Guangzhou Mingguan Information Technology Co., Ltd
Home>Products>Deeply convinced of MIG-1000-B500 integrated gateway
Deeply convinced of MIG-1000-B500 integrated gateway
Deeply convinced of MIG-1000-B500 integrated gateway
Product details

Requirement analysis:

ØBusiness needs to access the internet - Deploy export routing LAN mobile office - Deploy wireless AP


ØBusiness system driver requirements for interconnection with headquarters - deployment of VPN devices for network security - deployment of firewalls


ØDifficulty in wired network coverage - Deploying 3G routers


Challenges at the business management level:


ØHow to ensure secure terminal access, monitor abnormal terminal traffic, and reduce internal network risks


ØHow to achieve reasonable bandwidth allocation to ensure stable and efficient transmission of core business data


ØHow to effectively control internal network behavior, block and restrict non business data, and improve employee work efficiency


ØHow to reduce network management and maintenance costs for IT administrators


MIG can provide integrated solutions for small and medium-sized enterprise customers, meet the diverse needs of large enterprise branches, and achieve cost-effective solutions from flexible networking to business control




Product solution value:


The core value that MIG products bring to customers

Flexible Networking - Multiple Product Forms

ØIntegrate independent 3G module devices

ØIntegrating 3G and Wi Fi modules into one device;

ØIndependent multi WAN port module device;

Network Management - Ensuring Network Stability

ØResolve the issue of local LAN access to external network traffic control management;

ØUse an authentication system to prevent external users from accessing the network without authorization;

ØImplementing access control for network applications to maintain network stability;

ØRecord and trace network behavior to achieve traceability of network behavior

Interconnection

ØUsing VPN to solve local LAN and headquarters or other branch network issues

The issue of interconnectivity;

ØWired and wireless combination to meet the requirements of fixed and non fixed Internet lines

secure

ØSolving daily security protection issues in local area networks - built-in firewall, solving

Common ARP attacks and DOS attacks that affect network stability in local area networks;

ØMonitoring of abnormal traffic on terminals to freeze dangerous terminals

ØSupport LAN VLAN partitioning throughVLANAccess control, allowing or denyingVLANAccess between

ØSupport expandable encryption algorithms to the National Cryptography Office

simplify

ØProxy internet access can simplify the deployment, construction, and maintenance workload of small-scale networks for users;

ØSupport unified management by SC centralized management platform, status monitoring, policy issuance, etc., effectively reducing operation and maintenance costs;

Marketing Value Added:

ØSupport Wi Fi LAN coverage, support username and password authentication function, and use WEB authentication for advertising push

Functional advantages

üMulti functional integrated device: basic traffic management VPN、3G/WI-FI、 Firewall, routing and switching integrated device

üStronger application recognition capability in the industry; Built in over 850 more comprehensive application recognition rule libraries, continuously updated to help customers achieve precise application control and management;

üMore precise traffic control technology: achieve precise intelligent management and control for users, time periods, and application types;

üClear traffic distribution ranking of internal network applications and terminals, and viewing of online behavior records;

üMore stable VPN interconnection technology, automatic link healing technology, standard compatibility, and ensuring the stability of the business network carrying it;

üSupport web authentication, advertising push, and achieve value-added marketing

performance parameter


Deployment mode

Gateway/Single Arm/Bridge

Support gateway/Single arm/bridge mode deployment, with defense against attacks, intrusion prevention, and proxy for intranet users to access the internet; Support static addresses,PPPoEdial

IPSecVPN

IPSec VPN

professionalVPNModule, compatible with international standards, supports integration with third-party IPsec VPNs

Sangfor VPN

Ease of Use

Support inter tunnel routing, inter tunnel NAT, and bi-directional access control within tunnels

Built in Wi Fi

Wireless AP coverage

Support LAN wireless coverage, achieve mobile office, support 802.11n standard, support

WAP-PSK/WAP2-PSK secure encryption, supporting wireless MAC address filtering

Supports 3G lines

Support external 3G connection

USB network card

It is possible to establish a wide area network line through 3G network to address the difficulty or unattainability of fixed network coverage

Backup lines can be established for the current fixed network lines through 3G, supporting online monitoring and automatic switching mechanisms

Supports WCDMA/CDMA2000 standard mainstream 3G network card

Manageability

Administrator hierarchical management

Support differentiated authorization management between system administrators and regular administrators

Online User Management

Real time viewing of logged in users' usernames through the console interfaceIPPermission and operation timeAnd support freezing illegal users

authentication

WEB authentication

Support username and password authentication

IP-MACbinding

Support user hosts in three-layer network environmentsIP-MACBinding function

IP/MACauthentication

Based on the user'sIPaddress/MACAddress indicates the user's identity

Automatically create an account

Can be approved throughMIGBind the device to the host for internet accessIPBindingMACBindingIP-MACAnd automatically assigned to the designated user groupEnjoy the network permissions specified by the user

audit

Real time recording of logs

Including access time, refusal/approval of internet behavior operations, host IP, type of access object, and name of access object

MIG Integrated Gateway Product Function List

Support Syslog

Support Syslog export and implement dumping function for online behavior records

Security

Support national encryption algorithms

Support the National Security OfficeSM2SM3SM4algorithm

Marketing

Advertising push

Implementing ad page push based on specific users or terminals

Application recognition rules

Application recognition rule library

giveSANGFOR ACShared application recognition libraryhave20Multiple categories, exceeding850Application recognition rulesIt is a larger application protocol identification library in ChinaAnd support real-time updates

Manually adding application recognition

Can be manually added based onDeep Content DetectionIdentification rules for new application protocols of technologyRealize personalized recognition and blockingProvide unlimited scalability

Identification of Intelligent P2P

Intelligent recognition including encryptionBTEncrypt electric mules and other encryption devicesP2PBehavior, various rampant versionsP2Pbehavior every Plant uncommonP2PBehavior, to further enhance encryptionP2PProviding a foundation for behavior management

access control

Access Control Policy

Network usage can be controlled by grouping, time periods, and servicesSupport setting user network access time and speed limits

Application Protocol Control

be based onAC is moreComplete network application protocol identification libraryCan be applied to all the aforementioned online gamesIMStock trading, online streaming mediaP2PTools and other applications are used for blocking

Customize internet access time period

In half an hour unitsSupport setting at any time periodSupport setting multiple time periods per daySupport different times every day, seven days a week Segment settingsProvide customers with more flexible time control capabilities

Flow control

P2PFlow control

Allow designated users to useP2PbehaviorBut manage and control the bandwidth resources it occupies

line of business community More flexible live of flow control

Based on the user's network application behavior, the type of website visited, and different users/User groups and different time periods for traffic management strategy

WAN->LANFlow control

Partition the bandwidth resources specified in the exportAnd allocate the designated bandwidth resources to the designated servers that provide external accessRealize external release Application guarantee

Viewing bandwidth channel status

Support real-time viewing of the usage, status, traffic, etc. of each bandwidth channelReal time display of the top ten applications and users with current traffic

firewall

Preventing DoS from both public and internal networks

Support resisting attacks from the public networkDoSattackSupport for outbreaks within internal networksDoSAttack detection and defense webDoS

preventionARPdeception

Support for internal networksARPDefense against deception

firewall

Built in enterprise level firewall based on state monitoringProvide dual protection for gateway device security and organizational intranet security

Routing & Switching

centralized management

Divide VLANs

Support LAN VLAN partitioning throughVLANAccess control, allowing or denyingVLANAccess between

NAT Address Translation

supportDNATSNATWaiting for variousNATAddress translation strategy

Dynamic address allocation

supportDHCPservice function

Support SC centralized control

Support SC centralized control, implement configuration strategy issuance, software upgrades, management and maintenance, etc

Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!