CCAP/CMTS
Optyka stacyjna
Remote PHY
Węzły optyczne
Wzmacniacze
Pasywa RF
Infrastruktura pasywna sieci optycznej
Systemy pomiarowe
Systemy zasilania
Extendery WiFi
Modemy telefoniczne DOCSIS 3.0
Modemy telefoniczne DOCSIS 3.1
Modemy kablowe DOCSIS 3.0 32x8
Modemy telefoniczne z WiFi DOCSIS 3.0 16x4
Modemy telefoniczne z WiFi DOCSIS 3.1
Modemy telefoniczne z WiFi DOCSIS 3.0 24x8
Modemy telefoniczne z WiFi DOCSIS 3.0 8x4
CCAP/CMTS
Optyka stacyjna
Remote PHY
Węzły optyczne
Wzmacniacze
Pasywa RF
Infrastruktura pasywna sieci optycznej
Systemy pomiarowe
Systemy zasilania
Extendery WiFi
Modemy telefoniczne DOCSIS 3.0
Modemy telefoniczne DOCSIS 3.1
Modemy kablowe DOCSIS 3.0 32x8
Modemy telefoniczne z WiFi DOCSIS 3.0 16x4
Modemy telefoniczne z WiFi DOCSIS 3.1
Modemy telefoniczne z WiFi DOCSIS 3.0 24x8
Modemy telefoniczne z WiFi DOCSIS 3.0 8x4
Platforma ochrony przeciw atakom DDoS
Huawei’s Anti-DDos1000 protection systems respond within seconds to defend your critical online services against more than 100 types of DDoS attacks. Financial enterprises, government sectors, ICPs, and data centers all depend on Huawei’s DDoS protection system.
Accurate, comprehensive solution ensures service continuity. The system can “learn” more than 60 types of traffic patterns, so you can generate automatic security policies.
Shield your services against organized hackers with Huawei’s AntiDDoS1000 Series DDoS Protection Systems.
Parameters | AntiDDoS1520 | AntiDDoS1550 | AntiDDoS1500-D |
Interfaces | Fixed interfaces: 4 x GE (RJ45) and 4 x GE (combo); expansion slots: 2 x FIC | ||
Expansion Interfaces | 2 x 10 GE (SFP+); 2 x 10 GE (SFP+) and 8 x GE (RJ45); 8 x 1 GE (SFP) and 8 x 1 GE (RJ45)
Bypass card: 4 x 1 GE (RJ45); dual-link LC/UPC multiple-mode optical interface; dual-link LC/UPC single-mode optical interface |
||
Defense Types | |||
Anomaly Filtering | Blacklist, HTTP field-based filtering, and TCP/UDP/Other protocol load feature-based filtering | ||
Protocol Vulnerability | Defense against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, IP Option, IP fragment control packet, TCP label validity check, large ICMP control packet, ICMP redirect control packet, and ICMP unreachable control packet attacks | ||
Scanning and Sniffing Attacks | Defense against port scanning, address scanning, Tracert control packet, IP Option, IP timestamp, and IP routing record attacks | ||
Transport-layer Attacks | Defense against SYN, ACK, SYN-ACK, FIN/RST, TCP fragment, UDP, UDP fragment, and ICMP flood attacks | ||
Application-layer Attacks | Defense against forged source DNS query flood, real source DNS query flood, DNS reply flood, DNS cache poisoning, and DNS protocol vulnerability attacks
Defense against HTTP GET/POST flood, CC, HTTP slow header/post, HTTPS flood, SSL DoS/DDoS, TCP connection, Sockstress, TCP retransmission, and TCP null connection attacks Defense against SIP flood attacks |
||
Zombie/Trojan Horse/Worm Attacks | Defense against more than 200 zombies, Trojan horses, and worms such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, and Thc-ssl-dos |