Huawei Traffic Cleaning Solution

Size: px
Start display at page:

Download "Huawei Traffic Cleaning Solution"

Transcription

1 Huawei Traffic Cleaning Solution Copyright Huawei Technologies Co., Ltd All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademark Notice, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd. Other trademarks, product, service and company names mentioned are the property of their respective owners. General Disclaimer The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.

2 1 1.1 Introduction T h e m o d e r n w o r l d i s w i t n e s s i n g exponential growth of attacks. For example, in 2010 alone the rate of distributed denial-of-service (DDoS) traffic attacks on bandwidth was 100 Gbit/s, a 1000% increase compared with that in These emerging attacks target specific application-layer protocols, such as HTTP, HTTPS, SIP, and DNS. These new technologies and deep understanding on customer requirements, Huawei has devised a traffic cleaning solution able to secure customers' s while simplifying their management needs. The solution is specifically tailored for: Large and medium-sized enterprises Internet data centers (IDCs) Internet service providers (ISPs, including web portals, game service providers, and DNS service providers) Detecting center Acting like the "eyes" of the solution, the detecting center monitors traffic based on certain detection policies and reports abnormalities to the management center. Cleaning center Acting like the "heart" of the solution, the cleaning center receives instructions from the management center and cleans abnormal traffic based on traffic diversion policies. Management center Acting like the "brain" of the solution, the management center formulates detecting and cleaning policies, controls detecting and cleaning devices, and generates attack reports and cleaning logs. 1.3 Hardware The following figure shows detecting and 2 malicious attacks render conventional cleaning devices involved in the solution. flow devices ineffective. Consequently, customers are faced with the following problems: 1.2 Solution 160G How to withstand massive flooding and The Huawei traffic cleaning solution can application-layer attacks while securing the be divided into three centers, as shown in the following figure. 20G detecting board 20G cleaning board How to maximize investments on DDoS defense while reducing maintenance costs 10G detecting board 10G cleaning board E8080E E8016E Based on long-accumulated security 6G 6G detecting board 6G cleaning board E1000E-I (detecting device) E1000E-D (cleaning device) E1000E-I (detecting device) E1000E-D (cleaning device) Internet Management Security protection for small- and medium-sized enterprises. Security protection for IDCs/ large- and medium-sized enterprises The E1000E provides a gigabit-level cleaning capacity to secure services for small- and medium-sized Traffic Cleaning Solution Traffic Cleaning Solution enterprises (SMEs). The following table lists two models of the E1000E. Intranet Detecting Cleaning E1000E-I Detecting device E1000E-D Cleaning device

3 3 6G/10G An E8000E service board, coupled with a distributed E8000E series chassis, provides a cleaning capacity of 160 Gbit/s. The following table lists two models of the E8000E. 1.4 Features I n d u s t r y s H i g h e s t Performance to Secure the Network High Performance Attack traffic Legitimate traffic With an industry-leading processing capacity of 160 Gbit/s per chassis, the solution can withstand large-scale attacks. Advanced architecture Built on the processor (NP), multicore CPU, and distributed architecture, the detecting and cleaning centers provide linear capacity expansion capability to overcome bottlenecks in processing performance. High capacity The solution provides fine-grained Static filtering Whitelist Blacklist UDP Flood ICMP Flood DNS Flood Malformed packet filtering Transport layer source validity authentication LAND attack SYN Flood Fraggle attack ACK Flood Winnuke SYN-ACK Flood Ping of Death TCP Fragment Flood Tear Drop Invalid TCP flag attack Super large ICMP attack 20G protection for 2000 VIP customers and 10,000 IP addresses and provides coarse-grained protection for 1 million IP addresses. Highest Detection Rate With DPI technology and a solid 7-layer defense structure, the solution can efficiently prevent various attacks from occurring. Deep Packet Inspection (DPI) Unlike conventional Netflow-based devices, Huawei s detecting devices use DPI technology to analyze every byte inside packets, and use the 7-layer defense structure to effectively identify attack types, including traffic, application-layer, scanning and snooping, and malformed packet attacks. Dynamic analysis Source validity authentication HTTP Flood HTTPS Flood DNS Query Flood DNS Reply Flood SIP Flood Sessionbased cleaning Behavior analysis Connection exhaustion CC attack attack UDP Flood DNS cache poisoning DNS reflection attack Slow connection attack Retransmission attack Slow start attack Traffic shaping Forwarding Avoid congestion to the target IPv6 attack defense The solution supports IPv6/IPv4 dual stack to defend against IPv4 and IPv6 attacks simultaneously, secure the IPv4-to-IPv6 transition, and reduce transition costs. Quick Attack Response The solution detects and cleans abnormal traffic within seconds to ensure service continuity. Fast detection Conventional flow-based detecting devices analyze -wide router logs, which takes long time to detect attacks. Huawei s detecting devices use the DPI technology to capture attack characteristics in real time and detect attacks within seconds. Quick response The synchronization of sessions and detection results between detecting and cleaning centers enables the solution to respond to attacks within seconds (less than 10 seconds). High Reliability Reliable platform Hardware platform: 1+1 main processing engines 3+1 switching boards Key component (power module and fan) redundancy Core router-class service stability Versatile Routing Platform (VRP): Independent modules with little impact on each other 4 million devices on live s Reliable system The solution ensures 500,000 hours of mean time between failures (MTBF) and % reliability through: Inter-board load balancing Cross-board interface binding Two-node cluster hot backup Industry s Easiest Solution to Simplify the Management Easy Management and Low OPEX Graphical management T h e s o l u t i o n p r o v i d e s a f l e x i b l e graphical user interface which simplifies configuration and maintenance and reduces operating expenses (OPEX). Flexible evidence collection methods For security audit, the solution collects evidences in either of the following ways: Packet capture based on access control lists (ACLs) Automatic packet capture based on the types of attack events Centralized management The solution manages distributed peripheral devices in a centralized and simplified mode, which decreases management servers and significantly reduces maintenance costs. Easy Expansion and Low Expansion Cost Software license upgrade The E1000E supports software license upgrades to expand the cleaning capacity without adding hardware, which thereby greatly reduces costs. Smooth upgrade The E1000E supports smooth capacity expansion. Linear expansion The E1000E supports a maximum of eight service boards per chassis. Users can add service boards to expand the capacity. The expansion mode improves investment efficiency and reduces capacity expansion 4

4 5 costs. Cost-saving Traffic detecting and cleaning devices share the same chassis, which effectively saves on customers' investment. 1.5 Application Scenarios IDC Security The service-rich IDC with egress bandwidth is vulnerable to flooding attacks and application-layer attacks. Provides a processing capacity of 160 Gbit/s per chassis and quick response (within seconds). Withstands over 30 types of DDoS attacks, including e.g. : UDP Flood attacks CC attacks HTTP Flood attacks HTTPS Flood attacks DNS attacks Slow attacks attacks, including e.g. : UDP Flood attacks CC attacks HTTP Flood attacks Slow link attacks TCP retransmission attacks The following figure shows the anti-ddos of a web portal or game website. 6 Carrier 2 Carrier 1 Internet DDoS cleaning center Game server zone Web server zone Web Portal or Game Server Security Web portals or game servers with egress bandwidth are vulnerable to flooding DDoS cleaning center Service area 3 Hosted server Hosted server Hosted server Service area 1 Service area 2 attacks and application-layer attacks. Provides a processing capacity of 160 Gbit/s per chassis and quick response (within seconds). Withstands over 30 types of DDoS Enterprise Network Egress Security Large and medium-sized enterprises build s or rent links (about 10 GB) to enable office automation (OA) and internal communication, which is vulnerable to DDoS attacks. Withstands over 30 types of DDoS attacks, particularly those attacks aimed at OA Mail server zone s, including: UDP Flood attacks HTTP Flood attacks TCP Flood attacks The following figure shows the anti-ddos of an enterprise.

5 7 Carrier 1 Carrier 2 Detecting firewall Trust zone DDoS defense firewall DMZ 8 Cleaning Office area Living area DNS Security attacks, particularly those attacks aimed at DNS services, including: Online Service Security Online services are vulnerable to DDoS attacks. These attacks severely compromise a service provider s customer base, financial security, and reputation. Withstands over 30 types of DDoS attacks, particularly those attacks aimed at online transaction systems, including: HTTP Flood attacks HTTPS Flood attacks CC attacks Slow link attacks DNS servers, a vital part of the Internet infrastructure, are often subject to DDoS attacks, which brings serious consequences onto its customers whom have shown vested interests in securing their DNS services. Withstands over 30 types of DDoS DNS attacks (DNS Query and Reply Flood) DNS cache poisoning UDP Flood attacks Provides the Top N DNS cache function to alleviate the DNS server's pressure in coping with attacks. The following figure shows the anti-ddos of a DNS sever. DNS attacks (DNS Query and Reply Flood) The following figure shows the anti-ddos of online services. Internet DDoS Cleaning DNS Server Management

6 9 1.6 Product Specifications Model E1000E-I/D Number of slots For a 1 U device: 4 pairs of GE optical/electrical (mutually exclusive) interfaces 2 USB 2.0 interfaces Detecting and cleaning capacity 4G Model Eudemon8080E Eudemon8160E Number of slots 8 slots, a maximum of 4 detecting/ cleaning boards and 4 interface boards 16 slots, a maximum of 8 detecting/ cleaning boards and 8 interface boards Detecting and cleaning capacity 80G 160G Protected IP addresses Protected targets: 2000 IP addresses (fine-grained protection): 10,000 IP addresses (coarse-grained protection): 1 million 10 Protected destination IP addresses Protected targets: 400 Preventable DDoS attacks (Applicable to IPv4, IPv6, and IPv4- IPv6 s) IP addresses (fine-grained protection): 2048 Traffic-type attacks SYN Flood ACK Flood SYN-ACK Flood FIN/RST Flood IP Fragment Flood UDP Flood ICMP Flood Smurf attack Application-layer attacks Connection Flood DNS Query Flood DNS Reply Flood DNS cache poisoning HTTP Get /Post Flood CC attack SIP Flood HTTPS Flood Scanning and snooping attacks Port scanning Address scanning Tracert packet IP source routing option attack IP timestamp option attack IP routing record option attack Malformed packet attacks IP Spoofing LAND attack Fraggle attack Winnuke Ping of Death Tear Drop IP Option control IP fragment control packet Invalid TCP flag attack Super large ICMP control packet ICMP redirect packet ICMP unreachable packet Preventable DDoS attacks (Applicable to IPv4, IPv6, and IPv4-IPv6 s) Reliability Traffic-type attacks Scanning and snooping attacks SYN Flood Port scanning ACK Flood Address scanning SYN-ACK Flood Tracert packet FIN/RST Flood IP source routing option attack IP Fragment Flood IP timestamp option attack UDP Flood IP routing record option attack ICMP Flood Smurf attack Application-layer attacks Connection Flood DNS Query Flood DNS Reply Flood HTTP Get /Post Flood Malformed packet attacks IP Spoofing LAND attack Fraggle attack Winnuke Ping of Death Tear Drop CC attack IP Option control SIP Flood IP fragment control packet HTTPS Flood Invalid TCP flag attack Super large ICMP control packet ICMP redirect packet ICMP unreachable packet Module/Component hot swap, two-node cluster hot backup, link aggregation, and 1+1 main processing engines Reliability Interface board type Dimensions (W x D x H) Weight Power Mean time between failures (MTBF) Dual power modules and fans 2 expansion slots that support 4*FE RJ45 connectors and 2*GE Combo connectors 436 x 560 x 44.2 mm 10 kg 100 W years Interface board type Ethernet interface 1 x 10GE, 12 x 1G (optical/electrical) card P O S i n t e r f a c e 1 x 10G card Maximum interfaces Ethernet interface 8 x 12 x 1GE, 8 x 16 x 12 x 1GE, 16 x 10GE 10GE POS interface 8 x 10G 16 x 10G

7 11 Model Eudemon8080E Eudemon8160E Dimensions (W x D x H) 442 x 669 x 886 mm 442 x 669 x 1600 mm Weight 100 kg 150 kg Power 700 W 900 W MTBF 57 years 57 years Traffic statistics and limit Global packet capture attack event packet capture Abnormal event packet capture Static fingerprint Global feature filtering 12 Attack logs Model Traffic cleaning service board Abnormal logs Detecting capacity (max.) Cleaning capacity (max.) 20 Gbit/s 20 Gbit/s 1.7 Order Information Response delay DDoS Attack Defense Defense against attacks based on protection targets SYN Flood defense 10 seconds Model E1000E-I/D SU4Z1ADGD Description E1000E anti-ddos cleaning host, AC, 2G license SYN-ACK Flood defense ACK Flood defense SU4Z2ADGD E1000E anti-ddos cleaning host, DC, 2G license HTTP Flood defense SU4Z1ADGI E1000E anti-ddos detecting host, AC HTTPS Flood defense DNS Request Flood defense SU4Z2ADGI E1000E anti-ddos detecting host, DC DNS Reply Flood defense FWEM0004FE02 4-port 100 M Ethernet electrical interface module (RJ45) SIP Flood defense FWBM12GE 2-port 1000 M Ethernet electrical interface module (RJ45 and SFP) RST Flood/FIN Flood defense UDP Flood defense IP Fragment Flood defense Non-TCP/UDP/ICMP protocol packet flood defense CC attack defense LSU4ADGD01 ATIC3-WINDOWS E8000E Anti-DDoS E8080E-BUNDLE-AC License used to expand the anti-ddos cleaning capacity of the E1000E to 4G Software suite, ATIC management system installation package, DVD Eudemon8080E AC: 1 chassis, 2 power modules, 2 SRUs, 2 switch boards, 4 1G memory modules, 4 CF cards Connection flood defense E8080E-BUNDLE-DC Eudemon8080E DC: 1 chassis, 2 power modules, 2 SRUs, 2 switch boards, 4 1G memory modules, 4 CF cards

8 13 Model FWCD10GDDD01 FWCD10GDDC01 FWCD20GDDD01 Description Service processing unit, 10G detecting capacity Service processing unit, 10G cleaning capacity Service processing unit, 20G detecting capacity 14 FWCD20GDDC01 Service processing unit, 20G cleaning capacity FWCD10GDDU01 Plug-in board used to expand the anti-ddos detecting capacity from 10G to 20G FWCD10GDCU01 Plug-in board used to expand the anti-ddos cleaning capacity from 10G to 20G FWC2LPUKD1 Flexible card line processing unit (LPUF-21, two sub-slots) FWC2L1XX01 1-port 10GBase WAN/LAN-XFP flexible sub-card FWC2EBGF01 12-port 100/1000Base-X-SFP flexible sub-card FWC2EBGE01 12-port 10/100/1000Base-TX-RJ45 flexible sub-card FWC2P1XXBZ0 1-port OC-192c/STM-64c POS-XFP flexible sub-card FWCS00NOFA00 DDoS management center, a collection of functions for non-carrier customers FWCS00DOFA00 DDoS management center, a collection of functions for carriers FWCS00LCOP00 Data collector FWCS00BMOD00 DDoS management center-basic modules FWCS00STAT00 DDoS management center-statistical report management FWCS00ALAM00 DDoS management center-alarm management FWCS00PCAM00 DDoS management center-packet capture analysis management FWCS00SLHQ00 DDoS management center-self-service query FWCS05DMCL00 DDoS management center license (to add 5 control devices) FWCS10DMCL00 DDoS management center license (to add 10 control devices) FWCS25DMCL00 DDoS management center license (to add 25 control devices) FWCS50DMCL00 DDoS management center license (to add 50 control devices)

Eudemon8000E Anti-DDoS SPU

Eudemon8000E Anti-DDoS SPU Today's network attack varieties and intensities grow exponentially. Distributed Denial of Service (DDoS) attacks in 2010 swallowed 100G bandwidths, experiencing a 1000% increase over 2005. The diversified

More information

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD. Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview Faced with increasingly serious network threats and dramatically increased network traffic, carriers' backbone networks,

More information

AntiDDoS1000 DDoS Protection Systems

AntiDDoS1000 DDoS Protection Systems AntiDDoS1000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

Data Sheet. DPtech Anti-DDoS Series. Overview

Data Sheet. DPtech Anti-DDoS Series. Overview Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to

More information

AntiDDoS8000 DDoS Protection Systems

AntiDDoS8000 DDoS Protection Systems AntiDDoS8000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

HUAWEI TECHNOLOGIES CO., LTD. Anti-DDoS Solution

HUAWEI TECHNOLOGIES CO., LTD. Anti-DDoS Solution HUAWEI TECHNOLOGIES CO., LTD. Anti-DDoS Solution 1 Anti-DDoS Solution Dear Huawei Employees, Heartiest Congratulations to the Huawei team for the successful vision and ingenuity demonstrated in attaining

More information

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against

More information

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD. HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

NIP6300/6600 Next-Generation Intrusion Prevention System

NIP6300/6600 Next-Generation Intrusion Prevention System NIP6300/6600 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices,

More information

Huawei Eudemon200E-N Next-Generation Firewall

Huawei Eudemon200E-N Next-Generation Firewall Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT

More information

DPtech ADX Application Delivery Platform Series

DPtech ADX Application Delivery Platform Series Data Sheet DPtech ADX Series DPtech ADX Application Delivery Platform Series Overview IT requirements for service capability can be summarized as "acceleration", "security" and "reliability". The contradiction

More information

S5700S-LI Series Gigabit Enterprise Switches

S5700S-LI Series Gigabit Enterprise Switches HUAWEIENTERPRI SEUSA,I NC. S5700S-LI Series Gigabit Enterprise Switches Product Overview The S5700S-LI series gigabit enterprise switches (S5700S-LI for short) are next-generation energy-saving switches

More information

USG6600 Next-Generation Firewall

USG6600 Next-Generation Firewall USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

USG6300 Next-Generation Firewall

USG6300 Next-Generation Firewall USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

HUAWEI USG6000 Next-Generation Firewall V100R001. Product Description. Issue 01. Date 2014-10-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI USG6000 Next-Generation Firewall V100R001. Product Description. Issue 01. Date 2014-10-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI USG6000 Next-Generation Firewall V100R001 Issue 01 Date 2014-10-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd. Eudemon 1000E-X Series Firewall Huawei Technologies Co., Ltd. Product Overview With the dramatic increase in threats to networks, users are become ever more concerned by application- and service-based

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Introducing FortiDDoS. Mar, 2013

Introducing FortiDDoS. Mar, 2013 Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

S5700S-LI Series Gigabit Enterprise Switches

S5700S-LI Series Gigabit Enterprise Switches S5700S-LI Series Gigabit Enterprise Switches S5700S-LI Series Gigabit Enterprise Switches Product Overview The S5700S-LI series gigabit enterprise switches (S5700S-LI for short) are next-generation energy-saving

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

CloudEngine Series Data Center Switches. Cloud Fabric Data Center Network Solution

CloudEngine Series Data Center Switches. Cloud Fabric Data Center Network Solution Cloud Fabric Data Center Network Solution Cloud Fabric Data Center Network Solution Product and Solution Overview Huawei CloudEngine (CE) series switches are high-performance cloud switches designed for

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that

More information

Denial of Service Attacks

Denial of Service Attacks 2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,

More information

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be

More information

TDC s perspective on DDoS threats

TDC s perspective on DDoS threats TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Safeguards Against Denial of Service Attacks for IP Phones

Safeguards Against Denial of Service Attacks for IP Phones W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)

More information

NSFOCUS Anti-DDoS System White Paper

NSFOCUS Anti-DDoS System White Paper White Paper NSFOCUS Anti-DDoS System White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect to

More information

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet Huawei Technologies Co., Ltd. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or

More information

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

HUAWEI Tecal E6000 Blade Server

HUAWEI Tecal E6000 Blade Server HUAWEI Tecal E6000 Blade Server Professional Trusted Future-oriented HUAWEI TECHNOLOGIES CO., LTD. The HUAWEI Tecal E6000 is a new-generation server platform that guarantees comprehensive and powerful

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch GTL-2691 Version: 1 Modules are to be ordered separately. 20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch The LevelOne GEL-2691 is a Layer 3 Managed switch with 24 x 1000Base-T ports associated

More information

S5700-LI-BAT Switch Brochure

S5700-LI-BAT Switch Brochure S5700-LI-BAT Switch Brochure S5700-LI-BAT Switch Brochure S5700-LI-BAT Switch Brochure Product Overview Huawei S5700-LI-BAT series battery LAN switches (S5700-LI-BAT for short) are the industry's first

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities

More information

Denial Of Service. Types of attacks

Denial Of Service. Types of attacks Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service

More information

A1.1.1.11.1.1.2 1.1.1.3S B

A1.1.1.11.1.1.2 1.1.1.3S B CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Strategies to Protect Against Distributed Denial of Service (DD

Strategies to Protect Against Distributed Denial of Service (DD Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

S5700-SI Series Gigabit Enterprise Switches

S5700-SI Series Gigabit Enterprise Switches S5700-SI Series Gigabit Enterprise Switches S5700-SI Series Gigabit Enterprise Switches Product Overview The S5700-SI series are gigabit Layer 3 Ethernet switches based on new generation of high-performance

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Why Is DDoS Prevention a Challenge?

Why Is DDoS Prevention a Challenge? ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

Eudemon8000E Series 10-Gigabits IPS security gateway

Eudemon8000E Series 10-Gigabits IPS security gateway Product Overview Product Portfolio Nowadays, network bandwidths increase rapidly, and security threats and attacks also flood on networks. Therefore, enterprise and carriers must ensure the service security

More information

How To Stop A Ddos Attack On A Website From Being Successful

How To Stop A Ddos Attack On A Website From Being Successful White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service

More information

Attack and Defense Techniques

Attack and Defense Techniques Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of

More information

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks:

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks: HiPER 840 4-WAN Broadband Gateway/Router Overview HiPER 840 4-WAN Broadband Gateway/Router is a purpose-built solution designed for small-sized Internet cafés, broadband communities and schools which require

More information

What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0

What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0 What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0 PB458841 Product Overview The Cisco ACE Application Control Engine Module

More information

Frequent Denial of Service Attacks

Frequent Denial of Service Attacks Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:[email protected] Abstract Denial of Service is a well known term in network security world as

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

10 Configuring Packet Filtering and Routing Rules

10 Configuring Packet Filtering and Routing Rules Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring

More information

IxLoad-Attack: Network Security Testing

IxLoad-Attack: Network Security Testing IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience

More information

Content Distribution Networks (CDN)

Content Distribution Networks (CDN) 229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the

More information

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: p.bogaerts@f5.com Mob.: +32 473 654 689 F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application

More information

How To Create A Network Access Control (Nac) Solution

How To Create A Network Access Control (Nac) Solution Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security

More information

DDoS Protection on the Security Gateway

DDoS Protection on the Security Gateway DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

Big Data for Big Security

Big Data for Big Security Big Data for Big Security HUAWEI NEXT GENERATION ANTI-DDOS SOLUTION Index DDOS ATTACK AND DEFENSE INFOGRAPHIC HUAWEI 2013 SECURITY RESEARCH REPORT DDOS PREVENTION BASED ON BIG DATA HUAWEI NEXT GENERATION

More information

Radware s Attack Mitigation Solution On-line Business Protection

Radware s Attack Mitigation Solution On-line Business Protection Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,

More information

1. Firewall Configuration

1. Firewall Configuration 1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

White Paper A10 Thunder and AX Series Load Balancing Security Gateways White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its

More information

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Chapter 15. Firewalls, IDS and IPS

Chapter 15. Firewalls, IDS and IPS Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet

More information

The Product Description of SmartAX. MT882 ADSL2+ Router

The Product Description of SmartAX. MT882 ADSL2+ Router The Product Description of SmartAX MT882 ADSL2+ Router HUAWEI Huawei Technologies Co., Ltd Table of Contents Product Description...1 1. Preface...1 2. Highlights...1 3. Features and Benefits...2 4. Technical

More information

Brocade NetIron Denial of Service Prevention

Brocade NetIron Denial of Service Prevention White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron

More information

Realize Your Potential. S6700 Series 10G Switches

Realize Your Potential. S6700 Series 10G Switches Realize Your Potential S6700 Series 10G Switches S6700 Series 10G Switches Product Overview The S6700 series switches (S6700s) are next-generation 10G box switches. The S6700 can function as an access

More information

Load Balancing Security Gateways WHITE PAPER

Load Balancing Security Gateways WHITE PAPER Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...

More information

HUAWEI. Quidway Eudemon Series Firewall HUAWEI

HUAWEI. Quidway Eudemon Series Firewall HUAWEI HUAWEI T e c h n o l o g i e s Quidway Eudemon Series Firewall HUAWEI H U A W E I T E C H N O L O G I E S Quidway Eudemon Series Firewall Introduction Quidway Eudemon Series firewall is Huawei's new generation

More information

Huawei NE5000E 400Gbps Flexible Line Processing Unit

Huawei NE5000E 400Gbps Flexible Line Processing Unit Huawei NE5000E 400Gbps Flexible Line Processing Unit Huawei NE5000E 400Gbps Flexible Line Processing Unit Overview The Huawei NetEngine5000E router (NE5000E) is a high-end IP core network router. It is

More information

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1 Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,

More information

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

FortiDDos Size isn t everything

FortiDDos Size isn t everything FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information