当前位置:网站首页>Technical exchange | why should network security equipment use bypass function
Technical exchange | why should network security equipment use bypass function
2022-06-11 20:43:00 【Shenzhen Lianrui electronics lrlink】
Bypass What is it? ? Let's take a simple example : As we all know, network security devices are generally used between more than two networks , For example, between intranet and extranet . The application in the network security device will perform network packet analysis on the internal information , After judging that there is no threat , Then the packets are delivered according to certain routing rules . however , The premise is that there is no problem with the network communication equipment .
When the network security device crashes 、 In case of power failure , The network connected to this device will lose contact with each other , At that time, if we still needed to require that all networks be connected , This requires Bypass Here we go .
Bypass function
seeing the name of a thing one thinks of its function ,Bypass Function is bypass function , In case of power failure or crash between network security devices , By specific triggering methods , A system that physically prevents two networks from passing through network security devices , Direct conduction . At the firewall 、 Anti-Virus Gateway , Gatekeeper 、 It is especially suitable for network security equipment platforms such as data monitoring .
Bypass Three types of applications ( Control mode or trigger mode classification ):
1、 Triggered by the power supply . In this way , Generally, when the equipment is not powered on ,Bypass Function on , If once the equipment is powered on ,Bypass Immediately adjust to the off state .
2、 from GPIO To control . When entering OS after , Can pass GPIO To operate on a specific port , So as to realize the right to Bypass Switch control .
3、 from Watchdog To control . This situation is actually the right way 2 An extended application of , Can pass Watchdog To control GPIO Bypass Program startup and shutdown , So as to realize the right to Bypass State control . After using this method , If the device crashes, it can be controlled by Watchdog Open up Bypass.
Product overview
LREM3501BP-4T It is a support product independently developed by Shenzhen Lianrui electronics PCIe The protocol has four electric ports and two circuits Bypass Gigabit mezzanine Ethernet network adapter . In Gigabit Ethernet BYPASS Normal... Is supported on the server adapter , There are three functional modes of disconnection and bypass .
LREM3501BP-4T Function is introduced
- be based on Intel I350 Research and development of master control scheme
- Support IP / TCP and IP / UDP Receive checksum offload
- In case of power failure . Bypass when the system is suspended or the software application is suspended / Disconnect the Ethernet port
- Software programmable bypass . Disconnected or normal mode
- Support four Gigabit ports full duplex working mode
- Support IEEE802.3az、IEEE802.3ab And other Ethernet energy-saving standards
- PXE、DPDK Support
- Strong compatibility 、 High stability
- operating system : windows、windows server、Linux、VMware、FreeBSD etc.
In addition Intel master control Bypass Function network card , Shenzhen Lianrui Electronics Co., Ltd. also has localization support PCIe x8 Four electric ports and two circuits of bus protocol Bypass Gigabit mezzanine Ethernet network adapter , It has been running stably in the customer equipment of the global network security platform . at present , Shenzhen Lianrui Electronics Co., Ltd. is developing more Bypass Series function network card , High quality network card , Not to miss .
Source URL :lrnic.cn
边栏推荐
- 频域滤波器
- Ora-01089 ora-19809 ora-19815 exceeded the limit for recovering files
- Deploy website traffic statistics background based on Tencent cloud lightweight application server and umami
- Interpretation of OCP function of oceanbase Community Edition
- 10 R vector operation construction
- 【数据可视化】Apache Superset 1.2.0教程 (三)—— 图表功能详解
- 模拟Oracle锁等待与手工解锁
- moderlarts第二次作业
- Usage methods and cases of PLSQL blocks, cursors, functions, stored procedures and triggers of Oracle Database
- Jmeter安装
猜你喜欢

UDP、TCP

新品发布:国产单电口千兆网卡正式量产!

【数据可视化】Apache Superset 1.2.0教程 (二)——快速入门(可视化王者英雄数据)

周刊02|不瞞你說,我其實是MIT的學生

8 r subset

STC hardware only automatic download circuit V2

【数据可视化】使用 Apache Superset 可视化 ClickHouse 数据

Interpretation of OCP function of oceanbase Community Edition

Usage methods and cases of PLSQL blocks, cursors, functions, stored procedures and triggers of Oracle Database

Apache APISIX 在Amazon Graviton3 上的安装和性能测试
随机推荐
ubantu1804 两个opencv版本共存
[Monday commuter radio station] cron expression. It's enough to read this article
27. this pointing problem
7905 和TL431 负电压稳压电路 - 相对于电源正极的稳压和浮地电路
In unity, opencv and QT are used to create a plugin (I)
Space transcriptome experiment | what factors will affect the quality of space transcriptome sequencing during the preparation of clinical tissue samples?
Capriccio in the Internet Age
浅谈UGUI中Canvas RectTransform的Scale
The tutor transferred me 800 yuan and asked me to simulate a circuit (power supply design)
[data visualization] use Apache superset to visualize Clickhouse data
Deploy website traffic statistics background based on Tencent cloud lightweight application server and umami
Solution to unlimited restart of desktop and file explorer
ORA-01089 ORA-19809 ORA-19815 超过了恢复文件的限制
Calculation of Zeno paradox
Interpretation of OCP function of oceanbase Community Edition
The input value "18-20000hz" is incorrect. The setting information is incomplete. Please select a company
Implement AOP and interface caching on WPF client
Final examination of theory and practice of socialism with Chinese characteristics 1
On scale of canvas recttransform in ugui
php pcntl_ Fork create multiple child process resolution