<< Назад на страницу выбора модели



ThroughputUp to 80Gbps
Standard interface2×100GE (QSFP28) + 2×40GE (QSFP+) + 20×10GE (SFP+)
Deployment modein-line; off-line (static defense); off-line (Dynamic defense)
FunctionOptions for detecting or cleaning
External BypassMulti mode or single mode GE link; Multi mode or single mode 10GE link
Height × Width × Depth44.4mm × 442mm × 600mm (1U)
Power supplyRated input voltage:
AC: 100 V to 240 V, 50 Hz/60 Hz
Maximum input voltage range:
AC: 90 V to 264 V, 47 Hz to 63 Hz
Power Consumption566W
Power redundancyAC: 1+1 power redundancy
Safety certificationsElectro Magnetic Compatibility (EMC) certification


Defense against protocol abuse attacksDefense against Land, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
Web application protectionDefense against HTTP GET flood, HTTP POST flood, HTTP slow header, HTTP slow post, HTTPS flood, SSL DoS/DDoS, WordPress reflection amplification, RUDY, and LOIC attacks; packet validity check
Defense against scanning and sniffing attacksDefense against address and port scanning attacks, and attacks using Tracert packets and IP options, such as IP source route, timestamp, and record route
DNS application protectionDefense against DNS query flood, DNS reply flood, and DNS cache poisoning attacks; source limit
Defense against network-type attacksDefense against SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP fragment flood, UDP flood, UDP fragment flood, IP flood, ICMP flood, TCP connection flood, sockstress, TCP retransmission, and TCP empty connection attacks
SIP application protectionDefense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks; source limit
Defense against UDP-based reflection amplification attacksDefense against NTP, DNS, SSDP, Chargen, TFTP, SNMP, NetBIOS, QOTD, Quake Network Protocol, Portmapper, Microsoft SQL Resolution Service, RIPv1, and Steam
Protocol reflection amplification attacks
FilterIP, TCP, UDP, ICMP, DNS, SIP, and HTTP packet filters
Location-based filteringTraffic block or limit based on the source IP address location
Attack signature databaseRUDY, slowhttptest, slowloris, LOIC, AnonCannon, RefRef, ApacheKill, and ApacheBench attack signature databases; automatic weekly update of these signature databases
IP reputationTracking of most active 5 million zombies and automatic daily update of the IP reputation database to rapidly block attacks; local access IP reputation learning to create dynamic IP reputation based on local service sessions, rapidly forward service access traffic, and enhance user experience
Management functionsAccount management and permission allocation; defense policy configuration and report display based on Zones (up to 100,000 Zones, namely tenants); device performance monitoring; source tracing and fingerprint extraction through packet capture; email, short message, and audio alarms; log dumping; dynamic baseline learning
Report functionsComparison of traffic before and after cleaning; top N traffic statistics; application-layer traffic comparison and distribution; protocol distribution; traffic statistics based on the source location; attack event details; top N attack events (by duration or number of packets);
distribution of attacks by category; attack traffic trend; DNS resolution success ratio; application-layer top N traffic statistics (by source IP address, HTTP URI, HTTP HOST, and domain name); download of reports in HTML/PDF/Excel format; report push via email;
periodical generation of daily, weekly, monthly, and yearly reports; self-service portal for tenants
Deployment modeIn-line or off-line deployment
Traffic diversion and injectionTraffic diversion: supports manual, and PBR or BGP based automatic traffic diversion.
Traffic injection: supports static route injection, MPLS VPN injection, MPLS LSP injection, GRE tunnel injection, Layer 2 injection, PBR based injection, etc