With the Rapid Development of Information Technology, There is an Urgent Need to Upgrade the Means of IP Asset Management.
Low Efficiency
A large number of enterprises still casually conduct dynamic address allocation through switches or self - built Linux or Windows systems. In case of problems, they can only rely on manual search.
Difficult to Trace the Source
In the era of Internet of Everything, the access of massive terminals has made IP management and source tracing extremely difficult.
111
Numerous Threats
The outdated and inefficient IP management methods have led to the widespread unauthorized connection of routers and continuous IP conflicts.
Eight Functions

Network Space Planning

-Visualization of network address space planning
-Simultaneous support for multiple IP address types, enabling flexible definition and utilization
-Support for network planning by bit - width in the form of semantic templates, greatly reducing the difficulty of IPv6 network management
-Support for the import and export of planning data, facilitating secondary maintenance
Intelligent DHCP Service
-Support dynamic and static IP address allocation, as well as bound - type address allocation. -Support initial dynamic allocation followed by fixed allocation, significantly reducing the management cost of fixed IPs. -Ensure the stable operation of the service through HA + failover technology. -Simultaneously support multiple forms of access authorization management for addresses, including ZWP, MAC Option, and fingerprint.
111

Dynamic Address Sensing

-Support classified management of terminal IP address assets. -Support multi - dimensional asset analysis to create clear asset portraits.
Terminal Asset Management
- Support periodic IP address scanning and proactive IP address discovery. - Support multiple scanning protocols such as ICMP, ARP, NetBios, and Nmap.
111

Network Device Inter - linkage

-Support inter - linkage with external network devices and conduct periodic scans to obtain information such as IP addresses. -Support inter - linkage with switches to bind terminal IP/MAC/interface, and promptly block risky terminals.
Full - cycle Retrospection of Address History
- Status change - Information alteration - Address recovery for alarm events - Customize any historical time - Support export in CSV format
111

Third - party System Integration

-AD Domain Controller -CMDB System -Access Authentication System
Multidimensional Data Reports
-Support data reports including network utilization rate, address pool utilization rate, message type statistics, LPS (Line - per - Second) statistics, etc. -Based on specific business needs, support customized reports with combinations of various elements from different products. -Support periodic push and export in CSV format.
111
Three Major Advantages

Visual Management Experience

Improve management efficiency by
more than 10 times
Process - based Troubleshooting
and Root - cause Tracing
Shorten the troubleshooting time by
more than 10 times
111
IPv6 Top - level Design Guidance
Reduce the management difficulty by
more than 10 times
Four Major Values

Network Visualization

Through structured network address planning, intelligently collect the associated information of IP addresses across the network, form a dynamic and unified network ledger, eliminate misunderstandings in traditional management methods, and improve management efficiency.
Assets Can Be Managed
Based on accurate asset fingerprint recognition capabilities and supporting probe engines, gain a comprehensive understanding of assets, and promptly detect abnormal assets and potential threats.
111

Troubleshooting Traceability

Achieve one - stop IP traceability services through the IP address playback engine. Determine faults and assign responsibilities among three parties, tracing the source to specific individuals, which significantly improves users' efficiency in handling faults.
Risk Controllability
"One - click binding" and "one - click blocking", through deep integration with network devices, can significantly reduce the exposure of potential risks within the network and enhance the ability of rapid response and handling.
111