Huawei Anti-DDoS1000 DDoS Protection Systems

Platforma ochrony przeciw atakom DDoS

Huawei Anti-DDoS1000 DDoS Protection Systems
Najedź kursorem, aby przybliżyć
Huawei Anti-DDoS1000 DDoS Protection Systems
Opis
Specyfikacja techniczna
Do pobrania
Produkty powiązane
Usługi

Opis produktu Huawei Anti-DDoS1000 DDoS Protection Systems

  • Attack response within seconds, 5 Gbit/s protection performance
  • V-ISA reputation security mechanism — precise defense against hackers’ botnet attack techniques
  • Simplifies management, provides diversified reports
  • Protects against more than 100 types of DDoS attacks

Huawei’s Anti-DDos1000 protection systems respond within seconds to defend your critical online services against more than 100 types of DDoS attacks. Financial enterprises, government sectors, ICPs, and data centers all depend on Huawei’s DDoS protection system.

Accurate, comprehensive solution ensures service continuity. The system can “learn” more than 60 types of traffic patterns, so you can generate automatic security policies.

Shield your services against organized hackers with Huawei’s AntiDDoS1000 Series DDoS Protection Systems.

Specyfikacja techniczna

Parameters AntiDDoS1520 AntiDDoS1550 AntiDDoS1500-D
Interfaces Fixed interfaces: 4 x GE (RJ45) and 4 x GE (combo); expansion slots: 2 x FIC
Expansion Interfaces 2 x 10 GE (SFP+); 2 x 10 GE (SFP+) and 8 x GE (RJ45); 8 x 1 GE (SFP) and 8 x 1 GE (RJ45)

Bypass card: 4 x 1 GE (RJ45); dual-link LC/UPC multiple-mode optical interface; dual-link LC/UPC single-mode optical interface

Defense Types
Anomaly Filtering Blacklist, HTTP field-based filtering, and TCP/UDP/Other protocol load feature-based filtering
Protocol Vulnerability Defense against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, IP Option, IP fragment control packet, TCP label validity check, large ICMP control packet, ICMP redirect control packet, and ICMP unreachable control packet attacks
Scanning and Sniffing Attacks Defense against port scanning, address scanning, Tracert control packet, IP Option, IP timestamp, and IP routing record attacks
Transport-layer Attacks Defense against SYN, ACK, SYN-ACK, FIN/RST, TCP fragment, UDP, UDP fragment, and ICMP flood attacks
Application-layer Attacks Defense against forged source DNS query flood, real source DNS query flood, DNS reply flood, DNS cache poisoning, and DNS protocol vulnerability attacks

Defense against HTTP GET/POST flood, CC, HTTP slow header/post, HTTPS flood, SSL DoS/DDoS, TCP connection, Sockstress, TCP retransmission, and TCP null connection attacks

Defense against SIP flood attacks

Zombie/Trojan Horse/Worm Attacks Defense against more than 200 zombies, Trojan horses, and worms such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, and Thc-ssl-dos


Usługi

Oferta usług utrzymania systemów obejmuje 6 pakietów usług pomocy technicznej VECTOR TECH SOLUTIONS: V-AID Service / EW / NBD / NBD+EW / 24h / 24h+EW. Umożliwiają one wykorzystanie potencjału Firmy VECTOR w zakresie codziennego wsparcia technicznego, rozwiązywania problemów, szybkiego reagowania na problemy krytyczne w sieci oraz utrzymania systemu na najwyższym poziomie wydajności oraz planowania rozwoju sieci.

WordPress › Błąd