A proxy server software that integrates router, DNS server, NAT, Internet logging, and Internet access restrictions. It is used to realize that all computers in the LAN share an Internet connection (connection methods include MODEM, xDSL, broadband, etc.) to prevent important information of the unit from being accessed. Leakage of confidential documents, etc.; supervision, review and restriction of network usage. The main functions are:
1. Internet sharing function:
1. It has the routing function of the router, allowing multiple computers in the LAN to share the Internet. It can also isolate external access, act as a firewall, and automatically protect the internal network from external attacks;
2. With DNS forwarding function;
3. With automatic dialing function;
4. Supports Internet sharing in single network card mode;
2. Port mapping, supporting the establishment of WEB servers on the corporate intranet;
3. Network behavior monitoring: including website browsing monitoring, email sending and receiving monitoring, chat behavior monitoring, game behavior monitoring, FTP monitoring, and traffic monitoring;
4. Network behavior control: including website browsing control, email sending and receiving control, chat behavior control, game behavior control, and port-level control;
1. Prohibit certain computers from designated websites during specified time periods; only allow browsing of designated websites;
2. Prohibit certain computers from sending and receiving emails during designated time periods, only allow sending and receiving to designated post offices (whitelist), and prohibit sending and receiving to designated post offices (blacklist);
3. Prohibit certain computers from using specified chat tools (including QQ, MSN, Yahoo Messenger, ICQ, NetEase Bubble, E-Voice, UC, etc.) during specified time periods; and you can add chat behavior control lists by yourself;
4. Prohibit certain computers from playing online games (such as Lianzhong, Bubble Games, etc.) during designated time periods; and you can add online game behavior control lists by yourself;
5. It is prohibited to customize the control list, such as stock software, BT software, etc.; and initiate blocking;
6. Prohibit certain computers from using FTP tools to send out data during designated periods;
7. It can carry out strict UDP/TCP full series port level control of the entire network segment, and supports blacklist and whitelist functions;
5. Traffic limit/bandwidth limit;
You can set the maximum amount of network data traffic sent and received per second for each computer; minimizing the impact of BT software on network bandwidth.
6. IP and MAC binding;
7. Other functions.
1. Adopt C/S management mode and support hierarchical authority management;
2. Cross-platform monitoring; the monitored computer can also be Unix, Linux and other operating systems;
3. Support monitoring of unlimited IP network segments;
4. Adopt connection password management to prohibit illegal users from connecting;
5. The server runs in the background as a system service, and can achieve monitoring and Internet access control without logging in or user intervention;
Expand