Home > Products > Huawei Security > Huawei AntiDDoS1500D-AC DDoS protection system
Huawei AntiDDoS1500D-AC DDoS protection system
- 10 Unit / Units per Month
- HongKong
- T/T L/C D/P D/A
You May Like
Product Details
Products Status | Stock | Type | Wired | |
VPN Support | No | Brand Name | Huawei | |
Model Number | AntiDDoS1500D-AC | Place of Origin | Guangdong, China |
Product Description
AntiDDoS1500-D AC Host(4GE(RJ45)+4GE Combo,4G Memory,2 AC Power)
- AntiDDoS1500-D , DDoS attacks detect System
- 1U height ,with 4GE+4 Combo interface in default.
- With two expansion slots and two USB interface.
- Support dual AC/DC power.
- Second-Level DDoS attacks response.
Product Overview
Background
With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors. Instead, it forms an integral dark industry chain with overwhelming damages.
Severe DDoS attacks
At present, a single DDoS attack consumes more than 100 Gbit/s bandwidth. The number of DDoS attacks is 20 times of that in 2007, and over 30,000,000 zombie hosts flood the network. Moreover, attack tools become easily available. Large numbers of botnets break off the technical threshold for DDoS attacks. A DDoS attack is launched by only three steps, namely, downloading the attack tool, purchasing zombie hosts, and initiating the attack.
Traffic DDoS attacks evolve to application attacks
In the past, flood attacks were prevailing on the carrier network and infrastructure. In comparison, current DDoS attacks are specific to applications and services, such as enterprise portal applications, e-shopping, online videos, online games, DNS, and email. The targets of attacks become more extensive. A single attack consumes less traffic and fewer costs. The attack behavior becomes more complex and difficult to distinguish. This brings difficulty in detecting and defending against DDoS attacks.
Service interruption adversely affects enterprise operation
DDoS attacks frequently intrude into the service systems of enterprises, and severely interrupt the normal service operation. On the one hand, service interruption damages enterprises' brand images, takes away their customers, and reduces their profits, especially for small Internet enterprises on e-business, online games, and portals. On the other hand, constructing an anti-DDoS system brings intensive investment and maintenance pressure on these enterprises and deteriorates their normal service operation.
DDoS attacks cause IDC customer loss
If a service system suffers from DDoS attacks, the attack traffic occupies the entire IDC bandwidth, affecting the service systems of other leasers. As a result, IDC leasers quit, competitiveness lowers, and operation costs rise. These side impacts severely deteriorate the service operation and profits.
Solution Overview
Designed for carriers, enterprises, data centers, and ICP service providers (including providers for Web portals, online games, online videos, and DNS services), Huawei anti-DDoS solution incorporates extensive experience in network security and full understanding of customer demands.
Huawei anti-DDoS solution enhances defense against application-layer attacks, IPv4-IPv6 attack defense, and defense against zombies, Trojan horses, and worms. This fully ensures network security and service continuity.
Product Features
Service-based defense policy
Huawei anti-DDoS solution supports continuously periodic learning and analysis on the service traffic of the Zone, draws the outline of normal service traffic, and enables differentiated defense types and policies for various services or one service in different time ranges, therefore implementing refined defense.
Accurate abnormal traffic cleaning
Huawei anti-DDoS solution uses the per-packet detect technology. Defense is triggered immediately by an attack. This solution applies multiple technologies, including seven-layer filtering, behavior analysis, and session monitoring, to accurately defend against various flood attacks, Web application attacks, DNS attacks, SSL DoS/DDoS attacks, and protocol stack vulnerability attacks. In this way, application servers are protected.
Intelligently caching DNS traffic
Besides accurately defending against various attacks on the DNS server, Huawei anti-DDoS solution supports DNS cache for improved performance under heavy DNS server traffic.
Defense against prevailing zombies/Trojan horses/worms
By spreading Trojan horses and worms to large numbers of hosts, hackers control the hosts hierarchically and form the botnet to launch attacks. Therefore, botnets breed DDoS attacks. Huawei anti-DDoS solution identifies and blocks over 200 common zombies/Trojan horses/worms worldwide, therefore smashing botnets
Perfect IPv4-IPv6 defense
In February 2011, IANA declared that IPv4 addresses were exhausted. Enterprises have no new IPv4 addresses and begin to put IPv6 network construction into agenda. The particular IPv4-IPv6 technology of Huawei anti-DDoS solution supports concurrent defense against DDoS attacks on both IPv4 and IPv6 networks. The solution addresses the DDoS attack defense requirements in dual stack and helps users transit to the next generation network.
Flexible networking
The anti-DDoS solution must be adaptive to various network environments and address different grades of service requirements.
On this basis, Huawei anti-DDoS solution provides multiple in-line and off-line deployments, which enable customers to select flexibly by their services and networks.
In-line deployment: serially connects the detecting and cleaning modules to the network to be protected for direct traffic detecting and cleaning. The high-performance and multi-core hardware platform in use not only ensures the detecting and cleaning accuracy, but also minimizes the processing delay. Moreover, Huawei anti-DDoS solution provides the bypass module. When an anomaly occurs, traffic is sent to the cleaning module, which avoids introducing new failures.
Off-line traffic-diversion deployment: deploys the cleaning module on the network in off-line mode. Once detecting DDoS attack traffic, the detecting and cleaning centers perform actions based on the policies configured in the management center.
Highlights
Efficient and speedy: 5 Gbit/s defense performance and response within seconds
High-performance multi-core CPU as well as dedicated anti-DDoS operating system, providing 5 Gbit/s performance.
Self-learning of the service model and per-packet detect technology. Once a traffic or packet anomaly is found, the defense policy is automatically triggered.
The defense latency is within two seconds.
Accurate and comprehensive: “V-ISA” reputation technical to defend against hundreds of attacks
Particulaer “V-ISA” reputation technical to defend against over 100 DDoS attacks, with the industry-leading defense types.
Defense against over 200 zombies, Trojan horses, and worms, protecting users from hackers.
IPv4/IPv6, as the first to support IPv6 attack defense.
Terminal identification technology, accurately identifying illegitimate clients and ensuring zero false positive.
Easy-to-use: easy management and enriched reports
User/Service-centered management design, supporting the self-learning of the service traffic model and the automatic policy generation, and resulting in easy management.
Enriched reports display attack status in multiple perspectives, such as the service traffic, attack statistics, and attack trend analysis, providing a visibility into services and threats.
Self-extraction of attack fingerprints, implementing emergency defense and effectively defending against zero-day attacks.
Specifications
AntiDDoS1000 series | |||
---|---|---|---|
Model | AntiDDoS1520 | AntiDDoS1550 | AntiDDoS1500-D |
Flood defense performance | 3 Mpps | 3 Mpps | 3 Mpps |
Detecting/Cleaning performance | 2 Gbit/s | 5 Gbit/s | 5 Gbit/s (detecting) |
Defense start latency | ≤ 2 seconds | ≤ 2 seconds | ≤ 2 seconds |
Fixed interface | 4 × GE (RJ45)+4 × GE (combo) | ||
Expansion slot | 2 × FIC | ||
Expansion interface card | 2 × 10GE (SFP+),2 × 10GE (SFP+)+8 × GE (RJ45),8 × 1GE (SFP),8 × 1GE (RJ45) | ||
Bypass card | 4 × 1 GE (RJ45),Dual-link LC/UPC multi-mode optical interface, Dual-link LC/UPC single-mode optical interface | ||
Dimensions (H × W × D) | 43.6 × 442 × 560 | ||
Maximum power consumption | 150 W | ||
IPv4 defense types | |||
Anomaly filtering | Blacklist, HTTP field-based filtering, and TCP/UDP/Other protocol load feature-based filtering | ||
Protocol vulnerability defense | Defense against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, IP Option, IP fragment control packet, TCP label validity check, large ICMP control packet, ICMP redirect control packet, and ICMP unreachable control packet attacks | ||
Transport-layer attack defense | Defense against SYN flood, ACK flood, SYN-ACK flood, FIN/RST flood, TCP fragment flood, UDP flood, UDP fragment flood, and ICMP flood attacks | ||
Scanning and sniffing attack defense | Defense against port scanning, address scanning, Tracert control packet, IP Option, IP timestamp, and IP routing record attacks | ||
DNS attack defense | Defense against forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks, and fast flux botnet | ||
Web attack defense | Defense against HTTP get/post flood attacks, CC attacks, HTTP slow header/post attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, and TCP null connection attacks | ||
VoIP attack defense | Defense against SIP flood attacks | ||
Zombie/Trojan horse/Worm attack defense | Defense against over 200 zombies, Trojan horses, and worms, such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, and Thc-ssl-dos | ||
IPv6 defense types | |||
IPv6 defense types | Defense against ICMP fragment attacks, blacklist, HTTP field-based filtering, TCP/UDP/Other protocol load feature-based filtering, SYN flood attacks, ACK flood attacks, SYN-ACK flood attacks, FIN/RST flood attacks, TCP fragment flood attacks, UDP flood attacks, UDP fragment flood attacks, ICMP flood attacks, Forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks, fast flux botnet, HTTP get/post flood attacks, CC attacks, HTTP slow header/post flood attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, TCP null connection attacks, and SIP flood attacks | ||
IPv4/IPv6 dual-stack attack defense | Supported |
Basic configurations of the AntiDDoS1500-D | |||
---|---|---|---|
AntiDDoS1500D-AC | AntiDDoS1500 D-SUBZ31UAH-AMS1500-D AC Host, with HS General Security Platform Software | Alternative | |
AntiDDoS1500D-DC | AntiDDoS1500 D-SUBZ31UDH-AMS1500-D DC Host, with HS General Security Platform Software | ||
Basic configurations of the AntiDDoS1520 | |||
AntiDDoS1520-AC | AntiDDoS1520-SUBZ11UAH-AMS1520 AC Host, with HS General Security Platform Software | Alternative | |
AntiDDoS1520-DC | AntiDDoS1520-SUBZ11UDH-AMS1520 DC Host, with HS General Security Platform Software | ||
Basic configurations of the AntiDDoS1550 | |||
AntiDDoS1550-AC | AntiDDoS1550-SUBZ21UAH-AMS1550 AC Host, with HS General Security Platform Software | Alternative | |
AntiDDoS1550-DC | AntiDDoS1550-SUBZ21UDH-AMS1550 DC Host, with HS General Security Platform Software | ||
Interface modules of the AntiDDoS series | |||
FIC-2SFP+&8GE | 2 x 10GE optical interface card+8 GE electrical interface card, with HS General Security Platform Software | Optional | |
FIC-8GE | 8 GE electrical interface card, with HS General Security Platform Software | Optional | |
FIC-2SFP+ | 2 x 10GE optical FIC, with HS General Security Platform Software | Optional | |
FIC-8SFP | 8 GE optical FIC, with HS General Security Platform Software | Optional | |
FIC-8SFP | 8 GE optical FIC, with HS General Security Platform Software | Optional | |
FIC-2LINE-M-BYPASS | 2 Link LC/UPC Multimode Optical Interface Bypass Protect Card, with HS General Security Platform Software | Optional | |
FIC-2LINE-S-BYPASS | 2 Link LC/UPC Single mode Optical Interface Bypass Protect Card ,with HS General Security Platform Software | Optional | |
Anti-DDoS components | |||
ADSCT001WIN01 | Windows Chinese Platform(AC PC Server, Hard Disk, Microsoft Windows Server and Patches, Chinese),Including OS License | Optional | |
ADSCT001WIN03 | Windows Chinese Platform(DC PC Server, Hard Disk, Microsoft Windows Server and Patches, Chinese),Including OS License | Optional | |
NS19MKM00 | KB&Mouse, Monitor 19-Inch TFT LCD | Optional | |
Anti-DDoS management center | |||
LIC-ADS-NOFA00 | ATIC Basic Feature Summary, with HS General Security Platform Software |
Contact Us
- ActForNet Technologies Inc.
- Contact nameHarry Lin Chat Now
- Phone1-408-4191868
- Address710 Lakebird Drive
Product Categories
New Products
-
Huawei NIP2100-AC-01 IDS/IPS
-
Huawei NIP2130-AC-01 IDS/IPS
-
Huawei NIP2150-AC-01 IDS/IPS
-
Huawei NIP2200-AC-01 IDS/IPS
-
Huawei NIP5100-AC-01 IDS/IPS
-
Huawei NIP5200-AC-01 IDS/IPS
-
Huawei NIP5500-AC-01 IDS/IPS
-
Huawei SVN5830 AC Host VPN Gateway
-
Huawei SVN5850 AC Host VPN Gateway
-
Huawei SVN5860 AC Host VPN Gateway
-
Huawei SVN5880 AC Host VPN Gateway
-
Huawei SVN5880-C AC Host VPN Gateway
Popular Searches
- sim card slot
- wireless router
- hsdpa
- wifi router
- Wifi Router Modem
- Lte Modem
- Dual Sim Card
- network server
- Hosting Server
- voip hardware
- broadband router
- cisco router
- hsupa
- portable router
- pos card
- Dual Sim Router
- gsm router
- 3g router
- wcdma gateway
- Internet Router
- Wifi Router Sim Card
- Lte Router Sim Card
- 4g universal modem
- Wifi Hotspot
- adsl modem
- adsl router
- wireless adsl router
- Modem Router
- Industrial Router
- Adsl Modem Router
Recommended Products
- Network appliance with 8x2.5G and 2x10G SFP+ Intel i9 10900 CPU XEON cpu options
- Main Treatment Board 02353354 03050AXP ES0Z1B06ACS0 03050DEP ME0D0SRUAH70 IG2D0SRUAD02
- Main Treatment Board 03059879 03050DED 03050DCY 03058566 CR5D0SRUAI70 CR5D0SRUAH70 CR5D0SRUADK1 CR5D0SRUAC70
- Switch and Route Processing Unit 03058135 03058860 03058646 03053132 CR5D0SRUAA70 ME0D0SRUA470 CR5D0SRUAD70 CR5D0SRUAC71
- Switch and Route Processing Unit 03030KSR 03054207 ME0D0SRUA470 CR5D0SRUA770 CR5D0SRUA470
- Switch and Route Processing Unit 03054638 03053549 03053926 ME0D0SRUA770 CR5D0SRUA570 ME0D0SRUA570
- Switch and Route Processing Unit 03057261 03056096 03057257 CR5D0SRUA970 CR5D0SRUAE70 CR5D0SRUA971 CR5D0SRUA871
- Switch and Route Processing Unit 03056097 CR5D0SRUA870 03059315 CR5D0SRUAC73 03057257 CR5D0SRUA871 NE40E-X8A 03058860
- Plery R602 2.4GHz 300Mbps Unlocked 4G Wifi Hotspot Routers Wifi6 Internet SIM Card Router for Rural
- PLERY R605
- Network Security Appliance J6413 J6412 for Firewall Hardware Platform
- SA NSA waterproof IP 65 outdoor 5g router
Find Similar Products By Category
- Computer Products > Network Hardware & Parts > Router
- Please Enter your Email Address
- Please enter the content for your inquiry.
We will find the most reliable suppliers for you according to your description.
Send Now-
Harry Lin
Welcome to my shop, I'm glad to serve you. Please feel free to send me any questions you may have.
Your message has exceeded the limit.
- Contact supplier for lowest price
- Customized Request
- Request Sample
- Request Free Catalogs
Your message has exceeded the limit.
-
Purchase Quantity
-
*Sourcing Details
Your inquiry content must be between 10 to 5000 characters.
-
*Email
Please enter Your valid email address.
-
Mobile