$300.00 - $1,500.00
Min. Order : 1 Piece

Huawei Network Security Secure Port 8 x GE RJ45 DDoS Protection Systems AntiDDoS1650

Coupons
$50.00 OFF
Get Latest Price
Trade Assurance
Built-in order protection service in alibaba.com
Product quality
On-time shipment
More on shipping and other trade services.

Quick Details

Port: Guangzhou Huangpu
Payment Terms: T/T,Western Union,MoneyGram
Supply Ability: 1000 Piece/Pieces per Week
Brand Name: Huawei
Brand: Huawei
Type: FTTx Solutions
Place of Origin: Guangdong China
Expansion Slots: 2 x WSIC
Use: FTTX
Height x Width x Depth: 44.4 mm * 442 mm * 421 mm (1U)
Mitigation Rate: Up to 3 Mpps
Model Number: AntiDDoS1650,AntiDDoS1650
Packaging Detail: International Standard Package With Box Packaged Huawei Network Security Secure Port 8 x GE RJ45 DDoS Protection Systems AntiDDoS1650
Package Preview: https://sc02.alicdn.com/kf/Haab3dc05448547f5947f6e1cc3a6738fl.jpg_640x640.jpg
Guangzhou Huitou Information Technology Co., Ltd.
Gold Supplier
CN
Trading Company, Agent, Distributor/Wholesaler
84.2%
Response Rate
100.0%
On-time delivery rate
-
-
Transactions
-
Employees
-
R&D staffs
-
Patents
Visit Store
Products Description

Huawei AntiDDoS1650



The Huawei AntiDDoS1600 DDoS protection system employs Big Data analytics technology and supports modeling for 60+ types of network traffic to offer second-level attack response and comprehensive defense against 100+ types of attacks. The AntiDDoS1600 can be deployed on a user network in in-line mode to defend against volumetric and application attacks in real time.
When attack traffic exceeds the bandwidth or defense capability of a local scrubbing device, the AntiDDoS1600 associates with the AntiDDoS device of the upstream carrier or ISP to defend against flood attacks and guarantee service continuity.

As the Internet and the IoT continue to thrive, Distributed Denial of Service (DDoS) attacks are developing new characteristics:
Attacks are increasing in frequency and traffic volume
Reflection attacks have emerged, and reflection amplification attacks, such as NTP, SSDP, and DNS attacks are devouring limited enterprise and data center bandwidthsIoT devices could be exploited to construct Botnets for initiating large-scale attacks
Targets of DDoS attacks spread from large enterprises to whole industries
Attacks are more diversified, with volumetric and application attacks mixed to invalidate defense at a single layer

In response to these challenges, Huawei has created the AntiDDoS1600 DDoS Protection System, which employs Big Data analytics technology and supports modeling for 60+ types of network traffic to offer second-level attack response and comprehensive defense against 100+ types of attacks. The AntiDDoS1600 can be deployed on a user network in in-line mode to defend against volumetric and application attacks in real time.
When attack traffic exceeds the bandwidth or defense capability of a local scrubbing device, the AntiDDoS1600 associates with the
AntiDDoS device of the upstream carrier or ISP to defend against flood attacks and guarantee service continuity.

Highlight Features
* Precise protection, second-level response, in-line deployment, layered defense
* Precise anti-DDoS protection: 60+ traffic models, defense against 100+ types of DDoS attacks, second-level attack response
* In-line protection: In-line deployment to defend against volumetric and application attacks in real time
* Layered defense: Association with anti-DDoS devices of upstream carriers or ISPs to defend against flood attacks
* Defense against high-volume DDoS attacks
* Multi-core distributed architecture and Big Data-based intelligent protection engine
* Second-level attack response to rapidly block attack traffic
* Defense against application-layer DDoS attacks
* Collection of all traffic, Layer 3 to Layer 7 per-packet analysis, and modeling for 60+ types of network traffic to provide the most precise and comprehensive attack detection
* All-round reputation system of local session behavior reputation, location reputation, and Botnet IP reputation to precisely defend against application-layer DDoS attacks launched from Botnets, reducing false positives and improving user experiences
* Comprehensive defense against 100+ types of attacks to protect key service systems, such as Web, DNS, DHCP, and VoIP
* In-line protection
* Transparent access and simple deployment to defend against DDoS attacks in real time
* Bypass expansion cards for high availability
* Layered anti-DDoS
* Deployed at enterprise and data center borders to protect user services
* Associated with anti-DDoS devices of upstream carriers or ISPs to defend against flood attacks when the attack traffic exceeds access bandwidths or processing capabilities of on-premise devices
Scenario 1: 
Enterprise network defense
With the development of internet technologies, enterprise networks are prone to extensive threats. In addition to defending against attacks from Internet, enterprise networks require smooth service operation.
On the network shown in above figure, the cleaning device is deployed at the ingress of the enterprise network in in-line mode to protect incoming and outgoing traffic. When anomalies occur, the cleaning device enables attack defense immediately. Meanwhile, the cleaning device can be configured with the Bypass card to enhance solution reliability.
Scenario 2: 
Data center security protection
An Internet Data Center (IDC) is a part of basic network resources. It provides large-scale, high-quality, secure, and reliable data transmission services and high-speed access services for Internet content providers,enterprises, media, and each types of website. The IDC provides DNS servers, web servers, game servers, and other services. In recent years, more and more Internet-initiated DDoS attacks target IDCs. As a result, important servers are attacked; data center link bandwidth is occupied; videos and games are compromised by application-layer attacks.
On the network shown in above figure, a cleaning device is attached to the core router 1 and router 2 to detect and clean the traffic destined for the Zone. The traffic must be diverted to the cleaning device using BGP in real time. After traffic is cleaned, normal traffic is injected back to the original link through PBR and finally forwarded to the Zone.
Specification
Model
AntiDDoS1650
AntiDDoS1680
Throughput
Up to 5 Gbit/s
Up to 8 Gbit/s
Mitigation Rate
Up to 3 Mpps
Up to 7 Mpps
Latency
80 μs
80 μs
Standard Interfaces
8 x GE (RJ45) + 4 x GE (SFP)
16 x GE (RJ45) x 8 × GE (SFP) + 4 x 10 GE (SFP)
Expansion Slots
2 x WSIC
5 x WSIC
Expansion Interfaces
8 x GE (RJ45); 8 x GE (RJ45) + 2 x 10 GE (SFP+); 8 x GE (SFP); 4 x GE (RJ45) Bypass card
Deployment Modes
In-line; Out-of-path (static defense); Out-of-patch (dynamic defense)
Function
Options for detecting or cleaning
Defense against protocol abuse attacks
Defense against Land, Fraggle, Smurf, WinNuke, Ping of Death, Teardrop, and TCP error flag attacks
Web application protection
Defense against HTTP GET flood, HTTP POST flood, HTTP slow header, HTTP slow post, HTTPS flood, SSL DoS/DDoS, WordPress reflection
amplification, RUDY, and LOIC attacks; packet validity check
Defense against scanning and sniffing attacks
Defense against address and port scanning attacks, and attacks using Tracert packets and IP options, such as IP source route,
timestamp, and record route
DNS application protection
Defense against DNS query flood, DNS reply flood, and DNS cache poisoning attacks; source limit
Defense against network-type attacks
Defense against SYN flood, SYN-ACK flood, ACK flood, FIN flood, RST flood, TCP fragment flood, UDP flood, UDP fragment flood, IP
flood, ICMP flood, TCP connection flood, sockstress, TCP retransmission, and TCP empty connection attacks
SIP application protection
Defense against SIP flood/SIP methods flood attacks, including Register, Deregistration, Authentication, and Call flood attacks;
source limit
Defense against UDP-based reflection amplification attacks
Defense against NTP, DNS, SSDP, Chargen, TFTP, SNMP, NetBIOS, QOTD, Quake Network Protocol, Portmapper, Microsoft SQL Resolution
Service, RIPv1, and Steam
Protocol reflection amplification attacks
Filter
IP, TCP, UDP, ICMP, DNS, SIP, and HTTP packet filters
Location-based filtering
Traffic block or limit based on the source IP address location
Attack signature database
RUDY, slowhttptest, slowloris, LOIC, AnonCannon, RefRef, ApacheKill, and ApacheBench attack signature databases; automatic weekly
update of these signature databases
IP reputation
Tracking of most active 5 million zombies and automatic daily update of the IP reputation database to rapidly block attacks; local
access IP reputation learning to create dynamic IP reputation based on local service sessions, rapidly forward service access
traffic, and enhance user experiences
You May Like
Company Profile
Guangzhou Huitou Information Technology Co., Ltd.,
established in 2017 with a registered capital of 1 million yuan, is a communication technology enterprise integrating research and development, production, domestic and foreign trade sales, and overall scheme design. Huitou has been committed to the research and development, production and sales of communications equipment, and the advantages of well-known manufacturers, and serve the major operators and private network users as well as business customers.
Product packaging
FAQ
Q: Could you provide technical support?
A: Yes, we have engineers provide technical support for 24 hours.

Q: What are your main products?
A: OLT device, SFP fiber optic modules, ONU, ONT, transmission equipment, switches, routers, wireless AP etc.

Q: Is it safe on the payment for me as we are the first cooperation?
A: We can do the trade assurance on Alibaba, which will guarantee your products receiving, we also accept other safe payment way
as you want.

Q: Can I have a sample order?
Yes, welcome sample order to test and check quality.

Q: Can we get a lower price? Any Discount?
Yes, price is not a problem, everything could be negotiated based on the quantity.