1 / 34

Active Wall

Active Wall. (C) Active Network CO., Ltd http://www.lanctrl.com. Background. The booming of computer network Spread of virus and Trojan Horse Spread of junk software and email Risk of gambling and porn online Low work efficiency by chatting, shopping and stock screening on line

Gideon
Download Presentation

Active Wall

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Active Wall (C) Active Network CO., Ltdhttp://www.lanctrl.com

  2. Background • The booming of computer network • Spread of virus and Trojan Horse • Spread of junk software and email • Risk of gambling and porn online • Low work efficiency by chatting, shopping and stock screening on line • Divulge confidentialdocuments and technology of company • Less control capability of network management

  3. Function of Active Wall • Network Authorization • Time Filtering • Port Filtering • Bandwidth Control • Real time Throughput Screening • MACFiltering • IP Address Filtering • DNS Filtering

  4. Function of Active Wall Cont. • HTTPFiltering • SMTP Filtering • POP3 Filtering • Instant Messaging Filtering • FTP Filtering • Proxy Forward • Log File Export • Email Alert notification • Message Alert Notification • Log File Database Export

  5. Advantage of Active Wall • Strong Filtering Engine • Multiple Monitoring Mode • High System Performance • Flexible Monitoring & Control Configuration • Comprehensive Log Saving Function • Automatic Online Update

  6. Security and Reliability of the System • Comprehensive Operation Privilege Audit • Strict Data Verification • 10000PCs online Management • 100M Network Traffic Throughput Control • Least influence on networking traffic, but provide network optimization • System availability for 7X24hours

  7. Quick & Easy Operation Graphic user interface Mouse and keyboard operation Detailed send & received message report Traffic statistical graphs for various protocols Visible event log

  8. Group and Time Slot Based Management Group management, max 256 groups Time slot management, max 256 time slots Management policy import, export, and delete Drag and drop operation supported within groups and the policy is valid at once

  9. Policy Import and Export Policy Import Policy Export Policy Delete Policy Download Policy Share

  10. Plug-in Based modules Deployment The filtering modules are deployed as plug-ins in ease of function extension, user operation and management

  11. Network Authorization IISauthentication, Windows authentication, Digest authentication. WEB server authentication, such as Apacheand Netscape Webpage authentication, such as ASP, PHP, CGI, Java, .NET. User defined authentication based on C/S architecture

  12. Time Filtering Set the weekly time slot to permit network connection

  13. Port Filtering TCPport filtering UDP port filtering Default group policy Commonly used port list

  14. Bandwidth Control Host bandwidth control Group bandwidth control Outbound traffic control Inbound traffic control Total traffic control Outbound quota control Inbound quota control Total quota control

  15. Real Time Traffic Display Total Traffic TCP UDP ICMP IGMP Packets statistic Byte statistic

  16. MACAddress Filtering Network card MAC address filtering MAC-IP address binding Default MAC address filtering

  17. IP Address Filtering IPaddress filtering IPnet filtering

  18. DNSFiltering Domain specify filtering Domain catalog filtering Support wildcard Filtering order tuning

  19. HTTPFiltering Webpage filtering Keywords of webpage content filtering Post keywords filtering Post file filtering HTTP tunnelforward prevent Post message length control Download file size control Support wildcard Filtering order tuning

  20. SMTPFiltering Sender address filtering Receiver address filtering Subject filtering Content filtering Attachment filtering Size filtering Support wildcard Filtering order tuning

  21. POP3 Filtering Sender address filtering Receiver address filtering Subject filtering Content filtering Attachment filtering Size filtering Support wildcard Filtering order tuning

  22. IM Filtering QQfiltering MSN filtering ICQ filtering Yahoo messenger filtering Sina UC filtering AOL filtering Google Talk filtering ……

  23. FTP Filtering Upload file filtering Download file filtering Upload file size control Download file size control Support wildcard Filtering order tuning

  24. Proxy Forward Mode Port forward NATto transparent proxy DNS forward HTTPforward SMTPforward POP3forward FTPforward IMAPforward NNTPforward

  25. Log Export Log to file Log to database Support various databases Improve efficiency by caching technology

  26. Alert & Notification Keywords matching Email alert Message alter

  27. Easy Installation Support various of monitoring mode, such as gateway, bridge, switching, and host. Support VLAN monitoring and monitoring in different subnet. Support many types of network. No client needed to install. One host installed, the whole network is under control

  28. Various Type of Network Support Gateway Mode Bridge Mode Passby Mode Host Mode

  29. Online Update Support

  30. Hardware Requirement

  31. Software Requirement • 32-bit Windows 2000/XP/2003OS • NDISCompatible NIC drivers • TCP/IP Installed

  32. Supported Protocols • IEEE 802.3 - 10BASE-T • IEEE 802.3u - 100BASE-TX • IEEE 802.3z - 1000BaseSX,1000BaseLX • RFC 768 - User Datagram Protocol • RFC 791 - Internet Protocol • RFC 792 - Internet Control Message Protocol • RFC 793 - Transmission Control Protocol • RFC 821 - Simple Mail Transfer Protocol • RFC 822 - STANDARD FOR THE FORMAT OF ARPA INTERNET TEXT MESSAGES • RFC 826 - Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware • RFC 959 - File Transfer Protocol • RFC 977 - Network News Transfer Protocol • RFC 1034 - Domain names - concepts and facilities • RFC 1035 - Domain names - implementation and specification • RFC 1112 - Host extensions for IP multicasting • RFC 1323 - TCP Extensions for High Performance • RFC 1519 - Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy • RFC 1521 - MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies • RFC 1522 - MIME (Multipurpose Internet Mail Extensions) Part Two: Message Header Extensions for Non-ASCII Text • RFC 1631 - The IP Network Address Translator (NAT) • RFC 1700 - Assigned Numbers • RFC 1725 - Post Office Protocol - Version 3

  33. Supported Protocols Cont. • RFC 1738 - Uniform Resource Locators (URL) • RFC 1866 - Hypertext Markup Language - 2.0 • RFC 1867 - Form-based File Upload in HTML • RFC 1869 - SMTP Service Extensions RFC 1918 - Address Allocation for Private Internets • RFC 1939 - Post Office Protocol (POP) - Version 3 • RFC 1945 - Hypertext Transfer Protocol -- HTTP/1.0 • RFC 1951 - DEFLATE Compressed Data Format Specification version 1.3 • RFC 1952 - GZIP file format specification version 4.3 • RFC 2044 - UTF-8, a transformation format of Unicode and ISO 10646 • RFC 2045 - Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies • RFC 2046 - Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types • RFC 2047 - MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text • RFC 2048 - Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures • RFC 2049 - Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples • RFC 2060 - Internet Message Access Protocol (IMAP) - Version 4 Rev 1 • RFC 2068 - Hypertext Transfer Protocol -- HTTP/1.1 • RFC 2070 - Internationalization of the Hypertext Markup Language • RFC 2131 - Dynamic Host Configuration Protocol • RFC 2236 - Internet Group Management Protocol, Version 2 • RFC 2279 - UTF-8, a transformation format of ISO 10646 • RFC 2396 - Uniform Resource Identifiers (URI): Generic Syntax • RFC 2616 - Hypertext Transfer Protocol -- HTTP/1.1 • RFC 2617 - HTTP Authentication: Basic and Digest Access Authentication

  34. The End!

More Related