Network Security Management Solutions - Translation

With the rapid development of information technology, user management is increasingly dependent on computer application systems, and computer application systems are increasingly dependent on networks. The scale of computer network continues to expand, and the network structure becomes increasingly complex. The normal operation of computer networks and computer application systems puts forward higher requirements for network security. Information security prevention should be considered as a whole, covering all levels of the information system, and comprehensive prevention for the network, system, application, and data. The system model of information security prevention shows that security prevention is a dynamic process, the technical means should be complete before, during and after the event, and the security management should run through the whole process of security prevention activities.

Network Security Management Requirements

To achieve the goal of network security, the network management needs to provide two functions. One is the network security management and control function, which ensures the security of the network architecture from the aspects of authority, device configuration, and illegal device identification. The second is the network operation management function, through device alarm, Performance and other aspects to ensure the security of network operation.

Network Security Control

1. Access control, perfect authority management

It is possible to assign different operation rights to different management personnel, and to assign different networks to different management personnel, so as to achieve coarse and fine-grained authority control and avoid unauthorized management. At the same time, there are good prompts and log records for dangerous operations.

2. Provide security management and control functions

The network management provides security control functions and supports simple operations through the network management to complete the configuration of device users, various services, VLAN, QOS, port speed limit, static routing, etc.

The network management provides the port control function, and supports simple operations through the network management to complete the configuration of the device's port status, dot1x, STP, port application VLAN, and QOS policies.

3. Network access device control

When an illegal device is connected to the network, an alarm is generated to notify the network management personnel.

Network Operations Management

1. Fault discovery and fault notification

When a device failure occurs, the administrator can be notified immediately, and the failure link can be quickly located, so as to restore the system quickly.

2. Equipment performance monitoring

Real-time acquisition of network device performance data, comprehensive control of device port traffic, database read and write speed, CPU load and other performance, to avoid network operation insecurity incidents caused by device performance in advance.

Zhihe network management platform network security management solution

The network security management solution of Zhihe network management platform is a customized solution based on the special needs of network security, and achieves the goal of network security through network security control and network operation management functions . The network security management solution of Zhihe network management platform realizes functions such as authority control, security control, port control, policy comparison, access device control, fault management, and performance monitoring.

Rights Management and Control

Zhihe network management platform adopts a variety of rights management methods, which can assign read-only rights to users, assign different function menus to users, and assign users different network management rights. Through multiple rights control, complete rights management is achieved. Avoid unauthorized management and ensure network security. At the same time, the log module in the system will record the operation of the system by each user, including the operation time, content, operator and other information, which is convenient for timely troubleshooting.

Security Control Function

Security control: Zhihe network management platform analyzes the configuration commands of different devices, and uses multi-threading technology and remote connection technology to issue specific configuration commands, so as to limit the speed of users, various services, VLANs, QOS, and ports of devices , Static routing and other function configurations, control network access, ensure the reduction of intrusion attacks on the network, and achieve network security.

Port control: Zhihe network management platform operates the device through the SNMP protocol and issues configuration commands to the device to realize the configuration of port status, dot1x, STP, port application VLAN, QOS policy and other functions, and realize network security from the port level.

 

Policy comparison: Zhihe network management platform provides a device configuration policy comparison function, which can intelligently analyze policy information, and display the similarities and differences of different policies to users in a differentiated manner, so that users can confirm the policy configuration.

 

access device control

Zhihe network management platform adds blacklist, whitelist, mac-ip binding and other management strategies through the security management audit module, and network administrators only need to do simple configuration in advance to find illegal access devices in time. When an illegal device is connected, the network management will generate an alarm in time to notify the network management personnel.

 

Comprehensive network operation management

1. Fault discovery and fault notification

Zhihe network management platform finds faults in the network through multi-thread active polling and receiving device trap/syslog and other reported information, and realizes rapid device positioning through topology maps, and uses software interfaces, email notifications, and SMS notifications to notify The network management personnel ensure that the network management personnel can timely control the abnormal information of the network operation.

 

2. Equipment performance monitoring

Zhihe network management platform obtains the performance information of routers, switches, databases, middleware and other equipment through a multi-threaded active polling mechanism, and displays the performance information to users in the form of statistical charts and lists, allowing users to intuitively control the operation of network equipment.

 

General network management function

In addition to excellent network management security management functions, Zhihe network management platform also provides comprehensive network management functions, such as providing topology management functions, and supporting topology display network alarms, supporting topology to complete various network management operations; providing extended functions, supporting extended support through configuration Device type, resource type, and monitor tasks; provide business management functions, and realize business viewing and management through tables and topologies.

Value

Using the network security management solution of Zhihe network management platform, it can effectively manage the network operation status, prevent and organize network insecurity incidents.

  • Realize user-level and network-level authority management.
  • Realize the functions of simple operation and powerful security control, port control, and policy comparison.
  • Implement access device control.
  • Realize fault detection and notification in time.
  • Realize comprehensive control over the safe operation of the network.

technical features

Zhihe network management platform network security management solution mainly has the following technical features:

  1. Use JAVA multi-threading technology to realize efficient management and control of network security.
  2. Use SSH, Telnet and other remote connection methods to issue commands to network devices.
  3. Perform command analysis on the device to be managed, process the command to be sent and the result returned by the device.
  4. Obtain device information through SNMP, generate alarms and performance data, and process trap/syslog data.
  5. By actively discovering MAC and IP information in the network and comparing them with the black and white lists set by users, access control is realized.
  6. Establish an efficient message queue and push message events in real time.
  7. Use mature JAVA frameworks, such as Spirng, Struts, Hibernate, WebService, WebSocket, etc.

 

With the rapid development of information technology, user management is increasingly dependent on computer application systems, and computer application systems are increasingly dependent on networks. The scale of computer network continues to expand, and the network structure becomes increasingly complex. The normal operation of computer networks and computer application systems puts forward higher requirements for network security. Information security prevention should be considered as a whole, covering all levels of the information system, and comprehensive prevention for the network, system, application, and data. The system model of information security prevention shows that security prevention is a dynamic process, the technical means should be complete before, during and after the event, and the security management should run through the whole process of security prevention activities.

Network Security Management Requirements

To achieve the goal of network security, the network management needs to provide two functions. One is the network security management and control function, which ensures the security of the network architecture from the aspects of authority, device configuration, and illegal device identification. The second is the network operation management function, through device alarm, Performance and other aspects to ensure the security of network operation.

Network Security Control

1. Access control, perfect authority management

It is possible to assign different operation rights to different management personnel, and to assign different networks to different management personnel, so as to achieve coarse and fine-grained authority control and avoid unauthorized management. At the same time, there are good prompts and log records for dangerous operations.

2. Provide security management and control functions

The network management provides security control functions and supports simple operations through the network management to complete the configuration of device users, various services, VLAN, QOS, port speed limit, static routing, etc.

The network management provides the port control function, and supports simple operations through the network management to complete the configuration of the device's port status, dot1x, STP, port application VLAN, and QOS policies.

3. Network access device control

When an illegal device is connected to the network, an alarm is generated to notify the network management personnel.

Network Operations Management

1. Fault discovery and fault notification

When a device failure occurs, the administrator can be notified immediately, and the failure link can be quickly located, so as to restore the system quickly.

2. Equipment performance monitoring

Real-time acquisition of network device performance data, comprehensive control of device port traffic, database read and write speed, CPU load and other performance, to avoid network operation insecurity incidents caused by device performance in advance.

Zhihe network management platform network security management solution

The network security management solution of Zhihe network management platform is a customized solution based on the special needs of network security, and achieves the goal of network security through network security control and network operation management functions . The network security management solution of Zhihe network management platform realizes functions such as authority control, security control, port control, policy comparison, access device control, fault management, and performance monitoring.

Rights Management and Control

Zhihe network management platform adopts a variety of rights management methods, which can assign read-only rights to users, assign different function menus to users, and assign users different network management rights. Through multiple rights control, complete rights management is achieved. Avoid unauthorized management and ensure network security. At the same time, the log module in the system will record the operation of the system by each user, including the operation time, content, operator and other information, which is convenient for timely troubleshooting.

Security Control Function

Security control: Zhihe network management platform analyzes the configuration commands of different devices, and uses multi-threading technology and remote connection technology to issue specific configuration commands, so as to limit the speed of users, various services, VLANs, QOS, and ports of devices , Static routing and other function configurations, control network access, ensure the reduction of intrusion attacks on the network, and achieve network security.

Port control: Zhihe network management platform operates the device through the SNMP protocol and issues configuration commands to the device to realize the configuration of port status, dot1x, STP, port application VLAN, QOS policy and other functions, and realize network security from the port level.

 

Policy comparison: Zhihe network management platform provides a device configuration policy comparison function, which can intelligently analyze policy information, and display the similarities and differences of different policies to users in a differentiated manner, so that users can confirm the policy configuration.

 

access device control

Zhihe network management platform adds blacklist, whitelist, mac-ip binding and other management strategies through the security management audit module, and network administrators only need to do simple configuration in advance to find illegal access devices in time. When an illegal device is connected, the network management will generate an alarm in time to notify the network management personnel.

 

Comprehensive network operation management

1. Fault discovery and fault notification

Zhihe network management platform finds faults in the network through multi-thread active polling and receiving device trap/syslog and other reported information, and realizes rapid device positioning through topology maps, and uses software interfaces, email notifications, and SMS notifications to notify The network management personnel ensure that the network management personnel can timely control the abnormal information of the network operation.

 

2. Equipment performance monitoring

Zhihe network management platform obtains the performance information of routers, switches, databases, middleware and other equipment through a multi-threaded active polling mechanism, and displays the performance information to users in the form of statistical charts and lists, allowing users to intuitively control the operation of network equipment.

 

General network management function

In addition to excellent network management security management functions, Zhihe network management platform also provides comprehensive network management functions, such as providing topology management functions, and supporting topology display network alarms, supporting topology to complete various network management operations; providing extended functions, supporting extended support through configuration Device type, resource type, and monitor tasks; provide business management functions, and realize business viewing and management through tables and topologies.

Value

Using the network security management solution of Zhihe network management platform, it can effectively manage the network operation status, prevent and organize network insecurity incidents.

  • Realize user-level and network-level authority management.
  • Realize the functions of simple operation and powerful security control, port control, and policy comparison.
  • Implement access device control.
  • Realize fault detection and notification in time.
  • Realize comprehensive control over the safe operation of the network.

technical features

Zhihe network management platform network security management solution mainly has the following technical features:

  1. Use JAVA multi-threading technology to realize efficient management and control of network security.
  2. Use SSH, Telnet and other remote connection methods to issue commands to network devices.
  3. Perform command analysis on the device to be managed, process the command to be sent and the result returned by the device.
  4. Obtain device information through SNMP, generate alarms and performance data, and process trap/syslog data.
  5. By actively discovering MAC and IP information in the network and comparing them with the black and white lists set by users, access control is realized.
  6. Establish an efficient message queue and push message events in real time.
  7. Use mature JAVA frameworks, such as Spirng, Struts, Hibernate, WebService, WebSocket, etc.

 

Guess you like

Origin blog.csdn.net/Arvin_FH/article/details/132297899