Межсетевой экран Huawei AntiDDoS8030

SKU
AntiDDoS8030
Запросить цену
EAN: 17767
GPL price:
45000 $
Состояние: Новое
Наличие: Доступен под заказ
Срок поставки: 25-35 дней
AntiDDoS8030 DC Basic Configuration(include X3 DC Chassis.2*MPU)
Серия Huawei AntiDDoS8000 использует аналитику большого объема данных для моделирования более 60 типов трафика, обеспечивая защиту на терабайтном уровне, реагирование на второй уровень и комплексную защиту от более чем 100 типов атак. Линия функционирует с Huawei Cloud Cleaning Center для обеспечения многоуровневой очистки, предоставляя полноценную защиту, которая покрывает всю пропускную способность сетевых каналов и онлайн-сервисов.

Технические характеристики межсетевого экрана Huawei AntiDDoS8030:

Model

AntiDDoS8030

AntiDDoS8080

AntiDDoS8160

Throughput

Up to 120 Gbit/s

Up to 960 Gbit/s

Up to 1,920 Gbit/s

Throughput/Slot

Up to 120 Gbit/s

Up to 240 Gbit/s

Up to 240 Gbit/s

Mitigation Rate/Slot

Up to 60 Mpps

Up to 60 Mpps

Up to 60 Mpps

Latency

80 μs

80 μs

80 μs

Expansion Slots

3

8

16

Expansion LPU

FW-LPUF-120, 2 sub-slots

FW-LPUF-120, 2 sub-slots

FW-LPUF-240, 2 sub-slots 

FW-LPUF-120, 2 sub-slots

FW-LPUF-240, 2 sub-slots 

Expansion Interfaces

 24 x GE (SFP), 5 x 10 GE (SFP+), 6 x 10 GE (SFP+), 12 x 10 GE (SFP+), 1 x 40 GE (CFP), and 1 x 100 GE (CFP) 

Dimensions (H x W x D)

DC: 175 mm x 442 mm x 650 mm (4U)

AC: 220 mm x 442 mm x 650 mm (5U) 

620 mm x 442 mm x 650 mm (14U)

1,420 mm x 442 mm x 650 mm (32U)

DDoS Defense Specifications

  • Defense against protocol abuse attacks
    Defense against Land, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
  • Web application protection
    Defense against HTTP GET flood, HTTP POST flood, HTTP slow header, HTTP slow post, HTTPS flood, SSL DoS/DDoS, WordPress reflection amplification, RUDY, and LOIC attacks; packet validity check
  • Defense against scanning and sniffing attacks
    Defense against address and port scanning attacks, and attacks using Tracert packets and IP options, such as IP source route,  timestamp, and record route
  • DNS application protection
    Defense against DNS query flood, DNS reply flood, and DNS cache poisoning attacks; source limit
  • Defense against network-type attacks
    Defense against SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP fragment flood, UDP flood, UDP fragment flood, IP flood, ICMP flood, TCP connection flood, sockstress, TCP retransmission, and TCP empty connection attacks
  • SIP application protection
    Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks; source limit 
  • Defense against UDP-based reflection amplification attacks
    Defense against NTP, DNS, SSDP, Chargen, TFTP, SNMP, NetBIOS, QOTD, Quake Network Protocol, Portmapper, RIPv1, and Steam 
    Protocol reflection amplification attacks
  • Filter 
    IP, TCP, UDP, ICMP, DNS, SIP, and HTTP packet filters
  • Location-based filtering
    Traffic block or limit based on the source IP address location 
  • Attack signature database
    RUDY, slowhttptest, slowloris, LOIC, AnonCannon, RefRef, ApacheKill, and ApacheBench attack signature databases; automatic weekly update of these signature databases 
  • IP reputation
    Tracking of most-active 5 million zombies and automatic daily update of the IP reputation database to rapidly block attacks; local access IP reputation learning to create dynamic IP reputation based on local service sessions, rapidly forward service access traffic, and enhance user experience


Ваша оценка