Free shipping on all UAE order

All Products
More Categories Close Menu

15+ Years Of Experience

  • Gear Net Technologies LLC
  • sira-removebg-preview
sira-removebg-preview

Product Details

AntiDDoS1550-AC

AED22,613.00

< tbody >

Model: Huawei Anti-DDoS1000 DDoS Protection Systems AntiDDoS1550-AC 0235G77W
Detail: AntiDDoS1550 AC Host(4GE(RJ45)+4GE Combo,4G Memory,2 AC Power)
Chat With GNTME LLC

Share this product

Description

AntiDDoS1550 Specifications

Flood defense performance 3 Mpps
Detecting/Cleaning performance 5 Gbit/s
Defense start latency ≤ 2 seconds
Fixed interface 4 × GE (RJ45)+4 × GE (combo)
Expansion slot 2 × FIC
Expansion interface card 2 × 10GE (SFP+);2 × 10GE (SFP+)+8 × GE (RJ45);8 × 1GE (SFP);8 × 1GE (RJ45)
Bypass card 4 × 1 GE (RJ45);Dual-link LC/UPC multi-mode optical interface;Dual-link LC/UPC single-mode optical interface
Dimensions (H × W × D) 43.6 × 442 × 560
Maximum power consumption 150 W

IPv4 defense types

Anomaly filtering Blacklist, HTTP field-based filtering, and TCP/UDP/Other protocol load feature-based filtering
Protocol vulnerability defense Defense against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, IP Option, IP fragment control packet, TCP label validity check, large ICMP control packet, ICMP redirect control packet, and ICMP unreachable control packet attacks
Transport-layer attack defense Defense against SYN flood, ACK flood, SYN-ACK flood, FIN/RST flood, TCP fragment flood, UDP flood, UDP fragment flood, and ICMP flood attacks
Scanning and sniffing attack defense Defense against port scanning, address scanning, Tracert control packet, IP Option, IP timestamp, and IP routing record attacks
DNS attack defense Defense against forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks.
Web attack defense Defense against HTTP get/post flood attacks, CC attacks, HTTP slow header/post attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, and TCP null connection attacks
VoIP attack defense Defense against SIP flood attacks
Zombie/Trojan horse/Worm attack defense Defense against over 200 zombies, Trojan horses, and worms, such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, and Thc-ssl-dos

IPv6 defense types

IPv6 defense types Defense against ICMP fragment attacks, blacklist, HTTP field-based filtering, TCP/UDP/Other protocol load feature-based filtering, SYN flood attacks, ACK flood attacks, SYN-ACK flood attacks, FIN/RST flood attacks, TCP fragment flood attacks, UDP flood attacks, UDP fragment flood attacks, ICMP flood attacks, Forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks, fast flux botnet, HTTP get/post flood attacks, CC attacks, HTTP slow header/post flood attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, TCP null connection attacks, and SIP flood attacks
IPv4/IPv6 dual-stack attack defense Supported