Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Sangfor_NGAF Learning Notes 2

2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Introduction of Sangfor_NGAF function module

Authentication system: including user management and user authentication

User management: can add users and user groups, support user import, LDAP automatic synchronization

User authentication: use the concept of region to divide the authentication policies that need to be carried out when data passes through AF, including no authentication, local password authentication, external authentication, single sign-on, IP/MAC address binding.

Object definition: including ISP address library, application feature recognition library, application intelligent recognition library, custom application, URL classification library and so on.

Content security: including application control policies, content security policies, botnets

Application control policies can control applications based on source area, source IP address, destination area, destination IP address, service / application

Content security policies include email security, URL filtering, and file security.

Botnet (APT) can detect remote security, malicious links, mobile security and abnormal traffic, thus reducing the security risk of the client.

Traffic management (bandwidth management): bandwidth can be guaranteed or limited according to users, applications, and IP,IP groups

IPS (* * Defense): use the IPS vulnerability feature recognition library to identify whether traffic through AF is allowed to enter the destination area.

Firewall: including address translation, connection number control, DOS/DDOS protection, ARP spoofing prevention

Server protection: web application protection (WAF), website tampering protection

Web application protection includes website protection, parameter hiding, application hiding, password protection, permission control, login protection, HTTP anomaly detection, CC***, website scanning protection, data disclosure protection.

Risk detection and protection: including risk analysis, WEB scanning, real-time vulnerability analysis, threat intelligence early warning and disposal

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report