The development of computer technologies and its applications has been extremely rapid in this era. Computer networks like the Internet are gaining importance in social and economic life. With the reliance of organizations on the network platform and the provision of internal and external services through this way, managers of these organizations face numbers of challenges, one of the most important of these challenges is to provide security to servers and devices that these networks are built from.
The Rahban system is designed and implemented with the consideration of this need. Using this system, network administrators can create a security layer to access and modify the network context.
Using the Rahban system has a positive impact on network management, especially on security issues. In essence, this system implements the concept of the Jumpbox in such a way that it can implement the security policies of an organization or a team with high flexibility and provide access based on a specific structure Define and manage. By using such a tool, you can centrally manage all the concerns about access to the network infrastructure.
The steps of the Rahban system:
First, the network administrator defines the desired servers in arbitrary groups, then the system uses a three-layer floating-point structure for easy server management and access. Also, the network administrator uses ACLs to access users.
This flexible structure allows the network administrator to easily manage access at the general level of the group and up to the level of user accounts defined on servers.
With the help of mobile software, system and device administrators can monitor and communicate with other users at any moment.
It should be noted that the mobile app using a one-time password sent to the user via SMS. In addition, the user’s mobile number (that uses the mobile software) and the SMS delivery port must be pre-set.
-Reducing Attack Surface
-Recording and monitoring all activities online
-Keeping the track of changes in the less amount of time
-Preventing unwanted changes actively
-limiting access to server information and equipment
-having a mobile app for status online monitoring
-supporting the tree structure management equipment
-The ability to authenticate from LDAP or local
-Importing information from the equipment
-Command filtering (black and white list)
-The ability to define ACL based on the time and day
-Supporting SSH and Telnet protocols
The DNSSEC Train the Trainer Course was held, with 10 companies from
The DNS project training courses were held at the FWUTech Company with
The eighteenth International Telecommunication and Information Technology Exhibition, known as Iran Telecom,
The new website of the FWUTECH company has been re-designed and started
Unit 1, No.4, Kooh-e noor street, Motahari avenue , Tehran, Iran
info [at] fwutech [dot] com
+98 (21) 88171968 & +98 (21) 88171969