How does the network management effectively manage BT, QQ, and cameng?

Source: Internet
Author: User

Current status of network management for enterprises and institutions in China:


As a network administrator for enterprises and institutions, can you do the following? :
 
Can I record all the windows opened by the client, the programs running, and all the URLs accessed?
Can I copy, paste, delete, and insert the records of the USB flash disk to the database?
Can I restrict QQ chat, QQ games, and running chat software or game software?
Can I monitor and record the upload and download traffic of employees?
Can I disable Internet access, control Internet access, and restrict Internet access? Can I restrict Internet access in some time periods?
Can I disable USB devices to prevent information leakage and security risks?
 
All of this can be done by the jusheng network management system:


Specifically, jusheng network management mainly has the following functions:

1. Download Control

1. Complete P2P download control: full control over downloading of P2P tools, such as BT, eMule, Baidu xiba, ppdian Tong, kumeng, and thunder.
2. P2P download smart bandwidth Suppression Function: when a host is found to have P2P download, the available bandwidth of the host is automatically reduced.
3. HTTP download control function: You can set and control arbitrary file downloads by yourself, or specify a file suffix to restrict download.
4. FTP download function: You can set and control arbitrary file downloads, or specify the file suffix.

2. bandwidth (flow rate) and traffic management

1. view the bandwidth usage of the LAN host in real time: the large-to-small sorting function allows the network administrator to fully occupy the network.
2. allocate public network bandwidth for a specific host: the limited public network bandwidth of the enterprise can be used to the fullest extent, so that some hosts can no longer consume a large amount of bandwidth.
3. Host packet data analysis function: allows the network administrator to know the application of the bandwidth occupied by the host.
4. The system can set upstream, downstream, and total traffic for the LAN host. When the set traffic is exceeded, the public network connection is automatically disconnected.

3. Chat Management

1. QQ chat control: the system can completely control the chat tool that is not controlled by the general monitoring software.
2. MSN Chat control.
3. NetEase bubble Chat control.
4. Sina UC Chat control.
5. Any other chat tool.

Iv. WWW Access Management

1. Complete WWW Access Control: You can select whether to disable Internet access or use filter rules.
2. black/white list rules: the network administrator can set URL filtering rules and support custom black/white lists.
3. pornographic website Filtering: The system can automatically filter access to pornographic website libraries.
4. Lan host acts as proxy server control: the system can automatically restrict LAN hosts to act as proxy servers to prohibit improper LAN extension.
5. WWW Proxy Control for LAN: Prohibit LAN hosts from using Socks and other proxies to access WWW.

5. Portal mailbox Control

1. The Control LAN host can only access yahoo Mail, but cannot click any other yahoo link.
2. The Control LAN host can only access various sina mailboxes, but cannot click any other sina connection.
3. The Control LAN host can only access various mailboxes of Netease 163, but cannot click any other Netease connection.
4. Control LAN hosts to access only sohu mailboxes, but not any other sohu connections.
5. Control the email address of any website, but you cannot click any other link on the website.

6. Group Policy (Internet access permission) Management

1. A unified control policy can be set up for all hosts in the LAN.
2. Different policies can be assigned based on different IP addresses of LAN hosts.
3. The hosts in each control list can be flexibly converted between different policies.

VII. Time Management

The administrator can set the control time for the host (such as working hours, non-working hours, and custom time) for flexible management.

VIII. Cross-network segment Management

In actual network applications, there are often two or more network segments (VLAN) in a LAN, and each network segment is physically connected, however, they cannot access each other. network administrators need to manage each CIDR block separately. The repetitive workload is high and the overhead is increased. In this case, jusheng Network Management provides the "transparent cross-network segment management" function to help network administrators manage cross-network segments.
Currently, CIDR blocks are implemented through the following methods:


9. Custom ACL rules

The system provides network administrators with a custom control interface-ACL Rule settings (details: www.grabsun.com, you can set rules that include parameters such as IP Source Address, IP target address, Protocol Number (TCP/UDP), and port range. The system automatically blocks data packets that comply with the rules, by using ACL rules, you can easily flexibly extend the control function. Such as controlling access from any host IP address on the LAN to any public IP address, controlling any chat tools, and controlling any online games.

10. Lan Security Management

1. IP-MAC binding: The system supports IP-MAC binding on LAN hosts, once found illegal hosts, it can be isolated network.
2. Sniffing host scanning: by using the "anti-listening technology" attached to the system and the underlying analysis technology of windows, you can detect the three most serious attacks on the LAN: such as lan Terminator, cyber law enforcement officer, and cyber scissors.
3. Disconnect the public network of the Host: The system can disconnect the public network of the specified host.

11. Network Traffic Statistics

The system provides a variety of detailed and illustrated host traffic and flow rate statistics functions. Including:

1. Daily traffic statistics: the system provides daily traffic statistics for the specified host or all hosts.
2. Monthly Traffic Statistics: The system provides monthly traffic statistics for the specified host or all hosts.
3. Daily Flow Rate statistics: the system provides a flow rate trend chart for the specified host and time.

12. Detailed log records

1. The system records all the control information in detail. You can view the log file to determine the network access status of the managed host.
2. The system records in detail the WWW access URL of the LAN host, which can be queried by the user.

13. Other functions

In addition to the above functions, the system provides many very practical functions: for example, you can control the optical drive, soft drive, and usb interfaces of LAN hosts, this prevents employees from stealing business secrets from enterprises by using CDs, floppy disks, and USB flash drives. For example, you can send messages to any host on the LAN. You can view the speed of the host on the LAN in real time and provide a bar chart for visual display; record other hosts running jusheng network management on the LAN, and the official version can force the test version to exit.
 
In short, the jusheng network management system not only has very practical functions, but also we fully consider the operation level and network structure of network administrators of enterprises and institutions when designing the system, all functional modules can be completed with just a few clicks. At the same time, you can control the entire LAN by deploying the LAN on any computer, this prevents enterprises from adjusting the network structure, performing port mirroring, or adding other network devices, thus saving enterprises a lot of money, material resources, and manpower, reducing the total cost of ownership for deploying network management software for enterprises is a wise choice for enterprise network management.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.