⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

Network security one-way introduction system (optical shutter)-100M

Network security check into the system (light gate)-100

Product Description

High-speed optically isolated unidirectional security transmission system is a new generation of enterprise-level information security protection equipment. ...

With the development of information construction, people are more and more eager to adopt networked office to get the resources they want through the network. However, the popularity of networked office will inevitably lead to the expansion of the network security boundary, which brings a huge risk of confidentiality in which high-density information flows to low-density systems and confidential information flows to non-secret information systems.
In order to solve the problems of security isolation and unidirectional import of information, it is necessary to establish an overall network security protection system, formulate appropriate security strategies, improve security assurance capabilities, and prevent leakage of information from low-density networks to high-density networks, internal and external data transmission . As a new generation of high-security, enterprise-level information security protection equipment, the high-speed optical isolation unidirectional security transmission system relies on security isolation technology to provide a higher level of security protection capabilities for the information network. Efficient data transmission performance brings users Higher office efficiency, meanwhile, the anti-attack ability of the information network is greatly enhanced, which effectively prevents the occurrence of information leakage events.

Product advantage

The non-feedback unidirectional optical security transmission system uses the unidirectional optical transmission technology of the physical layer ...

(1) Non-feedback unidirectional optical security transmission system uses the unidirectional optical splitting transmission technology at the physical layer to cut off the communication "handshake" from the bottom layer to form a unidirectional transmission without feedback, realizing physical isolation from high-density networks to low-density networks.
(2) The high-speed isolated switching card uses DMA channel pipeline data transmission technology to maximize the bus bandwidth. No CPU scheduling, no bus competition and application, no waiting for each operation, and efficient exchange.
(3) High-speed isolated switching cards use cache technology to improve data processing capabilities and ensure that data is stored in time after receiving the data to avoid data loss due to blockage caused by high-speed data transmission; destination-side caching and source-side flow control to avoid big data Volume transmission has a processing bottleneck and data is lost.

...

Product parameter Spec

Product parameters ...

(1) Functional indicators support one-way file synchronization, one-way database synchronization (mainstream databases such as Oracle, MSSQL, MYSQL), one-way mail relay, and one-way web page publishing.
1) One-way transmission of information One-way transmission of files: One-way transfer function of files is provided One-way mail relay: One-way release function of mail is provided One-way database transmission of data: One-way data synchronization function of various relational databases is provided, support Heterogeneous database synchronization 2) Security control identity authentication: Provides system management with a secure identity authentication function. Identity authentication is implemented based on user names / passwords, hardware tokens, etc .; provides data sender and data receiver identity authentication functions. Content check: provides transmission Data content inspection function, inspection mechanism based on keywords to complete virus protection: Provide built-in virus protection functions, support automatic and manual virus database upgrades Flow control: Provide traffic management functions for key applications and network interfaces File type check: Provide transfer files Type filter detection function 3) Monitoring and auditing Provide real-time monitoring of the system's operating status; provide recording and auditing of user access behavior, security event information, system log information (2) Performance indicators
  • Length * width * height 705 * 437 * 43 (mm)
  • Input-output 100-240 V, 50-60 Hz, 11-4.5 Amp data throughput rate 100Mbps
  • Task Concurrency 15
  • Data error rate <1bit / 1Tb
  • Operating temperature 10 ° to 35 ° C (50 ° to 95 ° F)
  • Non-operating temperature -40 ° to 70 ° C (-40 ° to 158 ° F)
  • Operating humidity 8% to 90%
  • Non-operating related humidity 5 to 95%
  • System stable running time> 7000 hours

Honor Rertificate

Award certificate...

    Application scenarios

    Government, public security, confidential, armed police, military, large military enterprises, etc ...

    The core business systems of the government, public security, confidential, armed police, military, and large military enterprises are all in the secret network, but the basic data and statistical information required by the business system come from the external business network. The connection between the dense network, the connection between the high-density network and the low-density network, the connection between the network of subordinate units and the network of higher-level institutions.
    (1) Provincial, prefectural, city, and county-level government departments, public security departments, and national security departments (2) Secret-related enterprises (3) Armed police, frontier defense, courts, and procuratorates

    ...

    真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张