yl23455永利(中国)有限公司

Applied Traffic Management Position:Home » Products » Applied Traffic Management

The application of traffic management system is a professional system which analyzes, monitors and controls the flow of network behavior.

Can meticulous management of user network traffic behavior, application monitoring, graphical management for application analysis, traffic management, traffic control, applied statistics, application, application of audit reports and other functions, is the application of the new generation of rich and accurate application of control flow analysis of supervision system.

The application of talent flow management system from 100m to Gigabit, full range of products with high system stability, is suitable for the network environment emphasizes the analysis, graphical application behavior monitoring user behavior of fine control, the recognition accuracy is greater than 99%, the system operates stably.

The accuracy of application recognition is over 99%

Through the perfect application protocol feature library (signatures) detection and camouflage detection technology, and using DPI (Deep Packet Inspection) deep packet inspection technology to identify a variety of user applications, especially to the escape of cryptographic protocols for accurate identification, such as the use of encrypted transmission of thunder, eMule, QVOD video encryption protocol in a timely manner and so on precise recognition, recognition rate of more than 99% applications

1, ultra high performance and high stability

TopFlow uses advanced technology to optimize hardware and software
Hardware optimization: using multi-core architecture, four core functions, full-time processing, management, monitoring, detection and control module, greatly enhance the utilization of resources.
Software Optimization: Based on TOS platform, protocol stack optimization, interrupt handling function and network card driver modification for high performance processing requirements, priority processing, ultra high-speed release.
Strategy Optimization: using node management technology to optimize detection matching strategy to improve detection efficiency.

2, performance up to Gigabit (20G), with up to 20 million, can support 500 thousand users, can be used for operators; high reliability; double OS system redundancy backup function, to ensure the stability of the system in any situation, and improve the bypass function to ensure the healthy operation of the system. Hard rock dual process fault tolerant technology ensures robust system and automatically heals after error.

2, IPID trajectory detection

Can provide the user identity information corresponding to a single IP, such as QQ number, MSN account, POP3 account, easy to trace the identity; proxy IP tracking: cross flow routing agent examination room end user application protocol based on inspection, can deal with all the sharing mechanism, such as a small router, 360 and Baidu WiFi sharing depth examination the function of a N user detection, it is often said that the control; such as multiple users to use a PC as a proxy server or over the Internet, the multi-level routing, traffic management system can check to hide in other PC terminal IP backend.

3, Fine monitoring, analysis and control of user behavior

It can display the speed of a single IP flow rate and the rate of each individual application at the same time, such as magnifying glass display layer by layer, which can be quickly analyzed based on user application behavior. To help users protect the network and detect malicious traffic and prevent security threats and malicious traffic, troubleshooting and find performance problems, understand network applications and users of your activities, and ensure the optimization of network performance, application and service planning for the future, decide the future demand, trend analysis, demand and capacity in the future. Layer upon layer monitoring, analysis and analysis of the entire network

4, Rich and diverse reports and centralized monitoring

The channel flow, the application protocol / protocol group on the chart, the weekly chart, monthly chart; statistics, statistics, node connection protocol statistics, PPS statistics; custom report function: the user can according to the IP/IP group, the application protocol / protocol group they care about different objects in a custom report, the statistics for multiple objects the results are displayed in a chart, reduce the workload of daily monitoring, the statistics for multiple objects on display results in a chart, reduce the workload of daily monitoring; statistics show that you can specify a different shape and color in absolute or superimposed manner; statistical time span can be on the same day this week, and the month.

5, Detailed application, control, and diversion

The detailed control of the HTTP application, such as the control of the user through the HTTP download certain types of files, control user access to certain websites, but also can control the users in the forum and micro-blog post, active users eliminate bad information in some websites; for DNS control, such as according to the different operators will link DNS to the corresponding analytical line, realize hijack the function of Intranet DNS response. Support the application of streaming and flow proxy function, can realize application routing and application load balancing function, the network of all kinds of application traffic management and control.

© 2000-2024 Suzhou HuaSu Info-Tech Co., Ltd.   |   Su ICP 16051456号-1

              Technical support:HUICHENG

Online
Baidu
sogou