(After selection, your message can only be seen by merchants. It is recommended that you select it when asking for private information such as price)zero/200Post a message
Support rich and reliable VPN features, such as IPSec VPN, SSL VPN, L2TP VPN, MPLS VPN, GRE, etc., provide self-developed VPN client SecoClient, realize SSL VPN, L2TP VPN and L2TP over IPSec VPN user remote access, support DES, 3DES, AES, SHA, SM2/SM3/SM4 and other encryption algorithms
Intrusion detection
Intrusion prevention and Web protection: Get the latest threat information at the first time, accurately detect and defend attacks against vulnerabilities.It can protect against various attacks against the web, including SQL injection attacks and cross site scripting attacks
Administration
Bandwidth management: on the basis of identifying business applications, it can manage the bandwidth used by each user/IP to ensure the network experience of key businesses and key users. Control methods include: limiting the maximum bandwidth or ensuring the minimum bandwidth, application policy routing, modifying application forwarding priority, etc Cloud management mode: the device initiates authentication and registration to the cloud management platform, realizing plug and play, simplifying network creation and start, remote business configuration management, device monitoring fault management, and cloud management of massive devices
Integrated protection: integrating traditional firewall, VPN, intrusion prevention, anti-virus, data leakage prevention, bandwidth management, anti DDoS, URL filtering, anti spam and other functions, global configuration view and integrated policy management Application recognition and control: Recognize 6000+applications, access control accuracy to application functions, such as distinguishing WeChat text and voice.Application identification and intrusion detection, anti-virus and content filtering are combined to improve detection performance and accuracy APT defense: linkage with local/cloud sandbox to detect and block malicious files, encrypted traffic does not need to be decrypted, linkage with big data analysis platform CIS to realize threat detection of encrypted traffic, actively respond to malicious scanning behavior, and conduct behavior analysis through linkage with big data analysis platform CIS to quickly detect and record malicious behavior, so as to achieve real-time protection against enterprise threats Cloud application security awareness: it can carry out refined and differentiated control over enterprise cloud applications to meet the enterprise's control needs for users' use of cloud applications