Docs

Ping32

Network

Ping32 protects enterprise network security by promptly blocking unauthorized network behaviors through functions such as external connection control, network access control, and trusted network configuration.

Overview

Ping32 filters and analyzes network traffic to help enterprises prevent network intrusions and attacks. By setting network security rules on endpoint computers, it provides robust network access control and application communication control to safeguard enterprise and endpoint network security.

Network Access Control

This function prevents users from connecting to insecure networks, such as public Wi-Fi. Ping32 supports flexible network access control policies, allowing administrators to restrict computer access to internal networks, the Internet, or external networks based on programs, network ports, IP addresses, communication directions, and protocol types, filtering unsafe connections and ensuring secure network usage.

  • Policy types allow administrators to select kernel-level or application-level strategies to better control network access.
  • Control direction settings enable administrators to specify outbound, inbound, or bidirectional control for comprehensive network management.
  • Rule types support programs, ports, IPs, and expressions, allowing precise control. For example, specific programs can be restricted to access only certain network resources or specific IP addresses.
  • Protocol types include TCP, UDP, or any protocol, enabling administrators to set rules based on protocol characteristics.
  • Operation types include allow or block, giving administrators the ability to permit or deny network requests as needed to maintain security.

 

Unauthorized External Connections

Unauthorized external connections occur when enterprise computers or networks connect to external networks, potentially causing data leaks or network attacks. Ping32 manages this by allowing administrators to define compliant IP addresses, single or multiple IPs, or IP ranges. When an unauthorized connection is detected, the system immediately blocks it, protecting enterprise network security.

Trusted Network Access

Ping32 supports configuring trusted networks to identify and manage enterprise internal network environments. Administrators can define trusted network conditions and set corresponding policies when devices leave the trusted network, preventing external devices from negatively impacting enterprise networks.

  • Multiple detection conditions can be customized, such as accessing specified URLs, pinging specific IPs, wireless network names, gateway addresses, and WAN IPs.
  • Trusted network rules can require multiple conditions to ensure a device is fully verified as within a trusted environment.
  • Administrators can set permissions for leaving a trusted network, such as disconnecting from the network, issuing alerts, or locking the screen, controlling device behavior and maintaining internal network security.

 

Network Security Domain

Computers without the client installed cannot access devices with the client. This feature enforces precise access control policies, restricting unauthorized users or devices from accessing specific network resources, preventing unauthorized access and data leaks.

HTTP Protocol Filtering

Ping32 supports flexible HTTP rule configuration, monitoring, detecting, and blocking data transmitted via HTTP, protecting against malicious activity, data leaks, and other threats.

  • Administrators can customize actions and methods such as GET, POST, and PUT to handle different HTTP request types.
  • Rules can include custom conditions and HTTP header parameters for fine-grained control over HTTP traffic.

 

Network Protocol Auditing

Ping32 audits protocols such as DNS and FTP to help enterprises identify and prevent attacks, ensuring network availability and security.

  • DNS protocol auditing monitors DNS resolution activity, recording terminal name, source address, DNS server, request address, response IP, and timestamp to detect and prevent attacks.
  • FTP protocol auditing monitors FTP access, capturing IP, user, server, and operation type to maintain data integrity and prevent unauthorized changes.

 

IPSec Policy

Ping32 supports IPSec policies, allowing administrators to configure and view detailed policy information including IP, policy name, modification time, and status, enabling fine-grained access control and enhanced network security.

Courses

We offer courses to help you learn how to use our products in detail and resolve any issues during usage, providing better services and solutions for your clients or enterprise.

Concept