Hisecengine Ddos Defense System Antiddos12008 Network Security

Product Details
Portability: /
Interface: Network Interface
Storage Method: Flash Memory
Still deciding? Get samples of US$ 2000/piece
Request Sample
Diamond Member Since 2023

Suppliers with verified business licenses

Audited Supplier

Audited by an independent third-party inspection agency

Number of Employees
21
Year of Establishment
2011-01-13
  • Hisecengine Ddos Defense System Antiddos12008 Network Security
  • Hisecengine Ddos Defense System Antiddos12008 Network Security
  • Hisecengine Ddos Defense System Antiddos12008 Network Security
  • Hisecengine Ddos Defense System Antiddos12008 Network Security
  • Hisecengine Ddos Defense System Antiddos12008 Network Security
  • Hisecengine Ddos Defense System Antiddos12008 Network Security
Find Similar Products
  • Overview
  • Product Description
  • Detailed Photos
  • Product Parameters
  • Company Profile
  • Our Advantages
  • Packaging & Shipping
  • FAQ
Overview

Basic Info.

Model NO.
AntiDDoS12008
Use
Workstation
Supporting System
/
USB Memory Port
USB Memory Port
Transport Package
Cartons
Specification
90X60X45 cm
Origin
China
HS Code
8517623200
Production Capacity
5000PCS/Month

Product Description

Product Description

HiSecEngine AntiDDoS12000 series provides up to 2.4Tbps security protection performance and service expansion capabilities, ideal for mitigating heavy-traffic DDoS attacks. It can also effectively defend against and block hundreds of complex attacks in seconds or even milliseconds, ensuring customers' service continuity.
 

Detailed Photos

Hisecengine Ddos Defense System Antiddos12008 Network SecurityHisecengine Ddos Defense System Antiddos12008 Network Security

Product Parameters

Model
AntiDDoS12004
AntiDDoS12008
AntiDDoS12016
Max Defense Bandwidth
400 Gbps
1.2 Tbps
2.4 Tbps
Max Defense Packet Rate
300 Mpps
900 Mpps
1800 Mpps
Expansion Slots
4
8
16
Expansion Interfaces
• 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
• 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
• 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
• 48-port 10GBase-SFP+
• 48-port 10GBase-SFP+
• 48-port 10GBase-SFP+
 
• 4-port 400GBase-QSFP
• 4-port 400GBase-QSFP
 
• 12-port 40G/100GBase-QSFP28
• 12-port 40G/100GBase-QSFP28
 
(Only four ports are provided by default. If needed, you can purchase 100G interface expansion RTUs for capacity expansion. Only a
maximum of two ports can be added.)
(Only four ports are provided by default. If needed, you can purchase 100G interface expansion RTUs for capacity expansion. Only a
maximum of two ports can be added.)
Dimensions (H x W x D)
438 mm × 442 mm × 874 mm (9.8U)
703 mm x 442 mm × 874 mm (15.8U)
1436 mm x 442 mm x 1033 mm (32.3U)
DDoS Defense Specifications
• Defense against malformed-packet attacks
Defense against LAND, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
 
• Defense against scanning and sniffing attacks
Defense against port scan and IP sweep attacks, and attacks using Tracert packets and IP options, such as IP source route, IP
timestamp, and IP route record options
 
• Defense against network-layer flood attacks
Defense against common network-layer flood attacks, such as SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP
Fragment flood, TCP Malformed flood, UDP flood, UDP Malformed, UDP Fragment flood, IP flood, ICMP Fragment flood, ICMP flood,
Other flood, carpet-bombing flood, and pulse-wave attacks
 
• Defense against session-layer attacks
Defense against common session-layer attacks, such as real-source SYN flood, real-source ACK flood, TCP connection exhaustion,
sockstress, and TCP null connection attacks
 
• Defense against UDP reflection attacks
Static rules for filtering common UDP amplification attacks, such as NTP, DNS, SSDP, CLDAP, Memcached, Chargen, SNMP and WSD
Dynamic generation of filtering rules to defend against new UDP amplification attacks
 
• Defense against TCP reflection attacks
Static filtering rules that are created based on network-layer characteristics
TCP reflection attack filtering rules that are dynamically generated
 
• Defense against TCP replay attacks
Static filtering rules that are created based on network-layer characteristics
TCP replay attack filtering rules that are dynamically generated
 
• Defense against application-layer attacks (HTTP)
Defense against high-frequency application-layer attacks (HTTP and HTTP CC attacks) based on behavior analysis
Defense against low-frequency application-layer attacks (HTTP and HTTP CC attacks) based on machine learning
Defense against slow-rate HTTP attacks based on behavior analysis, including HTTP slow header, HTTP slow post, RUDY, LOIC, HTTP
multi-methods, HTTP Range request amplification, and HTTP null connection attacks
 
• Defense against HTTPS/TLS encrypted application-layer attacks
Defense against high-frequency HTTPS/TLS encrypted attacks
Defense against slow-rate incomplete TLS session and null connection attacks
 
• Defense against application-layer attacks (DNS)
Defense against DNS Malformed, DNS query flood, NXDomain flood, DNS reply flood, and DNS cache poisoning attacks
Source-based rate limiting and domain name-based rate limiting
 
• Defense against application-layer attacks (SIP)
Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks
Source-based rate limiting
 
• User-defined filtering rules
User-defined filtering rules for local software and hardware, as well as BGP FlowSpec rules for remote filtering. The fields can
be customized, including source/destination IP address, packet length, IP protocol, IP payload, source/destination port, TCP flag
bit, TCP payload, UDP payload, ICMP payload, DNS domain name, HTTP URI, HTTP field user-agent, as well as caller and callee in the
SIP protocol.
 
• Geographical location filtering
The blocking policy can be customized. For countries outside china, blocking policies can be customized based on country. In
China, blocking policies can be customized based on province.
 
• Dual-stack defense
IPv4/IPv6 dual-stack defense against DDoS attacks
 
• Automatic tuning of defense policies
Attack traffic snapshot, defense effect evaluation, and automatic tuning of defense policies
Automatic attack evidence collection
 
• Baseline learning
Support for dynamic traffic baseline learning and learning period configuration
 
• Packet capture-based evidence collection
Automatic packet capture based on attack events and user-defined ACLs for packet capture
Online parsing and analysis, source tracing, and local analysis after downloading for captured packets
 
  
 
 
 

Company Profile

  Chongqing Chimu Technology Co., Ltd. was established in 2011, we have been engaged in this industry 11 years.   Relying on 11 years of deep experience in the communication field and scientific and technological innovation ability, through the integration of multi-brand, full series of communication products resources, with a one-stop service model.  Let the network better connect you and me, connect the world.  In order to meet the needs of customers, we have eatablished a perfect supply chain system to provide super products with reliable quality and reasonable price. 
  We are devoted to offering Switches,  Routers,  Servers, Storages, LTs,  SDHs,  Network Modules,  Interface Cards,  Security Firewalls, Wireless AP. Our long-term aim is to provide users high-quality, efficient, economic, timely services.  Looking forward to establish long-term and win-win business relations with you.

Hisecengine Ddos Defense System Antiddos12008 Network Security
Hisecengine Ddos Defense System Antiddos12008 Network Security
Hisecengine Ddos Defense System Antiddos12008 Network Security
Hisecengine Ddos Defense System Antiddos12008 Network Security

Our Advantages

A)Stable and Wide Supply Chain System
we have established a perfect supply chain system to provide a wide range of products with reliable quality and reasonable price.
B)Competitive Price
We ensure the most competitive price. Warm reminders here, telecommunications equipment configuration is quite different, the price shown on the website is only for reference. After configuration and quantity been confirmed, we will give the final most competitive discounted price.
C) Safe and Easy Payment Solutions
We accept all major credit cards, PayPal and wire transfer.
D)Fast Delivery and Shipping
Fast, professional and reliable delivery.
E)11 Years Experience
we have been engaged in this industry more than 11 years, we have rich industry experience.

Packaging & Shipping

Hisecengine Ddos Defense System Antiddos12008 Network Security

FAQ

Q: How about your main products?
A: Our product lines include Switches, Routers, SFP Modules, OLTs, SDHs, Network Modules, Interface Cards, Security Firewalls, Wireless AP etc.

Q: What brand of products do you offer?
A: We can supply all the brands you need.

Q: what services can we provide?
A:Accepted Delivery Terms: FOB,CFR,EXW,FCA;
   Accepted Payment Currency:USD,EUR,CAD,HKD,GBP,CNY;
   Accepted Payment Type: T/T,MoneyGram,PayPal,Western Union,Cash etc...

Q: Can we get free samples?
A: Sorry, it is not available, but you can pay for one.

Q. How can we guarantee quality?
A:Always a pre-production sample before mass production;
   Always final Inspection before shipment;

Q: How about your delivery time?
A: Generally, it will take 1 to 10 days after receiving your deposit.  The specific delivery time depends on the items and the quantity of your order.

Q: Do you test all your goods?
A: Yes, We have professional engineer to test all devices before shipping.

Q:How about the MOQ?
A:1 piece

Send your message to this supplier

*From:
*To:
*Message:

Enter between 20 to 4,000 characters.

This is not what you are looking for? Post a Sourcing Request Now
Contact Supplier