Topwalk-ACG
Topwalk-ACG
Topwalk-ACG

Topwalk Access Control Gateway (Topwalk-ACG) is a security solution designed to address the cybersecurity issues existing in current video networks. It supports discovering and counting terminal devices in the network, mapping the video network topology, and classifying, organizing, and summarizing the network structure and terminals. Its core goal is to ensure the safe operation of each video terminal (such as cameras, network printers, video storage devices, video-specific equipment, personal computers, etc.), promptly detect and prevent the access of stolen or fraudulently used video terminals to the network, and protect the security of all video terminals in the network.

Home > Network security >
Core Values

System Management

System Management

Equipped with real-time gateway monitoring function to display various system monitoring data; supports regional management. In addition to the separation of three powers mechanism, it also sets regional administrator roles with configurable menus and data permissions. Administrators from different regions can perform access management for the terminal devices under their responsibility in the same system.

Precise Access Control

Precise Access Control

According to the enterprise network environment, it supports port-level access for access terminals through the hardware probe mode, and cooperates with the upper-level video security gateway to achieve centralized management and control of the entire network; it also provides two access methods: bypass monitoring based on key links and transparent bridge.

Terminal Authentication and Management

Terminal Authentication and Management

Authenticates devices with unique identifiers (supporting GB/T 28181 protocol, GA/T 1400 protocol, and GB 35114 standard); supports specifying that only cameras complying with the protocols can access the network through WEB registration, and the registration information shall include device IP/MAC, device ID, device attributes, etc.

Video Protocol Monitoring

Video Protocol Monitoring

Adopts powerful automated network data collection technology to real-time monitor IP addresses accessing the network. It can automatically identify video protocols complying with national standards such as GB/T 28181, GA/T 1400, and GB 35114, including verifying whether protocol fields are compliant.

Access Discovery and Awareness

Access Discovery and Awareness

an real-time monitor the access status of network devices and automatically collect basic network information of access devices, such as IP address and MAC address.

 

Product Advantages
Regional Cascading and Unified Management
Regional Cascading and Unified Management

The video surveillance gateway can cascade multiple video surveillance probes to achieve distributed deployment and management, realizing a mode of independent management of each subnet and centralized control of the entire network. The centralized management platform can summarize, analyze and display the online status, policy execution status, and asset status of video surveillance gateways and probes in each region, and improve the safe and unified management of video assets accessing the entire network through assessment.

Trusted and Controllable Operation and Maintenance Management
Trusted and Controllable Operation and Maintenance Management

Supports access control based on the association and binding of multiple elements such as user identity information and device hardware information, realizing permission-based regional management of access devices; provides multiple authentication mechanisms such as Portal and UKey to meet the maintenance operation needs such as repair, replacement, and modification of cameras already accessed to the network.

Rapid Asset Discovery and Identification
Rapid Asset Discovery and Identification

The rapid asset discovery technology integrates active detection and passive analysis: active detection adopts a high-performance intelligent detection engine, which can complete basic asset detection of a Class B subnet within 10 seconds; passive analysis adopts a high-performance kernel driver to directly obtain traffic data from network interfaces for in-depth analysis, supporting real-time discovery of terminal assets in 10G environments.

Hardware Probe Extended Deployment
Hardware Probe Extended Deployment

Without changing the network topology, video surveillance gateways can be deployed at the access layer, aggregation layer, core layer, and front end of the service area according to access requirements of different intensities to meet the needs of network access control; at the same time, it supports deploying video surveillance probes at aggregation points to assist video surveillance gateways in achieving rapid and accurate video asset discovery, positioning, and network access control.

Application Scenarios

01

Topwalk Access Control System implements network access control by bypassing core switches. Tailored to diverse network environments, it activates 802.1X authentication, policy-based routing, or VLAN isolation to deliver consistent security access protection across multi-branch deployments and varied application scenarios. The system effectively blocks unauthorized devices from network entry, enforces mandatory security protocols for terminal access, and enables granular access control for complex network topologies — all without requiring modifications to the existing network architecture. It is fully compliant with the security access requirements stipulated in the Level Protection framework.