Overview

To improve work efficiency through IT, many enterprises deploy information management systems such as ERP, OA, CRM, and PLM. These systems store critical company data, including customer information, R&D plans, and financial reports, making them highly valuable. The Secure Access Gateway ensures the security of these applications, preventing confidential corporate information from being easily leaked. It provides comprehensive protection for encrypted documents during upload, download, and transmission through upload decryption, download encryption, and communication encryption.

The Secure Access Gateway has two main functions: Application System Protection and Shared File Protection.

Application System Protection

It protects files on servers of applications like OA, PLM, and SVN. Unauthorized users or programs cannot access the protected servers. Authorized users and programs can access normally, with uploaded files decrypted on the server and downloaded files encrypted on local machines.

Shared File Protection

It protects shared file servers, functioning similarly to application system protection. Unauthorized users or programs cannot access protected servers, while authorized users can. Uploaded files to a designated directory on the shared server are decrypted, and downloaded files from that directory are encrypted. Files in other unspecified directories are not processed.

39.1 Network Architecture

The control functionality of the Secure Access Gateway primarily relies on hardware-based gateway devices. There are two working modes for these devices: Bridge Mode and Router Mode.

Bridge Mode

console display

In Bridge Mode, the network structure and configuration remain unchanged. The Secure Access Gateway device is simply inserted into the network at the point where control is needed, typically in front of critical application servers or gateways. This setup allows seamless integration without modifying existing network infrastructure.

Bypass Control Mode

bypass control mode

Routing Mode

Enable policy-based routing on the core switch to control inter-subnet access. This control method does not affect the existing network architecture and requires the core switch to support policy-based routing.

Bypass Mirror Mode

Set up mirror and monitoring ports on the core switch to analyze mirrored traffic for access control. This method does not affect the existing network architecture and requires the core switch to support port mirroring.