|
Secure your HTTPS traffic and save up to 20% of the bandwidth
|
As your Internet data contains in average 80% of useless requests (ads, trackers, malware, phishing, scam ...) our software appliance SecurityBox will drop 99.9% of these
unwanted requests and as a result it will make you save up to 20% of your overall HTTPS bandwidth.
|
It's an already pre-configured server under Linux in order to be installed within few minute.
It contains an already pre-installed/configured 64 bits Linux OS and an optimized system including a web graphical console for easy configuration and management of your Security Center Box.
|
|
|
|
|
Dedicated Server with 500Mbps HTTPS traffic |
Processor:
- Intel i7 (8 cores minimum)
|
Memory:
- 64 GB RAM or higher
|
Hard Disk:
- 1x512 GB or bigger (SSD recommended)
|
Network Interface:
- 1 Gbps
|
|
|
Screen Shots
|
Dashboard
|
Websites
|
SHA keys
|
Categories
|
Certificates
|
|
|
Mikrotik Mangles
|
1 - Define the comment of your Mikrotik Route:
|
In Routes definition, edit the route for the UnveilTech SecurityCenterBox and comment "sslbox" (without quotes)
|
2 - Define the special Mangle for enabling/disabling:
|
Original code
/ip firewall mangle
add action=add-dst-to-address-list address-list=SSLBOX address-list-timeout=20s \
chain=prerouting comment="SslBox Hello Packet" dst-port=2048 protocol=udp \
src-address=10.2.0.3
- address-list: Addr. list name of your IP ranges
- address-list-timeout: timeout when the Mikrotik will ON/OFF the rule
- src-address: IP address of the UnveilTech SecurityCenterBox
|
3 - Define the special Scheduler for enabling/disabling:
|
Original code
/system scheduler
add interval=10s name="MONITORING SSLBOX" on-event=":global SSLBOX\r\n\
:if ([/ip firewall address-list find list=SSLBOX] = \"\") do={\r\n\
:if (\$SSLBOX != \"down\") do={\r\n\
/ip route disable [find comment=\"sslbox\"]\r\n\
:set SSLBOX \"down\"\r\n\
:log info \"SSLBOX DOWN\"\r\n\
}\r\n\
} else={\r\n\
:if (\$SSLBOX != \"hidup\") do={\r\n\
/ip route enable [find comment=\"sslbox\"]\r\n\
:set SSLBOX \"hidup\"\r\n\
:log info \"SSLBOX UP\"\r\n\
}\r\n\
}" policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive
|
4 - Block the HTTPS port 443 UDP with your Mikrotik router:
|
Google services (Youtube, Gmail, etc...)
|
Facebook and Instagram
|
|
|
Global Statistics
|
Top 10 Traffic - 7 days
tiktokcdn.com |
27.97% |
googlevideo.com |
21.88% |
fbcdn.net |
21.82% |
nflxvideo.net |
17.50% |
rbxcdn.com |
3.11% |
apple.com |
2.47% |
facebook.com |
2.32% |
phncdn.com |
1.10% |
dbankcdn.com |
0.92% |
xvideos-cdn.com |
0.92% |
|
Top 10 Blocks - 7 days
www.googleadservices.com |
21.41% |
ad.doubleclick.net |
20.15% |
sdkconfig.ad.intl.xiaomi.com |
12.35% |
tc-log.mattel163.com |
8.37% |
asia-comonrt-stsdk.vivoglobal.com |
6.83% |
mediation.pangle.io |
6.56% |
googleads.g.doubleclick.net |
6.24% |
mon-va.tiktokv.com |
6.09% |
obus-sg.dc.heytapmobile.com |
6.05% |
prod-mediate-events.applovin.com |
5.95% |
|
Top 10 SSH Attacks - 7 days
|
Top 10 HTTP/S Attacks - 7 days
|
|
|
|
API
|
- curl -s -x [sslbox_ip_address]:8190 -I -k -L http://[host_to_test] | grep "X-SslBox-MyKey"
|
|