Huawei Traffic Cleaning Solution
|
|
|
- Annice Fleming
- 10 years ago
- Views:
Transcription
1 Huawei Traffic Cleaning Solution Copyright Huawei Technologies Co., Ltd All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademark Notice, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd. Other trademarks, product, service and company names mentioned are the property of their respective owners. General Disclaimer The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.
2 1 1.1 Introduction T h e m o d e r n w o r l d i s w i t n e s s i n g exponential growth of attacks. For example, in 2010 alone the rate of distributed denial-of-service (DDoS) traffic attacks on bandwidth was 100 Gbit/s, a 1000% increase compared with that in These emerging attacks target specific application-layer protocols, such as HTTP, HTTPS, SIP, and DNS. These new technologies and deep understanding on customer requirements, Huawei has devised a traffic cleaning solution able to secure customers' s while simplifying their management needs. The solution is specifically tailored for: Large and medium-sized enterprises Internet data centers (IDCs) Internet service providers (ISPs, including web portals, game service providers, and DNS service providers) Detecting center Acting like the "eyes" of the solution, the detecting center monitors traffic based on certain detection policies and reports abnormalities to the management center. Cleaning center Acting like the "heart" of the solution, the cleaning center receives instructions from the management center and cleans abnormal traffic based on traffic diversion policies. Management center Acting like the "brain" of the solution, the management center formulates detecting and cleaning policies, controls detecting and cleaning devices, and generates attack reports and cleaning logs. 1.3 Hardware The following figure shows detecting and 2 malicious attacks render conventional cleaning devices involved in the solution. flow devices ineffective. Consequently, customers are faced with the following problems: 1.2 Solution 160G How to withstand massive flooding and The Huawei traffic cleaning solution can application-layer attacks while securing the be divided into three centers, as shown in the following figure. 20G detecting board 20G cleaning board How to maximize investments on DDoS defense while reducing maintenance costs 10G detecting board 10G cleaning board E8080E E8016E Based on long-accumulated security 6G 6G detecting board 6G cleaning board E1000E-I (detecting device) E1000E-D (cleaning device) E1000E-I (detecting device) E1000E-D (cleaning device) Internet Management Security protection for small- and medium-sized enterprises. Security protection for IDCs/ large- and medium-sized enterprises The E1000E provides a gigabit-level cleaning capacity to secure services for small- and medium-sized Traffic Cleaning Solution Traffic Cleaning Solution enterprises (SMEs). The following table lists two models of the E1000E. Intranet Detecting Cleaning E1000E-I Detecting device E1000E-D Cleaning device
3 3 6G/10G An E8000E service board, coupled with a distributed E8000E series chassis, provides a cleaning capacity of 160 Gbit/s. The following table lists two models of the E8000E. 1.4 Features I n d u s t r y s H i g h e s t Performance to Secure the Network High Performance Attack traffic Legitimate traffic With an industry-leading processing capacity of 160 Gbit/s per chassis, the solution can withstand large-scale attacks. Advanced architecture Built on the processor (NP), multicore CPU, and distributed architecture, the detecting and cleaning centers provide linear capacity expansion capability to overcome bottlenecks in processing performance. High capacity The solution provides fine-grained Static filtering Whitelist Blacklist UDP Flood ICMP Flood DNS Flood Malformed packet filtering Transport layer source validity authentication LAND attack SYN Flood Fraggle attack ACK Flood Winnuke SYN-ACK Flood Ping of Death TCP Fragment Flood Tear Drop Invalid TCP flag attack Super large ICMP attack 20G protection for 2000 VIP customers and 10,000 IP addresses and provides coarse-grained protection for 1 million IP addresses. Highest Detection Rate With DPI technology and a solid 7-layer defense structure, the solution can efficiently prevent various attacks from occurring. Deep Packet Inspection (DPI) Unlike conventional Netflow-based devices, Huawei s detecting devices use DPI technology to analyze every byte inside packets, and use the 7-layer defense structure to effectively identify attack types, including traffic, application-layer, scanning and snooping, and malformed packet attacks. Dynamic analysis Source validity authentication HTTP Flood HTTPS Flood DNS Query Flood DNS Reply Flood SIP Flood Sessionbased cleaning Behavior analysis Connection exhaustion CC attack attack UDP Flood DNS cache poisoning DNS reflection attack Slow connection attack Retransmission attack Slow start attack Traffic shaping Forwarding Avoid congestion to the target IPv6 attack defense The solution supports IPv6/IPv4 dual stack to defend against IPv4 and IPv6 attacks simultaneously, secure the IPv4-to-IPv6 transition, and reduce transition costs. Quick Attack Response The solution detects and cleans abnormal traffic within seconds to ensure service continuity. Fast detection Conventional flow-based detecting devices analyze -wide router logs, which takes long time to detect attacks. Huawei s detecting devices use the DPI technology to capture attack characteristics in real time and detect attacks within seconds. Quick response The synchronization of sessions and detection results between detecting and cleaning centers enables the solution to respond to attacks within seconds (less than 10 seconds). High Reliability Reliable platform Hardware platform: 1+1 main processing engines 3+1 switching boards Key component (power module and fan) redundancy Core router-class service stability Versatile Routing Platform (VRP): Independent modules with little impact on each other 4 million devices on live s Reliable system The solution ensures 500,000 hours of mean time between failures (MTBF) and % reliability through: Inter-board load balancing Cross-board interface binding Two-node cluster hot backup Industry s Easiest Solution to Simplify the Management Easy Management and Low OPEX Graphical management T h e s o l u t i o n p r o v i d e s a f l e x i b l e graphical user interface which simplifies configuration and maintenance and reduces operating expenses (OPEX). Flexible evidence collection methods For security audit, the solution collects evidences in either of the following ways: Packet capture based on access control lists (ACLs) Automatic packet capture based on the types of attack events Centralized management The solution manages distributed peripheral devices in a centralized and simplified mode, which decreases management servers and significantly reduces maintenance costs. Easy Expansion and Low Expansion Cost Software license upgrade The E1000E supports software license upgrades to expand the cleaning capacity without adding hardware, which thereby greatly reduces costs. Smooth upgrade The E1000E supports smooth capacity expansion. Linear expansion The E1000E supports a maximum of eight service boards per chassis. Users can add service boards to expand the capacity. The expansion mode improves investment efficiency and reduces capacity expansion 4
4 5 costs. Cost-saving Traffic detecting and cleaning devices share the same chassis, which effectively saves on customers' investment. 1.5 Application Scenarios IDC Security The service-rich IDC with egress bandwidth is vulnerable to flooding attacks and application-layer attacks. Provides a processing capacity of 160 Gbit/s per chassis and quick response (within seconds). Withstands over 30 types of DDoS attacks, including e.g. : UDP Flood attacks CC attacks HTTP Flood attacks HTTPS Flood attacks DNS attacks Slow attacks attacks, including e.g. : UDP Flood attacks CC attacks HTTP Flood attacks Slow link attacks TCP retransmission attacks The following figure shows the anti-ddos of a web portal or game website. 6 Carrier 2 Carrier 1 Internet DDoS cleaning center Game server zone Web server zone Web Portal or Game Server Security Web portals or game servers with egress bandwidth are vulnerable to flooding DDoS cleaning center Service area 3 Hosted server Hosted server Hosted server Service area 1 Service area 2 attacks and application-layer attacks. Provides a processing capacity of 160 Gbit/s per chassis and quick response (within seconds). Withstands over 30 types of DDoS Enterprise Network Egress Security Large and medium-sized enterprises build s or rent links (about 10 GB) to enable office automation (OA) and internal communication, which is vulnerable to DDoS attacks. Withstands over 30 types of DDoS attacks, particularly those attacks aimed at OA Mail server zone s, including: UDP Flood attacks HTTP Flood attacks TCP Flood attacks The following figure shows the anti-ddos of an enterprise.
5 7 Carrier 1 Carrier 2 Detecting firewall Trust zone DDoS defense firewall DMZ 8 Cleaning Office area Living area DNS Security attacks, particularly those attacks aimed at DNS services, including: Online Service Security Online services are vulnerable to DDoS attacks. These attacks severely compromise a service provider s customer base, financial security, and reputation. Withstands over 30 types of DDoS attacks, particularly those attacks aimed at online transaction systems, including: HTTP Flood attacks HTTPS Flood attacks CC attacks Slow link attacks DNS servers, a vital part of the Internet infrastructure, are often subject to DDoS attacks, which brings serious consequences onto its customers whom have shown vested interests in securing their DNS services. Withstands over 30 types of DDoS DNS attacks (DNS Query and Reply Flood) DNS cache poisoning UDP Flood attacks Provides the Top N DNS cache function to alleviate the DNS server's pressure in coping with attacks. The following figure shows the anti-ddos of a DNS sever. DNS attacks (DNS Query and Reply Flood) The following figure shows the anti-ddos of online services. Internet DDoS Cleaning DNS Server Management
6 9 1.6 Product Specifications Model E1000E-I/D Number of slots For a 1 U device: 4 pairs of GE optical/electrical (mutually exclusive) interfaces 2 USB 2.0 interfaces Detecting and cleaning capacity 4G Model Eudemon8080E Eudemon8160E Number of slots 8 slots, a maximum of 4 detecting/ cleaning boards and 4 interface boards 16 slots, a maximum of 8 detecting/ cleaning boards and 8 interface boards Detecting and cleaning capacity 80G 160G Protected IP addresses Protected targets: 2000 IP addresses (fine-grained protection): 10,000 IP addresses (coarse-grained protection): 1 million 10 Protected destination IP addresses Protected targets: 400 Preventable DDoS attacks (Applicable to IPv4, IPv6, and IPv4- IPv6 s) IP addresses (fine-grained protection): 2048 Traffic-type attacks SYN Flood ACK Flood SYN-ACK Flood FIN/RST Flood IP Fragment Flood UDP Flood ICMP Flood Smurf attack Application-layer attacks Connection Flood DNS Query Flood DNS Reply Flood DNS cache poisoning HTTP Get /Post Flood CC attack SIP Flood HTTPS Flood Scanning and snooping attacks Port scanning Address scanning Tracert packet IP source routing option attack IP timestamp option attack IP routing record option attack Malformed packet attacks IP Spoofing LAND attack Fraggle attack Winnuke Ping of Death Tear Drop IP Option control IP fragment control packet Invalid TCP flag attack Super large ICMP control packet ICMP redirect packet ICMP unreachable packet Preventable DDoS attacks (Applicable to IPv4, IPv6, and IPv4-IPv6 s) Reliability Traffic-type attacks Scanning and snooping attacks SYN Flood Port scanning ACK Flood Address scanning SYN-ACK Flood Tracert packet FIN/RST Flood IP source routing option attack IP Fragment Flood IP timestamp option attack UDP Flood IP routing record option attack ICMP Flood Smurf attack Application-layer attacks Connection Flood DNS Query Flood DNS Reply Flood HTTP Get /Post Flood Malformed packet attacks IP Spoofing LAND attack Fraggle attack Winnuke Ping of Death Tear Drop CC attack IP Option control SIP Flood IP fragment control packet HTTPS Flood Invalid TCP flag attack Super large ICMP control packet ICMP redirect packet ICMP unreachable packet Module/Component hot swap, two-node cluster hot backup, link aggregation, and 1+1 main processing engines Reliability Interface board type Dimensions (W x D x H) Weight Power Mean time between failures (MTBF) Dual power modules and fans 2 expansion slots that support 4*FE RJ45 connectors and 2*GE Combo connectors 436 x 560 x 44.2 mm 10 kg 100 W years Interface board type Ethernet interface 1 x 10GE, 12 x 1G (optical/electrical) card P O S i n t e r f a c e 1 x 10G card Maximum interfaces Ethernet interface 8 x 12 x 1GE, 8 x 16 x 12 x 1GE, 16 x 10GE 10GE POS interface 8 x 10G 16 x 10G
7 11 Model Eudemon8080E Eudemon8160E Dimensions (W x D x H) 442 x 669 x 886 mm 442 x 669 x 1600 mm Weight 100 kg 150 kg Power 700 W 900 W MTBF 57 years 57 years Traffic statistics and limit Global packet capture attack event packet capture Abnormal event packet capture Static fingerprint Global feature filtering 12 Attack logs Model Traffic cleaning service board Abnormal logs Detecting capacity (max.) Cleaning capacity (max.) 20 Gbit/s 20 Gbit/s 1.7 Order Information Response delay DDoS Attack Defense Defense against attacks based on protection targets SYN Flood defense 10 seconds Model E1000E-I/D SU4Z1ADGD Description E1000E anti-ddos cleaning host, AC, 2G license SYN-ACK Flood defense ACK Flood defense SU4Z2ADGD E1000E anti-ddos cleaning host, DC, 2G license HTTP Flood defense SU4Z1ADGI E1000E anti-ddos detecting host, AC HTTPS Flood defense DNS Request Flood defense SU4Z2ADGI E1000E anti-ddos detecting host, DC DNS Reply Flood defense FWEM0004FE02 4-port 100 M Ethernet electrical interface module (RJ45) SIP Flood defense FWBM12GE 2-port 1000 M Ethernet electrical interface module (RJ45 and SFP) RST Flood/FIN Flood defense UDP Flood defense IP Fragment Flood defense Non-TCP/UDP/ICMP protocol packet flood defense CC attack defense LSU4ADGD01 ATIC3-WINDOWS E8000E Anti-DDoS E8080E-BUNDLE-AC License used to expand the anti-ddos cleaning capacity of the E1000E to 4G Software suite, ATIC management system installation package, DVD Eudemon8080E AC: 1 chassis, 2 power modules, 2 SRUs, 2 switch boards, 4 1G memory modules, 4 CF cards Connection flood defense E8080E-BUNDLE-DC Eudemon8080E DC: 1 chassis, 2 power modules, 2 SRUs, 2 switch boards, 4 1G memory modules, 4 CF cards
8 13 Model FWCD10GDDD01 FWCD10GDDC01 FWCD20GDDD01 Description Service processing unit, 10G detecting capacity Service processing unit, 10G cleaning capacity Service processing unit, 20G detecting capacity 14 FWCD20GDDC01 Service processing unit, 20G cleaning capacity FWCD10GDDU01 Plug-in board used to expand the anti-ddos detecting capacity from 10G to 20G FWCD10GDCU01 Plug-in board used to expand the anti-ddos cleaning capacity from 10G to 20G FWC2LPUKD1 Flexible card line processing unit (LPUF-21, two sub-slots) FWC2L1XX01 1-port 10GBase WAN/LAN-XFP flexible sub-card FWC2EBGF01 12-port 100/1000Base-X-SFP flexible sub-card FWC2EBGE01 12-port 10/100/1000Base-TX-RJ45 flexible sub-card FWC2P1XXBZ0 1-port OC-192c/STM-64c POS-XFP flexible sub-card FWCS00NOFA00 DDoS management center, a collection of functions for non-carrier customers FWCS00DOFA00 DDoS management center, a collection of functions for carriers FWCS00LCOP00 Data collector FWCS00BMOD00 DDoS management center-basic modules FWCS00STAT00 DDoS management center-statistical report management FWCS00ALAM00 DDoS management center-alarm management FWCS00PCAM00 DDoS management center-packet capture analysis management FWCS00SLHQ00 DDoS management center-self-service query FWCS05DMCL00 DDoS management center license (to add 5 control devices) FWCS10DMCL00 DDoS management center license (to add 10 control devices) FWCS25DMCL00 DDoS management center license (to add 25 control devices) FWCS50DMCL00 DDoS management center license (to add 50 control devices)
Eudemon8000E Anti-DDoS SPU
Today's network attack varieties and intensities grow exponentially. Distributed Denial of Service (DDoS) attacks in 2010 swallowed 100G bandwidths, experiencing a 1000% increase over 2005. The diversified
Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.
Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview Faced with increasingly serious network threats and dramatically increased network traffic, carriers' backbone networks,
AntiDDoS1000 DDoS Protection Systems
AntiDDoS1000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.
Data Sheet. DPtech Anti-DDoS Series. Overview
Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to
AntiDDoS8000 DDoS Protection Systems
AntiDDoS8000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.
HUAWEI TECHNOLOGIES CO., LTD. Anti-DDoS Solution
HUAWEI TECHNOLOGIES CO., LTD. Anti-DDoS Solution 1 Anti-DDoS Solution Dear Huawei Employees, Heartiest Congratulations to the Huawei team for the successful vision and ingenuity demonstrated in attaining
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
NIP6300/6600 Next-Generation Intrusion Prevention System
NIP6300/6600 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices,
Huawei Eudemon200E-N Next-Generation Firewall
Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT
DPtech ADX Application Delivery Platform Series
Data Sheet DPtech ADX Series DPtech ADX Application Delivery Platform Series Overview IT requirements for service capability can be summarized as "acceleration", "security" and "reliability". The contradiction
S5700S-LI Series Gigabit Enterprise Switches
HUAWEIENTERPRI SEUSA,I NC. S5700S-LI Series Gigabit Enterprise Switches Product Overview The S5700S-LI series gigabit enterprise switches (S5700S-LI for short) are next-generation energy-saving switches
USG6600 Next-Generation Firewall
USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
Huawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
USG6300 Next-Generation Firewall
USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
HUAWEI USG6000 Next-Generation Firewall V100R001. Product Description. Issue 01. Date 2014-10-20 HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI USG6000 Next-Generation Firewall V100R001 Issue 01 Date 2014-10-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.
Eudemon 1000E-X Series Firewall Huawei Technologies Co., Ltd. Product Overview With the dramatic increase in threats to networks, users are become ever more concerned by application- and service-based
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
S5700S-LI Series Gigabit Enterprise Switches
S5700S-LI Series Gigabit Enterprise Switches S5700S-LI Series Gigabit Enterprise Switches Product Overview The S5700S-LI series gigabit enterprise switches (S5700S-LI for short) are next-generation energy-saving
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
CloudEngine Series Data Center Switches. Cloud Fabric Data Center Network Solution
Cloud Fabric Data Center Network Solution Cloud Fabric Data Center Network Solution Product and Solution Overview Huawei CloudEngine (CE) series switches are high-performance cloud switches designed for
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
NSFOCUS Anti-DDoS System White Paper
White Paper NSFOCUS Anti-DDoS System White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect to
HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet
HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet Huawei Technologies Co., Ltd. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Load Balance Router R258V
Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
HUAWEI Tecal E6000 Blade Server
HUAWEI Tecal E6000 Blade Server Professional Trusted Future-oriented HUAWEI TECHNOLOGIES CO., LTD. The HUAWEI Tecal E6000 is a new-generation server platform that guarantees comprehensive and powerful
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch
GTL-2691 Version: 1 Modules are to be ordered separately. 20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch The LevelOne GEL-2691 is a Layer 3 Managed switch with 24 x 1000Base-T ports associated
S5700-LI-BAT Switch Brochure
S5700-LI-BAT Switch Brochure S5700-LI-BAT Switch Brochure S5700-LI-BAT Switch Brochure Product Overview Huawei S5700-LI-BAT series battery LAN switches (S5700-LI-BAT for short) are the industry's first
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Gigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
S5700-SI Series Gigabit Enterprise Switches
S5700-SI Series Gigabit Enterprise Switches S5700-SI Series Gigabit Enterprise Switches Product Overview The S5700-SI series are gigabit Layer 3 Ethernet switches based on new generation of high-performance
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Why Is DDoS Prevention a Challenge?
ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Eudemon8000E Series 10-Gigabits IPS security gateway
Product Overview Product Portfolio Nowadays, network bandwidths increase rapidly, and security threats and attacks also flood on networks. Therefore, enterprise and carriers must ensure the service security
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks:
HiPER 840 4-WAN Broadband Gateway/Router Overview HiPER 840 4-WAN Broadband Gateway/Router is a purpose-built solution designed for small-sized Internet cafés, broadband communities and schools which require
What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0
What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0 PB458841 Product Overview The Cisco ACE Application Control Engine Module
Frequent Denial of Service Attacks
Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:[email protected] Abstract Denial of Service is a well known term in network security world as
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
IxLoad-Attack: Network Security Testing
IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
How To Create A Network Access Control (Nac) Solution
Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Big Data for Big Security
Big Data for Big Security HUAWEI NEXT GENERATION ANTI-DDOS SOLUTION Index DDOS ATTACK AND DEFENSE INFOGRAPHIC HUAWEI 2013 SECURITY RESEARCH REPORT DDOS PREVENTION BASED ON BIG DATA HUAWEI NEXT GENERATION
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
White Paper A10 Thunder and AX Series Load Balancing Security Gateways
White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
The Product Description of SmartAX. MT882 ADSL2+ Router
The Product Description of SmartAX MT882 ADSL2+ Router HUAWEI Huawei Technologies Co., Ltd Table of Contents Product Description...1 1. Preface...1 2. Highlights...1 3. Features and Benefits...2 4. Technical
Brocade NetIron Denial of Service Prevention
White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron
Realize Your Potential. S6700 Series 10G Switches
Realize Your Potential S6700 Series 10G Switches S6700 Series 10G Switches Product Overview The S6700 series switches (S6700s) are next-generation 10G box switches. The S6700 can function as an access
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
HUAWEI. Quidway Eudemon Series Firewall HUAWEI
HUAWEI T e c h n o l o g i e s Quidway Eudemon Series Firewall HUAWEI H U A W E I T E C H N O L O G I E S Quidway Eudemon Series Firewall Introduction Quidway Eudemon Series firewall is Huawei's new generation
Huawei NE5000E 400Gbps Flexible Line Processing Unit
Huawei NE5000E 400Gbps Flexible Line Processing Unit Huawei NE5000E 400Gbps Flexible Line Processing Unit Overview The Huawei NetEngine5000E router (NE5000E) is a high-end IP core network router. It is
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
