yl23455永利(中国)有限公司

Border Protection Scheme Position:Home » Solutions » Border Protection Scheme
Requirements overview:
1, with the continuous development of enterprises, in the business management and also a new demand, XXX and ####= two company network is independent, is not conducive to the company's information resources sharing and business development, the requirements of XXX network under PC can access ####= network server.
2, two of the company's network exports are not set up firewalls, can not guarantee the stability and security of the company's business.
3, the company's business is relying on the Internet to carry out, and because of this, the company's employees online there are many problems:
During the period of the
 
3.1 employees to do some work things, such as browsing and work related web pages, IM chat, online stock, online games and other Internet behavior, not only reduces the production efficiency, but also affected the company's working environment.
3.2 non operating applications such as P2P behavior, file download, network streaming media take up a large amount of network bandwidth, which affects the demand of normal office for bandwidth.
3.3 the employee's access to the Internet and time is not clear enough.
3.4 outgoing data lack the necessary audit and verification, is not up to the requirements of relevant national laws and regulations, it can not effectively access through the company network who leaked company secrets or sensitive, illegal information spread.
4, because of the company's business needs, we need to visit overseas websites (such as Google).
Deployment topology:
 
 
Solution:
1, two the company's network of export to the erection of a SINFOR MIG integration gateway, through VPN Internet, XXX network in the PC remote access ####= Server.
2, two sets of SINFOR MIG are deployed by acting as a firewall gateway mode, MIG has a built-in firewall, solve common LAN ARP attack and DOS attack of network security issues; to support a variety of international mainstream encryption algorithm to ensure the uniqueness and determine the user access and access equipment identity; at the same time also has the abnormal traffic monitoring terminal. The danger of freezing alone.
 

 

Solutions

© 2000-2024 Suzhou HuaSu Info-Tech Co., Ltd.   |   Su ICP 16051456号-1

              Technical support:HUICHENG

Online
Baidu
sogou