Login| Register|
Currency:
| Contact Us Cart

Huawei AntiDDoS8030 employs

  • Model:

    Huawei AntiDDoS8030 employs
  • Detail:

    Huawei AntiDDoS8000 employs
  • Price:

    $5000.00

  • Condition:

    Brand New Sealed
  • Availability:

    IN STOCK

  • Quantity:

  • Free Technical Support
  • Product Quality Protection
  • On-time Shipment
Overview
Huawei AntiDDoS8000 employs

 

Specifications

Model AntiDDoS8030 AntiDDoS8080 AntiDDoS8160
Throughput Up to 120 Gbit/s Up to 720 Gbit/s Up to 1,440 Gbit/s
Throughput/Slot Up to 80 Gbit/s Up to 160 Gbit/s Up to 160 Gbit/s
Mitigation Rate/Slot Up to 60 Mpps Up to 60 Mpps Up to 60 Mpps
Latency 80 μs 80 μs 80 μs
Expansion Slots 3 8 16
Expansion LPU FW-LPUF-120, 2 sub-slots FW-LPUF-120, 2 sub-slots 
FW-LPUF-240, 2 sub-slots
FW-LPUF-120, 2 sub-slots 
FW-LPUF-240, 2 sub-slots
Expansion Interfaces 24 x GE (SFP); 5 x 10 GE (SFP+); 6 x 10 GE (SFP+); 12 x 10 GE (SFP+); 1 x 40 GE (CFP); 1 x 100 GE (CFP)
Dimensions (H x W x D) DC: 175 mm x 442 mm x 650 mm (4U) 
AC: 220 mm x 442 mm x 650 mm (5U)
620 mm x 442 mm x 650 mm (14U) 1,420 mm x 442 mm x 650 mm (32U)
Defense against protocol abuse attacks 
Defense against Land, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
Web application protection 
Defense against HTTP GET flood, HTTP POST flood, HTTP slow header, HTTP slow post, HTTPS flood, SSL DoS/DDoS, WordPress reflection amplification, RUDY, and LOIC attacks; packet validity check
Defense against scanning and sniffing attacks 
Defense against address and port scanning attacks, and attacks using Tracert packets and IP options, such as IP source route,  timestamp, and record route
DNS application protection 
Defense against DNS query flood, DNS reply flood, and DNS cache poisoning attacks; source limit
Defense against network-type attacks 
Defense against SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP fragment flood, UDP flood, UDP fragment flood, IP flood, ICMP flood, TCP connection flood, sockstress, TCP retransmission, and TCP empty connection attacks
SIP application protection 
Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks; source limit
Defense against UDP-based reflection amplification attacks 
Defense against NTP, DNS, SSDP, Chargen, TFTP, SNMP, NetBIOS, QOTD, Quake Network Protocol, Portmapper, Microsoft SQL Resolution Service, RIPv1, and Steam 
Protocol reflection amplification attacks
Filter 
IP, TCP, UDP, ICMP, DNS, SIP, and HTTP packet filters
Location-based filtering 
Traffic block or limit based on the source IP address location
Attack signature database 
RUDY, slowhttptest, slowloris, LOIC, AnonCannon, RefRef, ApacheKill, and ApacheBench attack signature databases; automatic weekly update of these signature databases
IP reputation 
Tracking of most active 5 million zombies and automatic daily update of the IP reputation database to rapidly block attacks; local access IP reputation learning to create dynamic IP reputation based on local service sessions, rapidly forward service access traffic, and enhance user experience
Reviews

(Total 0 User Comment Num)

  • No comment

Write a review here:

Your Name*Anonymous user