If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email address http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: front pagePC softwaresecurity softwareFirewall class Tianba firewall
Tianba firewall

Tianba Firewall 8.0 Enterprise Edition

QR code
  • Software licensing: shareware
  • Software size: 1.79MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2022-02-18
  • Application platform: WinNT/2000/XP/2003
  • Software language: multilingual
  • Version: 8.0 Enterprise Edition

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Basic introduction
Tianba firewall segment first LOGO
Tianba Enterprise Edition has all the functions of the stand-alone version, and adds a lot of enterprise LAN security management functions. Including enterprise firewall, enterprise LAN traffic/bandwidth management, intrusion detection, security analysis, network monitoring and other functions. Specific functions: Suitable for any type of platform: Although Tianba Enterprise Edition itself is based on the NT kernel, because it has a network bridge function, it can be applied to the protection of any platform; Firewall function: Tianba's firewall is based on Implemented by IM, located at the bottom of the system protocol layer, it can completely realize the physical isolation of the network and realize comprehensive monitoring of network communications; Intrusion detection: Tianba’s intrusion detection system is based on: trigger->action execution mechanism, the system defines There are 7 major categories of triggers and 9 major execution actions. Users can freely customize various triggers and execution actions and combine them into various forms of security policies; Security analysis: The system provides convenient data filtering and protocol analysis functions; Traffic Bandwidth control: Provides traffic, bandwidth control or alarm functions, which can achieve reasonable allocation of resources when network resources are limited; Host management: can perform real-time traffic and bandwidth classification statistics on all hosts in the enterprise's LAN at the same time. Physical isolation and other functions; TCP connection status tracking: up to 200,000 TCP connection statuses can be tracked at the same time; Plan customization: By customizing plans, users can easily implement security management of the network; Alarms; the system defines multiple types of Alarm events; communication interference: the content of data packets in both the upper and lower directions can be changed. This interference is completely transparent to the upper protocol layer, application layer and other hosts;

FAQ