Product Details
AntiDDoS1520-DC
AED20,241.00
< tbody >
Model: | Huawei Anti-DDoS1000 DDoS Protection Systems AntiDDoS1520-DC 0235G77Y |
Detail: | AntiDDoS1520-DC Host(4GE(RJ45)+4GE Combo,4G Memory,2 DC Power) |
Description
AntiDDoS1520 Specifications |
|
Flood defense performance | 3 Mpps |
Detecting/Cleaning performance | 2 Gbit/s |
Defense start latency | ≤ 2 seconds |
Fixed interface | 4 × GE (RJ45)+4 × GE (combo) |
Expansion slot | 2 × FIC |
Expansion interface card | 2 × 10GE (SFP+);2 × 10GE (SFP+)+8 × GE (RJ45);8 × 1GE (SFP);8 × 1GE (RJ45) |
Bypass card | 4 × 1 GE (RJ45);Dual-link LC/UPC multi-mode optical interface;Dual-link LC/UPC single-mode optical interface |
Dimensions (H × W × D) | 43.6 × 442 × 560 |
Maximum power consumption | 150 W |
IPv4 defense types |
|
Anomaly filtering | Blacklist, HTTP field-based filtering, and TCP/UDP/Other protocol load feature-based filtering |
Protocol vulnerability defense | Defense against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, IP Option, IP fragment control packet, TCP label validity check, large ICMP control packet, ICMP redirect control packet, and ICMP unreachable control packet attacks |
Transport-layer attack defense | Defense against SYN flood, ACK flood, SYN-ACK flood, FIN/RST flood, TCP fragment flood, UDP flood, UDP fragment flood, and ICMP flood attacks |
Scanning and sniffing attack defense | Defense against port scanning, address scanning, Tracert control packet, IP Option, IP timestamp, and IP routing record attacks |
DNS attack defense | Defense against forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks. |
Web attack defense | Defense against HTTP get/post flood attacks, CC attacks, HTTP slow header/post attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, and TCP null connection attacks |
VoIP attack defense | Defense against SIP flood attacks |
Zombie/Trojan horse/Worm attack defense | Defense against over 200 zombies, Trojan horses, and worms, such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, and Thc-ssl-dos |
IPv6 defense types |
|
IPv6 defense types | Defense against ICMP fragment attacks, blacklist, HTTP field-based filtering, TCP/UDP/Other protocol load feature-based filtering, SYN flood attacks, ACK flood attacks, SYN-ACK flood attacks, FIN/RST flood attacks, TCP fragment flood attacks, UDP flood attacks, UDP fragment flood attacks, ICMP flood attacks, Forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks, fast flux botnet, HTTP get/post flood attacks, CC attacks, HTTP slow header/post flood attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, TCP null connection attacks, and SIP flood attacks |
IPv4/IPv6 dual-stack attack defense | Supported |