Best Network Configuration Software in China

Find and compare the best Network Configuration software in China in 2024

Use the comparison tool below to compare the top Network Configuration software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    WeConfig Reviews
    WeConfig makes network maintenance and configuration easier, more efficient, and more reliable. You can save many hours on the initial installation and ongoing maintenance of your network. Automating tedious tasks and deploying configuration updates in bulk can make them less time-consuming. WeConfig reduces the chance of configuration errors and optimizes network security. A well-managed network will reduce the risk of network failures by ensuring that it is properly monitored and maintained. The risk of unauthorized access is minimized by simple deployment of security features across the entire system. Security analysis allows you to identify and fix network vulnerabilities. WeConfig makes it easy for you to establish and maintain a strong network security standard. High network reliability through diagnostic tools WeConfig makes your network transparent, and collects all information in one place.
  • 2
    Batfish Reviews
    Open-source network configuration analysis tool. Batfish detects errors and guarantees correctness of current or planned network configurations. It allows for safe and rapid network evolution without fear of security breaches or outages. Researchers at Microsoft Research, UCLA and USC originally created Batfish. It has been developed by many others. Intentionet maintains it, and also offers Batfish Enterprise, which extends and enhances Batfish's core capabilities. Batfish can be used to analyze firewall rules and ACLs. You can analyze forwarding paths using traceroute or reachability queries. Analyze the impact failures have on the network and perform Chaos Monkey-style testing. Analyze Batfish routing tables. An abstract representation is used to quickly analyze control planes. Network analysis in multivendor networks with Cisco, Arista and Cumulus.
  • 3
    RANCID Reviews
    RANCID monitors the configuration of a router (or any device) and uses CVS, Subversion, or Git to keep track of changes. RANCID also has looking glass software. It is based on Ed Kern's looking glass which was once used for http://nitrous.digex.net/, for the old-school folks who remember it. Our version adds functions, supports cisco and juniper and foundry, and uses the login scripts included with rancid. It can connect to your devices using telnet and ssh. Rancid supports Allied Telesis switches with AW+, Cisco routers and Juniper routers. It also supports Catalyst switches and Foundry switches (now Brocade), Redback NASs and ADC EZT3 muxes. It can also connect to HP Procurve switches, Alteon switches, MRTd (and therefore likely IRRd), and Alteon switches.
  • 4
    racksnet Reviews
    Racksnet®, a network automation software, allows you to automate your IT network in any location, including campus, data center, WAN, or IoT. Racksnet® is a smart, convenient network automation software that relieves IT staff from repetitive, tedious and time-consuming tasks. Our customers can choose when, where, how, and on what site controllers they perform tasks. Absolute independence in time and place. It is possible to plan and configure important network tasks during core work hours and then have them completed on weekends. For the provisioning of network resources, there are no requirements to be on-site. All configurations can be deployed via racksnet®. Racksnet®, which allows for the separation of hardware and software, is a significantly better open networking technology than conventional systems.
  • 5
    Vertiv Environet Reviews
    Vertiv™, Environet™, is a comprehensive monitoring system solution that collects all the data you need in order to run your data center efficiently. Environet™, which provides visibility and management of your data center environment, transforms complexity into simplicity. You can proactively manage changes, moves, and adds with real-time, holistic data. Environet's interactive interface provides critical information that allows you to make intelligent decisions quickly and with confidence. Environet uses the same protocols to communicate with facility infrastructure and data centers to obtain critical data as well as device statuses. These values are used to send alarm notifications and can be stored for historical reporting. You can view all statuses and values in a web browser that supports HTML graphics editing. This allows you to see the health of your data. Environet, a comprehensive software solution, allows you to efficiently manage your data centers.
  • 6
    Cisco FlexConnect Reviews
    FlexConnect is a wireless solution that can be used to deploy branch offices and remote offices. Customers can configure and control access point (AP) in a branch office or remote office via a wide area network link (WAN), without the need to deploy a controller in each of their offices. FlexConnect access points can be used to switch client data traffic locally, and perform client authentication locally if their connection to the controller goes down. They can also send traffic back and forth to the controller when they are connected to it. The FlexConnect access point can also perform local authentication in the connected mode. FlexConnect APs can tunnel client data in CAPWAP over the controller (called Central Switching) or allow client data to egress at the AP’s LAN port (called local switching). Locally Switched WLANs allow the AP to tag client traffic in separate VLANs. This allows the AP to segregate the traffic from its management interface.
  • 7
    TrueSight Automation for Networks Reviews
    Automation and configuration of networks for greater agility, security, efficiency, and speed. Automated vulnerability management to detect vulnerabilities, improve visibility, and respond quickly to threats across network devices. Integrate with NIST National Vulnerability Database security notifications and vendor to identify vulnerabilities, fix images and upgrade devices with minimal downtime. Automated roll-back and change tracking make it easy to make configuration changes across thousands network devices. You can control device access to view and change settings, and you can also deploy policies for regulatory standards like DISA and CIS. To meet business needs, quickly deploy new virtual or physical network devices with gold-standard configurations. View real-time configurations of devices to troubleshoot, see job status, or perform a compliance audit.