Whitelist-based Security Switch

For closed networks, industrial control equipment networks, security networks, etc.
Other than allowed communication rules (whitelist)
Security switch that blocks all other communication
In response to intelligent attacks Whitelist-based security switch

Why doesn’t the security incident decrease?
By blurring the boundaries of the network with technologies such as mobile and cloud!
The biggest threat to security threats is internal users!
Security department in limited resources, hard to decide where to focus!
Whitelist security that only allows “safe” to be proven
The communication path is set according to the authority of the internal user or terminal (White-List base Security), and all communication other than the registered path is blocked to prevent security threats caused by indiscriminate communication by internal users.


  • 특징 아이콘

    Implement whitelist security at the network switch level
    Internal security can be enhanced by controlling the communication path of all network devices using Ethernet regardless of the type of internal terminal and OS.
  • 특징 아이콘

    Non-Agent based communication blocking and control
    You can control the communication path using a network switch without configuring separate probe and agent installation.
  • 특징 아이콘

    Apply integrated security policy to remote networks
    In addition to the internal network, the same security policy is applied to the remote network to maintain a uniform and advanced security policy even in various environment changes such as internal terminal movement and department movement.
  • 특징 아이콘

    Network service, integrated management of internal terminals (intelligent integrated management)
    You can monitor real-time services, protocols, and users using the network, and you can manage the internal communication path by limiting the users who use the service or by specifying the allowable services for each user depending on the environment.

Main Functions

  • Whitelist-based communication path control
    Policy by IP, service port, and group
    WhiteList, BlackList policy applied
    Schedule support
    Provides notification function when WhiteList is violated
  • Block network harmful traffic
    L2~L4 level network attack blocking
    DoS, DDoS, SCAN, Spoofing, Flooding attack blocking
    Provide security log report
  • Cable looping blocking
    Automatic detection and blocking when cable looping occurs
    Bundling software (VNM) allows for the location of roofing to occur immediately OK
    Automatic recovery of switch ports when looping is released
  • Network integration control
    Unauthorized user access control Real-time internal IP management Internal asset management Configure network topology Switch Config

Difference Between General Switch And WhiteList Security Switch

General switch

WhiteList security switch

Introduction Effect

Protecting critical systems and services

01. Protecting critical systems and services
Main system (equipment, server, etc.) protection (access control)
Prevention of data leakage
Preventing useful backdoor
02. Blocking abnormal traffic detection
APT defends against malware attacks
Prevention of security accidents that are difficult to predict Enhancement of internal network safety through prevention of secondary infection and spread
03. Illegal access control
Security management of external import equipment
Use time, access permission system/service designation Save communication log (for future accident investigation, audit use)
Unauthorized access control
IP management
Securing network device visibility
04. Blocking unnecessary communication by internal users
Control the communication path of the internal terminal
Control according to the use of network terminals by user, protocol, and group Printers and multifunction devices, CCTV, IP phones Cooling/heating devices, access control devices, various control systems, etc.