The Data Center DPI and Network Visualization Analysis System is a network visualization analysis system equipped with functions such as basic data management, log management, and network visualization, designed to meet the information management needs of relevant authorities for visualization systems, data centers, and operators.
The Data Center DPI and Network Visualization Analysis System is a network visualization analysis system equipped with functions such as basic data management, log management, and network visualization, designed to meet the information management needs of relevant authorities for visualization systems, data centers, and operators.
The Data Center DPI and Network Visualization Analysis Platform is a network visualization analysis system equipped with features such as basic data management, access log management, and network visualization, designed to meet the information management needs of relevant authorities, data centers, and operators for visualization systems.
This system is a deep packet inspection and information management system designed for scenarios such as operator communication networks and data centers. It meets the data management and network visualization requirements of relevant authorities for telecom operators and data centers, enabling real-time monitoring, collection, and reconstruction of large-scale bidirectional network traffic, as well as real-time blocking of illegal and non-compliant information.
The Data Center DPI and Network Visualization Analysis Platform consists of two main components: the Control Unit (CU) and the Execution Unit (EU).

Rich Application Recognition Capabilities
Supports application recognition capabilities for over 20 major categories and more than 3,500 sub-categories of internet applications. The accuracy rate for identifying common internet applications exceeds 95%, and the system features certain AI self-learning capabilities that enable continuous expansion of its recognition abilities.
Powerful Rule-Matching Capability
It fully supports matching traffic against various types of rules, including quintuples, URLs, domain names, TCP Flags, TOS, VLANs, keywords, IMSIs, and regular expressions, and enforces management policies. It can support up to one million rules at maximum.
High Integration with Low Power Consumption Ratio
The 1U/2U universal X86 architecture servers or domestically produced KunPeng servers based on the ARMv8 architecture both feature high integration, low cabinet footprint, low power consumption, and a high energy efficiency ratio.
Good Interface Extensibility
In terms of physical interfaces, the traffic processing device can flexibly support various line interfaces—including 100G, 50G, 25G, 10G, and GE—for traffic collection and access.
Information Management
• Receive monitoring, filtering, and handling instructions issued by the control unit, record logs promptly, and report them in a timely manner. Adjust management strategies in real time, and employ multi-dimensional and multi-faceted detection and handling methods.
Application Recognition
• Supports over 20 major business categories and more than 3,500 sub-categories of applications;
• Supports real-time or scheduled updates of the application signature database;
Log Audit
• Supports auditing and reporting of all access logs, and offers flexible log customization templates.
Traffic Control
• Supports multi-dimensional traffic control based on APP, user, user group, QOS, and more.
Traffic Blocking
• Supports blocking policies based on domain names, URLs, IP addresses, ports, and keywords;
• Supports blocking and handling through various methods such as TCP connection termination, UDP packet loss, and HTTP page redirection;
• Supports coordinated handling with other devices.
Traffic Statistics
• Supports IDC traffic flow analysis and statistics;
• Supports IP address traffic TOPN, and supports traffic statistics for specific IPS and IP segments;
• Supports statistical analysis of network attack traffic.
Traffic Mirroring
• Supports mirroring policies that combine multiple dimensions, such as users, user groups, and time periods.
Network Visibility
• Supports the analysis of network attacks and malicious program network activities.
• Supports the management of network abnormal behaviors and the analysis of restored malicious files, including the analysis of unknown malicious programs through methods such as sandboxes and decompilation.
Data Management
• Supports the identification and restoration of protocols containing sensitive data, and assigns hierarchical classification labels to the restored files;
• Supports executing task instructions from the Control Unit and reports detection results, while also monitoring and tracing data sources.
