Requirement analysis:
ØBusiness needs to access the internet - Deploy export routing LAN mobile office - Deploy wireless AP
ØBusiness system driver requirements for interconnection with headquarters - deployment of VPN devices for network security - deployment of firewalls
ØDifficulty in wired network coverage - Deploying 3G routers
Challenges at the business management level:
ØHow to ensure secure terminal access, monitor abnormal terminal traffic, and reduce internal network risks
ØHow to achieve reasonable bandwidth allocation to ensure stable and efficient transmission of core business data
ØHow to effectively control internal network behavior, block and restrict non business data, and improve employee work efficiency
ØHow to reduce network management and maintenance costs for IT administrators
MIG can provide integrated solutions for small and medium-sized enterprise customers, meet the diverse needs of large enterprise branches, and achieve cost-effective solutions from flexible networking to business control
Product solution value:
The core value that MIG products bring to customers
Flexible Networking - Multiple Product Forms
ØIntegrate independent 3G module devices
ØIntegrating 3G and Wi Fi modules into one device;
ØIndependent multi WAN port module device;
Network Management - Ensuring Network Stability
ØResolve the issue of local LAN access to external network traffic control management;
ØUse an authentication system to prevent external users from accessing the network without authorization;
ØImplementing access control for network applications to maintain network stability;
ØRecord and trace network behavior to achieve traceability of network behavior
Interconnection
ØUsing VPN to solve local LAN and headquarters or other branch network issues
The issue of interconnectivity;
ØWired and wireless combination to meet the requirements of fixed and non fixed Internet lines
secure
ØSolving daily security protection issues in local area networks - built-in firewall, solving
Common ARP attacks and DOS attacks that affect network stability in local area networks;
ØMonitoring of abnormal traffic on terminals to freeze dangerous terminals
ØSupport LAN VLAN partitioning throughVLANAccess control, allowing or denyingVLANAccess between
ØSupport expandable encryption algorithms to the National Cryptography Office
simplify
ØProxy internet access can simplify the deployment, construction, and maintenance workload of small-scale networks for users;
ØSupport unified management by SC centralized management platform, status monitoring, policy issuance, etc., effectively reducing operation and maintenance costs;
Marketing Value Added:
ØSupport Wi Fi LAN coverage, support username and password authentication function, and use WEB authentication for advertising push
Functional advantages
üMulti functional integrated device: basic traffic management VPN、3G/WI-FI、 Firewall, routing and switching integrated device
üStronger application recognition capability in the industry; Built in over 850 more comprehensive application recognition rule libraries, continuously updated to help customers achieve precise application control and management;
üMore precise traffic control technology: achieve precise intelligent management and control for users, time periods, and application types;
üClear traffic distribution ranking of internal network applications and terminals, and viewing of online behavior records;
üMore stable VPN interconnection technology, automatic link healing technology, standard compatibility, and ensuring the stability of the business network carrying it;
üSupport web authentication, advertising push, and achieve value-added marketing
performance parameter
Deployment mode |
Gateway/Single Arm/Bridge |
Support gateway/Single arm/bridge mode deployment, with defense against attacks, intrusion prevention, and proxy for intranet users to access the internet; Support static addresses,PPPoEdial |
IPSecVPN |
IPSec VPN |
professionalVPNModule, compatible with international standards, supports integration with third-party IPsec VPNs |
Sangfor VPN |
Ease of Use |
Support inter tunnel routing, inter tunnel NAT, and bi-directional access control within tunnels |
Built in Wi Fi |
Wireless AP coverage |
Support LAN wireless coverage, achieve mobile office, support 802.11n standard, support WAP-PSK/WAP2-PSK secure encryption, supporting wireless MAC address filtering |
Supports 3G lines |
Support external 3G connection USB network card |
It is possible to establish a wide area network line through 3G network to address the difficulty or unattainability of fixed network coverage Backup lines can be established for the current fixed network lines through 3G, supporting online monitoring and automatic switching mechanisms Supports WCDMA/CDMA2000 standard mainstream 3G network card |
Manageability |
Administrator hierarchical management |
Support differentiated authorization management between system administrators and regular administrators |
Online User Management |
Real time viewing of logged in users' usernames through the console interfaceIPPermission and operation time,And support freezing illegal users |
|
authentication |
WEB authentication |
Support username and password authentication |
IP-MACbinding |
Support user hosts in three-layer network environmentsIP-MACBinding function |
|
IP/MACauthentication |
Based on the user'sIPaddress/MACAddress indicates the user's identity |
|
Automatically create an account |
Can be approved throughMIGBind the device to the host for internet accessIPBindingMACBindingIP-MAC,And automatically assigned to the designated user group,Enjoy the network permissions specified by the user |
|
audit |
Real time recording of logs |
Including access time, refusal/approval of internet behavior operations, host IP, type of access object, and name of access object |
MIG Integrated Gateway Product Function List
|
Support Syslog |
Support Syslog export and implement dumping function for online behavior records |
Security |
Support national encryption algorithms |
Support the National Security OfficeSM2、SM3、SM4algorithm |
Marketing |
Advertising push |
Implementing ad page push based on specific users or terminals |
Application recognition rules |
Application recognition rule library |
giveSANGFOR ACShared application recognition library,have20Multiple categories, exceeding850Application recognition rules,It is a larger application protocol identification library in China,And support real-time updates |
Manually adding application recognition |
Can be manually added based on“Deep Content Detection”Identification rules for new application protocols of technology,Realize personalized recognition and blocking,Provide unlimited scalability |
|
Identification of Intelligent P2P |
Intelligent recognition including encryptionBTEncrypt electric mules and other encryption devicesP2PBehavior, various rampant versionsP2Pbehavior , every Plant uncommonP2PBehavior, to further enhance encryptionP2PProviding a foundation for behavior management |
|
access control
|
Access Control Policy |
Network usage can be controlled by grouping, time periods, and services,Support setting user network access time and speed limits |
Application Protocol Control |
be based onAC is moreComplete network application protocol identification library,Can be applied to all the aforementioned online gamesIMStock trading, online streaming mediaP2PTools and other applications are used for blocking |
|
Customize internet access time period |
In half an hour units,Support setting at any time period;Support setting multiple time periods per day;Support different times every day, seven days a week Segment settings,Provide customers with more flexible time control capabilities |
|
Flow control |
P2PFlow control |
Allow designated users to useP2Pbehavior,But manage and control the bandwidth resources it occupies |
line of business community More flexible live of flow control |
Based on the user's network application behavior, the type of website visited, and different users/User groups and different time periods for traffic management strategy |
|
WAN->LANFlow control |
Partition the bandwidth resources specified in the export,And allocate the designated bandwidth resources to the designated servers that provide external access,Realize external release Application guarantee |
|
Viewing bandwidth channel status |
Support real-time viewing of the usage, status, traffic, etc. of each bandwidth channel,Real time display of the top ten applications and users with current traffic |
|
firewall |
Preventing DoS from both public and internal networks |
Support resisting attacks from the public networkDoSattack,Support for outbreaks within internal networksDoSAttack detection and defense webDoS |
preventionARPdeception |
Support for internal networksARPDefense against deception |
|
firewall |
Built in enterprise level firewall based on state monitoring,Provide dual protection for gateway device security and organizational intranet security |
|
Routing & Switching centralized management |
Divide VLANs |
Support LAN VLAN partitioning throughVLANAccess control, allowing or denyingVLANAccess between |
NAT Address Translation |
supportDNAT、SNATWaiting for variousNATAddress translation strategy |
|
Dynamic address allocation |
supportDHCPservice function |
|
Support SC centralized control |
Support SC centralized control, implement configuration strategy issuance, software upgrades, management and maintenance, etc |