IoT Security Control System

IoT Security Control System

 > Products>Network Security>IoT Security Control System
IoT Security Control System

With the backdrop of rapid development of Internet of Things (IoT) and IP-based infrastructure communication system, it is an inevitable trend that a huge number of devices become interconnected through the Internet. Evidenced by the large number of front-end devices, including IP cameras, capturing devices and RFID units, that are widely used in every corner of the city serving the public security, transportation, power and other industries, it is without doubt that the world has gradually entered the era of IoT. IoT is characterized by a huge number of front-end devices and a wider range of physical deployments compared with the traditional Internet, and includes a lot of interconnected devices in addition to human-machine interconnection. How to ensure a fully controllable and available IoT at all times has become a brand new challenge to the Industry. Given the large number of front-end IoT devices deployed in unattended environment, it is a difficult task to perform in-person supervision. This vulnerability is easy to be exploited by hackers, who may penetrate into the entire network, resulting in failure of core business systems and a great amount of confidential information being stolen. Therefore, building a perfect management and control mechanism for access assets and devices and applications is of paramount significance for the construction of a secure IoT system.

Focused on the R&D of IoT terminal access control, L2 to L7 whitelist, and other key techniques, DPtech has developed a set of IoT security control system, or Device Application Controller (DAC). The system is capable of performing accurate management of front-end IP devices and transmitted traffic over the IoT. Only authenticated devices are allowed to access, and only traffic from legitimate applications is allowed to be transmitted over the Internet. In this way, illegal private connection, counterfeiting devices, unauthorized scanning and DDoS attacks can be effectively prevented.

Designed specifically for the IoT scenarios, DACs can be widely applied in “building a safe city” projects, Intelligent Transportation, power, energy, medical, production automation and other industries. In particular, DACs address the problem of access authentication and security management of a massive volume of IP cameras and other front-end IP devices in the video surveillance application scenario, making IoT secure and fully controllable for users.

More
PRODUCT FEATURES
PRODUCT SPECIFICATION

Hardware Parameters of Board DACs

Product Model DAC-Blade-S DAC-Blade-XS DAC-Blade-AI DAC-Blade-XA
Processing Capabilities for Video Surveillance Scenarios IP cameras of 800-channel 4M bit-stream, scalable to a maximum of 8,000 channels as a whole unit IP cameras of 800-channel 4M bit-stream, scalable to a maximum of 8,000 channels as a whole unit IP cameras of 1600-channel 4M bit-stream, scalable to a maximum of 16000 channels as a whole unit IP cameras of 1600-channel 4M bit-stream, scalable to a maximum of 16000 channels as a whole unit
Scalability Support cloud-based board technology to achieve aggregated performance of multiple service boards
Maximum Slots of Hosts 10 slots
Maximum Ports Scalable to 480 Gigabit interfaces, 320 10-Gigabit interfaces, 40 40G optical interfaces
Hardware Redundancy

Dual-master redundancy; Key hardware redundancy of power supplies and fans

Operating Temperature 0~45℃

Hardware Parameters of Cassette DACs

Product Model DAC-A DAC-S
Processing Capabilities for Video Surveillance Scenarios IP cameras of 600-channel 4M bit-stream IP cameras of 250-channel 4M bit-stream
fixed interfaces 8 Gigabit optical interfaces + 8 Gigabit electrical interfaces + 40 Gigabit optical interfaces 16 Gigabit optical interfaces + 8 Gigabit combo interfaces
Expansion Slots 2 expansion slots, scalable to 10-Gigabit optical interface, Gigabit optical interface, Gigabit electrical interface 2 expansion slots, scalable to 10-Gigabit optical interface
Hardware Redundancy Key hardware redundancy of power supplies and fans
Operating Temperature 0~45℃

Software Features for Video Surveillance Scenarios

Product Model DAC-S DAC-A DAC-Blade-S DAC-Blade-XS DAC-Blade-AI DAC-Blade-XA
Security Access of Devices Support access mechanisms based on MAC address, IP address,  and device fingerprints
Data Application Control Support the whitelisting mechanism for application control based on protocol features, allowing only authorized services to be transmitted in the network; can detect control signaling and transmission protocols including SIP, RTSP, RTP/RTCP, HTTP, FTP and NTP; Support content-based deep service detection
Asset Detection and Management Capture asset information in the video networks by active scanning, passive monitoring and manual settings, and establish a unified asset database; Conduct regular scanning of devices in the video networks, and compare scanning results with asset database in order to discover abnormal devices and trigger alarms in time.
Visualized Security Situation and Status Monitoring Enable alarm logs and real-time display of behaviors such as newly connected devices, disconnected devices, and illegal terminal access in the video networks. Information captured involves device IP, type of device, geo-location, time, type of logs, etc. Provide statistics of online terminals, including the number of online terminals such as cameras, PCs and NVRs;Provide statistics of online utilization rate and online profile, including the number of online and offline units and the online utilization rate; Display the exact number of cameras from each vendor; Support regional terminal statistics at the provincial/city level and the city/district/county level or the district/county/township level, providing information on terminal quantity at all levels;
Outreach Breach Detection Enable terminal with illegal internet access in real time and perform cutoff as needed.
Compatibility Compliance with requirements set forth in national standards, including GB 35114-2017 and GB/T28181-2016; Identify the business of mainstream security product manufacturers;  A signature library upgrade is provided, which can be updated to enable detection of unconventional services
Three-layer Features IPv4: Static routing, RIP v1/2, OSPF, BGP, policy-go-together, etc. IPv6: IPv6 static routing, RIPng, OSPFv3, BGP4+, transition tunnel technology from IPv4 to IPv6, etc.
Deployment Modes Support Online and Bypass Deployments
NAT Function Support NAT modes such as one-to-one and address pool
Management and Maintenance Support RMON real-time temperature detection and alarm  Support SNMP, CLI, system adminnistration, and Unified Management Center (UMC) Support local and remote output of system logs, operation logs, commissioning and debugging information, etc.

These specifications apply only to DPtech products available on the international market.

LinkedIn Facebook Twitter

Leave a message

Leave a message

Official wechat Official Weibo

Legal Statement ©2008 - 2024 Hangzhou DPtech Technology Zhejiang ICP Registration No. 09001402 浙公网安备 33010802011733号

Leave a message

Name

Mobile

Email

Description

Code