Grand opening, up to 15% off all items. Only 3 days left
  • Contact Us
  • Order Tracking
  • hotline

    920012778

Loading...
Sale Off

AntiDDoS8030-BASE-AC

Brands: Huawei
(0 reviews)
90593.44 100659.38 10% Off

Model: AntiDDoS8030-BASE-AC 0235G783 Huawei Anti-DDoS8000 DDoS Protection Systems

Detail: AntiDDoS8030 S8030-BASE-AC Basic Configuration(include X3 AC Chassis,2*MPU)

Huawei AntiDDoS8030-BASE-AC Basic Configuration includes basic 3 slots of AC Chassis and 2 * MPU which designs for carriers, enterprises, data centers, and ICP service providers (including providers for web portals, online games, online videos, and DNS services).

The Huawei AntiDDoS8000 series incorporates extensive experience in network security and full understanding of customer demands. It enhances defense against application-layer attacks, IPv4-IPv6 attack defense, and defense against zombies, Trojan horses, and worms. This fully ensures network security and service continuity.
Huawei AntiDDoS8000 series uses the leaser-specific service design for management configuration, which implements a series of functions, including leaser service model learning, leaser configuration, and report self-service. Moreover, IDC operators can provide the anti-DDoS solution for their leasers as a SaaS service to increase the leaser viscosity, improve IDC competitiveness, and add IDC operation profits.

Quick Specs

Figure 1 shows the appearance of AntiDDoS8030-BASE-AC.

Table 1 shows the Quick Specs.

Product Code

AntiDDoS8030-BASE-AC

Part Number

0235G783

Description

AntiDDoS8030 AC Basic Configuration(include X3 AC Chassis,2*MPU)

Attributes

Hardware

List Price(USD)

45,000.00

Category

Hardware

Product Line

Networking

Product Family

Security

Overview

AntiDDoS8030

Sub Product Family

Application Security

Product Series

AntiDDoS8030

UOM

PCS

Pack Weight(kg)

43.2

Pack Volume(m^3)

0.212

Pack Dimension (D*W*H mm)

885*640*385

Net Dimension (D*W*H mm)

650*442*220

Typic Power(W)

122

Get more information

Do you have any question about the AntiDDoS8030-BASE-AC?

Contact us now via Live Chat or [email protected].

AntiDDoS8030-BASE-AC Specification

AntiDDoS8030 Specifications

Interfaces and performance

Throughput

Up to 120 Gbit/s

Throughput/Slot

Up to 80 Gbit/s

Mitigation Rate/Slot

Up to 60 Mpps

Latency

80 μs

Expansion Slots

3

Expansion LPU

FW-LPUF-120, 2 sub-slots

Expansion Interfaces

24 x GE (SFP); 5 x 10 GE (SFP+); 6 x 10 GE (SFP+); 12 x 10 GE (SFP+); 1 x 40 GE (CFP); 1 x 100 GE (CFP)

Dimensions

Height x Width x Depth

DC: 175 mm x 442 mm x 650 mm (4U) 
AC: 220 mm x 442 mm x 650 mm (5U)

Weight

DC chassis: 15 kg (empty), 30.7 kg (full) 
AC chassis: 25 kg (empty), 40.7 kg (full)

Power and Environment

Power Supply

Rated input voltage: 
DC: -48V 
AC: 175V to 264V; 50 Hz/60 Hz 
Maximum input voltage range: 
DC: -72V to -38V 
AC: 90V to 264V; 50 Hz/60 Hz

Power Consumption

1 x FW-LPUF-120 + 2 x ADS-SPUC-B + 2 x ADS-SPC-80-01: 
DC: 1,066W (avg.), 1,272W (max.) 
AC: 1,185W (avg.), 1,414W (max.)

Power Redundancy

DC: Double hot-swappable power modules 
AC: Double hot-swappable power modules

Operating Temperature

0°C to 45°C (long-term), -5°C to 50°C (short-term)

Storage Temperature

-40°C to 70°C

Operating Humidity

5% RH to 85% RH, non-condensing (long-term), 5% RH to 95% RH, non-condensing (short-term)

Storage Humidity

0% RH to 95% RH

Certifications

Safety Certifications

Electro Magnetic Compatibility (EMC) certification 
CB, Rohs, FCC, MET, C-tick, and VCCI certification

DDoS Defense Specifications

Defense against protocol abuse attacks 
Defense against Land, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks

Web application protection 
Defense against HTTP GET flood, HTTP POST flood, HTTP slow header, HTTP slow post, HTTPS flood, SSL DoS/DDoS, WordPress reflection amplification, RUDY, and LOIC attacks; packet validity check

Defense against scanning and sniffing attacks 
Defense against address and port scanning attacks, and attacks using Tracert packets and IP options, such as IP source route, timestamp, and record route

DNS application protection 
Defense against DNS query flood, DNS reply flood, and DNS cache poisoning attacks; source limit

Defense against network-type attacks 
Defense against SYN flood, SYN-ACK flood ACK flood, FIN flood, RST flood, TCP fragment flood, UDP flood, UDP fragment flood, IP flood, ICMP flood, TCP connection flood, sockstress, TCP retransmission, and TCP empty connection attacks

SIP application protection 
Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks; source limit

Defense against UDP-based reflection amplification attacks 
Defense against NTP, DNS, SSDP, Chargen, TFTP, SNMP, NetBIOS, QOTD, Quake Network Protocol, Portmapper, Microsoft SQL Resolution Service, RIPv1, and Steam Protocol reflection amplification attacks

Filter 
IP, TCP, UDP, ICMP, DNS, SIP, and HTTP packet filters

Location-based filtering 
Traffic block or limit based on the source IP address location

Attack signature database 
RUDY, slowhttptest, slowloris, LOIC, AnonCannon, RefRef, ApacheKill, and ApacheBench attack signature databases; automatic weekly update of these signature databases

IP reputation 
Tracking of most active 5 million zombies and automatic daily update of the IP reputation database to rapidly block attacks; local access IP reputation learning to create dynamic IP reputation based on local service sessions, rapidly forward service access traffic, and enhance user experience

Management and Reporting

Management functions 
Account management and permission allocation; defense policy configuration and report display based on Zones (up to 100,000 Zones, namely tenants); device performance monitoring; source tracing and fingerprint extraction through packet capture; email, short message, and audio alarms; log dumping; dynamic baseline learning

Report functions 
Comparison of traffic before and after cleaning; top N traffic statistics; application-layer traffic comparison and distribution; protocol distribution; traffic statistics based on the source location; attack event details; top N attack events (by duration or number of packets); distribution of attacks by category; attack traffic trend; DNS resolution success ratio; application-layer top N traffic statistics (by source IP address, HTTP URI, HTTP HOST, and domain name); download of reports in HTML/PDF/Excel format; report push via email; periodical generation of daily, weekly, monthly, and yearly reports

Traffic Diversion and Injection

Traffic diversion
Supports manual, and PBR or BGP based automatic traffic diversion

Traffic injection 
Supports static route injection, MPLS VPN injection, MPLS LSP injection, GRE tunnel injection, Layer 2 injection, PBR based injection, etc

Customer questions & answers

Customer reviews

0 out of 5
5 star
0%
4 star
0%
3 star
0%
2 star
0%
1 star
0%

No reviews yet

Related products