Henan IBM servers, network security appliances
Henan IBM servers, network security appliances
|
LeadSec Internet behavior management system (Leadsec ACM) is LeadSec full range of solutions for the Internet access provided by the user in the information content security, network application management, organizational operational efficiency, network resources, legal risk aversion and return on investment and other aspects of the network program. ACM addition to the bandwidth management with professional online behavior management products, network application control, URL category filtering, filtering sensitive information, statistics and analysis and other functions, but also with link load balancing (Inbound / Outbound), network bandwidth optimization and anti share Internet, WEB push, professional VPN, firewall and other value-added services capabilities. Leadsec ACM rely on efficient unified defense engine USE, multi-core software architecture design, combined with DPI (deep packet inspection) and DFI (depth behavior test) data analysis techniques, to provide users with superior integrated business processing performance and precision The data protocol analysis capabilities, to meet the stringent requirements of users in critical network equipment performance, high reliability, scalability and so on. Features accurate application identification using intelligent pattern recognition technology combined with enhanced DPI (deep packet inspection) technology and DFI (depth behavior test) data analysis techniques can accurately identify a variety of network applications and protocols, including the use of random port, encryption, and proxy network applications, network applications to ensure maximum accuracy control and audit. Flexible bandwidth management policies provide maximum bandwidth, guaranteed bandwidth, flexible bandwidth and QOS policy and other flexible bandwidth management tools, set the bandwidth management policy based on a combination of a variety of conditions user, user group, application, application type, time, network interfaces, etc. to provide users with the most flexible bandwidth management tools to meet the diversity of needs bandwidth management. Powerful Internet behavior management built real-time updates of the most comprehensive application identification and classification library URL, can be based on a variety of keyword filtering web content, including microblogging, BBS posting, EMAIL, IM chat, users can implement the most accurate, Flexible online behavior management. Professional audit information content information content of a professional audit capacity, detailed records the user's online behavior and access to content, offers an easy audit query tools to help quickly locate sensitive information problems. While supporting an external server storage capacity to increase storage capacity and reliability of audit data. Powerful statistical analysis supports tables, pie charts, bar charts, line charts and other forms of statistical analysis reports showing network information, activity and access frequency ranking information, and built-in statistical analysis of various time periods, analyzing the content comprehensive coverage of traffic, users, groups, applications, application classes and other objects, and supports a variety of objects portfolio analysis. Improved means to support link management link load balancing (in / out two-way), link backup, ECMP / WCMP routing, policy routing, ISP P2P intelligent routing and drainage and other WAN link access features as multi-user network WAN access, improving export bandwidth capacity, and optimize bandwidth utilization to ensure network connectivity and business connectivity. Simple device management based HTTPS secure web management interface protocols, CLI command line configuration interface, device management hierarchy and decentralized authorization have NAT traversal capability of centralized gateway features to help users easily manage the device, and effectively reduce management costs, improve management efficiency. Features and functions Function Item Function Description deployment capabilities to support the deployment of routing, transparent way to access bypass three deployment to support PPPOE dial and static IP configuration access to advanced network applications IP routing Static routing and dynamic routing protocols routing strategy Support DHCP Server based on the source address and policy-based routing interface ISP routing support Telecom, China Unicom, mobile, educational network and other ISP intelligent routing VLAN support 802.1Q VLAN function supports standard DHCP protocol, Client, Relay functions DNS function support DNS Clinet , DNS relay, DNS proxy NAT firewalls and security features the ability to support PNAT, DNAT, NAT session limit-one support for per-user, per-user or per-device group session connection packets restrictions limit support for virus report limit the transmission rate of packets ACL control support and support based on the 5-tuple-based ACL application time of IP + MAC binding support Layer and Layer IP + MAC binding support for ARP ARP attack protection virus attack protection, improve network stability based on black list MAC or IP-based configuration of black and white list support DOS Protection SYN Flood, UPD Flood, ICMP Flood, ARP Flood attacks with powerful antivirus protection virus filtering, including web anti-virus, anti-virus e-mail, file transfer virus, virus filtering logs, etc. VPN IPSEC VPN function supports the standard point and multipoint applications IPSEC VPN L2TP VPN L2TP VPN support value-added service features customizable WEB push send the appropriate web popups to the user, can be used to inform, advertising, surveys, and other services. WEB user access authentication authentication authentication function built-WEB can be used as an access server authentication IP + MAC authentication support Layer and Layer IP + MAC authentication link load balancing to support high reliability based on the number of users and networks and other means of egress bandwidth link load balanced link between automatic backup support automatic backup link, enhance network reliability to support bandwidth management bandwidth management per user bandwidth control and traffic management user group bandwidth management support for each user in the user group as a unit bandwidth control and traffic management single application bandwidth management support for each application (such as FTP or HTTP download) bandwidth control and traffic management applications group for application bandwidth management support group (such as P2P or web video) bandwidth control and traffic management Flexible bandwidth control according to exit flexible allocation of bandwidth utilization can identify the user's bandwidth QOS packet classification and identification applications implement QOS monitoring and control network game control can be grouped, per-user monitoring network games, such as Lianzhong game, World of Warcraft, Fantasy Westward Journey, BNB, Hao Fang gaming platform, KartRider, Sina UT Game, Chinese game centers, Yulgang, Audition, street basketball, QQ speed of sound, QQ games, voyage games, Westward Journey, Netease bubble games, Sohu Games, MSN Games, ICQ Games winger games, sword games, conquer games, journey, perfect world, the game Gametea, Three Heros, entertainment chess, Shaoxing city tours and other Internet search control can be grouped, per-user retrieval major search sites to monitor: such as baidu , google, in the search, yahoo and other P2P application control can be grouped, per-user, time sharing control or block P2P applications. Such as BT, eMule / eDonkey, Thunder (and web mode), PP little pass, Kugoo, KaZaA (Fast Track), Gnutella, Vagaa, under Baidu it, WinMX, Winny, Share, msze access control and other sites can be grouped, divided user All URLs network monitor user access control statements can be grouped, per-user monitoring user BBS, WEBMail, Blog and other network IM application to control the transmission of speech can block chat software, including chat software QQ, MSN, Skype, UC, Yahoo Messenger, AIM, TM, Google Talk, PoPo Build, iChat and other mail users to send and receive control may monitor WEB, SMTP message contents and attachments control agent software can prohibit unsafe user terminal using the Internet; intranet users can prohibit the use of HTTP, Socks proxy Internet file transfer software agent can limit users to filter file content HTTP, FTP upload, download the specified type, name and size of the filter web content filter web filter packets based on the theme of time and personnel, network search e-mail filtering can mail in the mailbox theme, domain names, message content, attachment name filtering keyword filter to limit the search through the pages for certain keywords (keywords can be defined), you can restrict users by BBS, Blog, etc. to send a message with the word sensitive remarks Explorer New Application and Applications Group supports user-application and application-defined set new time policy can create absolute time and relative time policy defines the organization supports the user presses the internal organization of enterprises to create the appropriate department and user support for the new URL and user-defined categories and URL URL categorization real-time statistics of online users in a timely manner to support real-time view long online users information and online user connections long ranked according to the number of connections to support user rankings support user traffic rank according to size of the flow of real-time application users are ranked according to size of the flow of support ranking Applications are ranked real-time traffic information to support real-time view of each interface traffic information network security incident support for network-critical security events in real-time displays historical statistics firewall logging support bandwidth management Statistics and logging support for firewall features produced in violation of bandwidth management logs behavioral strategies for statistical and query historical traffic statistics support for users, applications and interface traffic information, statistics and inquiry line historical statistics to support the user when the subscriber line long history information statistics and query the contents of the audit web browser audit support for user web browsing behavior chat audit records and query the user to query the network supports recording and post audit support network for users to post content file transfer audit records and query support for user chat records and query the network for users to search audit support file transfer content to the user Web search Records and audit support keyword query P2P applications use P2P software on the user's name and flow records and audit support user queries online gaming operations online game account name and email audit support for WEB and SMTP mail content (including attachments) records and audit support media information queries users are using online video-on-demand applications and traffic access to the audit records and query the database to support the user database access and query the information recording device management WEB management support secure HTTPS protocol WEB Management CLI Management supports the CLI CONSOLE port and TELNET management standards-based SNMP network management support SNMP v1 / v2c / v3 for centralized network management device supports centralized management of decentralized management support for centralized management platform to achieve according to the administrator account privileges grading equipment, the decentralization of management control device can be set to allow the management device NMS NMS IP or MAC system time support setting the system time and time synchronization with NTP server System log View supported system log and recording equipment query configuration file backup and restore support for HTTP, FTP and other ways of configuration files for backup or restore upgrade support for HTTP, TFTP, FTP and other ways to back up or restore the configuration file to restore the factory settings support the device to restore the factory configuration system software versions operational audit data backup and import support to back up data to external storage media audit and provide import backup data network diagnostic work provides ping, tracert and other network diagnostic tools and means of network health monitoring provides network communications to detect and report the health status Typical applications for routing mode LeadSec online behavior management system is operating in routing mode to turn all the features of the device, including routing (NAT), load balancing, flow control, application blocking, content filtering and auditing, and to replace the traditional router or Firewall as an export gateway, save the overall network investment. Route mode network bridge mode deployment schematic Royal online behavior management system is operating in bridging mode, without changing the user's network topology. Bridged mode device does not have the NAT function, the network application control, traffic management, and other content filtering and auditing. Bridge mode deployment schematic bypass mode LeadSec online behavior management system to support the deployment of bypass mode in the network core switch, the switch port mirroring function of the user's online behavior of real-time detection. Bypass mode support online behavior audit function, but do not have the online behavior control and filtering capabilities. Bypass Mode deployment schematic Company: Henan Blue Arrow Electronics Co., Ltd. Contact: (Mr.) Chai famous phone: 13526599308 13323820552 QQ: 1051607197 E-mail: 1051607197@qq.com Phone: 037165327806 Fax: 0371-65327806 turn 812 Website: http: //www.henanibm.com Company Address: Zhengzhou City Cultural Road 85 E Times Square, Room 603
Contact Detail
Company Name: | Henan Blue Arrow Electronics Co., Ltd. |
---|---|
Employee Number: | |
Annual export: | |
Year Established: | |
Contact Person: | Mr. Chai famous() |
Telephone Number: | 0371-65327806 |
Company Address: | Zhengzhou, Zhengzhou City, Henan Province, China |
Zip/Postal Code: |
Find More Related Products
- HZ-3700 as the United State..
- nec projector
- Optoma HD90
- Gifted crown VOD
- Hitachi projectors
- Hitachi HCP-380X projector
- LED digital control, one, t..
- 5mm full-color LED lights l..
- Red LED, blue LED, green LE..
- 10 segment LED light bar li..
- Shenzhen Eastern Long Digit..
- Shenzhen Eastern Long Digit..
- Epson cb965
- Optoma projector ZD201
- 1588 3mm dot dot dot 15088
- 5mm red dot 2088 dot
- 1088BS1088 1288 dot dot
- 788 8x8 dot dot dot 1.9mm, ..
- Epson Ebx24
- 100-inch movie screen 120 i..
- Hitachi projector Hitachi p..