中文|English
Phone:0731-85150018
SOLUTION

Hunan Kangbaite Information Technology Co.

Address:Yunda Central Plaza, No. 289 Shawan Road, Yuhua District, Changsha City, Hunan Province

contacts:Mr. Wu

Phone:13681337341

fixed telephone:0731-85150018

EMail:450685298@qq.com

QQ:450685298

Network Access Control Solution
Network Access Control Solution
2023-03-16

requirement analysis

Network security has become a highly concerned issue for enterprises, but current security solutions focus on backend and defense, such as firewalls, IDS, IPS, etc., lacking a perspective on the security of front-end access endpoints, unable to actively protect the network, resulting in arbitrary access of terminal devices and easy penetration of boundary devices. VPN and other transmission security solutions only ensure the transmission security between devices, and the devices are fully open afterwards, so there are hidden dangers in the transmission system. Enterprises need to establish a strict, standardized, and non counterfeit access behavior security management mechanism.

Solution

The communication network access control solution adopts comprehensive and highly hybrid access control technology, uses device to device communication encryption mechanisms, and highly flexible deployment methods to achieve multi-level and multimodal access security management, achieving the goal of purifying the internal network environment, regulating network behavior, and ensuring network communication security.

Plan composition

★ Endpoint security network card

Complete encryption and authentication of endpoint device network cards, and achieve communication encryption of controlled terminals; When the terminal is turned on and started, it will enter the security network card authentication interface;

★ Authentication server

Complete authentication and configuration management of secure network cards; After authentication, the terminal will be allowed to enter the operating system and network; Authentication failure, the terminal cannot access the operating system and enterprise network;

★ Security switch

Complete data exchange and communication encryption for endpoints;

★ Communication process between terminals

After the authentication is passed, all terminals perform communication encryption, and the security network card completes communication encryption and decryption of all data.

Application Fields and Patterns

★ Point to point encrypted communication

★ Point to network encrypted communication

★ Network to network encrypted communication

★ Mixed encryption


F5

Juniper

FortiGate

Paloalto

AVAYA

Radware

Jiangxi Province

Xiangya Hospital

Yali Middle School

Midea Co., Ltd

Sheraton Tianjin Hotel

Basic network

communication

Virtualization

Application Manage

network security

Application Network

IT Maintenance

IT Professional

IT Outsourcing

IT Consulting

IT Training

Brief Introduction

Corporate Culture

aim

Partner

Copyright © 2023-2024 Hunan Kangbaite Information Technology Co. All Rights Reserved phone:13681337341technical support:Sujun Technology