Current Location: 首页 > Industrial control safety > Product system > Net series products
  • Industrial switch system
  • Industrial firewall system
  • Centralized safety management system
  • Industrial safety isolation network gate system
  • Industrial safety audit system
  • Industrial control honeypot system
  • Industrial asset exploration and full life cycle management system
Industrial switch system
Haotian Industrial Switch is a three-layer network management switching device for communication applications. It provides rich switching routing features, fast Ethernet ring network support, and high reliability environment adaptability, and provides a stable and reliable communication platform for information systems。Haotian Industrial switch adopts 3U high CPCI, rack type and rail type,Provides 8/12 Gigabit M12 Ethernet ports,Supports rich Layer 2 software features such as ports, vlans, multicast, QoS, and fast Ethernet,Supports Layer 3 functions, such as static routing and policy,It also supports Con-sole, Telnet and SNMP based network management software。
cut-through
Ultra-low delay
Reliable and compatible
Environmental adaptation
Functional characteristics
Advanced switching and routing performance
It provides advanced network switching performance, realizes low latency, full-line speed switching, and zero packet loss, and supports Layer 3 routing functions such as static routing and policy-based routing。
Fast Ethernet ring network support
Supports fast loop network protocols with self-healing time less than 50 milliseconds, and supports spanning trees and fast spanning tree algorithms。
Strict security protection mechanism
It supports hierarchical user management, password protection, and port isolation。
Highly reliable adaptability to the environment
机身采用金属外壳,坚固耐腐蚀; -40°C ~ +45°C宽温工作模式,无风扇自然冷却散热,稳固耐用。
Rich management style
Supports FTP/TFTP loading and upgrading.Supports the command line interface (CLI) and the Console port for configuration.Supports SNMP NMS and Telnet remote maintenance。
Flexible networking mode
Supports flexible networking modes such as loop topology, double-ring topology, tangential ring topology, and Layer 2 and Layer 3 switch mixed group ring topology。
Industrial firewall system
Haotian Industrial firewall system is a special protection product for security isolation between networks of different security levels in industrial environment。Based on the in-depth analysis of mainstream industrial protocols, the product integrates industrial control threat feature recognition technology, machine self-learning and trusted whitelist technology, which can effectively resist all kinds of network attacks and malicious damage aimed at industrial control systems and provide security guarantee for the stable operation of production control systems。
Depth analysis
Intelligent and trustworthy
Command control
Multiple protection
Functional characteristics
Full and deep protocol parsing
Supports in-depth analysis of dozens of industrial protocols such as OPC, Modbus/TC, IEC104, DNP3, MMS, S7, GOOSE, SV, and supports custom extended private protocols。
Intelligently build trusted rules
Establish the trusted behavior baseline of industrial control services through traffic self-learning, assist users to build security protection rules, and reduce the difficulty of manual deployment。
Strong network adaptability
Supports transparent mode and routing mode deployment, ADAPTS to complex industrial network environments, and can work in test mode and working mode to facilitate deployment。
Command level precision control
Support for mainstream industrial protocols (OPC, Modbus, IEC104, DNP3, etc.) for instruction level recognition and accurate control, such as remote sensing encounter, APCI, function code, register, etc。
Multiple protection mechanism
With the traditional network layer wainful attack protection capability, well based on industrial control threat feature recognition technology, trusted white list technology to build multiple protection mechanism, to resist the leaf of the industrial control system of high-yield network attacks (APT).。
Flexible management style
Supports self-management of local devices and centralized management of multiple devices。Realize the grouping of devices and unified management in different regions。Reduce security operation and maintenance costs。
Centralized safety management system
Haotian centralized security management system is a security platform for unified management, configuration, authorization and response of various security equipment in the industrial control network (industrial firewall, industrial security audit system, industrial network gate system, etc.)。It can centrally and effectively manage the security policies and security events of the currently supported industrial control security equipment, break the security islands, and make them become a living organism system to resist various threats in the network。
Centralized monitoring
Unified management
Comprehensive analysis
Fast response
Functional characteristics
Support the access management of industrial control security products such as industrial firewall, industrial security audit system, industrial security isolation network gate, industrial data acquisition gateway, etc。
The system provides visual statistical analysis of alarm information in terms of alarm severity statistics and alarm IP address statistics。In addition, the alarm list is provided. You can view all generated alarms and their details。
Association analysis Supports association analysis of multiple event sources through logical modeling and visual editing, and reference rules and multi-rule nesting, meeting the security scenario analysis requirements of log audit。
The system can discover security events based on various association analysis rules and display all kinds of alarms in a centralized manner。
The system provides process-based work order management function, which can send or receive the disposal work order for the alarm, and track the flow status and disposal progress of the work order related to the responsible person。
To realize the separation of administrator's responsibilities, the system adopts role-based access control (RBAC)。According to the principle of least permission, the system grants each administrator the minimum permissions required to complete tasks。
Industrial safety isolation network gate system
Industrial Internet is facing increasing security threats, Haotian industrial security isolation network gate system using advanced GAP technology independently developed and produced a new generation of industrial network security products。The system consists of internal and external network processing units and security data exchange units. Security policies are configured to meet the needs of enterprises。On the premise of ensuring the isolation of internal and external networks, it can achieve efficient and secure data exchange to meet the relevant needs of data security exchange in the electric power, petroleum and petrochemical, coal, rail transit, intelligent manufacturing and other industries。
2+1架构
Intelligent whitelist
Symmetric multiprocessing
Excellent performance
Functional characteristics
Data acquisition real-time monitoring
Support rich industrial protocols for industrial data acquisition。For fixed collection points, the system provides real-time monitoring of collection status, and can clearly view the collection status and collection data dynamics。
Securely isolate data exchange
Provides a complete function of SMTP/POP(3) protocol analysis module and FTP protocol analysis module。The blacklist and whitelist function filters industrial protocols and data items of data transmitted through the network gate, effectively preventing the exchange of sensitive files, data, and protocol package contents。
Supports rich reporting protocols
Support MQTT protocol, standard socket protocol;Provides client mode and server mode.Traditional protocols such as HTTP and SQL are reported。
Supports multi-data center upload and disconnection
Report The data source to be reported can be intelligently selected on the management page and can meet the Settings of multiple receiving servers。When the reporting system and the receiving server fail, the receiving server can be automatically reconnected to continue to report industrial data。
Industrial safety audit system
Haotian Industrial Security audit system is an industrial security product with completely independent intellectual property rights of Yantian Security, specially tailored for industrial control networks。It can monitor the status of the industrial control network in real time, detect the intrusion behavior in the industrial control network, and track the security events of the industrial control network according to the user-defined audit strategy, and retain the data of the industrial control network。
Accurate recognition
Real-time alarm
Comprehensive audit
In-depth analysis
Functional characteristics
Accurate identification and in-depth analysis
Accurate identification of OPC, Modbus/TCP, IEC104, DNP3, Profinet, MMS, S7 and other mainstream industrial protocols, can deeply analyze the control instructions, parameters, remote sensing, telemetry and other information in the production environment。
Service interruption real-time alarm
Continuous monitoring of the communication status of specified industrial protocols, real-time alarm of traffic interruption events affecting business continuity, and timely detection of security risks in the production environment。
Full audit of operational records
Comprehensive and detailed records of operational behaviors in industrial control business, such as instruction changes, load changes, configuration changes, etc., to facilitate traceability of security events。
Real-time monitoring of network status
Real-time monitoring of the operating status of the industrial control network, automatic learning of normal communication rules, the establishment of a trusted behavior baseline, real-time monitoring and alarm of abnormal instructions and behaviors in the network。
Identify intrusions accurately
Use its own industrial control threat knowledge base to establish detection rules, accurately identify the network exploit attacks, malicious code attacks and other intrusion behavior and real-time alarm。
Audit data is securely retained
The original data of all industrial control networks shall be securely stored, and the audit data shall be retained for no less than six months according to industry-related audit requirements。
Industrial control honeypot system
Haotian industrial control honeypot system adopts the virtual and real combination method, which can disguise and simulate various industrial control equipment and protocols in the industrial control system, and support high interactive communication of a variety of general IT protocols and common industrial control protocols。The system built-in industrial control system commonly used protocol data acquisition and analysis module,By deploying decoys and traps along the critical path of the attacker's intrusion,Luring attackers into honeynet systems that are isolated from the real network,Capture attacks against industrial control systems and obtain attack data,The traffic entering the sensing terminal is fully recorded,Analyze the packet in depth,Alarm the attack behavior。
Fast switching
Flow analysis
Dynamic forensics
Flexible networking
Functional characteristics
"High sweetness" decoy ability
Stand in the attacker's point of view, set bait, in the case of a single point of Intranet breakthrough, let the attacker away from the real asset。Intelligently learning defended networks,Automated simulation simulates business scenarios,Build diverse vulnerable environments and information that attract attackers,Luring the attacker deeper into the honeypot scenario,Expose their motives and technical means,Delay attacker time,This gives the defense a firm hold on the initiative,Improve the speed of emergency response to sudden cybersecurity incidents。
"High disposal" defense capability
The deceptive defense mode is an effective supplement to the traditional border defense means。Precise location of attack sources and detailed analysis of attack behavior make post-processing fast and efficient, especially for the defense and disposal of new infiltration attacks that have bypassed border protection and are both highly dangerous and highly concealed。
"Zero false positives" discovery capability
Honeypot endogenous trapping mechanism, any touching and entering the honeypot behavior is detailed positioning and analysis, "attack is alarm, response is disposal", achieve zero false positives。When hackers are already conducting network scanning and reconnaissance, the product can provide a large number of fake hosts and fake services to form a "shadow network", hide the original real business system, interfere with hackers' judgment of the attack target, respond quickly and obtain evidence。
"Traceability analysis" intelligence capability
Through the detection of malicious code, the virus Trojan existing in the industrial control host is found to help the management personnel of the tested unit trace the source and take security precautions in time。Highly concealed collection of the honeypot attacker's address, sample, behavior, hacker fingerprint and other information, master its detailed attack path, terminal fingerprint and behavioral characteristics, to achieve comprehensive forensics, accurate traceability。
Industrial asset exploration and full life cycle management system
Haotian Industrial asset exploration and whole life cycle management system,The method of combining passive flow analysis technology with active nondestructive exploration technology is adopted,Discover mainstream assets in the industrial network,Active asset exploration Lossless exploration using proprietary asset discovery instructions for each brand of industrial asset,Significantly reduces the pressure on industrial assets caused by active exploration。Haotian Industrial Asset exploration and full life cycle management system will also manage changes and life cycles for asset manufacturers, models, firmware versions, software lists, configurations, patches and operational data。
Active probe
Passive detection
Classification recognition
Asset tracking
Functional characteristics
High coverage asset identification
Equipment detection covers the main industrial control protocols, supports the monitoring of more than 90 industrial control protocols, can scan assets at high speed, scan a C-segment of 68 protocols within tens of seconds, the system built-in 2500+ industrial equipment fingerprint information。
Active lossless probing technique
For industrial control equipment in industrial field, using the actual communication protocol to obtain equipment characteristic information will not affect the field equipment。The asset discovery mechanism combining active and passive detection is adopted to improve the coverage and accuracy of asset identification。
Authoritative and rich vulnerability library
Fully support CVE industrial control vulnerability detection, built-in 130,000 + vulnerability rules。Support industrial control equipment vulnerabilities, industrial control system component software vulnerabilities, monitoring software vulnerabilities, OS vulnerabilities, database vulnerabilities, office software vulnerabilities, etc., can be scanned in the industrial control system for the asset risk alarm。
Asset lifecycle management
It covers the whole process of asset discovery, asset tracking, asset management and asset retirement。Help industrial enterprises dynamically track the location and use of industrial assets and equipment, and generate asset statistical reports, analyze asset data, and automatically determine asset decommissioning through scanning。
Flexible asset management
Active and passive asset management: Supports flexible asset management by setting the asset range and then detecting assets and grouping assets according to their common characteristics。
Video terminal security access control platform
Video terminal security access control platform (referred to as "VAC system") is an application in the video network to the entire video network front-end network camera, network hard disk recorder (NVR), video server and other equipment centralized management and monitoring system。The VAC system uses the identification method of "active detection + passive protocol analysis" to automatically discover video equipment information, monitor image quality, effectively block the access of illegal network equipment, and ensure the normal data transmission of legitimate equipment。The system monitors the devices in the video network in real time, and generates alarms in the first time for violations such as illegal network device connection, device loss, counterfeit replacement, and parameter modification, and blocks related devices according to the rules, effectively ensuring the secure operation of the video network。VAC system is specialized for video surveillance network application scenarios, widely used in public security/traffic police video private network, safe city, intelligent transportation and other fields, to solve the access authentication and security control problems of massive network cameras and other front-end IP devices, to help users build a safe and controllable video network。
Boundary protection
Stream delay
Centralized control
Anomaly detection
Functional characteristics
Asset discovery and identification
Based on the method of "active network protocol detection + passive protocol packet analysis", the system collects device information for devices in the network, which has the characteristics of good brand adaptability and high accuracy。The system adopts active and passive detection technology,Real-time monitoring of network equipment, network boundary changes and violations,It uses multiple network protocols (SNMP, ICMP, ARP, LLDP) and asset feature identification technologies,You can collect information about the device type, model, IP-MAC, and device manufacturer。
Advanced network access control
The system adopts the new NACP access control technology to realize the network access management of the video network terminal, which can bind the information of the network equipment, prevent illegal intrusion, and monitor the operation of the equipment。The system is easy to deploy, does not change the existing network structure, does not rely on network equipment, and can be compatible with various complex network environments on the customer site。If the information about managed devices is abnormal, you can isolate the abnormal devices to prevent unauthorized terminals from accessing the network。Improve the efficiency of network access and ensure the security of access networks。
Continuous equipment condition monitoring
The system adopts network awareness and discovery module,Can continuously monitor the operation of managed devices 24/7,Real-time detection of equipment anomalies,Generate security events (event time, device information, event type, event content, network access status) for abnormal operations such as illegal device connection, offline device, counterfeit replacement, unfamiliar device intrusion, and parameter modification.,Alarms and blocks events in a timely manner,In addition, multiple alarm modes such as email, SMS, and message are provided,Avoid missing alarm information。
Intuitive presentation of statistical results
The system performs intelligent statistical analysis on the running status and security events of the equipment,The device online rate, stream pass rate, asset status, device alarm, and threat status are displayed in visual ICONS,It is convenient for managers to view and analyze,Helps users quickly understand the operation of supervised equipment,To make quick responses and decisions。
Video terminal security access acquisition probe
Yantian Video Terminal security access acquisition probe is an innovative product, based on the video terminal security access control platform capability research and development, through distributed deployment to achieve data interaction with the main platform, to ensure efficient and secure data transmission。The probe is equipped with a self-developed device detection engine, through active detection and passive protocol analysis, to comprehensively identify and collect information on the devices in the network segment, accurately match the device type, and report the data to the main platform in real time for in-depth monitoring and analysis。Without changing the existing network structure, the probe can quickly realize the access control of illegal devices, effectively prevent the access of unauthorized devices, and ensure the security of video network。
Fast recognition
Real-time reporting
Boundary protection
Second response
Functional characteristics
Asset discovery and identification
The product is equipped with the equipment detection engine independently developed by Yantian,The device information within the configured network segment is fully collected in active detection and passive protocol analysis mode,The collected results are compared with the signature database of the built-in type device of the probe,Accurately lock the type of the collection device,After the probe collection is completed, the collected data content can be actively pushed to the main platform for monitoring application。
Security access control
The product adopts a new generation of self-developed NACP access technology, which adheres to the characteristics of "do not change the network, do not rely on network equipment", and solves the risk problem of illegal equipment accessing the video network at will for customers。The product supports the delivery of the access control network segment configuration to the main platform and the application of the access blacklist and whitelist policy. After receiving the policy information, the access control of the target device is quickly realized, providing all-round security protection for the video network border。

Shandong Yuntian Safety Technology Co., LTD. All rights reserved Lu ICP No. 17007379-1

Lu public network Anbei 37010202002190

" class="hidden">一览应届生网