<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-1-0-1</article-id><article-id pub-id-type="publisher-id">3401</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;OVERVIEW OF CRYPTOGRAPHIC GATEWAYS FOR PROTECTION INFORMATION IN CORPORATE NETWORKS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;OVERVIEW OF CRYPTOGRAPHIC GATEWAYS FOR PROTECTION INFORMATION IN CORPORATE NETWORKS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Chayka</surname><given-names>Evgeny Mikhailovich</given-names></name><name xml:lang="en"><surname>Chayka</surname><given-names>Evgeny Mikhailovich</given-names></name></name-alternatives><email>desare48@yandex.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Belov</surname><given-names>Sergey Pavlovich</given-names></name><name xml:lang="en"><surname>Belov</surname><given-names>Sergey Pavlovich</given-names></name></name-alternatives><email>belovssergei@gmail.com</email></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/1/ИТ_НР_9.1_1.pdf" /><abstract xml:lang="ru"><p>This article discusses solutions from domestic manufacturers for the organization of a secure corporate network (cryptoslocks, VPN gateways), the basic principles of operation of this equipment, connection scenarios and the main protocols used, an analysis of solutions available to state and federal authorities, according to legislation and regulatory requirements, an analysis of the stages of certification of components of the solutions in question, compatibility with domestic ones The possibility of using integrated solutions in organizations is being considered.</p></abstract><trans-abstract xml:lang="en"><p>This article discusses solutions from domestic manufacturers for the organization of a secure corporate network (cryptoslocks, VPN gateways), the basic principles of operation of this equipment, connection scenarios and the main protocols used, an analysis of solutions available to state and federal authorities, according to legislation and regulatory requirements, an analysis of the stages of certification of components of the solutions in question, compatibility with domestic ones The possibility of using integrated solutions in organizations is being considered.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>encryption</kwd><kwd>secure VPN gateways</kwd><kwd>corporate networks</kwd><kwd>ViPNet</kwd><kwd>Continent</kwd><kwd>Dionis</kwd></kwd-group><kwd-group xml:lang="en"><kwd>encryption</kwd><kwd>secure VPN gateways</kwd><kwd>corporate networks</kwd><kwd>ViPNet</kwd><kwd>Continent</kwd><kwd>Dionis</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Federal Law No. 149 dated 07/27/2006 &amp;quot;On Information, Information Technologies and Information Protection&amp;quot;.</mixed-citation></ref><ref id="B2"><mixed-citation>Government Resolution No. 1119 dated 11/01/2012 &amp;quot;On approval of requirements for the protection of personal data during their processing in personal data information systems&amp;quot;.</mixed-citation></ref><ref id="B3"><mixed-citation>Order No. 17 of the Federal Customs Service of 11.02.2013 &amp;quot;On approval of requirements for the protection of information that does not constitute a State Secret contained in State information systems.&amp;quot;</mixed-citation></ref><ref id="B4"><mixed-citation>FSTEC Order No. 21 dated 02/18/2013 &amp;quot;On approval of the composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems&amp;quot;.</mixed-citation></ref><ref id="B5"><mixed-citation>FSTEC Order No. 31 dated 03/14/2014 &amp;quot;On Approval of Requirements for Ensuring Information Protection in Automated Control Systems for Production and Technological Processes at Critical Facilities, potentially Dangerous facilities, as well as facilities that pose an increased danger to human life and health and to the environment&amp;quot;.</mixed-citation></ref><ref id="B6"><mixed-citation>Features of Dionis DPS Source: https://dps.factor-ts.ru/vozmozhnosti, date of access: 12/01/2023, electronic text.</mixed-citation></ref><ref id="B7"><mixed-citation>Zenzin I. &amp;quot;Overview of cryptographic gateways of Russian and foreign manufacturers&amp;quot; Source: https://www.anti-malware.ru/analytics/Market_Analysis/cryptographic-gateways-russian-and-foreign-manufacturers-2017, accessed: 12/01/2023, electronic text.</mixed-citation></ref><ref id="B8"><mixed-citation>Security Complex Continent Version 4 Administrator&amp;#39;s Guide Principles of operation https://www.securitycode.ru/upload/iblock/a6c/mjqueclwoehg014tilmlinzmbwxfdlc5/Continent-Basics-AdminGuide.pdf, accessed: 12/01/2023, electronic text</mixed-citation></ref><ref id="B9"><mixed-citation>Cryptographic Security Gateway &amp;ndash; A new generation Firewall ViPNet Coordinator HW 5 Source: https://infotecs.ru/products/vipnet-coordinator-hw-5 /, date of access: 12/01/2023, electronic text.</mixed-citation></ref><ref id="B10"><mixed-citation>Sarychev D. &amp;quot;How to choose a corporate VPN gateway&amp;quot;, Source: https://www.anti-malware.ru/practice/methods/How-to-choose-VPN-gateway#part4, date of access: 12/01/2023, electronic text.</mixed-citation></ref><ref id="B11"><mixed-citation>SIM Networks, L2 and L3 VPN communication channels &amp;ndash; differences between physical and virtual channels of different levels. Source: https://www.sim-networks.com/ru/blog/the-difference-between-layer-2-and-layer-3-networks, date of access: 12/01/2023, electronic text.</mixed-citation></ref></ref-list></back></article>