Your First Line of Defense AGAINST DDOS ATTACKS AND CYBER THREATS. for inspection performance, security. while providing an unprecedented



Similar documents
Your First Line of Defense AGAINST DDOS ATTACKS. scalability for First Line of Defense protection against cyber threats. ROBUST SECURITY COVERAGE

First Line of Defense

First Line of Defense

First Line of Defense

On-Premises DDoS Mitigation for the Enterprise

Corero Network Security First Line of Defense Executive Overview

Corero Network Security First Line of Defense Overview

Hosting Provider DDoS Protection Playbook

McAfee Network Security Platform A uniquely intelligent approach to network security

McAfee Network Security Platform A uniquely intelligent approach to network security

McAfee Network Security Platform A uniquely intelligent approach to network security

First Line of Defense to Protect Critical Infrastructure

Ixia xstream TM 10. Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks. Aggregation and Filtering DATA SHEET

CaptIO Policy-Based Security Device

QuickSpecs. Models HP S Mbps IPS

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

APV9650. Application Delivery Controller

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

IBM Security Network Protection

Ixia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET

FortiDDos Size isn t everything

Cisco ACE 4710 Application Control Engine

Cisco Intrusion Detection System Services Module (IDSM-2)

Cisco Nexus 7000 Series.

Security Information & Event Manager (SIEM)

QuickSpecs. Models HP TippingPoint S8010F Next Generation Firewall Appliance

Introducing FortiDDoS. Mar, 2013

FIRST LINE OF DEFENSE

Analysis of a DDoS Attack

Security Information & Event Manager (SIEM)

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

IBM Security Network Intrusion Prevention System

IBM Security Network Intrusion Prevention System

Cisco IPS 4200 Series Sensors

Intrusion Prevention System

Cisco IPS 4200 Series Sensors

Cisco Wide Area Application Services (WAAS) Appliances

Intrusion Prevention System

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600

How To Build A Cisco Uniden Computing System

Delivers fast, accurate data about security threats:

Cisco ASA 5500 Series Advanced Inspection and Prevention Security Services Module

Deliver More Applications for More Users

SourceFireNext-Generation IPS

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Centralized Orchestration and Performance Monitoring

Automated Mitigation of the Largest and Smartest DDoS Attacks

HP S Intrusion Prevention System (IPS) Series

McAfee IntruShield Network IPS Sensor Pioneering and Industry-Leading, Next-Generation Network Intrusion Prevention Solution

FASTIRON II SWITCHES Foundry Networks award winning FastIron II family of switches provides high-density

Cisco NetFlow Generation Appliance 3240

How To Use The Cisco Wide Area Application Services (Waas) Network Module

Cisco ASA 5500 Series IPS Solution

Cisco NetFlow Generation Appliance (NGA) 3140

Secure Networks for Process Control

THUNDER TPS Next-generation DDoS Protection

Simplify Data Management and Reduce Storage Costs with File Virtualization

ARUBA 7000 SERIES CLOUD SERVICES CONTROLLER

MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS

Cisco SR 520-T1 Secure Router

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

WHITE PAPER Hybrid Approach to DDoS Mitigation

STORAGETEK SL150 MODULAR TAPE LIBRARY

MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS

Cisco SFS 7000P InfiniBand Server Switch

TP-LINK L2 Managed Switch

EMC DATA DOMAIN DEDUPLICATION STORAGE SYSTEMS

EMC DATA DOMAIN DEDUPLICATION STORAGE SYSTEMS

Cisco Nexus 7000 Series Supervisor Module

SecureSphere Appliances

QuickSpecs. Models. Features and benefits Configuration. HP VCX x3250m2 IP Telecommuting Module. HP VCX x3250m2 IP Telecommuting Module Overview

TP-LINK. Gigabit L2 Managed Switch. Overview. Datasheet TL-SG3216 / TL-SG

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

STORAGETEK SL150 MODULAR TAPE LIBRARY

Cisco ASA 5585-X Next-Generation Firewall

HP Networking Mobility Security IDS/IPS Series

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

STORAGETEK SL150 MODULAR TAPE LIBRARY

Cisco VPN 3000 Concentrator Series

THUNDER TPS Next-generation DDoS Protection

Symantec NetBackup 5220

TP-LINK. 24-Port Gigabit L2 Managed Switch with 4 SFP Slots. Overview. Datasheet TL-SG

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Cisco M-Series Content Security Management Appliance for and Web Security Appliances

NLoad Balancing Stackable Switch

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL

Secure Cloud-Ready Data Centers Juniper Networks

Intelligent Data Access Networking TM

A Layperson s Guide To DoS Attacks

CENTRAL MONITORING AND MANAGEMENT. CMX SERIES DATASHEET CENTRALIZED MANAGEMENT

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

TP-LINK 24-Port Gigabit L2 Managed Switch with 4 SFP Slots

Cisco ASR 9001-S Router

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

NetScaler SD-WAN. Securely delivers optimal application performance over any network

Secure Access Complete Visibility

Data Sheet. DPtech Anti-DDoS Series. Overview

Transcription:

SmartWall THREAT DEFENSE SYSTEM FIRST LINE OF DEFENSE DATA SHEET NETWORK THREAT DEFENSE APPLIANCE KEY BENEFITS Robust security coverage Comprehensive network security protection against layer 3 and layer 4 for both IPv4 and IPv6 traffic. Industryleading density, scalability & performance Protection is provided through configurable access policies with scalability from 10Gbps to 1Tbps in a single rack. Green, energyefficient platform Energy-efficient design with front-to-back cooling fully supports economic and environmental initiatives. Powerful centralized management Centralized Operational Management for configuring, controlling, and monitoring the appliances. Flexible deployment configurations Multiple appliances can be distributed to key control points in the Provider network or centrally combined in 1 RU shelves in various configurations. Your First Line of Defense AGAINST DDOS ATTACKS AND CYBER THREATS The Corero SmartWall TM provides First Line of Defense protection against DDoS attacks, cyber threats and unwanted Internet traffic. It delivers the industry s highest performance in a compact, energy efficient form factor for scalability from 10Gbps to 1Tbps in a single rack. Disruptions to Internet-facing online services can cripple operations, impact customers and result in major economic losses. The SmartWall is an intelligent, always on platform that inspects traffic, detects threats and blocks attacks against protected network resources. It allows Service Providers, Hosting Providers, and Managed Security Service Providers (MSSPs) to deploy centralized or distributed threat defense solutions via purpose-built network security appliances that provide advanced Layer 3 and Layer 4 cyber threat protection. The SmartWall provides continuous visibility and security policy enforcement so that organizations can establish a proactive First Line of Defense for inspecting traffic, detecting threats and blocking attacks. It is capable of mitigating a wide range of DDoS attacks and cyber threats while maintaining full service connectivity and availability to avoid degrading the delivery of legitimate traffic. In addition, Service Providers and Hosting Providers can leverage scale-as-you-grow deployments of SmartWall Network Threat Defense Appliances to create incremental service revenue streams by offering highvalue DDoS and cyber threat protection services to their enterprise or hosted customers. This next-generation slimline appliance delivers 10Gbps full-duplex performance in a ¼ wide, 1 RU form factor. It is a member of the new Corero SmartWall Threat Defense System (TDS), an innovative family of space-saving, modular security platforms that will change the rules FEATURED PRODUCT for inspection performance, security intelligence and network forensics, 10Gbps full-deplex performance in a 1/4 wide, 1 RU form factor with scalability from 10Gbps to while providing an unprecedented 1Tbps in a single rack level of scalability for First Line of Defense protection against cyber threats. ROBUST SECURITY COVERAGE The SmartWall Network Threat Defense Appliance provides comprehensive network security protection against layer 3 and layer 4 DDoS attacks and cyber-threats for both IPv4 and IPv6 traffic. It leverages the Corero award-winning DDoS defense technology to deliver non-disruptive, always on protection against

ROBUST SECURITY COVERAGE (cont.) against the constantly evolving threat landscape. This groundbreaking new appliance provides configurable policies to selectively enable a broad range of specific protection mechanisms to defend critical network assets against suspicious or malicious traffic types while allowing uninterrupted service access to legitimate users and applications. You can also configure protection against known suspicious or malicious IP addresses with the Corero ReputationWatch service which receives the latest intelligence data on potential sources of cyber criminal activity. ReputationWatch continuously leverages global threat feeds to determine the current IP reputation of incoming traffic. Granular policy options can be selected to automatically monitor or block access from malicious sources such as botnets or DDoS attackers. ReputationWatch also supports country-based protection policies using SmartWall geolocation technology which allows you to control access, based on the reported national origin of an IP address. The geolocation capability lets you define policies to alert, limit or exclude traffic from countries that you do not need to connect with, or from countries associated with a high risk of potential attack. The SmartWall supports both symmetric and asymmetric traffic inspection to support flexible network deployment options. First Line of Defense SOLUTION FOR SERVICE PROVIDERS The SmartWall TM can be deployed to protect both infrastructure and cloud resources. INDUSTRY-LEADING SCALABILITY & PERFORMANCE The SmartWall offers new levels of scalability and performance in a compact and energyefficient platform. Each appliance provides dynamic threat level tracking of up to 16 million Internet based IP addresses and their associated flows. Protection is provided through configurable acceptable access policies supporting packet and connection rate limiting, reputation and geolocation checks, server and service connection limits, protocol checks, as well as blacklist, whitelist and temporary shun list enforcement. This high-performance platform is designed to maintain 10Gbps full duplex 2

INDUSTRY-LEADING SCALABILITY & PERFORMANCE (cont.) throughput, even while under attack. Each appliance offers flow-based inspection of up to 10 million flows and can setup one million new flows per second. Traffic inspection can be performed in monitor or inline modes with under 45 microseconds of latency. The modular architecture of the SmartWall enables cost-effective scaling in 10Gbps increments as bandwidth, flow table and inspection requirements increase. Four appliances can be deployed in a single 1 RU shelf to deliver a combined 40Gbps full duplex throughput or four times the 10Gbps inspection rate for four times the number of IP addresses. 4 RUs of appliances can deliver 160 Gbps of full duplex throughput. GREEN, ENERGY-EFFICIENT PLATFORM Compact packaging provides the best performance to size and power ratio in the industry. This green, energy-efficient design with front-to-back cooling fully supports economic and environmental initiatives to reduce rack space and cut back on cooling and electrical requirements. POWERFUL CENTRALIZED MANAGEMENT Each unit has a dedicated management port and is assigned a unique IP address. Centralized operational management of multiple appliances minimizes IT overhead, speeds deployments and streamlines provisioning. Corero offers multiple management options for configuring, controlling, and monitoring the appliances including a flexible Browser-based GUI, a full SSH CLI and powerful REST API that supports open integration with existing management frameworks. Centralized management of the SmartWall Network Threat Defense Appliance as well as other family members of the SmartWall Threat Defense System is performed via secure connection to the Corero Management Server (CMS). The CMS includes a dashboard for monitoring threat activity and viewing key security events. The CMS is delivered as a virtual appliance to run on customer-provided hardware. The SmartWall provides seamless integration with Security Information and Event Management (SIEM) and Operational Intelligence solutions, such as Splunk. CORERO MANAGEMENT SERVER FLEXIBLE DEPLOYMENT CONFIGURATIONS A single appliance can be deployed in a standalone configuration to provide 10Gbps full-duplex performance, multiple SmartWall Network Threat Defense Appliances can be distributed to key control points in the Provider network or centrally combined in 1 RU shelves in various high throughput configurations. The modular design enables rapid, flexible and expandable deployments, and lowers The Corero Network Management Server offers an easy-to-use, browser-based interface for centrally managing all SmartWall TM Threat Defense System Appliances your risk by limiting your investments to match your current requirements while allowing you to add capacity as your needs grow. Redundant or hot-standby SmartWall Network Threat Defense Appliances can be deployed in high-availability configurations to provide backup protection in 10Gbps increments. Multiple appliances can also be deployed in dynamic load-balanced configurations to accommodate peak period demands. 3

TECHNICAL SPECIFICATIONS Order Part Number Regulatory Model Number 6000-10 Interfaces Copper 10/100/1000 Ethernet Ports Pluggable 10G Ethernet Ports (SFP+ Modules) 4 SmartWall 1 MGMT Other Ports (Serial Console, Authentication Service) 1 USB 2.0 Performance Maximum Throughput (Gbps) Maximum Throughput (Packets Per Second) Typical Latency 1 Typical Inspected Latency 1 Maximum Concurrent Sessions Maximum Session Setup/Teardown Maximum SYN Flood DoS Protection Rate Attack Reaction Time IP Reputation / Geolocation lookups per second IP Addresses Blocked/Shunned Per Second SYN Proxies Per Second Maximum Number of TCP Connections/ UDP flows Device Management Management Interfaces Management Station Management Options Command Line Web-Based Programmatic API Management Protocols for Monitoring Software Upgrade Mechanism Security Dashboards Reporting and 3 rd -Party Management Authentication Mechanisms Physical/Environmental Size Weight 10 Gbps 30 Mpps < 45 usec < 60 usec 16 Million 3 Million/Sec < 2 Seconds 15 Million/Sec blocked, shunned 16 Million 1 10/100/1000 Management Port Virtual Machine Deployable in VMware-capable environments GUI, Command Line, Programmatic API SSH Access Through the Management Station HTTP/HTTPS Access Through the Management Station JSON-Based REST API Through the Management Station SNMP v2 Standard MIB GETs, SYSLOG Remotely Upgradeable Image and Configuration Stored on Internal SSD TBD Splunk, ArcSight, CA, eiq Networks, Forensics Explorer, GuardedNet, HP OpenView, IBM Tivoli, netforensics, Open Service, RSA Envision, Q1Labs, TriGeo Role-Based Access Control (Active Directory) 1-RU 4.0cm (H) x 10.8 cm (W) x 60.4cm (D) 3.6 Kgs (7.9 lbs.) Operating Temperature 0 C to 40 C (32 F to 104 F) Storage Temperature -25 C to 70 C (-13 F to 158 F) Humidity 5% to 95% Non Condensing MTBF Rating Operating Altitude Tamper Protection Power & Cooling Power Supplies AC Input >100,000 Hours (25 deg. C Ambient) 0-10,000 Feet Tamper-Evident Seal Single Internal PSU 100 to 240 VAC Auto-Ranging, 50-60Hz 4

TECHNICAL SPECIFICATIONS (Cont.) Power Consumption Cooling Compliance & Approvals Compliance to EMC Emissions Compliance to EMC Immunity Compliance to Safety International Compliance Approvals Typical 120W Internal N+1 Fans FCC Part 15-7.10.2008, EN55022: 2006+A1: 2007, CISPRR 22:2005+A1+A2:2005, VCCI-3 2009.04, AS/NZS CISPR22:2006, EN 61000-3-2:2006, EN61000-3-3:1995 +A1:2001+A2:2005, EN61000-3- 11:2000, EN 61000-3-12:2005 EN55024: 1998 Including Amendment 1:2001 & Amendment 2:2003(CIS- PR24:1997 +A1:2001 +A2:2002), EN 61000-4-2:1995 +A1:1998 +A2:2001, EN 61000-4-3:2006, EN 61000-4-4:2004, EN 61000-4-5:2006, EN 61000-4-6:1996 +A1:2001, EN 61000-4-8:1993 +A1:2001, EN 61000-4-11:2004 UL 60950-1, 2 nd Ed., CSA C22.2 No. 60950-1, 2nd Ed., EN 60950-1, 2 nd Ed., IEC 60950-1, 2 nd Ed. UL Listed, CUL, AS/NZS 3260, CE, FCC Class A, VCCI Class A, ICES- 003 Class A 1 Typical latency values measured for packet sizes up to 1518 bytes SECURITY COVERAGE Defense Mechanisms Access Restrictions Protocol Validations Protocol Validations Integrity Analysis Security Coverage Block and shun undesired IP addresses Filter based on IP reputation (botnets, spammers, anonymizing services) Filter based on IP geo-location data Block undesired TCP/UDP ports Protect against ICMP floods, ssmurf attacks, SYN floods Apply rate limits per incoming client(s) as well as per protected server(s) Control rates based on TCP connections, TCP/UDP packets/flows, and protocols Limit IP fragmentation and TCP Segmentation rates Apply granular policies to both symmetric and asymmetric traffic types Reject invalid IP protocol fields and invalid TCP/UDP ports Ensure proper IP/TCP/UDP header lengths Perform multicast protocol checks Reject invalid checksums and malformed UDP packets Block TCP state violations Reject truncated packet lengths and invalid/repeated TCP segment IDs Block IP segmentation/fragmentation exploits (Advanced Evasion Techniques) Reject unsupported tunnel types Prevent attacks from spoofed IP addresses Protect from attacks like rose, smurf, teardrop, and Ping of Death ABOUT CORERO NETWORK SECURITY Corero Network Security, an organization s First Line of Defense against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide online enterprises, service providers, hosting providers, and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more information, visit www.corero.com. Corporate Headquarters EMEA Headquarters 1 Cabot Road Regus House, Highbridge, Oxford Road Hudson, MA 01749 USA Uxbridge, England Phone: +1.978.212.1500 UB8 1HR, UK Web: www.corero.com Phone: +44.0.1895.876579 Copyright 2014 Corero Network Security, Inc. All rights reserved. 867-5309-001 5