Binds the Ethernet port to a specific device for active network traffic protection and check-up
ORing’s proprietary Device Binding effectively binds the IP/MAC address of the device connected with the switch port. If the IP/MAC address of the connecting device does not match the switch port binding information, the device will be blocked for security. Additionally, the bound device also benefits from a collection of active network traffic protection and maintenance tools — alive check, stream check, and DoS/DDoS auto-prevention. Device Binding actively blocks hacker attacks and ensures that all bound devices are running well.
The Alive Check monitors the real-time status of a connected P.D. (powered device, e.g. PoE IP camera) bound to the port. Alive-checking packets are sent to the P.D. to assure the device is in working state. If the connected P.D. fails to response, ORing’s managed/lite-managed PoE switch can reactivate the connected P.D.s to assure the reliability of the network.
The Stream Check monitors the continuity of real-time data flow from the bound device. If suddenly there is a big drop of the data flow, a warning log event of such unusual phenomenon will be quickly dispatched. In conjunction with Open-Vision, ORing’s powerful network management software, the bound device failing the streaming check will also be visually indicated on the network topology in Open-Vision’s Topology View, giving the network administrator a chance to properly respond to the situation.
A Denial-of-Service attack (DoS attack) or Distributed Denial-of-Service Attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
ORing’s advanced DoS/DDoS Auto-Prevention feature effectively blocks out such hacker attacks. If there is a rapid increase of traffic flow in a short time, ORing Thunder switch will lock the source IP address for certain time to avoid the network from being attacked. Since it is a hardware-based prevention mechanism, it can prevent large scale DDoS attack immediately and completely.
In conjunction with Open-Vision, ORing’s powerful network management software, the node that the hacker attempts to sabotage and the device being attacked are visually indicated in Open-Vision’s Topology View.Also read: