Establish an efficient enterprise Internet Access Management System

Source: Internet
Author: User

To effectively manage users' Internet access, the network administrator should establish a user access management system as soon as possible to improve the efficiency of Intranet access to the Internet. A complete user access management system should have the following functions.

  1. Internet access permission management

You can set the permission for each user and each computer to access the Internet: organize the user or computer into a user group, with the configurable length of time as the unit of time and group as the management unit, set the time period for Internet access. You can easily change the group of a user or computer based on the adjustment of the person, computer, or department. With this function, the network administrator can assign Internet access permissions to departments and employees that are really needed to avoid wasting resources.

  2. Access Content Management

Restrict users to access websites with poor content or websites unrelated to work during working hours to prevent Internet resource abuse by employees. An ideal system should be able to provide website classification databases and support dynamic updates of Database networking. Network administrators can customize their own Internet access policies based on their needs through the features provided by the database, and can independently add and delete the addresses of websites to be managed.

  3.1P address management

Address management means that the network administrator can monitor and charge users when they access the Internet in multiple modes based on the IP address of the user's computer II. You can manage the IP addresses of an enterprise intranet as follows.

(1) IP addresses that are prohibited from accessing the Internet.

(2) IP addresses that are allowed to access the Internet, but must be logged on and billed. After a user logs on to a computer using this type of IP address, the access to the Internet is recorded in the user's account.

(3) IP addresses that are allowed to access the Internet, which do not need to be logged on but are billed. You do not need to log on to a computer that uses such IP addresses to access the Internet (or allow users to log on ). Access to the Internet is recorded on the account of the IP address.

(4) the IP addresses that are allowed to access the Internet do not need to be logged on or billed. You do not need to log on to the Internet from computers using such IP addresses.

  4. monitoring and auditing

Able to monitor and audit users' online behaviors in real time. The network administrator should be able to monitor the real-time user access to haternet, and be able to stop the Internet access connection of the specified user or the specified IP address in real time. The system records the Internet access of all users to log files one by one in chronological order. One log file per day. In addition, the system should also provide the targeted function of selecting audit objects. With this function, the network administrator can set up a system to record the internet behavior of the audited user to an AUDIT file named after the user or the IP address of the computer used by the user one by one. The system should provide the log and audit record reading function. The system should also be able to read log files or audit files and generate different types of reports based on historical records, such as webpage access, sending and receiving emails, downloading software, and downloading files. Through these reports, the network administrator can master the following situations.

(1) You can query the Internet access records, access times, and related data traffic of each user or computer in the enterprise intranet.

(2) You can view the access status of a website at any time to see which user has accessed the website and the specific webpage.

(3) You can view the list of websites that an enterprise intranet user accesses to the Internet in a certain period of time, as well as the list and statistics based on the nature of the website, to facilitate the network administrator to analyze users' online behavior, make targeted adjustments to Internet access management policies.

Through various reports, the network administrator is familiar with the Internet usage of each user on the enterprise intranet, and can obtain data basis for various problems in network resource management, so as to make more accurate decisions.

  5. Billing Control

The system should provide the billing setting function based on users and user groups, and dynamically accumulate billing based on users' access to the Internet. It should be able to set the billing threshold for specified users or IP addresses, when the billing threshold is exceeded, the system automatically stops Internet access.

  6. Access the cache Function

An ideal user access management system should provide the access cache function, which can save the webpage accessed by Intranet users on the Internet for users with the same requirements in the future. Using Cache not only avoids repeated accesses to the same webpage for communication, but also saves considerable network communication costs for organizations. It also enables enterprise intranet users to quickly respond when accessing the same webpage.

  7. bandwidth management

With the bandwidth management function, the network administrator can allocate different network resources to different departments and personnel at different times as needed, set upstream bandwidth and downstream bandwidth for important users and normal users, so that Internet access behavior between different departments and users does not affect each other, it effectively prevents some users or departments from abusing network resources and affecting Internet access of other users.

  8. Data Backup

The system should provide data backup and recovery functions. The network administrator can regularly back up user management data and user online records. When data is damaged due to system exceptions, data can be quickly restored.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.