Portability: | / |
---|---|
Interface: | Network Interface |
Storage Method: | Flash Memory |
Still deciding? Get samples of US$ 2000/piece
Request Sample
|
Suppliers with verified business licenses
Audited by an independent third-party inspection agency
Model
|
AntiDDoS12004
|
AntiDDoS12008
|
AntiDDoS12016
|
Max Defense Bandwidth
|
400 Gbps
|
1.2 Tbps
|
2.4 Tbps
|
Max Defense Packet Rate
|
300 Mpps
|
900 Mpps
|
1800 Mpps
|
Expansion Slots
|
4
|
8
|
16
|
Expansion Interfaces
|
• 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
|
• 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
|
• 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
|
• 48-port 10GBase-SFP+
|
• 48-port 10GBase-SFP+
|
• 48-port 10GBase-SFP+
|
|
|
• 4-port 400GBase-QSFP
|
• 4-port 400GBase-QSFP
|
|
|
• 12-port 40G/100GBase-QSFP28
|
• 12-port 40G/100GBase-QSFP28
|
|
|
(Only four ports are provided by default. If needed, you can purchase 100G interface expansion RTUs for capacity expansion. Only a
maximum of two ports can be added.) |
(Only four ports are provided by default. If needed, you can purchase 100G interface expansion RTUs for capacity expansion. Only a
maximum of two ports can be added.) |
|
Dimensions (H x W x D)
|
438 mm × 442 mm × 874 mm (9.8U)
|
703 mm x 442 mm × 874 mm (15.8U)
|
1436 mm x 442 mm x 1033 mm (32.3U)
|
DDoS Defense Specifications
|
• Defense against malformed-packet attacks
|
||
Defense against LAND, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
|
|||
|
|||
• Defense against scanning and sniffing attacks
|
|||
Defense against port scan and IP sweep attacks, and attacks using Tracert packets and IP options, such as IP source route, IP
timestamp, and IP route record options |
|||
|
|||
• Defense against network-layer flood attacks
|
|||
Defense against common network-layer flood attacks, such as SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP
Fragment flood, TCP Malformed flood, UDP flood, UDP Malformed, UDP Fragment flood, IP flood, ICMP Fragment flood, ICMP flood, Other flood, carpet-bombing flood, and pulse-wave attacks |
|||
|
|||
• Defense against session-layer attacks
|
|||
Defense against common session-layer attacks, such as real-source SYN flood, real-source ACK flood, TCP connection exhaustion,
sockstress, and TCP null connection attacks |
|||
|
|||
• Defense against UDP reflection attacks
|
|||
Static rules for filtering common UDP amplification attacks, such as NTP, DNS, SSDP, CLDAP, Memcached, Chargen, SNMP and WSD
|
|||
Dynamic generation of filtering rules to defend against new UDP amplification attacks
|
|||
|
|||
• Defense against TCP reflection attacks
|
|||
Static filtering rules that are created based on network-layer characteristics
|
|||
TCP reflection attack filtering rules that are dynamically generated
|
|||
|
|||
• Defense against TCP replay attacks
|
|||
Static filtering rules that are created based on network-layer characteristics
|
|||
TCP replay attack filtering rules that are dynamically generated
|
|||
|
|||
• Defense against application-layer attacks (HTTP)
|
|||
Defense against high-frequency application-layer attacks (HTTP and HTTP CC attacks) based on behavior analysis
|
|||
Defense against low-frequency application-layer attacks (HTTP and HTTP CC attacks) based on machine learning
|
|||
Defense against slow-rate HTTP attacks based on behavior analysis, including HTTP slow header, HTTP slow post, RUDY, LOIC, HTTP
multi-methods, HTTP Range request amplification, and HTTP null connection attacks |
|||
|
|||
• Defense against HTTPS/TLS encrypted application-layer attacks
|
|||
Defense against high-frequency HTTPS/TLS encrypted attacks
|
|||
Defense against slow-rate incomplete TLS session and null connection attacks
|
|||
|
|||
• Defense against application-layer attacks (DNS)
|
|||
Defense against DNS Malformed, DNS query flood, NXDomain flood, DNS reply flood, and DNS cache poisoning attacks
|
|||
Source-based rate limiting and domain name-based rate limiting
|
|||
|
|||
• Defense against application-layer attacks (SIP)
|
|||
Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks
|
|||
Source-based rate limiting
|
|||
|
|||
• User-defined filtering rules
|
|||
User-defined filtering rules for local software and hardware, as well as BGP FlowSpec rules for remote filtering. The fields can
be customized, including source/destination IP address, packet length, IP protocol, IP payload, source/destination port, TCP flag bit, TCP payload, UDP payload, ICMP payload, DNS domain name, HTTP URI, HTTP field user-agent, as well as caller and callee in the SIP protocol. |
|||
|
|||
• Geographical location filtering
|
|||
The blocking policy can be customized. For countries outside china, blocking policies can be customized based on country. In
China, blocking policies can be customized based on province. |
|||
|
|||
• Dual-stack defense
|
|||
IPv4/IPv6 dual-stack defense against DDoS attacks
|
|||
|
|||
• Automatic tuning of defense policies
|
|||
Attack traffic snapshot, defense effect evaluation, and automatic tuning of defense policies
|
|||
Automatic attack evidence collection
|
|||
|
|||
• Baseline learning
|
|||
Support for dynamic traffic baseline learning and learning period configuration
|
|||
|
|||
• Packet capture-based evidence collection
|
|||
Automatic packet capture based on attack events and user-defined ACLs for packet capture
|
|||
Online parsing and analysis, source tracing, and local analysis after downloading for captured packets
|
Chongqing Chimu Technology Co., Ltd. was established in 2011, we have been engaged in this industry 11 years. Relying on 11 years of deep experience in the communication field and scientific and technological innovation ability, through the integration of multi-brand, full series of communication products resources, with a one-stop service model. Let the network better connect you and me, connect the world. In order to meet the needs of customers, we have eatablished a perfect supply chain system to provide super products with reliable quality and reasonable price.
We are devoted to offering Switches, Routers, Servers, Storages, LTs, SDHs, Network Modules, Interface Cards, Security Firewalls, Wireless AP. Our long-term aim is to provide users high-quality, efficient, economic, timely services. Looking forward to establish long-term and win-win business relations with you.
A)Stable and Wide Supply Chain System
we have established a perfect supply chain system to provide a wide range of products with reliable quality and reasonable price.
B)Competitive Price
We ensure the most competitive price. Warm reminders here, telecommunications equipment configuration is quite different, the price shown on the website is only for reference. After configuration and quantity been confirmed, we will give the final most competitive discounted price.
C) Safe and Easy Payment Solutions
We accept all major credit cards, PayPal and wire transfer.
D)Fast Delivery and Shipping
Fast, professional and reliable delivery.
E)11 Years Experience
we have been engaged in this industry more than 11 years, we have rich industry experience.
Q: How about your main products?
A: Our product lines include Switches, Routers, SFP Modules, OLTs, SDHs, Network Modules, Interface Cards, Security Firewalls, Wireless AP etc.
Q: What brand of products do you offer?
A: We can supply all the brands you need.
Q: what services can we provide?
A:Accepted Delivery Terms: FOB,CFR,EXW,FCA;
Accepted Payment Currency:USD,EUR,CAD,HKD,GBP,CNY;
Accepted Payment Type: T/T,MoneyGram,PayPal,Western Union,Cash etc...
Q: Can we get free samples?
A: Sorry, it is not available, but you can pay for one.
Q. How can we guarantee quality?
A:Always a pre-production sample before mass production;
Always final Inspection before shipment;
Q: How about your delivery time?
A: Generally, it will take 1 to 10 days after receiving your deposit. The specific delivery time depends on the items and the quantity of your order.
Q: Do you test all your goods?
A: Yes, We have professional engineer to test all devices before shipping.
Q:How about the MOQ?
A:1 piece