product overview
Compliant with the security standards of border access platforms in industries such as public security, law enforcement, and finance; There are a large number of streaming media business application environments suitable for video conferencing, safe cities, snow projects, and smart cities.
In e-government, audio and video streaming media applications are important components of e-government network construction. Due to the particularity of streaming media, its transmission content is binary data streams, and the video application protocols vary greatly among manufacturers. It becomes difficult to use traditional data isolation gateways for protocol analysis, stripping, and transmission content filtering.
Relying on the special industrialization support of the National Development and Reform Commission, Weisi took the lead in launching a high-speed video dedicated security isolation and information exchange system suitable for the next generation Internet in the industry. The system is based on Weisi's nearly 20 years of security isolation technology advantages and experience, using an ASIC+MIPS full hardware rack, providing the industry's most comprehensive security solution with the highest security and performance for audio and video streaming media.
The Weisixin'an video dedicated security isolation gateway has created a high-performance, visual, and video security defense system for video security isolation and information exchange through the collaboration of three major components. The system structure is as follows:
Product Features
▶ The standard 2+1 security isolation architecture adopts a full hardware structure design of ASIC+MIPS, and an 8-level video stream DPI security processing pipeline based on ASIC chips, breaking through performance bottlenecks and providing throughput performance of over 10Gbps and latency of less than 0.5ns, which can meet the concurrent access of 5000 high-quality D1 resolution videos. Through stacking technology, system performance can continue to expand.
▶ Analyze video control signaling, dynamically write quintuple forwarding rules into hardware FPGA chips, achieve physical level unidirectional video transmission, with extremely high security for unidirectional video stream transmission, and use completely separate independent physical ports for transmission from control signaling.
▶ Deep protocol analysis technology separates video protocols from control protocols, supporting technologies including DB33, Huawei, Hikvision H3C、 The video surveillance systems from dozens of manufacturers, including Bell, Public Information Industry, Global Eye, Advanced Video, FiberHome, Dahua, etc., provide video control signaling analysis and content filtering functions.
▶ The combination of protocol deep filtering technology and behavior pattern analysis technology can deeply inspect the transmission content of video protocols, block viruses and Trojans from using video channels to transmit non video data, and effectively control the secure use of video channels.
▶ The virus killing technology based on stream detection directly scans the video stream by the antivirus engine, which can effectively kill viruses mixed in the video stream. Equipped with anti Trojan defense capabilities, effectively preventing unauthorized processes within the internal network from leaking data externally.
▶ It has powerful traffic management functions, supports WRED congestion control, GTS traffic shaping, supports WFQ/CBQ priority queue algorithms, provides bandwidth guarantee capabilities, and can reserve sufficient bandwidth for critical applications or users.
▶ The load balancing design of LVS+RealTime real-time backup, a high-performance LVS load balancing system based on DR semi connection mechanism, combined with a high-performance streaming media Realtime real-time session backup module, realizes a high-performance link load balancing cluster.
▶ The system provides powerful reports for administrators, including current video traffic, system processing performance, concurrent connections, online users, and a series of other reports, providing a visual video surveillance access management environment.
Provide secondary development interfaces for logging, auditing, and management, standard SNMP v1/v3 device management interfaces, and SYSLOG log output interfaces, which can be integrated with various boundary access platforms and meet the technical requirements of multiple industry boundary security access specifications.