Internet Behavior Safety Compliance

Internet Behavior Safety Compliance

Horizon Networks SuperAC Series

It integrates rich network characteristics, and can flexibly network in various complex network environments such as 802.1Q, RIP, OSPF, etc. in combination with intelligent routing and DDNS while meeting the IPv4 / IPv6 dual protocol stack; It has the ability to connect with third-party systems, share data, and improve business value.

Product Advantages

Flexible, efficient and comprehensive, with richer scene support

User authentication is diversified and user management is more convenient

Application control is fine-grained, and behavior control is more fine-grained

Optimized bandwidth management, faster user experience

Value added marketing features, more accurate marketing promotion

In depth behavior audit

Flexible, efficient and comprehensive, with richer scene support

It integrates rich network characteristics, and can flexibly network in various complex network environments such as 802.1Q, RIP, OSPF, etc. in combination with intelligent routing and DDNS while meeting the IPv4 / IPv6 dual protocol stack; It has the ability to connect with third-party systems, share data, and improve business value.

User authentication is diversified and user management is more convenient

Rich user authentication methods and user synchronization methods, support local authentication, SMS authentication, wechat authentication, ad single sign on, APP authentication, QR code authentication and other access authentication, as well as external authentication services such as AD server, Radius server and Portal server, so as to better meet the enterprise's user management requirements.

Application control is fine-grained, and behavior control is more fine-grained

Using DPI / DFI fusion identification technology, through a comprehensive analysis of user traffic, can in-depth identify the built-in action of the application. The system built-in 4500 + application can complete fine-grained application control based on the application, providing guarantee and basis for preventing enterprise key information leakage and improving network security.

Optimized bandwidth management, faster user experience

Support channelized QoS: different QoS applications are placed in different channel intelligent control, which can provide the minimum bandwidth policy guarantee based on user, application and other elements, support bandwidth borrowing, dynamically adjust according to the bandwidth usage of each channel, and support 4-level channel bandwidth nesting to meet the needs of large-scale network management.

Value added marketing features, more accurate marketing promotion

File cache function: support app and video application cache, and provide fast download of applications; App and advertisement promotion function: regularly promote the browser advertisement window, and define the click to jump page to realize the automation of business promotion.

In depth behavior audit

Detailed and comprehensive log information: comprehensively record user's online behavior, quickly search by fuzzy matching, and conduct accurate marketing through in-depth mining of website visit / search engine / e-commerce log after audit; User behavior trace query: track the user's access behavior, record in detail and easy to find.

Product Value

Save network bandwidth resources and ensure core business

Save marketing cost and get good marketing effect

Mining data value and providing business decision

Functional Features

  • System monitoring
  • Log query
  • Network management
  • User management
  • Object management
  • Internet Management
  • Safety Protection
  • VPN
  • System Management
System monitoring
System status: including system status, line traffic monitoring, user monitoring and application monitoring.

Interface status: display interface status information.

Online user management: manage online users.

User information center:

Application traffic statistics: application traffic information.

User traffic statistics: user traffic information.

Device traffic statistics: Device Health Statistics: display the current CPU, memory, number of sessions, machine forwarding traffic and other information
Log query
Application audit log: IM chat software log query and display,Community log query and display,search engine log query and display,mail log query and display,file transfer log query,entertainment and stock application log query, other application logs query and display

Website access log: visit website log, log query and display, malicious URL log: query and display malicious URL log

Security log: network layer attack log,system attack log,query and display

System log: system log query and display

Operation log: operation log query and display
Network management
Interface: interface configuration

Route: route table: route table display static route: configure static routing policy route: configure policy route ISP route: configure ISP routing library rip: configure rip routing protocol OSPF: configure OSPF routing protocol

Wireless settings: 3G network settings: configure 3G NAT: configure NAT DNS Service: configure DNS Service: configure DHCP service IPv6 network: configure IPv6
User management
User: configure user user policy: configure user policy global configuration: configure user identification range and mode and user authentication method

Authentication server: local web authentication: configure local web authentication portal server: configure portal server radius: configure RADIUS Server LDAP: configure LDAP server wechat authentication: configure Wechat authentication
Object management
Application: application: configure application object application recognition mode: configure application recognition mode

Keywords: configure keyword object URL: configure URL object address: configure address object service: configure service object schedule: configure time object

CA server: root CA configuration management: configure CA center user certificate management: issue user certificate

Local certificate: Certificate: local user certificate auto get CRL: automatically get CRL to local
Internet Management
Application audit log: IM chat software log query and display,Community log query and display,search engine log query and display,mail log query and display,file transfer log query,entertainment and stock application log query, other application logs query and display

Website access log: visit website log, log query and display, malicious URL log: query and display malicious URL log

Security log: network layer attack log,system attack log,query and display

System log: system log query and display

Operation log: operation log query and display
Safety Protection
Blacklist: configure security protection blacklist

Network layer attack protection: ARP attack protection: configure ARP attack protection DoS attack protection: configure DoS attack protection abnormal packet attack defense: configure abnormal packet attack defense
VPN
IPsec-VPN

IPSec: configure Ike and IPSec

IPSec tunnel interface: configure the IPSec tunnel interface

SSL-VPN: configure SSL VPN

SSL VPN monitoring: display SSL VPN status
System Management
Authorization management: configure and display system authorization

Profiles: profile management

HA global configuration: configure HA interface state synchronization group: configure interface state synchronization group interface state probe: configure interface state detection

Log server: configure log server log filtering: configure log filtering conditions

Deployment mode: configure bypass deployment mode VRP configuration: configure VRP

System diagnostic tools Ping, traceroute, TCP Syn tool information collection system information collection and packet capturing tool

SNMP: configure SNMP