Network boundary violation inline detection and blocking system
A network boundary and subsystem technology, applied in the field of network security, can solve the problems of difficult deployment and maintenance, illegal access concealment deception, etc., to achieve the effect of improving efficiency and accuracy, avoiding incomplete results, and solving difficult positioning.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Example 1: Log in to the system as a super user
[0033] The system provides three types of functions for super users: parameter setting, equipment linkage control management and user management.
[0034] Parameter setting: mainly complete the main operation and management parameter configuration of the system, mainly equipment performance management parameters, scanning address range, setting of main scanning parameters, database maintenance plan, network equipment management, etc.;
[0035] Device linkage control management: mainly completes the management of terminal incident response control. The system provides an emergency response mechanism for violations, so as to quickly and accurately eliminate the threat of violations to network security and improve the efficiency of violation incidents. Emergency response control methods are mainly divided into Three types: 1. Blocking control based on switch ports; 2. Blocking control based on ARP spoofing; 3. Sending email...
Embodiment 2
[0037] Example 2: Management user identity login system
[0038] The management user is the most used user of the system. After the super management user sets the system operation parameters, the subsequent system management and maintenance work is mainly in charge of the management user. The management authority and authorized address range of the management user are specified by the super management user, and the management user maintains and manages the system within the scope of its authorization.
[0039] The main functions of managing users include: query statistics and reports, network management, equipment linkage control management and user management.
[0040] Query statistics and reports: Provide users with relevant information query and statistical functions, including alarm information, IP real-name management, device port information management, IP usage tracking audit, network access tracking audit. Alarm information includes individual and combined query of al...
Embodiment 3
[0044] Embodiment 3: Audit user identity login system
[0045] The audit user is responsible for the audit and supervision of the system. Like the super management user, there is only one such user. The system provides two functions for the audit user: audit and password modification. The audit functions provided by the system for audit users mainly include: user operation log audit, system operation log audit and device operation log audit.
[0046] User operation log audit: perform unified audit management on user login, logout, query, policy management, parameter configuration, user management and other behaviors, and provide corresponding retrieval query conditions, including user name, operation type, operation time period alone and Combined query, without specifying query conditions, the system will query all operation logs by default, and support report generation and printing;
[0047] System operation log audit: Responsible for auditing the operation log of the syste...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

