F.A.S.T数据安全传输系统产品说明(USB+IB)v1.3
- 格式:pdf
- 大小:1.15 MB
- 文档页数:8
KEY FEATURES• Physically secured for replication of GE OSM data to outside business networks and remote locations • Fastest throughput - Owl solutions range from 5 Mbps up to industry leading 10 Gbps• Unhackable hardware eliminates cyber threats and attackers from tampering • Supports high availability architecture and high bandwidth connectivity • Compliant with NERC-CIP and NIST • Common Criteria EAL certified • Full functionality embodied in a single device• Low SWaP (Size, Weight, and Power)Simple and Hardware EnforcedOwl’s hardware-enforced data diode cybersecurity products are built from the ground up for seamless data availability and unhackable security. They are designed to provide deterministic data transfer in only one direction to segment and protect networks, devices, and other digital assets (databases, historians, SCADA, PLCs, DCS, etc.) from external threats. Owl offers the industry’s most flexible line of data diode cybersecurity products. Customers can choose from the appropriate hardware platform and form factor, which includes a base software package, and then select optional add-on software modules to meet their solution needs.GE On-Site Monitoring (OSM) provides businesses with access to important turbine performance data by collecting and monitoring diagnostic information, then transferring that data to a Remote Monitoring Center. Because these data transfers require bi-directional communication between the business and external networks, they are inherently insecure. Owl data diodes enable the secure one-way transfer of GE OSM data to a Remote Monitoring Center, ensuring that critical turbine assets are safe from external cyber attack.OverviewFocused Functionalities for GE On-Site MonitorOwl data diodes for GE OSM use hardware-enforced one-way transfer to securelyreplicate GE OSM servers. When integrated with GE OSM, Owl’s data diode technology ensures that turbine performance data is available remotely for the centralized system and secures the process control network and turbines from external cyber threats.Call 203-894-9342 or email *************************Our team is always available to meet your cybersecurity needsD A T A S HE E Tfor GE On-Site Monitoring (OSM)Owl Data DiodesHardware-Enforced Cybersecurity for OSM Server ReplicationFILE AND PROTOCOL SUPPORT+UDP+TCP/IP+SNMP+SMTP+FTPSOFTWARE MODULE COMPATIBILITY+OSIsoft PI System Transfer+OPC Transfer+Modbus+Screen Replication+SQL Database Transfer+Remote File Transfer (RFTS)+Log File Transfer+Owl Performance Management (OPMS)Over the last 20 years, Owl has been developing and refining data diode technologies, consistently well ahead of any other competing solution. Owl solutions feature transfer rates at up to an industry-leading 10 gigabits per second. In addition, the reliability, high bandwidth, and low latency of Owl solutions means packets never require retransmission, creating highly tuned and optimized solutions with zero data loss when operating within the specified bandwidth rate.。
DATA SHEETFortiSwitch ™ Data Center SeriesFortiSwitch Data Center switches deliver a Secure, Simple, Scalable Ethernet solution with outstanding throughput, resiliency, and scalability. Virtualization and cloud computing have created dense high-bandwidth Ethernet networking requirements. FortiSwitch Data Center switches meet these challenges by providing a high performance 10 GE, 40 GE, or 100 GE capable switching platform, with a low Total Cost of Ownership. Ideal for Top of Rack server or firewall aggregation applications, as well as SD-Branch network coredeployments, these switches are purpose-built to meetthe needs of today’s bandwidth intensive environments.Highlights§High throughput Ethernet switch suitable for Top of Rack or largeSD-Branch network deployments§ 1 GE, 10 GE, or 100 GE access ports, in a compact 1 RU form factor with 40 or 100 GE capable uplinks which includes breakout support for 2x50G, 4x25G, 4x10G, and 4x1G §FortiGate management through FortiLink, enabling the Security Fabric§Stackable up to 300 switches per FortiGate depending on model§Dual hot swappable power supplies for redundancy§Supports Wire-speed switching with both Store and Forward and Cut Through forwarding modesProduct OfferingsFortiSwitch 1024D, 1048E, 3032D, and 3032ESecurity Fabric Integration through FortiLinkThe FortiSwitch Data Center Series supports FortiGate managementthrough FortiLink, extending the Fortinet Security Fabric to the Ethernet port level. This link allows the same policies configured and applied to FortiGate interfaces to be applied to theFortiSwitch Ethernet ports, reducing complexity and decreasing management cost. With network security and access layer functions enabled and managed through a single console, centralized policy management, including role-based access and control, are easy to implement and manage. Users or devices can be authenticated against the same database and have the same security policy applied regardless of how or where they connect to the network.DATA SHEET | FortiSwitch™ Data Center SeriesDeploymentStandalone ModeThe FortiSwitch has a native GUI and CLI interface. All configuration and switch administration can be accomplished through either of theseinterfaces. Available ReSTful API’s offer additional configuration and management options.FortiLink ModeFortiLink is an innovative proprietary management protocol that allows our FortiGate Security Appliance to seamlessly manage any FortiSwitch. FortiLink enables the FortiSwitch to become a logical extension of the FortiGate integrating it directly into the Fortinet Security Fabric. This management option reduces complexity and decreases management cost as network security and access layer functions are enabled and managed through a single console.DATA SHEET | FortiSwitch ™ Data Center Series3HardwareFortiSwitch 3032D — frontFortiSwitch 3032D — backFortiSwitch 1048E — frontFortiSwitch 1048E — backFortiSwitch 1024D — backFortiSwitch 3032E — frontFortiSwitch 3032E — backFortiSwitch 1024D — frontDATA SHEET | FortiSwitch™ Data Center SeriesFeaturesLAG support for FortiLink Connection YesActive-Active Split LAG from FortiGate to FortiSwitches for Advanced Redundancy YesFORTISWITCH 1024D FORTISWITCH 1048E FORTISWITCH 3032D FORTISWITCH 3032E Layer 2Jumbo Frames Yes Yes Yes YesAuto-negotiation for port speed and duplex Yes Yes Yes YesIEEE 802.1D MAC Bridging/STP Yes Yes Yes YesIEEE 802.1w Rapid Spanning Tree Protocol (RSTP)Yes Yes Yes YesIEEE 802.1s Multiple Spanning Tree Protocol (MSTP)Yes Yes Yes YesSTP Root Guard Yes Yes Yes YesEdge Port / Port Fast Yes Yes Yes YesIEEE 802.1Q VLAN Tagging Yes Yes Yes YesPrivate VLAN Yes Yes Yes YesIEEE 802.3ad Link Aggregation with LACP Yes Yes Yes YesUnicast/Multicast traffic balance over trunking port(dst-ip, dst-mac, src-dst-ip, src-dst-mac, src-ip, src-mac)Yes Yes Yes YesIEEE 802.1AX Link Aggregation Yes Yes Yes YesSpanning Tree Instances (MSTP/CST)32/132/132/132/1IEEE 802.3x Flow Control and Back-pressure Yes Yes Yes YesIEEE 802.1Qbb Priority-based Flow Control Yes Yes Yes YesIEEE 802.3u 100Base-TX Yes No No YesIEEE 802.3z 1000Base-SX/LX Yes Yes Yes YesIEEE 802.3ab 1000Base-T Yes Yes No YesDATA SHEET | FortiSwitch™ Data Center Series Features* Requires ‘Advanced Features’ License5DATA SHEET | FortiSwitch™ Data Center Series RFC ComplianceRFC and MIB Support*BFDRFC 5880: Bidirectional Forwarding Detection (BFD)RFC 5881: Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop)RFC 5882: Generic Application of Bidirectional Forwarding Detection (BFD)BGPRFC 1771: A Border Gateway Protocol 4 (BGP-4)RFC 1965: Autonomous System Confederations for BGPRFC 1997: BGP Communities AttributeRFC 2545: Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain RoutingRFC 2796: BGP Route Reflection - An Alternative to Full Mesh IBGPRFC 2842: Capabilities Advertisement with BGP-4RFC 2858: Multiprotocol Extensions for BGP-4RFC 4271: BGP-4RFC 6286: Autonomous-System-Wide Unique BGP Identifier for BGP-4RFC 6608: Subcodes for BGP Finite State Machine ErrorRFC 6793: BGP Support for Four-Octet Autonomous System (AS) Number SpaceRFC 7606: Revised Error Handling for BGP UPDATE MessagesRFC 7607: Codification of AS 0 ProcessingRFC 7705: Autonomous System Migration Mechanisms and Their Effects on the BGP AS_PATH Attribute RFC 8212: Default External BGP (EBGP) Route Propagation Behavior without PoliciesRFC 8654: Extended Message Support for BGPDHCPRFC 2131: Dynamic Host Configuration ProtocolRFC 3046: DHCP Relay Agent Information OptionRFC 7513: Source Address Validation Improvement (SAVI) Solution for DHCPIP/IPv4RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IPRFC 5227: IPv4 Address Conflict DetectionRFC 5517: Cisco Systems' Private VLANs: Scalable Security in a Multi-Client EnvironmentRFC 7039: Source Address Validation Improvement (SAVI) FrameworkIP MulticastRFC 2362: Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol SpecificationRFC 2710: Multicast Listener Discovery (MLD) for IPv6 (MLDv1)RFC 4541: Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping SwitchesRFC 4605: Internet Group Management Protocol (IGMP)/Multicast Listener Discovery (MLD)-Based Multicast Forwarding (“IGMP/MLD Proxying”)RFC 4607: Source-Specific Multicast for IPIPv6RFC 2464: Transmission of IPv6 Packets over Ethernet Networks: Transmission of IPv6 Packets over Ethernet NetworksRFC 2474: Definition of the Differentiated Services Field (DS Field) in the and IPv6 Headers (DSCP) RFC 2893: Transition Mechanisms for IPv6 Hosts and RoutersRFC 4213: Basic Transition Mechanisms for IPv6 Hosts and RouterRFC 4291: IP Version 6 Addressing ArchitectureRFC 4443: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification RFC 4861: Neighbor Discovery for IP version 6 (IPv6)RFC 4862: IPv6 Stateless Address Auto configurationRFC 5095: Deprecation of Type 0 Routing Headers in IPv6RFC 6724: Default Address Selection for Internet Protocol version 6 (IPv6)RFC 7113: IPv6 RA GuardRFC 8200: Internet Protocol, Version 6 (IPv6) SpecificationRFC 8201: Path MTU Discovery for IP version 6IS-ISRFC 1195: Use of OSI IS-IS for Routing in TCP/IP and Dual EnvironmentsRFC 5308: Routing IPv6 with IS-ISMIBMIBRFC 1724: RIPv2-MIBRFC 1850: OSPF Version 2 Management Information BaseRFC 2233: The Interfaces Group MIB using SMIv2RFC 2618: Radius-Auth-Client-MIBRFC 2620: Radius-Acc-Client-MIBRFC 2674: Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN extensionsRFC 2787: Definitions of Managed Objects for the Virtual Router Redundancy ProtocolRFC 2819: Remote Network Monitoring Management Information BaseRFC 2932: IPv4 Multicast Routing MIBRFC 2934: Protocol Independent Multicast MIB for IPv4RFC 3289: Management Information Base for the Differentiated Services ArchitectureRFC 3433: Entity Sensor Management Information BaseRFC 3621: Power Ethernet MIBRFC 6933: Entity MIB (Version 4)OSPFRFC 1583: OSPF version 2RFC 1765: OSPF Database OverflowRFC 2328: OSPF version 2RFC 2370: The OSPF Opaque LSA OptionRFC 2740: OSPF for IPv6RFC 3101: The OSPF Not-So-Stubby Area (NSSA) OptionRFC 3137: OSPF Stub Router AdvertisementRFC 3623: OSPF Graceful RestartRFC 5340: OSPF for IPv6 (OSPFv3)RFC 5709: OSPFv2 HMAC-SHA Cryptographic AuthenticationRFC 6549: OSPFv2 Multi-Instance ExtensionsRFC 6845: OSPF Hybrid Broadcast and Point-to-Multipoint Interface TypeRFC 6860: Hiding Transit-Only Networks in OSPFRFC 7474: Security Extension for OSPFv2 When Using Manual Key ManagementRFC 7503: OSPF for IPv6RFC 8042: CCITT Draft Recommendation T.4RFC 8362: OSPFv3 Link State Advertisement (LSA) ExtensibilityOTHERRFC 2030: SNTPRFC 3176: InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed NetworksRFC 3768: VRRPRFC 3954: Cisco Systems NetFlow Services Export Version 9RFC 5101: Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow InformationRFC 5798: VRRPv3 (IPv4 and IPv6)RADIUSRFC 2865: Admin Authentication Using RADIUSRFC 2866: RADIUS AccountingRFC 5176: Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)RIPRFC 1058: Routing Information ProtocolRFC 2080: RIPng for IPv6RFC 2082: RIP-2 MD5 AuthenticationRFC 2453: RIPv2RFC 4822: RIPv2 Cryptographic AuthenticationSNMPRFC 1157: SNMPv1/v2cRFC 2571: Architecture for Describing SNMPDATA SHEET | FortiSwitch ™ Data Center Series7Specifications* Full line rate with minimum packet size of 427bytes on FS-1048E** Fortinet Warranty Policy:/doc/legal/EULA.pdfDATA SHEET | FortiSwitch ™ Data Center Series8Specifications* Full line rate with minimum packet size of 250bytes on FS-3032E, 194bytes on FS-3032D ** Fortinet Warranty Policy:/doc/legal/EULA.pdfDATA SHEET | FortiSwitch™ Data Center Series Order InformationFS-SW-LIC-3000SW License for FS-3000 Series Switches to activate Advanced Features.AC Power Supply FS-PSU-460Spare AC power supply for FS-1048E/1024DFS-PSU-800Spare AC power supply for FS-3032E* When managing a FortiSwitch with a FortiGate via FortiGate Cloud, no additional license is necessary.For details of Transceiver modules, see the Fortinet Transceivers datasheet. Copyright © 2020 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST-PROD-DS-SW4FS-DC-DAT-R23-202011。
数据在线备份与存储系统使用手册上讯信息技术股份有限公司DS数据安全产品部版权声明本文档版权归上海上讯信息技术股份有限公司所有(简称上讯信息),并保留一切权利。
未经书面许可,任何公司和个人不得将此文档中的任何部分包括其中所含的所有资料进行复制、公开、转载或以其他方式传播、散发给第三方。
否则,本公司将必将追究其法律责任。
免责条款本文档仅提供阶段性信息,因市场情况变化迅速,所含内容可根据产品的实际情况随时更新、修改,恕不另行通知。
所以,本文档仅供参考使用,不提供任何形式的担保,如因文档使用不当造成的直接或间接损失,本公司不承担任何责任。
信息反馈地址:上海市浦东新区张江高科技园区郭守敬路498号20号楼邮编:201203电话:86-21-51905999 传真:86-21-51905959邮箱:********************目录1产品介绍 (7)1.1产品简介 (7)1.2产品架构 (8)1.3产品功能 (8)1.4工作环境要求 (9)1.4.1安装数据在线备份与存储系统客户端系统要求 (9)2安装与卸载 (10)2.1安装前准备 (10)2.1.1安全使用需知 (10)2.2服务器安装 (10)2.2.1硬件导览(产品外观以实物为主) (10)2.2.2硬件安装 (11)2.2.3配置部署 (13)2.3客户端安装 (15)2.3.1Windows操作系统下安装数据在线备份与存储系统版 (15)2.3.2Mac OS X操作系统下安装数据在线备份与存储系统版 (18)2.3.3Linux操作系统下安装数据在线备份与存储系统版 (18)2.3.4Netware操作系统下安装数据在线备份与存储系统版 (19)2.3.5Solaris操作系统下安装数据在线备份与存储系统版 (19)2.4卸载 (20)2.4.1Windows操作系统下卸载数据在线备份与存储系统版 (20)2.4.2Mac OS X操作系统下卸载数据在线备份与存储系统版 (20)2.4.3Linux/UNIX/Solaris 操作系统下卸载数据在线备份与存储系统版 (21)2.4.4Netware操作系统下卸载数据在线备份与存储系统版 (21)3新手上路 (22)3.1.1安装虚拟机快速步骤 (22)4管理平台配置使用说明 (37)4.1数据保险箱管理平台登录 (37)4.2快速设置向导 (39)4.3系统设置 (42)4.3.1系统设置 (42)4.3.2邮件设置 (43)4.3.3网络设置 (46)4.3.4防火墙设置 (47)4.3.5安全套件 (48)4.3.6升级 (49)4.3.7备份/恢复 (49)4.3.8电源设置 (52)4.3.9恢复出厂设置 (52)4.4存储设置 (53)4.4.1磁盘管理 (53)4.4.2加密管理 (56)4.4.3磁盘卷管理 (57)4.4.4热备盘管理 (61)4.5用户管理 (61)4.5.1用户管理 (61)4.5.2群组管理 (62)4.6文件共享 (63)4.6.1共享管理 (63)4.6.2文件管理 (64)4.6.3SAMBA (66)4.6.4FTP (66)4.6.5NFS (67)4.6.6AFP (68)4.6.7ISCSI (69)4.7虚拟平台 (72)4.7.1虚拟机 (72)4.7.2虚拟磁盘 (73)4.7.3安装镜像 (74)4.7.4全局设置 (75)4.8备份服务 (76)4.8.1备份服务状态 (76)4.8.2备份服务管理 (76)4.8.3异地同步复制 (84)4.9系统日志 (87)4.10帮助 (88)5客户端配置使用说明 (88)5.1开始使用数据在线备份与存储系统版 (88)5.1.1从系统托盘快速启动(仅限于Windows操作系统) (88)5.1.2登陆对话框 (89)5.1.3语言选择 (90)5.1.4操作主界面 (90)5.1.5用户设定 (91)5.1.6备份日志 (93)5.2设定备份集 (93)5.2.1备份集类型 (94)5.2.2备份来源 (95)5.2.3备份计划任务 (97)5.2.4连续数据保护(CDP) (97)5.2.5加密 (100)5.2.6备份过滤器 (101)5.2.7备份前/备份后命令 (104)5.2.8临时文件夹 (106)5.2.10追踪符号链接(仅适用于Linux/Unix/Mac) (107)5.2.11微软卷影复制服务(VSS) (107)5.2.12保存策略 (108)5.2.13额外备份(离线备份,注销提醒) (111)5.2.14In-file delta(文件中差异备份) (111)5.2.15本地复制 (111)5.2.16在多台电脑上使用一个备份账户 (114)5.3备份 (114)5.3.1数据是如何备份的 (114)5.3.2备份文件到备份服务器上 (115)5.3.3备份文件到本地磁盘(文件种子加载工具) (118)5.4恢复 (119)5.4.1从备份服务器上恢复备份的文件 (119)5.4.2从移动设备恢复备份的数据 (120)5.4.3在线恢复的IP地址限制机制 (121)5.5In-file delta(文件中差异备份)技术 (121)5.5.1概述 (122)5.5.2数据块大小 (124)5.5.3文件大小 (124)5.5.4上传完整文件 (125)5.5.5高级In-file delta(文件中差异备份) 类型 (125)5.6备份/恢复 Oracle 8i/9i/10g数据库 (126)5.6.1要求 (126)5.6.2概述 (127)5.6.3如何备份Oracle数据库(Physical Backup) (127)5.6.4如何恢复Oracle数据库 (131)5.6.5如何恢复单个表空间 (132)5.7第十章备份/恢复 Microsoft SQL Server 7.0 / 2000 / 2005 (132)5.7.1要求 (132)5.7.2概述 (133)5.7.3如何备份Microsoft SQL Server 数据库 (133)5.7.4如何恢复Microsoft SQL Server 数据库 (137)5.8备份/恢复 Lotus Domino / Notes (138)5.8.1要求 (138)5.8.2概述 (139)5.8.3如何备份Lotus Domino / Notes database(s) / file(s) on Windows (139)5.8.4如何恢复Lotus Domino / Notes database(s) / file(s) (143)5.9备份/恢复Microsoft Exchange Server (146)5.9.1要求 (146)5.9.2概述 (146)5.9.3如何备份Microsoft Exchange 服务器 (147)5.9.4如何恢复Microsoft Exchange 服务器 (151)5.10备份/恢复 Windows 系统状态 (152)5.10.2概述 (152)5.10.3如何备份Windows 系统状态 (152)5.10.4如何恢复Windows 系统状态 (155)5.11Microsoft Exchange邮件层面的备份/恢复 (156)5.11.1要求 (156)5.11.2概述 (156)5.11.3授权 (156)5.11.4如何对Exchange单邮箱备份 (157)5.11.5如何对Exchange单邮箱恢复 (161)5.12备份/恢复MySQL 服务器 (163)5.12.1要求 (163)5.12.2概述 (163)5.12.3如何备份MySQL server (163)5.12.4如何恢复MySQL 数据库 (168)5.13邮件报告 (168)5.13.1新用户报告 (168)5.13.2忘记密码报告 (169)5.13.3备份报告 (170)5.13.4备份设定更改报告 (173)6关于上讯信息 (174)7产品支持 (175)1产品介绍1.1产品简介随着信息科技的发展,企业对IT系统的依赖性也不断提高,越来越多的重要数据和文件以电子格式保存和传递。
FusionServer Pro 2288H V5 服务器V100R005用户指南文档版本08发布日期2019-10-30版权所有 © 华为技术有限公司 2019。
保留一切权利。
非经本公司书面许可,任何单位和个人不得擅自摘抄、复制本文档内容的部分或全部,并不得以任何形式传播。
商标声明和其他华为商标均为华为技术有限公司的商标。
本文档提及的其他所有商标或注册商标,由各自的所有人拥有。
注意您购买的产品、服务或特性等应受华为公司商业合同和条款的约束,本文档中描述的全部或部分产品、服务或特性可能不在您的购买或使用范围之内。
除非合同另有约定,华为公司对本文档内容不做任何明示或默示的声明或保证。
由于产品版本升级或其他原因,本文档内容会不定期进行更新。
除非另有约定,本文档仅作为使用指导,本文档中的所有陈述、信息和建议不构成任何明示或暗示的担保。
华为技术有限公司地址:深圳市龙岗区坂田华为总部办公楼邮编:518129网址:https://前言概述本文档介绍2288H V5的产品外观、功能、结构、安装和拆卸、基本配置、操作系统的安装方法、部件更换及故障处理。
读者对象本文档主要适用于以下工程师:l企业管理员l企业终端用户符号约定在本文中可能出现下列标志,它们所代表的含义如下。
修改记录目录前言 (ii)1 简介 (1)1.1 产品概述 (1)1.2 物理结构 (2)1.3 逻辑结构 (3)2 硬件描述 (5)2.1 前面板 (5)2.1.1 外观 (5)2.1.2 指示灯和按钮 (7)2.1.3 接口 (11)2.2 后面板 (13)2.2.1 外观 (13)2.2.2 指示灯 (14)2.2.3 接口 (16)2.3 处理器 (18)2.4 内存 (19)2.4.1 内存标识 (19)2.4.2 内存子系统体系结构 (20)2.4.3 内存兼容性信息 (21)2.4.4 内存安装准则 (23)2.4.5 内存插槽位置 (23)2.4.6 内存保护技术 (25)2.5 存储 (25)2.5.1 硬盘配置 (26)2.5.2 硬盘编号 (29)2.5.3 硬盘指示灯 (33)2.5.4 RAID控制卡 (35)2.6 网络 (35)2.6.1 灵活IO卡 (35)2.7 IO扩展 (38)2.7.1 PCIe卡 (38)2.7.2 PCIe插槽 (38)2.7.3 PCIe插槽说明 (42)2.8 电源 (47)2.9 风扇 (48)2.10 单板 (49)2.10.1 主板 (50)2.10.2 硬盘背板 (52)3 产品规格 (57)3.1 技术规格 (57)3.2 环境规格 (62)3.3 物理规格 (63)4 软硬件兼容性 (65)5 管制信息 (66)5.1 安全 (66)5.2 维保与保修 (69)6 静电释放 (70)6.1 防止静电释放 (70)6.2 防止静电释放的接地方法 (70)7 安装与配置 (72)7.1 安装环境要求 (72)7.1.1 空间与通风要求 (72)7.1.2 温度与湿度要求 (73)7.1.3 机柜要求 (73)7.2 安装硬件 (73)7.2.1 安装简介 (74)7.2.2 拆卸服务器外包装 (74)7.2.3 安装硬件选件 (75)7.2.4 安装服务器导轨 (75)7.2.4.1 安装L型滑道 (75)7.2.4.2 安装可伸缩滑道 (77)7.2.4.3 安装抱轨 (78)7.2.5 安装服务器 (79)7.2.5.1 L型滑道/可伸缩滑道上安装服务器 (79)7.2.5.2 抱轨上安装服务器 (80)7.2.6 安装外部线缆 (83)7.2.6.1 布线指导 (84)7.2.6.2 安装鼠标、键盘和VGA接口线缆 (84)7.2.6.3 安装网线 (85)7.2.6.4 安装光口线缆 (87)7.2.6.5 安装IB线缆 (89)7.2.6.6 安装外置USB设备 (91)7.2.6.7 安装串口线缆 (92)7.2.6.8 安装电源模块线缆 (93)7.2.6.8.1 安装交流电源模块线缆 (93)7.2.6.8.2 安装直流电源模块线缆 (94)7.2.6.9 检查线缆连接 (95)7.3 上电与下电 (96)7.3.1 上电 (96)7.3.2 下电 (97)7.4 初始配置 (98)7.4.1 默认数据 (98)7.4.2 配置简介 (99)7.4.3 修改初始密码 (100)7.4.3.1 修改iBMC默认用户的初始密码 (100)7.4.3.2 修改iBMC U-Boot的初始密码 (102)7.4.4 检查服务器 (103)7.4.5 配置iBMC IP地址 (105)7.4.6 配置RAID (106)7.4.7 配置BIOS (106)7.4.7.1 进入BIOS系统 (107)7.4.7.2 设置系统启动顺序 (107)7.4.7.3 设置网卡PXE (108)7.4.7.4 设置BIOS密码 (109)7.4.7.5 切换界面语言 (109)7.4.7.6 重启服务器 (110)7.4.8 安装操作系统 (110)7.4.9 使系统保持最新状态 (111)8 故障处理指导 (112)9 常用操作 (113)9.1 查询iBMC管理网口的IP地址 (113)9.2 登录iBMC WebUI (114)9.3 登录服务器实时桌面 (117)9.3.1 通过远程虚拟控制台登录 (117)9.3.1.1 iBMC (117)9.3.2 通过独立远程控制台登录 (120)9.3.2.1 Windows (120)9.3.2.2 Ubuntu (122)9.3.2.3 MAC (124)9.4 登录服务器命令行 (126)9.4.1 通过PuTTY登录(网口方式) (127)9.4.2 通过PuTTY登录(串口方式) (128)9.5 管理VMD功能 (130)9.5.1 开启VMD功能 (131)9.5.2 关闭VMD功能 (131)9.6 进入BIOS系统 (132)9.6.1 进入BIOS系统(Skylake) (132)9.6.2 进入BIOS系统(Cascade Lake) (133)9.7 清除存储介质数据 (135)10 更多资源 (138)10.1 获取技术支持 (138)10.2 产品信息资源 (139)10.3 产品配置资源 (139)10.4 维护工具 (140)11 软件和配置实用程序 (141)11.1 iBMC (141)11.2 BIOS (142)11.3 FusionServer Tools SmartKit (142)A 附录 (145)A.1 术语 (145)A.1.1 A-E (145)A.1.2 F-J (145)A.1.3 K-O (146)A.1.4 P-T (146)A.1.5 U-Z (147)A.2 缩略语 (147)A.2.1 A-E (147)A.2.2 F-J (148)A.2.3 K-O (150)A.2.4 P-T (151)A.2.5 U-Z (153)A.3 产品序列号 (153)A.4 工作温度规格限制 (155)A.5 铭牌型号 (157)A.6 RAS特性 (157)A.7 传感器列表 (159)1简介1.1 产品概述1.2 物理结构1.3 逻辑结构1.1 产品概述华为FusionServer Pro 2288H V5(以下简称2288H V5)是华为公司针对互联网、IDC(Internet Data Center)、云计算、企业市场以及电信业务应用等需求,推出的具有广泛用途的新一代2U2路机架服务器。
金字塔决策交易系统产品介绍手册2013金字塔平台特色↘多市场多品种支持●期货、股票、外盘策略可在同一平台上运行,支持多市场、跨市场交易策略的实现。
↘策略研究与执行●语言易学——PEL语言沿袭国内软件用户习惯,简单易学●函数众多——近900、22类函数支持,方便用户实现投资思想●统计函数——70余统计函数,全面支持统计类、创新类模型●二次开发——支持自定义数据、自定义函数功能提供VBS、VBA、C++、C#扩展功能●精确回测——提供各种测试功能,方便用户策略与优化●便捷调试——提供简洁易用的调试器,轻松解决策略的纠错、优化●高频扫描——支持tick级别策略的运行●图表程序化——简单PEL,轻松实现资金管理●后台程序化——基于预警模式,不懂C++也可实现策略精细化控制↘机构解决方案●服务器公式——通过高清度加密算法,提供模型分享解决方案基于预警模式,提供远程信号分享方案●篮子功能——支持N个股票同时下单,方便实现期现套利●多账户下单——支持多平台账户同时下单↘数据服务●双路数据支持——确保数据稳定、准确,为程序化交易的安全性提供保障●全推行情——全市场、全品种实时行情零秒延时传输●数据库支持——提供SQL、ACCESS等标准化数据库接口●大容量历史数据——免费提供包括Tick数据在内的各周期行情数据●数据容量无限制——支持导入1900年以后的数据用于分析、测试↘行情分析●分时图——提供如K线般分析功能●板块指数——建立自己的“上证指数”,并进行分析、下单●套利合约——套利合约可如常规品种般查看K线、分时等信息,并加载各种指标公式。
↘下单支持●支持CTP、金仕达、恒生柜台系统、股票FIX接口及IB(美国盈透)下单●支持手工、程序化下单金字塔决策交易系统产品介绍手册目录1.数据服务 (1)1.1. 数据支持 (1)1.2. 海量历史数据 (1)2. 策略研究 (2)2.1. 图表程序化 (2)2.2. 函数支持 (3)2.3. 后台程序化 (4)2.4. VBA、C++二次开发 (5)2.5. 测试 (6)2.6. 优化 (8)2.7. 调试器 (8)3. 行情分析 (9)3.1. 特色分时图............................................ 93.2. 板块指数. (11)3.3. 套利合约 (11)4、风险控制 (12)4.1. 止盈止损 (12)4.2. 短信、邮件提示 (12)5. 私募、机构解决方案 (13)5.1服务器公式 (13)5.2多账户下单 (14)6. 下单支持 (15)6.1. 篮子下单 (15)6.2. 套利下单 (15)7. 版本介绍 (16)1.数据服务1.1. 数据支持☑全市场——提供期货、股票、外盘实时数据☑双路数据技术——除常规软件提供的站点数据外,金字塔开发了从CTP账户直接接入实时数据的技术。
Intrusion DetectorReference Guide2 | Bosch Security SystemsTable of ContentsIntroduction3Blue Line Series6Commercial Series8Professional Series10Classic Line12RADION wireless18Specialty Sensors20Detector Reference Guide | 3Security you can rely onWhether you are securing a home, retail store, bank, museum, commercial business or government facility, you need dependability from your systems. With decades of experience and an unwavering dedication to high-quality and high-performing products, Bosch detectors provide best-in-class false alarm immunity and catch performance while minimizing installation time and complexity. Millions of residential and commercial users rely on Bosch for superior intrusion detection.Bosch is recognized throughout the security industry as a global leader in intrusion detection expertise. We have earned this reputation by consistently providing products that meet your needs with a focus on performance, reliability, durability, and ease of installation.Bosch detectors fulfill the requirements of standards allover the world. In the state-of-the-art Bosch laboratory, we verify that our detectors pass the most stringent requirements of each certification standard. Bosch also designs its own, even more demanding, tests to ensure the detectors are virtually immune to environmental disturbances. As a result, false alarm protection and catch performance exceed the requirements of any single country. With Bosch detectors, there is no hiding place for intruders and zero tolerance for false alarms.4| Bosch Security SystemsWall-to-Wall coverageExcellent catch performanceFirst Step Processing intelligently analyzes motionfor an almost instant response to intruders. Thedetectors automatically adjust to their environment bycompensating for temperature fluctuations, so you areguaranteed optimal performance regardless of changesin room conditions.For more challenging applications, models with SensorData Fusion technology employ a sophisticated softwarealgorithm to analyze signals from multiple sensors,including microwave, temperature, and white light levels,to make the most intelligent alarm decisions in thesecurity industry.No more false alarmsBosch detectors feature Microwave Noise AdaptiveProcessing to easily differentiate humans from falsealarm sources, such as a ceiling fan or hanging sign.For increased reliability, dual sensors process the PIR andmicrowave Doppler radar signals independently and mustagree there is an alarm before the relay activates. Thesealed optical chamber also prevents drafts and insectsfrom affecting the detector. Bosch pet and small animalimmunity provides optimal sensitivity for any application.Minimize time on the ladderBosch detectors include a number of uniquedesign features to help you get the job done fasterand more reliably.▶ A self-locking, two-piece enclosure means no more lostscrews and an easy snap-to-lock installation▶ Integrated biaxial bubble level eliminates the guessworkto ensure proper alignment, requiring one lessinstallation tool▶ The removable, gap-free, liftgate-style terminal stripr educes mounting time to mere seconds and preventsincorrect wiring to eliminate future service calls▶ Optics and electronics are assembled into the frontenclosure and sealed with a protective cover to preventdamage during installation▶ A flexible mounting height makes positioning thedetector easy, and you get no-gap coverage withoutany optical or electronic on-site adjustmentsDetector Reference Guide | 5Ideal for any applicationIntelligent intrusion detection is a delicate balance between responding to real security breaches and ignoring sources of costly false alarms. Bosch offers a choice of detector models that set the standard for reliability and rapid detection.Our intrusion detectors suit the requirements of virtually any application — from residential to large commercial to high security. They stand up to multiple challenges, including strong drafts, moving objects, and the presence of pets.Our complete line includes:▶ Passive Infrared (PIR) and TriTech®(Combination PIR and microwave Dopper radar) – Long-range – 360° ceiling mount – Pet friendly®▶ Request-to-exit PIR ▶ Glass break ▶ Seismic and shock ▶ Photoelectric beam▶ Wireless communication6| Bosch Security SystemsBlue Line Gen2 Series Detection is PowerPIRStandardPet Friendly®Quad PIR* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useDetector Reference Guide | 7 TriTech® (PIR + MW)Standard Pet Friendly®8| Bosch Security SystemsCommercial SeriesDetection delivered. Reliability assured.TriTech (PIR + MW)StandardAnti-maskas curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useDetector Reference Guide | 910| Bosch Security SystemsProfessional SeriesIntelligent Motion DetectionPIRTriTech® (PIR + MW)StandardAnti-maskStandard* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useTriTech® (PIR + MW)Anti-mask CurtainAnti-mask CurtainClassic Line Long Range PIRLong-range* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useTriTech® (PIR + MW)Long-range OutdoorClassic Line Ceiling Mount PIRCurtain Wide angleLow-profile Panoramicas curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor usePIR TriTech®(PIR + MW)PIR TriTech® (PIR + MW)PanoramicHigh-Performance PanoramicPIRRecessedas curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useRADION wireless†Superior Range and Reliability PIR TriTech® (PIR + MW) Pet Friendly® Standard Pet Friendly® Curtain Pet Friendly®Standard† Wireless peripherals require a compatible receiver. B810 RADION receiver is compatible with SDI2 bus panels (B Series and G Series); RFRC-OPT is compatible with Option bus panels; RFRC-STR is compatible with Streamline bus panels.* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useGlass break Door/Window Contacts OtherAcoustic Surface Mount RecessedMount Universal Transmitter SmokePortable Other Keyfob Panic Button Bill TrapPremises Wireless (ZigBee) RADION ZB PIR TriTech® (PIR+MW) StandardStandard* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86°F (30°C), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32° to 120°F (0° to 49°C), indoor use.*** Power source has capacity for an additional battery increasing the battery life from 6 to 10 years (RFPR-ZB) or from 3 to 6 years (RFDL-ZB).**** All models feature a two-piece design, self-locking enclosure, interchangeable mounting base and integrated bubble level.Specialty Request-to-exit PIRStandardHigh-performance* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useSpecialty Glass Break AcousticStandardComboMagneticContactSpecialty Photoelectric Beam Dual BeamShort RangeMedium Range* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useSpecialty Photoelectric Beam Quad BeamMedium RangeLong Range* QS — single channel QF — four channelSpecialty Seismic/ShockSeismic Shock StandardHigh-performanceStandard* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useN e wAccessoriesNotesDetector Reference Guide | 31 NotesA Tradition of Quality and Innovation For 125 years, the Bosch name has stood for quality and reliability. Bosch is the global supplier of choice for innovative technology backed by the highest standards for service and support. Bosch Security Systems proudlyoffers a wide range of security, safety, communications and sound solutions that are relied upon every day in applications around the world, from government facilities and public venues to businesses, schools and homes. Bosch Security Systems, Inc.130 Perinton ParkwayFairport, NY 14450 USAPhone: 800.289.0096Fax: 585.223.9180For more information please visit © Bosch Security Systems, 2016 Modifications reservedPrinted in United States | 10/16BINBR_DETECT-REF_v20161028。
XX-XX XXXXX设备使用说明书项目名称:文件编号:密级:编制:最新版本:V1.00编辑软件:Microsoft Office 2003中文版版本说明:目录1 概述 (1)1.1 产品特点 (1)1.2 主要用途及使用范围 (2)1.3 型号的组成及代表意义 (2)1.4 使用环境条件 (2)1.5 工作条件 (3)1.6 对环境及能源的影响 (3)1.7 安全 (3)2 结构特征及工作原理 (3)2.1 总体结构及其工作原理、工作特性 (4)2.2 主要部件或功能单元的结构、作用及其工作原理 (4)2.3 各单元结构之间的机电联系、系统工作原理、故障报警系统 (4)2.4 辅助装置的功能结构及其工作原理、工作特性 (4)3 技术特性 (5)3.1 主要功能 (5)3.2 主要参数 (5)4 尺寸、重量 (5)4.1 外形及安装尺寸(可分开) (5)4.2 重量 (5)5 安装、调试 (5)5.1 设备基础、安装条件及其安装技术要求 (5)5.2 安装程序、方法及注意事项 (5)5.3 调试程序、方法及注意事项 (5)5.4 安装、调试后的验收试验项目、方法和依据 (5)5.5 试运行前的准备、试运行启动、试运行 (5)6 使用、操作 (6)6.1 使用前的准备和检查 (6)6.2 使用前和使用中的安全及安全防护、安全标准及说明 (6)6.3 启动及运行过程中操作程序、方法、注意事项及容易出现的错误操作及防范措施 (6)6.4 运行中的检测和记录 (6)6.5 停机的操作程序、方法及注意事项 (6)7 故障分析及排除 (6)7.1 故障现象 (6)7.2 原因分析 (6)7.3 排除办法 (7)8 安全保护装置及事故处理(包括消防) (7)8.1 安全保护装置及注意事项 (7)8.2 出现故障时的处理程序和方法 (7)9 保养、维修 (7)9.1 日常维护、保养、校准 (7)9.2 运行时的维护、保养 (7)9.3 检修周期 (7)9.4 正常维修程序 (7)9.5 长时间停放时的维护、保养 (8)10 运输、储存 (8)10.1 吊装、运输注意事项 (8)10.2 储存条件、储存期限及注意事项 (8)11 其它 (8)11.1 生产厂保证、售后服务注意事项、联系方法等 (8)11.2 需要向用户说明的其它注意事项 (8)12 图、表、照片(也可分别列在上述各章中) (8)12.1 外形(外观)图、安装图、布置图 (9)12.2 结构图 (9)12.3 原理图、系统图、电路图、逻辑图、示意图、接线图、施工图等 (9)12.4 各种附表:附件明细表、专用工具(仪表)明细表 (9)12.5 照片 (9)1概述GPRS-FSU是适用于基站/机房使用的多功能综合监控系统,集节能、动力环境、智能门禁、GRPS传输四大功能于一体,可以灵活实现节能、门禁、环境动力监控等多项功能的全部或者任意一项或者多项功能组合,并可以通过SMS、GPRS、RS232、RS485、MODEM任一种方式将数据传输到监控中心。
让万物互联更简单、更安全工控安全INDUSTRIAL CONTROLSECURITY让万物互联更简单,更安全目录CONTENTS公司简介安全理念发展历程资质荣誉1538公司篇产品篇用户篇安全管理平台数据库审计系统网络入侵检测系统堡垒机工控网络安全态势感知平台工业防火墙日志审计系统工业安全隔离装置工业应用审计系统工业数采单向光闸工控主机卫士网络准入控制系统050709111315171921232527机甲卫士29能耗在线监测端设备31电力正向隔离装置33工控安全实验室350102030437服务篇安盟信息SECURITYUNION北京安盟信息技术股份有限公司成立于2005年,是国内领先的新一代边界安全、工业互联网安全和商用密码应用整体解决方案供应商,拥有北京、长沙、无锡、成都四大研发基地。
依托专业的研发团队,安盟信息在工业互联网、工业控制、物联网、大数据、信息技术创新应用等多个领域,不断推出适应用户场景的创新产品和解决方案,并广泛应用于公检法、能源、军工、交通、冶金、化工、水务等关键基础设施客户,服务网络覆盖全国主要客户所在省市,累计用户超两万家。
安盟信息以“让万物互联更简单、更安全”为愿景,致力于维护国家网络信息安全,为数字经济发展保驾护航。
01企业文化CORPORATE CULTURE坚持诚信为本服务至上 坚持自主研发不断创新坚持团结友爱共同拼搏 坚持以人为本合作共赢经营理念团结一切可团结的网络安全力量,共同打造一个网络安全产业联盟,以维护中华网络安全为己任,筑御敌之网络长城。
企业使命注:“安盟华御”为安盟信息产品注册商标。
让万物互联更简单,更安全02soc发展历程DEVELOPMENT HISTORY·网闸应用于北京奥运并 提供安保支撑·首发支持OPC 动态安全 模块的工业网闸·开启重点省份的服务站 点建设2008年·完成股份制改造,登陆新三板·完成全国营销体系布局·发布工控安全整体解决方案,全面 进军工控安全市场2017年·安盟信息公司成立,迈 出了长征第一步·首发具有“隔离通道”技 术的网闸产品2005年·发布高性能单向光闸产品·推出边界安全整体解决方案·产品出口中东,走出国门2012年·荣获专精特新小巨人称号·成立成都、无锡研发中心·推出商用密码产品与解决方案·中国电科战略入股,正式成为 网络安全“国家队”2021年资质荣誉APTITUDE HONOR公司资质公司荣誉检法信息化(智慧检法)最佳实践奖2019-2020年度工业互联网安全最佳产品奖中国信息安全能源工控安全最佳解决方案证书 中国网络安全企业100强(网络边界与安全)中国安全隔离网闸产品质量合格消费者放心产品ISO20000服务管理体系ISO27001信息安全管理体系ISO45001职业健康安全管理体系SM信息系统集成乙级信息安全服务资质-信息安全应急处理三级信息安全服务资质-安全工程类一级工业信息安全应急服务支撑单位商用密码产品销售许可证国家高新技术企业中关村高新技术企业ISO14001环境管理体系ISO9001质量管理体系北京市“专精特新”中小企业北京市用户满意企业北京市诚信创建企业智慧司法创新方案证书信创安全优秀解决方案证书智慧法院优秀解决方案证书智慧检务十大解决方案提供商工信部科学技术成果登记证书中国国家信息安全产品认证证书北京市新技术新产品(服务)证书中国信息安全隔离网闸最佳产品奖03安全理念SECURTY CONCEPTIONS指导思想网络安全牵一发动全身,已成为信息时代国家安全的战略基石⸺“没有网络安全就没有国家安全”。
配网自动化运维考试(试卷编号211)1.[单选题]为了避免断路器短时间内被连续操作分合,测控装置设置了操作间隔时间闭锁,时间一般为( )s。
A)5.0B)10.0C)20.0D)30.0答案:D解析:2.[单选题]同一个遥控点号同时只允许()个主站进行操作。
A)多B)一C)二D)三答案:B解析:3.[单选题]配电终端的设计遵循标准化、()、低成本、易(免)维护、小型化和低功耗的设计原则。
A)规范化B)高可靠C)高强度D)长寿命答案:B解析:4.[单选题]( )是二次系统安全防护设备发生故障后首先应当考虑的原因。
A)配置选项B)板卡故障C)配置文件D)网络连接性答案:D解析:5.[单选题]各单位应结合配电网( )、运行方式、保护配置等运行情况,针对性制定馈线自动化投运方案A)网架结构B)保护类型C)供电范围D)负荷大小答案:A解析:6.[单选题]隔离设备前面板的Alarm指示灯为单电源报警指示灯,双电源为( ),单电源为( )。
A)绿色、闪烁B)红色、闪烁C)绿色、红色D)红色、绿色答案:C解析:7.[单选题]对TA感应供电回路应具备大电流保护措施,当一次电流达到()kA并持续()s时,配电终端不应损坏A)10,2B)20,2C)30,1D)15,1答案:B解析:8.[单选题]遥信分辨率测试中,使用遥信发生器产生两个时间间隔为( )ms的遥信,在配电主站查看产生的遥信时标是否能够准确分辨出该时间间隔。
A)6B)8C)10D)25答案:C解析:9.[单选题]配网工程与配电自动化改造项目管理应实现“五同步”,即()、同步设计、同步施工、同步调试、同步投运。
A)同步管理B)同步建设C)同步考核D)同步储备答案:D解析:10.[单选题]配电终端的录波内容应包含故障发生时刻前不少于()个周波和故障发生时刻后不少于()个周波的波形数据。
A)4,8B)4,4C)6,6D)8,8答案:A解析:11.[单选题]配电终端所配套的超级电容寿命应不少于()年A)3.0B)4.0C)5.0D)6.0答案:D解析:12.[单选题]配电终端所配套的后备电源应满足:蓄电池寿命应不少于3年;超级电容寿命应不少于()年。
F.A.S.T 数据安全传输系统
1.产品简介
目前全国各级电视台都把信息安全建设视为数字化、网络化建设的重要组成部分,是全台制播网络系统正常运行的重要保障,是电视台业务系统可靠运营的有利协助,也为全台各级人员有效、安全的工作建立了系统的规范。
F.A.S.T数据安全传输系统是新奥特公司针对广播电视行业的制播业务特性,实现内网板块与内网板块、内网和外网板块间文件交互,自主研发的数据安全交互产品。
2.产品基本形态
2.1 F1000系列(文件夹扫描传输模式):
2.1.1 F1000-1型(USB传输介质)
2.1.2 F1000-2型(IB传输介质)
2.1.3 F1000-3型(IB高密度专有服务器)
通过扫描指定系统路径,将该系统路径下的文件或文件夹通过传输系统传输至另一端指定的路径中。
制作、播出、媒资等内网板块可采用该系列实现数据安全、高效交互,通过配置策略实现文件单向或双向传输。
2.2 F3000系列(近线传输模式):
2.2.1 F3000-1型(USB传输介质)
2.2.2 F3000-2型(IB传输介质)
2.2.3F3000-3型(IB高密度专有服务器)
F.A.S.T数据安全传输系统是与制作网紧密结合的独立传输系统,作为制作网近线导入系统,将编辑、记者的待编文件,可以粗编后,能够自动进行过滤、杀毒,高效的传输至制作网进行节目制作,并且全面支持P2、蓝光等专业介质的安全防控。
不仅在保证了制作系统信息入网的安全,节省人工杀毒繁重操作,而且便于管理,使整个制作流程方便、快捷。
2.3 F5000系列(远程上传/下载模式):
2.3.1 F5000-1型(USB传输介质)
2.3.2 F5000-2型(IB传输介质)
2.3.3 F5000-3型(IB高密度专有服务器)
该系列产品适合全台生产系统与办公网系统实现信息交互,编辑、记者不再关注采集、待编信息所在位置,可以随时随地通过BS Client,将媒体数据传入至台内的交互平台上,可以采用F.A.S.T数据安全传输集群系统的安全机制,将数据导入到各类生产子系统中。
具有集中部署、传输能力强、统一管理等优点。
2.4 F7000系列(桥接传输模式):
2.4.1 F7000-1型(USB传输介质)
2.4.2 F7000-2型(IB传输介质)
2.4.3 F7000-3型(IB高密度专有服务器)
桥接传输模式:该模式适用于注重传输效率,强调安全、可靠,实现机制是不需要经过源端本地存储,经过安全处理后直接到达对端系统的单向传输模式,并且支持断点续传,不落地完整性校验,具有传输高效、安全、稳定的特点。
3.产品关键特性
◆支持(USB传输介质)多链路集群的方式传输任务;
◆支持(IB传输介质)超高速率传输;
◆支持(IB传输介质)远距离传输,1m<X<200m;
◆支持桥接模式(文件/任务不落地);
◆支持多文件负载的方式传输;
◆支持链路扩展的方式,线性增加带宽;
◆支持传输任务速率监控;
◆支持单链路单文件监控;
◆支持链路健壮性监控;
◆支持链路自动修复;
◆支持对知名杀毒软件的调用及异构处理;
◆支持对文件后缀名过滤;
◆支持文件深度检测;
◆支持远程、近线的传输模式;
◆支持传输目的多路由的配置;
◆支持IE v11+、Chrome v33+、Firefox v17+等多种浏览器上传下载;
◆支持Windows、Linux操作系统;
4.典型用户&成功案例
◆北京台电视台
北京电视台的《综合性生产业务支撑平台》项目。
在国内电视台首次采用了公共平台用于管理外部网和制播网不同网域之间的业务交互和数据交换。
在外部网和制播网之间USB 摆渡系统和辅助的安全设备,实现系统自动识别数据类型,选择对应网络传输链路的机制。
基于USB协议的文件导入技术,从理论上完全杜绝了网络攻击的可能性,与内嵌的防病毒软件配合,自动实现异构病毒查杀。
◆江苏省广播电视总台(集团)
少儿制作网数据安全传输系统,将办公网和制作网实现文件级互通。
◆内蒙古电视台
内蒙古电视台新大楼高安全区项目,实现全台办公网与生产网。
◆云南电视台
云南电视台全台高安全区项目。
◆浙江电视台
浙江省台民生频道通过远程回传的文件通过数据安全传输系统传入到制作网。
◆陕西电视台
陕西电视台的高安全区项目,是在办公网与生产网之间架构了一个由FAST数据安全传输系统为核心的高安全区的项目,实现了办公网与生产网之间的文件级数据安全交互。
◆吉林省台
吉林省台是在各生产网的边缘建立独立的数据安全传输系统,可以将编导、记者的文件信息快速导入到生产网内。
◆南京台
在合成包装网,以FAST数据安全传输系统为唯一的数据导入来源。
◆第十二届全运会
在十二届全运会的IBC,FAST数据安全传输系统得到全方位的应用。