Current location - Music Encyclopedia - Dating - What is an Internet Behavior Management Router?
What is an Internet Behavior Management Router?
You can refer to the flying fish VE series Internet behavior management router. Reference address: /ve/

First, online behavior management:

1, website classification management

Users can freely set up black and white lists, allow access to whitelisted websites, and prohibit access to blacklisted websites.

Through classified management of websites, we can block, record or warn the following nine types of websites: leisure and entertainment, news information, chatting and making friends, online games, e-shopping, forum blogs, securities funds, e-mail boxes and online banking. Support URL classification library online upgrade.

2.WEB security: Internet posting and webpage login can be prohibited to protect internal information and intellectual property rights of enterprises. You can filter keywords and file suffixes of web addresses, restrict users from downloading certain files (such as EXE and BT seed files), reduce virus sources, and improve network speed and work efficiency.

3. Chat and P2P software filtering: QQ\MSN\ Fetion \SKYPE and other chat tools can be controlled to allow abnormal QQ numbers to be used normally; Effectively restrict P2P software and stock trading software such as BT\ Thunder \PPLIVE\ Electric Donkey to prevent bandwidth abuse.

4. Online time control: You can control the online users and reasonably arrange the online time of members of various departments. You can set weekly online time and daily online time. This function has great expansion value for realizing the demand of online billing.

5. Email management and monitoring: When users use email clients (such as OUTLOOK, FAXMAIL, etc.), they mirror and monitor emails. ) send and receive e-mail through POP3/SMTP protocol.

6. Grouping management: planning the organizational structure of LAN through IP address groups. Good planning will make the whole network architecture orderly. Assign different internet access rights to users in different departments or levels, effectively reducing your maintenance.

Second, multi-line load balancing.

1. Multi-line access: 2 or 4 WAN ports are provided, and multiple ADSL access can be used, which can increase bandwidth, save costs and reduce the risk of "single line failure"; Support multi-line hybrid access.

2. Intelligent balance: on the basis of realizing "telecom traffic takes telecom line and netcom traffic takes netcom line", automatically optimize business data and completely solve the problem of network interconnection; At the same time, the proportion of traffic distribution is adjusted according to the line bandwidth to achieve the best line utilization and the best line load balance.

3. Line backup and switching: the leading line on-off detection technology intelligently judges the line state. When one line is disconnected, the lines of other WAN ports bear the network data to ensure the stability of the network. It also supports the smooth data transition of line timing switching, reducing the phenomenon of card machine dropping when line switching.

4. Flexible policy scheme: You can use options such as source address routing, static routing and application scheduling to configure the advanced scheme of policy routing.

Third, accurate traffic management.

1, flexible flow control: flexible upload and download rate limit can be set for the whole network, a single IP or IP segment, and the optimal bandwidth can be intelligently allocated for each online PC. When the network is busy, it automatically suppresses users with large bandwidth to ensure that people can use it more easily; When the network is idle, we can make full use of the idle bandwidth and let fewer people use more bandwidth.

2. Priority of key applications: users can specify key applications that need priority protection, so that this part of data can be transmitted preferentially under any circumstances, thus ensuring the smooth operation of key business applications of enterprises.

3. Traffic control of sub-interfaces: different traffic control is carried out for data of different interfaces, so that bandwidth can be used more reasonably and the waste of overall bandwidth resources can be avoided when the bandwidths of multiple lines are quite different.

Fourth, comprehensive defense against ARP virus.

1, convenient ARP spoofing defense: through the regular sending mechanism of free ARP, the intranet ARP virus is initially prevented.

2. Reliable bidirectional binding: One-click IP/MAC address binding function and fixed gateway ARP list can effectively deal with ARP virus attacks.

3. Flexible ARP trust mechanism: not suitable for the traditional IP/MAC two-way binding network environment (such as business hotels with frequent guest traffic). The ARP trust mechanism automatically learns, judges and updates the ARP information of the host in the intranet, without two-way binding, so as to ensure that the router can obtain the real and reliable ARP information of users, which not only ensures the convenience of surfing the Internet, but also ensures the security of surfing the Internet.

4, external network anti-tools, internal network anti-virus: it can effectively resist DDoS attacks on internal and external networks and prevent common "login, deception" attacks.

5. Connection restriction function: The number of network connections can be restricted to the specified IP, thus effectively preventing users from abusing bandwidth by using P2P software.

6.Mac address filtering: You can filter hosts with specified MAC addresses.

Introduction to other functions of verb (abbreviation of verb)

1, with port mapping, DMZ, VLAN and other functions.

2. Support port mirroring, which can mirror the network data and analyze it through data analysis software to ensure the information security of enterprises.

3. Support common dynamic domain names such as 3322 to facilitate users to use dynamic IP architecture for enterprise service applications.

4. Support UPNP applications and define IP segments that can use UPNP.

5. Support the VPN function between networks, and provide two configurations of PPTP server and client. PPTP server can facilitate business travelers and branches to access the intranet; PPTP client can be used for mutual visits between branch offices and headquarters.

Six, the typical application

1, reduce network cost: support multiple ADSL lines to access, and automatically realize bandwidth superposition, line backup and intelligent load balancing.

2. Improve work efficiency: web page filtering, keyword filtering, IP filtering and other control functions. Employees are forbidden to visit websites, chat, games, movies, BT downloads, etc. Working hours have nothing to do with work.

3. Personalized Internet access strategy: flexible IP user group and time period setting, and different Internet access rights and bandwidths are allocated for different levels of users;

4. Reasonable allocation of bandwidth resources: ensure the priority of bandwidth resources and services in key applications and important departments;

5.VPN application: branches and business travelers can use VPN function to access the internal network;

6. Manageable security network: integrate multiple security functions and provide an integrated security mechanism.