ORing's proprietary Device Binding effectively binds the IP/MAC address of the device connected with the switch port. If the IP/MAC address of the connecting device does not match the switch port binding information, the device will be blocked for security. Additionally, the bound device also benefits from a collection of active network traffic protection and maintenance tools :

  • Alive Check
  • Stream Check
  • DoS/DDoS Auto Prevention

 

The Alive Check monitors the real-time status of a connected PD (powered device, e.g. PoE IP camera) bound to the port. Alive-checking packets are sent to the PD to assure the device is in working state. If the connected PD fails to response, ORing’s managed PoE switch can reactivate the connected PDs to assure the reliability of the network.

PD Alive Checking

 

 

The Stream Check monitors the continuity of real-time data flow from the bound device. If suddenly there is a big drop of the data flow, a warning log event of such unusual phenomenon will be quickly dispatched. In conjunction with Open-Vision, ORing’s powerful network management software, the bound device failing the streaming check will also be visually indicated on the network topology in Open-Vision’s Topology View, giving the network administrator a chance to properly respond to the situation.

Stream check

 

 

 

A Denial-of-Service attack (DoS attack) or Distributed Denial-of-Service Attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.

ORing’s advanced DoS/DDoS Auto-Prevention feature effectively blocks out such hacker attacks. If there is a rapid increase of traffic flow in a short time, ORing Thunder switch will lock the source IP address for certain time to avoid the network from being attacked. Since it is a hardware-based prevention mechanism, it can prevent large scale DDoS attack immediately and completely.

In conjunction with Open-Vision, ORing's powerful network management software, the node that the hacker attempts to sabotage and the device being attacked are visually indicated in Open-Vision's Topology View.

 

DoS, DDoS prevention