loading

We provide customers with various communication products at reasonable prices and high quality products and services

Antiddos1910 Network Security Hisecengine Ddos Defense System 1
Antiddos1910 Network Security Hisecengine Ddos Defense System 1

Antiddos1910 Network Security Hisecengine Ddos Defense System

    oops...!

    no product data.

    Go to homepage
    Place of Origin
    Guangdong, China
    Products Description

     

    The HW AntiDDoS1000 DDoS protection system utilizes Big Data analytics technology and supports modeling for 60+ types of network traffic to offer second-level attack response and comprehensive defense against 100+ types of attacks. The AntiDDoS1000 can be deployed on a user network using in-line mode to defend against volumetric and application attacks in real time.
     
    When attack traffic exceeds the bandwidth or defense capability of a local scrubbing device, the AntiDDoS1000 associates with the AntiDDoS device of the upstream carrier or ISP to defend against flood attacks and guarantee service continuity.
    Details Images
    Antiddos1910 Network Security Hisecengine Ddos Defense System 2
    Antiddos1910 Network Security Hisecengine Ddos Defense System 3
    Specification
    Model
    AntiDDoS1905
    AntiDDoS1908
    Standard interface
    8×GE COMBO + 4×GE RJ45 + 4×GE SFP + 6×10GE SFP+
    4 x 100G/40G+16 x 25G/10G(25G/100G COMBO)+8 x 10G/GE
    Deployment mode
    In-line; off-line (static defense); off-line (Dynamic defense)
    Function
    Options for detecting or cleaning
    Options for detecting or cleaning, or both
    Height x Width x Depth
    43.6 mm × 442 mm × 420 mm (1U)
    43.6 mm x 442 mm x 600 mm (1U)
    DDoS Defense Specifications
    Defense against malformed-packet attacks
    Defense against LAND, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
    Defense against scanning and sniffing attacks
    Defense against port scan and IP sweep attacks, and attacks using Tracert packets and IP options, such as IP source route, IP
    timestamp, and IP route record options
    Defense against network-layer flood attacks
    Defense against common network-layer flood attacks, such as SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP
    Fragment flood, TCP Malformed flood, UDP flood, UDP Malformed, UDP Fragment flood, IP flood, ICMP Fragment flood and ICMP flood
    attacks, sweeping segment flooding, and pulse-wave attacks
    Defense against session-layer attacks
    Defense against common session-layer attacks, such as real-source SYN flood, real-source ACK flood, TCP connection exhaustion,
    sockstress, and TCP null connection attacks
    Defense against UDP reflection attacks
    Static rules for filtering common UDP amplification attacks, such as NTP, DNS, SSDP, CLDAP, Memcached, Chargen, SNMP and WSD
    Dynamic generation of filtering rules to defend against new UDP amplification attacks
    Defense against TCP reflection attacks
    Static filtering rules that are created based on network-layer characteristics
    TCP reflection attack filtering rules that are dynamically generated
    Defense against TCP replay attacks
    Static filtering rules that are created based on network-layer characteristics
    TCP replay attack filtering rules that are dynamically generated
    Defense against application-layer attacks (HTTP)
    Defense against high-frequency application-layer attacks (HTTP and HTTP CC attacks) based on behavior analysis
    Defense against low-frequency application-layer attacks (HTTP and HTTP CC attacks) based on machine learning
    Defense against slow-rate HTTP attacks based on behavior analysis, including HTTP slow header, HTTP slow post, RUDY, LOIC, HTTP
    multi-methods, HTTP Range request amplification, and HTTP null connection attacks
    Defense against HTTPS/TLS encrypted application-layer attacks
    Defense against high-frequency HTTPS/TLS encrypted attacks
    Defense against slow-rate incomplete TLS session and null connection attacks
    Defense against application-layer attacks (DNS)
    Defense against DNS Malformed, DNS query flood, NXDomain flood, DNS reply flood, and DNS cache poisoning attacks
    Source-based rate limiting and domain name–based rate limiting
    Defense against application-layer attacks (SIP)
    Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks
    Source-based rate limiting
    User-defined filtering rules
    User-defined filtering rules for local software and hardware, as well as BGP FlowSpec rules for remote filtering. The fields can
    be customized, including source/destination IP address, packet length, IP protocol, IP payload, source/destination port, TCP flag
    bit, TCP payload, UDP payload, ICMP payload, DNS domain name, HTTP URI, HTTP field user-agent, as well as caller and callee in the
    SIP protocol.
    Dual-stack defense
    IPv4/IPv6 dual-stack defense against DDoS attacks
    Automatic tuning of defense policies
    Attack traffic snapshot, defense effect evaluation, and automatic tuning of defense policies
    Automatic attack evidence collection
    Baseline learning
    Support for dynamic traffic baseline learning and learning period configuration
    Packet capture-based evidence collection
    Automatic packet capture based on attack events and user-defined ACLs for packet capture
    Online parsing and analysis, source tracing, and local analysis after downloading for captured packets


    Why Choose Us

    1.Table And Wide Supply Chain System
    We have established a perfect supply chain system to provide a wide range of products with reliable quality and reasonable price.

    2.Competitive Price

    We ensure the most competitive price.Warm reminders here, telecommunications equipment configuration is quite different, the price show

    3.Safe And Easy Payment Solutions

    We support a variety of payment methods, such as T/T, credit card, et

    4.Strong Pre-Sales And After-Sales Services

    To provide customers with professional pre- sales service, as well as after-sales technical Services

    5.More Than 20 Years Industry Experience

    We have been engaged in this industry more than 20 years, we have rich industry experience.

    6.Fast Delivery And Shipping

    Fast, professional and reliable delivery.

    FAQ

    Q: How about your main products?
    A:Our product lines include Switches.Routers,OLTs,SDHs. Network Modules, Interface Cards, Security Firewalls, Wireless AP etc.


    Q: What brand of products do you offer?
    A:We are devoted to offering Huawei, ZTE, Cisco, Ruijie and other network equipment brands

    Q:Can we get free samples?
    A: Sorry, it is not available, but you can pay for one.

    Q: What trade terms do you use ?
    A: We offer EXW.FOB,CIF and CNF or as your request.

    Q: How about your delivery time?
    A:Generally, it will take 1 to 10 days after receiving your deposit. The specific delivery time depends on the items and the quantity of your order.

    Q: Do you test all your goods?
    A:Yes we have professional engineer to test all devices before shipping.
     
    Get in touch with us
    just leave your email or phone number in the contact form so we can send you a free quote for our wide range of designs
    Related Products
    no data
    Tel: +86 18328719811

    We provide customers with various communication products at reasonable prices and high quality products and services

    Contact with us
    Contact person: Dou Mao
    WhatsApp: +86 18328719811
    Add: 

    Flat/Rm P, 4/F, Lladro Centre, 72 Hoi Yuen Road, Kwun Tong, Hong Kong, China

    Copyright © 2025 Intelligent Network INT Limited  | Sitemap | Privacy Policy
    Customer service
    detect