+
  • 新 拷贝(1733118382203).jpg

Internet Behavior Management

The Nanjing Tianwei Internet Behavior Management Product NTW-XW600 features identity access, network auditing, behavior management, terminal control, and security compliance, helping users to clearly understand the network, use the network wisely, and realize the value of the network, providing users with a secure and intelligent integrated management system.
The NTW-XW600 is deployed at key nodes in the network in transparent, routing, or bypass mode, conducting comprehensive inspection and analysis of network data, achieving in-depth auditing and control of over ten thousand OA applications, entertainment applications, illegal applications, online gaming applications, and streaming video applications, among others. It combines technologies such as intelligent flow control, intelligent blocking, and intelligent routing to provide a powerful bandwidth management mechanism, generating clear and readable log reports, and multi-dimensional real-time alerts for abnormal internal network behavior, helping administrators build a secure and compliant internet environment.
The NTW-XW600 is suitable for various industries including government, finance, education, enterprises, and distribution, widely used in scenarios such as internet authentication, internet proxy, permission management, bandwidth assurance, VPN, and auditing compliance, providing customers with a secure, comprehensive, and user-friendly internet behavior management solution.
  • Commodity name: Internet Behavior Management

Contact Phone:

Contact E-mail:

  • Product Features
  • Product Parameters
  • Order Information
  • 2.1 Flexible Deployment, Flexible Networking

    The NTW-XW600 has flexible capabilities, suitable for deployment environments such as X86, ARM, domestic, and virtualization, fully meeting customers' needs for different performance levels and deployment scenarios.

    The NTW-XW600 integrates rich network features, supporting both IPv4/IPv6 dual protocol stacks, and, in conjunction with intelligent routing and DDNS, enables flexible networking in various complex network environments such as 802.1Q, RIP, and OSPF; it is capable of interfacing with third-party systems, sharing data, and enhancing business value.

    The NTW-XW600 product has excellent adaptability, suitable for various complex scenarios, and better meets business needs.

    2.2 Real-name Access, Trusted Identity

    The NTW-XW600 provides rich scenario-based internet identity access features, effectively avoiding management issues such as identity impersonation, privilege escalation, and privilege abuse.

    ØLocal Authentication: Local account password authentication, IP/MAC authentication

    ØSingle Sign-On:AD-SSO, PPPoE-SSO, Web-SSO, Radius-SSO, Database-SSO

    ØThird-party server linkage: LDAP, Radius, Mail server, CAS, Oauth

    ØSimplified Authentication: SMS authentication, WeChat authentication, Mini Program authentication, QR code authentication

    ØSelf-registration Authentication: Internet users can register their identity information, which can be used for subsequent internet access verification.

    ØHybrid Authentication: Internet users can choose the authentication type based on their habits and needs.

    2.3 Precise Standards, Manageable Permissions

    The NTW-XW600 system is equipped with over ten thousand application and tens of millions of domain recognition features. Combined with DPI/DFI integrated recognition technology, it conducts comprehensive traffic analysis to achieve refined management based on dimensions such as IP, user, application, content, traffic, and time, helping organizations promptly intercept illegal content and establish an orderly and efficient management baseline.

    2.4 Intelligent Flow Control, Enhancing Experience

    It helps managers thoroughly understand the current and historical bandwidth resource usage within the organization and formulate corresponding bandwidth management strategies, ensuring core users and core businesses during work hours, while limiting resource occupation by unrelated businesses, thus improving network usage efficiency.

    To address network congestion issues, it dynamically borrows idle channel bandwidth resources to achieve full resource utilization and enhance user experience on the network.

    2.5 Compliance Audit, Behavior Visibility

    By associating information such as "user", "behavior", and "traffic", it visually presents users' internet dynamics through tables, bar charts, pie charts, percentages, trend graphs, etc., helping managers clearly see and understand the network, providing data support for organizational baseline management.

    Audit data supports local retention and external transmission, with large-capacity storage allowing local retention for over 180 days, meeting the requirements of Order No. 151 and the Cybersecurity Law, while also supporting integration with various public security log platforms for on-demand reporting of audit data to avoid regulatory risks.

    Application Scenarios:

    ØUser Access/User Real-name System

    ØNetwork Permission Management

    ØNetwork Quality Management

    ØInterconnection of Multi-branch Networks in Chain Units

    ØPreventing circumvention, online loans, network sharing, etc.

    ØAudit and Management of Confidential Industry Terminals

    ØPlug-and-play in the hotel industry

    ØNetwork Exit Construction for Small and Micro Units

    ØVirtualization or SDK integration, adding behavior control

    ØCompliance construction for classified protection, Order No. 151, Cybersecurity Law, etc.

  • Specific Indicators

    Function Description

    1. Deployment Mode

    Bridge Mode

    Supports deployment in bridge mode, including single bridge and multi-bridge deployment modes; supports Bypass functionality.

    Routing Mode

    Supports deployment in routing mode, can act as an exit gateway, including single exit and multi-exit deployment modes; supports firewall and NAT functionalities.

    *One-Arm Mode

    Supports deployment in one-arm mode, achieving internal and external network forwarding functions under a single physical interface.

    Bypass Mode

    Supports deployment in bypass mode, supporting traffic flow and splitting methods.

    Supports IPv6 Deployment

    Fully supports IPv6, including internet authentication, application control, traffic control, content auditing, log reporting, etc.

    High Reliability (HA)

    Supports HA functionality with one primary and one backup mode.

    1. Network Management Methods and Policies

    WEB Management

    Supports device configuration and management through a WEB graphical interface using HTTP and SSL encryption, supporting English, Simplified Chinese, and Traditional Chinese interfaces.

    SSH Management

    Supports SSH command line management.

    Telnet Management

    Supports management via Telnet.

    Console Management

    Supports Console management.

    Network Management Policies

    1. Management permissions are separated: the system defaults to super administrator, audit administrator, and read-only administrator, and administrator roles can be flexibly customized as needed.
    2. Supports security management functions such as password strength, password usage duration, password attempt lockout, and account activation.
    3. Through network management policies, certain IPs can be allowed to manage devices to restrict unauthorized administrator access.
    4. Administrators can authenticate through AAA servers, such as Radius servers.
    5. Global administrator login source IP address restrictions can be set.
    1. Network Functions (IPV4)

    Static Routing

    Supports static routing functionality.

    Policy Routing

    Supports policy routing based on source and destination IP addresses and source physical interfaces.

    Policy Routing

    Supports policy routing functionality.

    Link Load Balancing

    Supports load balancing across multiple links.

    Continuous Routing

    Supports continuous routing algorithms for links.

    Dynamic Routing Protocols

    Supports dynamic routing protocols such as OSPF, BGP, and RIP.

    Link Backup

    Supports backup functionality for primary and backup links.

    PPPOE Dial-up

    Supports PPPOE dial-up functionality, supporting load balancing across multiple PPPOE dial-ups.

    DHCP Server

    Supports DHCP server and relay functionality.

    DHCP Client

    Supports DHCP client to obtain dynamic IP address functionality.

    VLAN Subinterface

    Supports VLAN subinterface functionality.

    Link Aggregation

    Supports bundling multiple ports into a single logical port to increase bandwidth and provide link backup.

    DNS Proxy

    Supports DNS proxy functionality.

    DNS Cache

    The device acts as a transparent DNS proxy, caching DNS records.

    Dynamic DNS Functionality

    Supports dynamic DNS functionality, such as Peanut Shell, Alibaba Cloud, etc.

    Intelligent DNS

    For multi-IP DNS resolution, supports intelligent processing based on user source, returning the intelligently determined IP to the user without requiring user selection. DNS balancing algorithms include: by weight, by upstream traffic, by downstream traffic, by total traffic.

    Proxy Server

    Supports HTTP and HTTPS proxy servers, and supports secondary proxy functionality.

    GRE Tunnel

    Supports GRE tunnel functionality.

    Plug and Play Functionality

    Due to the varying IP address configurations of hotel guests' computers, hotel network management personnel often need to configure them before they can access the internet.
    Regardless of how the guest's computer is configured, once the hotel plug-and-play function is enabled, guests can access the internet simply by plugging in the network cable.

    DNS Proxy Functionality

    If a guest's computer is configured with an invalid DNS or an external DNS, resulting in inability to access the internet or slow internet speed, enabling the DNS proxy function allows guests to access the internet normally regardless of their DNS configuration.

    1. Network Functions (IPV6)

    DHCPv6

    Supports stateful and stateless allocation of IPv6 addresses.

    Static Routing

    Supports static routing functionality.

    Policy Routing

    Supports policy routing based on source and destination IP addresses and source physical interfaces.

    Link Load Balancing

    Supports load balancing for links.

    Continuous Routing

    Supports continuous routing algorithms for links.

    Link Backup

    Supports backup functionality for primary and backup links.

    Neighbor Table

    Supports IPv6 neighbor table functionality.

    NAT66

    Supports IPv6 to IPv6 internal network proxy for internet access, one-to-one address translation, port mapping, and server load balancing.

    NAT64

    Support proxying from IPv6 to IPv4, port mapping from IPv4 to IPv6, and port mapping from IPv6 to IPv4.

    DNS64

    Support proxying DNS requests for IPv6, converting DNS AAAA record requests into DNS A requests for sending out, and returning the DNS AAAA to the client upon receiving a response. It can also work with NAT64 functionality to access IPv4 resources in an IPv6 network.

    1. VPN

    PPTP VPN

    Support PPTP VPN.

    IPSec VPN

    Support standard IPSec VPN functionality.

    L2TP VPN

    Support L2TP VPN.

    SSL VPN

    Support SSL VPN.

    1. Security Protection

    Firewall

    Support stateful inspection firewalls, allowing or blocking based on IP, port, service, user, and user group.

    NAT Translation

    Support various NAT translation strategies, including many-to-one PAT translation, one-to-one address translation, and port mapping.

    DOS/DDOS Protection

    Support protection against ARP flood attacks, IP and port scanning, DOS/DDOS protection (ICMP flood, UDP flood, SYN flood, DNS flood attack protection), unknown protocol type protection, TearDrop attack protection, IP packet fragmentation transmission protection, LAND attack protection, WinNuke attack protection, Smurf attack protection, and abnormal message detection protection.

    ARP Spoofing Protection

    Protection against ARP attacks on the device itself or client machines.

    Mobile Device Management

    Identify and manage mobile devices, allowing or denying access to the network.

    1. Application Identification

    Application Feature Library

    Support for P2P downloads, email, job recruitment, online meetings, online storage, online gaming, and dozens of other application categories, with over 10,000 application features.

    URL Library

    Support for over 60 URL categories related to IT, blogs, email, audio and video downloads, online shopping, etc., with over ten million entries.

    *Asset Identification Library

    Support for identifying device types such as network devices, IoT devices, security devices, and computer operating systems.

    Protocol Stripping

    Support for stripping protocol headers from special protocols (such as MPLS, PPPoE, VLAN (Q-in-Q), L2TP, GRE, CAPWAP, etc.), allowing for authentication, auditing, and control of the original data encapsulated within special protocols.

    Custom Applications

    Custom application rules can be defined based on protocol, port, destination IP, etc.

    Custom Feature Identification

    Custom features can be defined based on protocol, session direction, source port range, destination port range, destination address, payload data length, data packet feature strings, location, and other information.

    Custom Forum Posting Features

    Posting features can be defined based on URL, HOST, encoding type, MIME type, subject keywords, and content keywords.
    Forum posting audit content can be extracted based on features.

    Custom URL Library

    Support for customizing URL types based on domain names.

    1. Traffic Control

    Traffic Priority

    Application traffic can be divided into three priority levels: high, medium, and low, with higher priority traffic being transmitted first.

    Parent-Child Channel

    Support for traffic parent-child channel technology, supporting three levels of parent-child channels.

    Maximum Bandwidth

    Specify maximum bandwidth for certain users or specific applications.

    Guaranteed Bandwidth

    Combining maximum bandwidth and traffic priority, certain key applications or VIP customers can be guaranteed a certain bandwidth.

    Reserved Bandwidth

    Reserve a certain bandwidth for specific applications or key customers to ensure that certain traffic can access the reserved bandwidth at any time and in any network environment. Reserved bandwidth cannot be used by other traffic.

    Line-Based Flow Control

    Traffic management can be performed based on the line.

    Application-Based Flow Control

    Combining application protocol identification functionality, traffic management can be performed based on the user's application protocol category.

    IP-Based Flow Control

    Traffic management based on source IP address/address group.

    User Group-Based Flow Control

    Different traffic management measures can be taken for different user groups.

    Time-Based Flow Control

    Differentiated traffic management can be performed based on different time periods.

    Single User-Based Flow Control

    Control can be applied to a single host based on the host's IP address or user name.

    • Maximum upstream/downstream bandwidth limit.
    • Maximum upstream/downstream session control.
    • Bandwidth control for classified services, which limits the total bandwidth of a single host while controlling certain services. For example, limiting a single host's upstream/downstream bandwidth to 500K/1M while also limiting P2P bandwidth to 100K/200K and online TV to 100K/100K, etc.
    • The above parameters can be managed by time period.

    Application quota management

    Limit the total amount of traffic or usage time that a specified application can use in one day.

    Channel bandwidth statistics

    Support real-time viewing of channel bandwidth and the usage of sub-bandwidth.

    *Line idle threshold setting

    Support adjusting bandwidth based on the line's idle threshold. When the line load is below the idle threshold, the line limit can exceed the user-defined limit. When the line load is high and exceeds the idle threshold, the channel bandwidth returns to the user-defined limit.

    *Suppress P2P downstream packet loss

    Suppress packet loss for P2P downloads, streaming media, and other applications in the downstream direction.

    1. Real-time traffic monitoring

    TOP 50 service traffic monitoring

    View real-time monitoring of the top fifty service traffic.

    Service group traffic monitoring

    Classify and count each service, and view the real-time service group traffic monitoring chart.

    Active service statistics

    View the latest rate of currently active services, traffic in the last hour, average rate in the last hour, which users are using each service, and each user's usage situation.

    All service statistics

    View the latest rate of currently active services, traffic in the last hour, and average rate in the last hour.

    TOP 50 user traffic monitoring

    View the transmission rate, new session rate, and number of active sessions for the top fifty users.

    Online user statistics

    Real-time view of detailed information about current online users: online traffic, latest rate, number of sessions, online time, etc.

    Internet behavior

    Real-time view of online users' browsing records, search engines, email sending and receiving, account logins, and other internet behavior.

    Physical port

    View the status of received messages at physical ports and the trend chart of transmission traffic for each port.

    Dynamic update of real-time monitoring chart

    Support dynamic display of network traffic monitoring charts.

    Prevent shared internet user list

    Punishment list for shared internet behavior through wireless routers, 360WiFi, etc.

    Current blacklist

    Punishment list for exceeding the blacklist policy threshold.

    Application quota users

    List of users who exceed the application quota management threshold.

    1. User authentication

    Organizational structure

    Can establish a network organizational structure identical to the enterprise organizational structure, categorizing users into corresponding user groups. Each user or user group can have its own internet access policies and permissions.

    Temporary account management

    Support temporary accounts.
    Users can apply for temporary accounts, mainly for external temporary users. Supports automatic review and manual review by administrators to add temporary accounts to the organizational structure. Reduces the frequency of administrator configuration for temporary accounts, unifying the management of internet access permissions and usage periods for temporary accounts.

    Batch production of temporary accounts

    Supports batch production of temporary accounts, specifying the number produced and the validity period. Also supports receiving temporary account passwords via email.

    Uncertified user management

    Users who have not been certified can have some permissions released, allowing specific services or specific destination IP addresses or specific URLs.

    Local authentication

    Store user information within the device, no need for third-party servers during authentication.

    AD domain authentication

    Supports AD domain authentication, facilitating integration with existing domain authentication within the organization.

    RADIUS authentication

    Supports authentication with third-party RADIUS servers.

    LDAP authentication

    Supports LDAP authentication, facilitating integration with existing LDAP authentication within the organization.

    POP3 authentication

    Supports authentication with account information from existing POP3 servers, simplifying configuration and deployment.

    WEB authentication

    Combines local databases, POP3, AD, LDAP, or RADIUS server authentication methods to provide Web authentication functionality for access users.

    Single sign-on

    Supports AD SSO, PPPOE SSO, Web SSO, RADIUS SSO, city hotspot SSO, H3C IMC SSO, PROXY SSO, SAM SSO, Tianrongxin CSP/ESP, Ruijie SMP, MCP, and various other single sign-on username recognition.

    SMS authentication

    Supports authentication via SMS verification code. (External USB SMS modem or third-party SMS network linked authentication)

    Oauth authentication

    Supports third-party Oauth authentication.

    WIFIdog authentication

    Supports WIFIdog authentication method and supports AWIFI integration.

    *Social account authentication

    Supports WeChat, Enterprise WeChat, DingTalk, Facebook, Gmail, and WeChat Mini Program authentication.

    CAS authentication

    Supports CAS authentication method.

    Database authentication

    Supports authentication with accounts stored in databases like MySQL.

    SMP Certification

    Supports interaction with Ruijie SMP certification servers to obtain SMP online/offline usernames and corresponding IP information.

    LDAP/AD Import

    User/user group information can be imported according to the organizational structure of LDAP/AD and other servers.

    *DingTalk Team Import Local Organizational Structure

    Import the organizational structure of DingTalk to the local organizational structure through the DingTalk interface.

    User Synchronization

    User information from external servers such as LDAP and AD can be synchronized to the device without manually adding user information.

    User Import

    User information files that have been exported, or files edited according to specified user formats, can be imported in bulk.

    Automatic Account Creation

    For accounts that have not been created, new usernames can be automatically created based on their IP address, MAC address, hostname, or VLAN ID, and can be bound to IP, bound to MAC, bound to IP+MAC, bound to VLAN, and automatically assigned to a specified user group with designated network permissions.

    IP/MAC Binding

    Supports binding IP, binding MAC, and binding IP+MAC.

    VLAN Binding

    Supports VLAN binding.

    No Authentication Function

    Special IPs can be set to access the network without authentication.

    Display Specified Page After Authentication

    Authenticated users can be forcibly redirected to the enterprise entry webpage, such as the organization's announcement page.

    Custom Authentication Page

    Supports custom user authentication login pages.

    Authentication Conflict Handling

    Supports repeated logins for accounts, and when the maximum allowed login number is exceeded, it supports whether to kick off the previous login.

    Intranet Host Scanning

    Can scan the host information of the intranet through the NetBIOS protocol, and the scan results will list each host's IP address, MAC address, and hostname, etc., which can then be added to a user group to gradually improve the management of the organizational structure.

    Cross-Layer MAC Recognition

    Supports obtaining the real MAC of users on switches through the SNMP protocol, supports SNMPv2/3, and supports automatic recognition.

    1. Internet Behavior Management
      1. Web Filtering

    URL Filtering

    Supports content filtering based on URL types.

    Keyword Filtering

    Filters keywords entered in search engines, forum and microblog posting keywords, and webpage content keywords, automatically blocking URLs found that involve vulgar or illegal content.

    Encrypted HTTPS Content Recognition

    Supports recognition and filtering of encrypted webpages in non-bypass mode, and supports auditing and filtering of encrypted WEB emails, search engine keywords, etc.

    Encrypted Email Recognition

    Supports auditing and filtering of SMTPS, POP3S, IMAPS encrypted emails in non-bypass mode.

      1. Application Control

    Application Control

    Supports allowing and blocking traffic based on application types.

      1. Keyword Filtering

    Search Keyword Filtering

    Supports filtering based on keywords in web searches.

    HTTP Request Keywords

    Supports filtering based on keywords in HTTP requests.

    Webpage Content Keywords

    Filters based on keywords in webpage content.

    TELNET Command Keywords

    Filters based on keywords in TELNET commands.

      1. File Transfer Filtering

    HTTP File Transfer Filtering

    Can recognize file uploads and downloads of HTTP webpages and filter the uploads and downloads.

    FTP File Transfer Filtering

    Can recognize file uploads and downloads of FTP webpages and filter the uploads and downloads.

      1. File Transfer Filtering

    Proxy Control

    Recognition and control of proxy behaviors using HTTP proxies, socks proxies, etc.

      1. Terminal Reminder

    Announcement Page

    Regularly redirect HTTP traffic to a specified announcement page to deliver announcement information to terminal users via the browser.

    URL Redirection

    Redirect terminal users accessing a specified domain name to a specific domain name through URL redirection.

      1. Email Filtering

    Filter Emails Based on Sender

    Filters email sending based on the sender's address.

    Filter Emails Based on Keywords

    Filters email sending based on "email subject", "body keywords", and "attachment content keywords".

    Filter Emails Based on Attachment Type

    Filters email sending based on the type of email attachments.

    Filter Emails Based on Attachment Size

    Filters email sending based on the size of email attachments.

    WebMail Email Filtering

    In addition to filtering SMTP sending, it also supports filtering of WeMail email sending.

    Terminal Type

    Policies can be set for mobile terminals, PCs, and other terminals.

      1. Access Policy

    IM Monitoring Rules

    Supports monitoring chat content and file transfer detection and auditing for chat tools such as QQ, MSN, Skype, and Alibaba Wangwang. Supports detection of processes running on internal network computers. Users must meet the corresponding process admission rules to allow their computers to connect to the internet.

    Operating System Rules

    Supports setting admission rules for specified Windows operating systems. For users who violate the rules, options include prohibiting internet access or merely recording the violation.

    Process Rules

    Supports detection of processes running on Windows PCs; only PCs that meet the rules can connect to the internet.

    File Rules

    Supports detection of file paths on Windows PCs; only PCs that meet the rules can connect to the internet.

    Registry Rules

    Supports detection of the registry on Windows PCs; only PCs that meet the rules can connect to the internet.

    Patch Rules

    Supports detection of patches for Windows PCs; for users who violate the rules, options include prohibiting internet access or
    merely recording.

    Scheduled Task Rules

    Can set task schedules for Windows PCs to execute specified tasks at designated times.

    Antivirus Rules

    Supports detection of antivirus software installation status and versions on Windows PCs, and sets rules. For users who violate the rules, options include prohibiting internet access or merely recording.

    External Connection Detection

    Detects external connection behaviors on Windows PCs, including dial-up behavior, using dual network cards, wireless network cards, connecting to illegal WiFi, 4G cards, using illegal gateways, connecting to external networks, using proxies, and custom illegal external connections. Users who violate the rules may be prohibited from accessing the internet.

    External Connection Control

    Supports controlling Windows PCs to access specified IP address ranges or prohibiting access to specified IP address ranges.

    Peripheral Management

    Supports setting permissions to allow or block external devices such as mobile storage, network devices, Bluetooth devices, cameras, and printers, and can set a whitelist for peripherals.

    Other Rules

    Prohibit logging into Windows PCs as a super administrator.

    *Ad Block Rules

    Intercept specified software pop-up ads through terminal plugins and report logs to the device.

      1. Asset Management

    *Asset Scanning

    Asset scanning settings enable full network terminal scanning to actively scan and detect terminals in the monitored network segment to identify internal network assets.

    *Asset List

    The terminal list is mainly used to view the status of internal network terminal devices, including terminal type, operating system, IP, and MAC information.

    *IP Management

    The IP list can be used to check the survival status of scanned hosts, with IP address ranges divided into 24-bit subnet masks.

      1. Policy Management

    Reuse Policy Objects

    User internet access permissions are presented as policy objects, which can be reused and referenced in users or user groups.

    Policy Inheritance

    Subgroups can inherit policy objects from parent groups.

    Policy Forced Inheritance

    Parent groups can force subgroups to inherit their policy objects.

      1. Blacklist Management

    *Shared Internet Access

    Detects shared internet access behaviors through wireless routers, 360WiFi, game application characteristics, WeChat characteristics, etc. If a single IP exceeds the set number of terminals, that IP will enter the anti-sharing internet access list.

    Credibility Mechanism: Mobile terminals determine credibility by accessing websites multiple times to identify terminal models, achieving credibility to confirm the mobile terminal model.

    Traffic Quota

    Can control users based on daily, weekly, and monthly traffic quotas. When a user's traffic exceeds the preset quota, the user will be placed on the blacklist.

    Rate Control

    When a user's upstream or downstream traffic continuously exceeds the preset threshold for a certain period (e.g., 5 minutes), the user will be placed on the blacklist.

    Concurrent Session Control

    When a user's upstream or downstream concurrent session count continuously exceeds the preset threshold for a certain period (e.g., 5 minutes), the user will be placed on the blacklist.

    New Session Count Control

    When a user's upstream or downstream new session count continuously exceeds the set threshold for a certain period (e.g., 5 minutes), the user will be placed on the blacklist.

    Time Period Control

    During certain time periods (e.g., after work, midnight), there are no restrictions on the user's rate and session count, and the traffic generated by the user is not counted towards the blacklist traffic quota.

    Multiple Punishment Methods

    When a user enters the blacklist, the user can be forcibly logged off, or the user's upstream rate, downstream rate, upstream sessions, downstream sessions, etc., can be modified.

    Double Punishment

    If the number of times a user enters the blacklist consecutively within a week, a month, or a quarter exceeds the preset number, the punishment time can be extended to several times the original.

    Terminal Type

    Control policies can be set for mobile terminals, PCs, and other terminal types.

      1. Internet Access Audit Management

    Audit Policy

    Default is to audit all; rules can be set to implement partial user audits and partial internet behavior audits.

    Audit Options

    You can specify the audit method, the maximum file size for auditing, session audit methods, and options for logging website access.
    .

    Terminal Type

    You can specify audit rules for internet behavior of mobile terminals, PCs, and other terminals.

      1. Whitelist Management

    Whitelist Management

    Data flows that comply with whitelist policy rules will not be controlled by "firewall rules, flow control rules, authentication policy rules, internet access policy object rules, blacklist rules"; internet traffic and behavior will not be recorded.

    Whitelist based on internal network users

    You can control the whitelist for internal network users (IP addresses, address ranges, address books, user groups).

    *Whitelist based on external IP addresses

    You can control the whitelist for internal network users accessing specific internet IP addresses (IP addresses, address ranges, address books, domain name groups).

    URL-based whitelist

    You can control the whitelist for internal network users accessing specific URL addresses.

    Time-based control

    You can control the whitelist based on time periods.

    Whitelist types

    Supports setting complete access (no auditing, no control), or auditing but not counting and controlling traffic.

    1. Self-security protection

    Prevent ARP spoofing

    Regularly send ARP broadcasts to prevent gateway device ARP from being tampered with.

    Session acceleration aging

    Quickly age certain sessions to prevent the session table from being filled.

    1. Alarm configuration

    Device alarms

    Supports device event log alarms, blacklist alarms, CPU, memory, active session count alarms, etc.

    Illegal website alarms

    Supports alarm settings for accessing custom illegal websites.

    Violation search alarms

    Supports alarms for searching illegal keywords in search engines.

    Violation posting alarms

    Supports alarms for posts containing illegal keywords.

    Violation upload alarms

    Supports alarms for transferring illegal file types on forums, cloud storage, etc.

    Violation email alarms

    Supports alarms for sending emails with illegal subject, content keywords, and illegal email attachment types.

    Violation IM alarms

    Supports alarms for logging in to violation IM chat accounts and keywords in violation chat content.

    Potential harm alarms

    Supports alarms for frequently triggered alarm events for certain keywords.

    Mining alarms

    Supports alarms for illegal access to mining URLs and mining applications.

    1. Troubleshooting

    Capture data packets

    You can specify device physical interfaces, source and destination IPs, source and destination ports, unidirectional or bidirectional traffic direction, protocol types, and other conditions to capture data packets passing through the device.

    View data packets

    You can directly view captured data packets on the device; you can also download data packets and use sniffing software like Sniffer, Ethereal, or Wireshark to view.

    Debug information download

    One-click download of fault information for analysis by developers.

    1. Report center

    Built-in report center

    The device has a built-in report center system that implements storage, query, auditing of internet behavior records and logs, as well as report generation.

    External report center

    Automatically transfers report data to an external independent server for storage in database form. This avoids the limitations of the device's built-in storage space and its impact on performance.

    Graphical log statistics tool

    Through a graphical report center, it is convenient for users to query, audit, and statistically analyze behavior records, and supports intuitive display of statistical results in pie charts, bar charts, line charts, etc.

    Hierarchical management

    Based on the administrator's permissions, they can view statistical data belonging only to their jurisdiction.

    Report generation

    Can convert report center related content into Excel, PDF reports, greatly simplifying the manual report creation for administrators.

    Automatic email alarms

    Supports automatic email alarms for specific security events.

    Automatic SMS alarms

    Supports automatic SMS alarms for specific security events.

      1. Statistical analysis

    Device resources

    Statistical analysis of device resources, including CPU usage, memory usage, active session count, online user count, etc., based on time periods.

    Physical interfaces

    Statistical analysis of the traffic and rate of physical interfaces based on time periods.

    User statistics

    Based on users,
    statistical analysis of their traffic, new sessions, active sessions over time, and further statistical analysis of which services each user used, which websites they visited, and which links they passed through, etc.
    Information.

    User group statistics

    Based on user groups, perform time-segmented statistical analysis of their traffic, new sessions, and active sessions, and further analyze detailed information such as which services each user group used, which websites they visited, and which links they passed through.

    Service Statistics

    Based on service names, perform time-segmented statistical analysis of their traffic, new sessions, and active sessions, and further analyze which users/user groups are using each service and the usage situation of each user/user group; as well as the distribution of each service across various links.

    Service Type Statistics

    Based on service types, perform time-segmented statistical analysis of their traffic, new sessions, and active sessions, and further analyze which users/user groups are using each type of service and the usage situation of each user/user group; as well as the distribution of each service type across various links.

    Website Statistics

    Based on URLs, perform time-segmented statistical analysis of their traffic, new sessions, and active sessions, and further analyze which users/user groups are using the services of each URL and the usage situation of each user/user group; as well as the distribution of each service type across various links.

    Website Type Statistics

    Based on website types, perform time-segmented statistical analysis of their traffic, new sessions, and active sessions, and further analyze which users/user groups are using each type of website and the usage situation of each user/user group; as well as the distribution of each service type across various links.

    Line Statistics

    Based on exit links, perform time-segmented statistical analysis of their traffic, new sessions, and active sessions, and further analyze detailed information about users, user groups, services, service types, websites, and website types on each link.

    Website Access Ranking

    1. Statistical ranking based on the number of times users/user groups accessed URLs.
    2. Statistical ranking based on the number of times websites/website types were accessed.

    Web File Download Ranking

    1. Statistical ranking based on the number of files downloaded by users/user groups through web pages.
    2. Statistical Ranking of File Types Downloaded

    Internet Usage Duration Statistics

    Statistics on the total duration of users' internet usage, and the usage time of each type of service.

    *Shared Access Statistics

    Statistics ranking the number of shared access users and terminals.

      1. Log Query

    Record the title of the webpage.

    Record the title content of the webpages visited by users.

    Record the URL of the website.

    Able to record the URL addresses of websites visited by users.

    Record Search Engine Keywords

    Record the keywords searched in search engines.

    Email Sending and Receiving Records

    • Record information about emails sent by users through clients (SMTP protocol, including encrypted emails), including: sender, recipient, email subject, body, attachments, date, email size, etc.
    • Record information about emails received by users through clients (POP3 protocol, including encrypted emails), including: sender, recipient, email subject, body, attachments, date, email size, etc.
    • Record information about emails sent by users through WebMail (including encrypted emails), including: sender, recipient, email subject, body, attachments, date, email size, etc.

    IM Chat Content Audit

    Record chat content information from QQ, MSN, Skype, Yahoo, Feixin, Ali Wangwang, etc., including sending account, receiving account, chat content, username, host IP, group, and corresponding time.

    Forum and Weibo Information

    Record posts and blog records from major forums and Weibo such as Tianya, Sohu, Sina, etc.; including over 40 types and hundreds of forums, Weibo, and community websites in categories such as comprehensive, social, entertainment, local, military, international, history, and automotive.

    Audit information includes title, body, posting website, username, group name, date, etc.

    Account Login Audit

    Record login accounts for applications in categories such as shopping, Weibo, blogs, forums, cloud storage, email, social entertainment, instant messaging, games, mobile ID, etc. This includes account audits for both web and client login methods.

    Outgoing File Audit

    • Record HTTP uploaded files from cloud storage services like NetEase Cloud, Baidu Cloud, Kingsoft Cloud, including file name, file size, username, group name, host IP, target IP address, upload URL, date, number of attachments, and downloads.
    • Record outgoing files from chat tools like QQ, Skype, MSN, Ali Wangwang, including file name, file size, username, group name, host IP, target IP address, upload URL, date, number of attachments, and downloads.
    • Record FTP uploaded and downloaded files, including file name, file size, username, group name, host IP, target IP address, upload URL, date, number of attachments, and downloads of FTP uploaded files.
    • Record emails sent via WebMail, SMTP, and received via POP3, including file name, file size, username, group name, host IP, target IP address, upload URL, date, number of attachments, and downloads of WebMail sent and SMTP sent email attachments.

    Outgoing POST Audit

    Record outgoing POST information for applications in categories such as shopping, Weibo, blogs, forums, cloud storage, email, search engines, games, comprehensive, mobile ID, etc.

    Telnet Behavior Record

    Record detailed information about users' Telnet operations.

    SAMBA Audit

    Support recording SAMBA protocol actions, including reading, writing files, logging in, file names, accounts, etc.

    Database Audit

    Support recording information such as executed SQL statements in databases.

    Session Records

    Detailed records of each session's information, including: username, user group, source IP/port, destination IP/port, conversion IP/port, MAC address, protocol type, protocol name, sent traffic, received traffic, session duration, session end time. Reports can be exported in EXCEL or HTML format.

      1. Block records

    Firewall blocking

    Detailed information on the amount of data blocked by firewall rules.

    Behavior management blocking

    Detailed information on the amount of data blocked by behavior management rules.

    Traffic management blocking

    Detailed information on the amount of data blocked by traffic management rules.

      1. Personal behavior statistics

    Personal behavior sub-item statistics

    Based on the logical tree structure in the organizational structure, users can be displayed one by one. Each user's internet behavior is statistically categorized, with specific content described in the subsequent sub-item descriptions.

    Personal web record statistics

    Records and displays each user's personal internet web page titles, web searches, forum microblogs, outgoing information, and URL access records.

    Personal instant messaging
    Communication records

    Records and displays each user's login records, chat records, or file transfer records for several instant messaging tools such as MSN, QQ, Yahoo, GTALK, Skype, Alibaba Wangwang, and Feixin. The chat record display fully simulates the chat record box style of instant messaging software.

    Personal email records

    Records and displays the detailed information of emails sent and received by each user. Email information includes: sender and recipient, subject, body, attachments and size, date, etc. If the user has multiple email accounts, the information for each account will be displayed separately. It fully simulates the display method of the FoxMail client.

    Personal account login records

    Records the login activities of each user's accounts for online shopping, microblogs, blogs, forums, email, video sites, social entertainment, instant messaging, etc.

    Personal outgoing file records

    Records and statistics for each user's HTTP uploads, instant messaging uploads, FTP uploads and downloads, and EMAIL sent files.

    Export personal behavior records

    Exports the internet behavior data of a single user as an Excel file.

      1. Audit exemption function

    Audit exemption Key

    By inserting the audit exemption Key into the computer, internet behavior auditing can be exempted. This can safely completely exempt the internet behavior auditing of company owners or senior leaders, avoiding the leakage of confidential information from senior management.

    Policy audit exemption

    Policies can be configured based on IP addresses to exempt specific IP users from internet behavior auditing.

    1. Network monitoring integration

    Network monitoring integration

    Supported network monitoring platforms: Renzi Hang, Paibo, Hengbang, Wangxing, and more than a dozen nationally certified network monitoring platforms.

Leave Us A Message

Note: Please leave your contact information and our professionals will contact you as soon as possible!

More Products

6-slot frame switch

The NTW-SW9600 core switch is a high-capacity 10G core switch launched by Nantianshi for core networks. To meet the market's demand for high performance, it adopts a green energy-saving design concept in hardware, utilizing high-frequency, high-density, and highly stable multilayer circuit board designs, and selecting top international high-frequency low-resistance components, which greatly reduces the device's power consumption. This not only improves network operation efficiency but also effectively reduces users' operating costs. In terms of software, it is equipped with a multilayer switch operating system that supports the vast majority of enterprise network Layer 2 and Layer 3 data exchange services. As a rack-mounted switch product, this switch can be widely applied in the core layer of campus networks across various industries, providing users with multi-service network solutions.

Large cabinet-type OLT

The NTW-G19000 is the company's latest modular design box platform for GPON/XGSPON or EPON/10G EPON. The device combines excellent industrial design with advanced manufacturing technology, providing users with a broadband access product that is moderately dense, highly reliable, flexible in networking, and easy to install and maintain. This product features line-speed forwarding capabilities for IPv4/IPv6 services, carrier-grade security features, and service performance, offering high reliability, high scalability, and strong service capabilities to provide large capacity, high-speed, and high-bandwidth data, voice, and video service access for carrier-grade broadband access networks. Depending on different user scenarios, this product can meet the application needs for various access situations such as FTTB, FTTC, and FTTH.

10 Gigabit AC Controller

The NTW-AC1000 is a high-performance smart Wi-Fi authentication gateway with a 10G capability, featuring a three-in-one function of AC, gateway, and authentication. It enables unified configuration and management of wireless APs, meeting the export gateway needs of enterprises. The NTW-AC1000 supports various authentication access methods, including WeChat authentication, making it an ideal device for optimal layout of wireless network solutions in chain hotels, enterprises, schools, shopping malls, and restaurants. The configuration is very simple. Additionally, the NTW-AC1000 supports intelligent flow control, which intelligently selects priority based on application type, easily resolving issues of various P2P programs occupying network bandwidth. This product is characterized by high performance, high reliability, easy installation, and easy maintenance, significantly saving labor and material costs in network layout.

< 1234...23 >

Please enter search keywords

搜索历史清除全部记录
最多显示8条历史搜索记录噢~
All
  • All
  • Product Management
  • News
  • Introduction
  • Enterprise outlets
  • FAQ
  • Enterprise Video
  • Enterprise Atlas