Welcome Customer !

Membership

Help

Hangzhou Dipu Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Hangzhou Dipu Technology Co., Ltd

  • E-mail

  • Phone

  • Address

    6th Floor, Zhongcai Building, No. 68 Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Contact Now

Internet behavior management and flow control

NegotiableUpdate on 12/11
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
Internet behavior management and flow control can lead to network exit congestion when a large amount of application data traffic is transmitted in the network, and there are serious problems such as inability to monitor work status, leakage of company secrets, and even legal violations. The UAG3000 Internet Behavior Management and Flow Control series products independently developed by Dipu Technology provide customers with professional application control, bandwidth management, Internet Behavior Audit, keyword filtering, user behavior analysis and other functions. It can help users achieve the goals of reasonable utilization of network bandwidth, ensuring data security, improving staff work efficiency, and avoiding legal risks, and build a visible, controllable, and optimizable network for users. more
Product Details
PRODUCT FEATURES Product characteristics more
Massive feature precise control It can recognize over 5200 network and application layer protocols, support custom network applications based on application features, and fully support internet behavior management and traffic control in IPv4/IPv6 environments, making internet behavior management and traffic control more accurate.
Flexible authentication, real name audit Support user/MAC/IP binding authentication, Portal local authentication, Radius, LDAP and other third-party authentication, SMS authentication, WeChat authentication, and achieve seamless authentication. Connect with mainstream systems such as Shenlan System and urban hotspots to obtain the correspondence between users and IP addresses, achieve accurate online behavior audit, meet the requirements of the Regulations on Technical Measures for Internet Security Protection (Order No. 82 of the Ministry of Public Security), the regulations on Internet security supervision and inspection of public security organs (Order No. 151 of the Ministry of Public Security) and the Regulations on Network Security Classification Protection, and achieve security compliance;
The network quality is clear and visible Combining multiple dimensions such as users, applications, traffic, and time to display users' bandwidth usage. At the same time, analyzing network quality, monitoring parameters such as network latency, status codes, and retransmission rates, to achieve quality perception of users, applications, and web access.
Link Load Balancing It has a network segment table for mainstream domestic operators, supports session maintenance and health checks, and supports scheduling algorithms such as polling, minimum bandwidth utilization, source destination address hashing, and minimum connection. It also supports operator traffic scheduling, overload traffic scheduling, and custom traffic scheduling based on layer 4 ports. Support gateway mode NAT、 Routing forwarding can serve as a link optimization gateway.
Complete localized logs Support localized hard disk storage without the need for data storage servers, saving customers' IT construction investment. Ability to analyze traffic trends based on dimensions such as interface, user, application, and time, and view users or applications with high bandwidth usage in the network. Count the duration of users using non work related applications such as games, videos, and shopping during working hours. Record users' online behavior, such as web access, email transmission, instant messaging, forum access, and other specific content.
<>
PRODUCT SPECIFICATION Product specifications more
PRODUCT FUNCTION Functional Value
service identification Identify over 5200 mainstream network and application layer protocols to achieve precise internet behavior control and auditing
Application Control Support speed limiting or blocking P2P, network TV, gaming, instant messaging and other applications
Behavioral Audit Support auditing of web applications, web search, email, forum, instant messaging, FTP, and other related content
Access authentication Support multiple authentication methods such as IP/MAC binding, Portal authentication, SMS authentication, WeChat authentication, etc
Support local authentication, Radius, LDAP authentication, PPPoe authentication, domain monitoring, Shenlan system, city hotspot docking to obtain user and IP address correspondence
Networking mode Transparent mode, bridge mode, bypass mode, gateway mode
Network characteristics Supports routing protocols such as IPv4/v6, RIP, OSPF, ISIS, BGP, static routing, policy routing, etc
high reliability Multiple modes including silent dual machine, dual machine hot standby, VRRP multi master, etc
Support built-in power failure protection for electrical ports
Specialized software and hardware platform** A dedicated hardware platform using Feiteng CPU and Shengke exchange chip, with software platform authorized to use Kirin kernel

**This feature is only supported on specific models

Similar Product Recommend