loading

We provide customers with various communication products at reasonable prices and high quality products and services

Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 1
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 2
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 3
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 4
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 5
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 1
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 2
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 3
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 4
Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 5

Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System

    oops...!

    no product data.

    Go to homepage
    Use
    other
    Place of Origin
    Guangdong, China
    Type
    Enterprise Firewall
    Products Description

     

    HiSecEngine AntiDDoS12000 series provides up to 2.4Tbps security protection performance and service expansion capabilities, ideal for mitigating heavy-traffic DDoS attacks. It can also effectively defend against and block hundreds of complex attacks in seconds or even milliseconds, ensuring customers' service continuity.
    Details Images
    Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 6
    Antiddos12004 Hisecengine Antiddos12000 Series Ddos Defense System 7
    Specification
     
    Model
    AntiDDoS12004
    AntiDDoS12008
    AntiDDoS12016
    Max Defense Bandwidth
    400 Gbps
    1.2 Tbps
    2.4 Tbps
    Max Defense Packet Rate
    300 Mpps
    900 Mpps
    1800 Mpps
    Expansion Slots
    4
    8
    16
    Expansion Interfaces
    • 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
    • 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
    • 24-port 10GBase-SFP+ + 2-port 40G/100GBase-QSFP28
    • 48-port 10GBase-SFP+
    • 48-port 10GBase-SFP+
    • 48-port 10GBase-SFP+
     
    • 4-port 400GBase-QSFP
    • 4-port 400GBase-QSFP
     
    • 12-port 40G/100GBase-QSFP28
    • 12-port 40G/100GBase-QSFP28
     
    (Only four ports are provided by default. If needed, you can purchase 100G interface expansion RTUs for capacity expansion. Only a
    maximum of two ports can be added.)
    (Only four ports are provided by default. If needed, you can purchase 100G interface expansion RTUs for capacity expansion. Only a
    maximum of two ports can be added.)
    Dimensions (H x W x D)
    438 mm × 442 mm × 874 mm (9.8U)
    703 mm x 442 mm × 874 mm (15.8U)
    1436 mm x 442 mm x 1033 mm (32.3U)
    DDoS Defense Specifications
    • Defense against malformed-packet attacks
    Defense against LAND, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
     
    • Defense against scanning and sniffing attacks
    Defense against port scan and IP sweep attacks, and attacks using Tracert packets and IP options, such as IP source route, IP
    timestamp, and IP route record options
     
    • Defense against network-layer flood attacks
    Defense against common network-layer flood attacks, such as SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP
    Fragment flood, TCP Malformed flood, UDP flood, UDP Malformed, UDP Fragment flood, IP flood, ICMP Fragment flood, ICMP flood,
    Other flood, carpet-bombing flood, and pulse-wave attacks
     
    • Defense against session-layer attacks
    Defense against common session-layer attacks, such as real-source SYN flood, real-source ACK flood, TCP connection exhaustion,
    sockstress, and TCP null connection attacks
     
    • Defense against UDP reflection attacks
    Static rules for filtering common UDP amplification attacks, such as NTP, DNS, SSDP, CLDAP, Memcached, Chargen, SNMP and WSD
    Dynamic generation of filtering rules to defend against new UDP amplification attacks
     
    • Defense against TCP reflection attacks
    Static filtering rules that are created based on network-layer characteristics
    TCP reflection attack filtering rules that are dynamically generated
     
    • Defense against TCP replay attacks
    Static filtering rules that are created based on network-layer characteristics
    TCP replay attack filtering rules that are dynamically generated
     
    • Defense against application-layer attacks (HTTP)
    Defense against high-frequency application-layer attacks (HTTP and HTTP CC attacks) based on behavior analysis
    Defense against low-frequency application-layer attacks (HTTP and HTTP CC attacks) based on machine learning
    Defense against slow-rate HTTP attacks based on behavior analysis, including HTTP slow header, HTTP slow post, RUDY, LOIC, HTTP
    multi-methods, HTTP Range request amplification, and HTTP null connection attacks
     
    • Defense against HTTPS/TLS encrypted application-layer attacks
    Defense against high-frequency HTTPS/TLS encrypted attacks
    Defense against slow-rate incomplete TLS session and null connection attacks
     
    • Defense against application-layer attacks (DNS)
    Defense against DNS Malformed, DNS query flood, NXDomain flood, DNS reply flood, and DNS cache poisoning attacks
    Source-based rate limiting and domain name–based rate limiting
     
    • Defense against application-layer attacks (SIP)
    Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks
    Source-based rate limiting
     
    • User-defined filtering rules
    User-defined filtering rules for local software and hardware, as well as BGP FlowSpec rules for remote filtering. The fields can
    be customized, including source/destination IP address, packet length, IP protocol, IP payload, source/destination port, TCP flag
    bit, TCP payload, UDP payload, ICMP payload, DNS domain name, HTTP URI, HTTP field user-agent, as well as caller and callee in the
    SIP protocol.
     
    • Geographical location filtering
    The blocking policy can be customized. For countries outside china, blocking policies can be customized based on country. In
    China, blocking policies can be customized based on province.
     
    • Dual-stack defense
    IPv4/IPv6 dual-stack defense against DDoS attacks
     
    • Automatic tuning of defense policies
    Attack traffic snapshot, defense effect evaluation, and automatic tuning of defense policies
    Automatic attack evidence collection
     
    • Baseline learning
    Support for dynamic traffic baseline learning and learning period configuration
     
    • Packet capture-based evidence collection
    Automatic packet capture based on attack events and user-defined ACLs for packet capture
    Online parsing and analysis, source tracing, and local analysis after downloading for captured packets


    Why Choose Us

    1.Table And Wide Supply Chain System
    We have established a perfect supply chain system to provide a wide range of products with reliable quality and reasonable price.

    2.Competitive Price

    We ensure the most competitive price.Warm reminders here, telecommunications equipment configuration is quite different, the price show

    3.Safe And Easy Payment Solutions

    We support a variety of payment methods, such as T/T, credit card, et

    4.Strong Pre-Sales And After-Sales Services

    To provide customers with professional pre- sales service, as well as after-sales technical Services

    5.More Than 20 Years Industry Experience

    We have been engaged in this industry more than 20 years, we have rich industry experience.

    6.Fast Delivery And Shipping

    Fast, professional and reliable delivery.

    FAQ

    Q: How about your main products?
    A:Our product lines include Switches.Routers,OLTs,SDHs. Network Modules, Interface Cards, Security Firewalls, Wireless AP etc.


    Q: What brand of products do you offer?
    A:We are devoted to offering Huawei, ZTE, Cisco, Ruijie and other network equipment brands

    Q:Can we get free samples?
    A: Sorry, it is not available, but you can pay for one.

    Q: What trade terms do you use ?
    A: We offer EXW.FOB,CIF and CNF or as your request.

    Q: How about your delivery time?
    A:Generally, it will take 1 to 10 days after receiving your deposit. The specific delivery time depends on the items and the quantity of your order.

    Q: Do you test all your goods?
    A:Yes we have professional engineer to test all devices before shipping.
     
    Get in touch with us
    just leave your email or phone number in the contact form so we can send you a free quote for our wide range of designs
    Related Products
    no data
    Tel: +86 18328719811

    We provide customers with various communication products at reasonable prices and high quality products and services

    Contact with us
    Contact person: Dou Mao
    WhatsApp: +86 18328719811
    Add: 

    Flat/Rm P, 4/F, Lladro Centre, 72 Hoi Yuen Road, Kwun Tong, Hong Kong, China

    Copyright © 2025 Intelligent Network INT Limited  | Sitemap | Privacy Policy
    Customer service
    detect