Products Status: | Stock |
---|---|
Type.: | Wired & Wireless |
VPN Support: | Yes |
Suppliers with verified business licenses
Audited by an independent third-party inspection agency
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
Bandwidth Management
|
Manages per-user and per-IP bandwidth in addition to identifying service applications to ensure the network access experience of key services and users. Control methods include limiting the maximum bandwidth, ensuring the minimum bandwidth, applying PBR, and changing application forwarding priorities.
|
|||||
Intrusion prevention and Web protection
|
Obtains the latest threat information in a timely manner for accurate detection and defense against vulnerability-based attacks.
The device can defend against web-specific attacks, including SQL injection and XSS attacks. |
|||||
AAPT
|
Interact with local and cloud sandboxes to detect and block malicious files
Encrypted traffic does not need to be decrypted, and is linked to the big data analysis platform HiSec Insight to detect encrypted traffic threats. Actively respond to malicious scanning behaviors, and conduct behavior analysis by linking the big data analysis platform HiSec Insight to quickly discover and record malicious behaviors, thus realizing real-time protection against enterprise threats. |
|||||
Cloud management mode
|
Initiates authentication and registration to the cloud management platform to implement plug-and-play and simplify network creation and deployment.
Remote service configuration management, device monitoring, and fault management are used to implement cloud-based management of mass devices. |