed information about the hardware options available in the NQX Datasheet

Main features Security feature
highlights 256 bit security level throughout the system for encryption keys, MAC keys, key agreement keys, and authentication keys Authentication using Public Key Certificates or Shared Secrets 521 bit ECDH key exchange, alternative 8kbit Diffie-Hellman key exchange, and 16kbit Diffie- Hellman Protection from Quantum threat using automatic PostQuantum Preshared Keys (PPK) for Key Exchange and Authentication Perfect Forward Secrecy for session keys Adjustable IKEv2 and IPSec cryptoperiods and cipher modes IKEv2 DoS protection using bounded Adaptive WRED with upper bound on IKEv2 Emergency security features to purge sessions and keys Networking feature highlights Flexible L3 operations with native dualstack architecture, IPv4 and IPv6 support Unlimited Ipsecs VPN support for both L2 and L3, all frames and protocols BGP4 for IGP/EGP dynamic routing
Dynamic Host Configuration Protocol (DHCP) Network address translation (NAT) and NAT travelsal support for mobile and broadband access Link aggregation (LACP) for redundancy and increasing bandwidth. Media access control address (MAC) table Rule-based forwarding for granular flow management

Central Management feature highlights Browser based user interface Inventory management for nodes, configurations and software releases VPN wizards for easy service provisioning Mass provisioning functions Holistic Service monitoring Security policies with version management Reporting templates Role and domain-based user policy Certification management for NQX nodes Get in touch about NQX demos and pricing  

SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录