ADS M can manage NTAs, including checking NTA running status, time synchronization, dispatching IP group configuration of a region, displaying traffic information of NTAs, and receiving logs uploaded from NTAs. The steps to configure the collaboration between ADS M and NTA are as follows: Configuring NTA Step 1: Choose Administration...
Blog
SiS Cyber Security Solution Month
SiS Cyber Security Solution Month kicked off in Kwun Tong District, Hong Kong in August. NSFOCUS was invited to join this partner event. Kings Leung shared the topic "Be Prepared - Cyber Security Laws" at this event. SiS International Limited is one of the largest value-added distributors in HK. NSFOCUS and SiS have been in a good partnership since...
Description of NIPS Discarding Jumbo Frames in MPLS Traffic by Default
When there is MPLS traffic in the network, there may be jumbo frames whose layer 2 packet including the CRC code has a length greater than 1518 bytes. The NIPS network interface card directly discards these jumbo frames by default, causing network failure. Perform the following check on the client...
NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report
Santa Clara, Calif. August 24, 2022 – We are very happy to announce that NSFOCUS was included as one of notable vendors in the report The Security Analytics Platform Landscape, Q3 2022 published by Forrester, an authoritative international research consulting organization. “Security analytics platforms are the center of the SOCâ€, as...
Security Knowledge Graph | Cyberspace Mapping Strengthens Tailor-Made Security
The security knowledge graph, a knowledge graph specific to the security domain, is the key to realizing cognitive intelligence in cyber security, and it also lays an indispensable technological foundation for dealing with advanced, continuous and complex threats and risks in cyberspace. NSFOCUS will publish a series of articles about...
Introduction to Web APIs of ADS
O&M personnel can quickly and easily perform operations such as information query and diversion configuration through web APIs. If web APIs of ADS are to be used by the management platform, mutual authentication between the management platform and ADS must be performed first to ensure security. The procedure is as...





