Fixed ports
|
8 GE ports + 4 ports SFP
|
4 GE port + 2 coMbport
|
8 GE ports + 4 ports SFP
|
8 GE ports + 4 ports SFP
|
4 10 GE ports + 16 GE ports + 8 ports SFP
|
Intrusion prevention
|
Ensuring protection against common types of attacks such as worms, Trojan programs, botnets, cross-site scripting and implementation SQL-codes by comparing with a database of signatures with the possibility of entering new signatures by users to protect against new types of attacks.
|
Intelligent control
|
В·В В В В В В В В Definition of types, operating systems and running services of protected IT resources. Dynamic generation of intrusion prevention policies appropriate for the IT environment in question.
В·В В В В В В В В Assessment of the degree of risk of attack attempts, taking into account the characteristics of the IT environment. Thus, administrators are left to process only events that really threaten the system, ignoring false positives.В».
|
Detection APT-threats
|
В·В В В В В В В В Detection of target cyber attacks on the basis of the reputation system and the protection mechanism "SandboxВ». System NIP6300/NIP6600 sends suspicious files to the sandbox in order to detect a threat, and then, based on the results of the sandbox analysis, displays events that signal an attack on the screen.
В·В В В В В В В В To detect and exclude malicious IP addresses and domain names, IP reputation data and CC.
|
Application Security
|
В·В В В В В В В В Automatic study of traffic patterns and protection against various kinds DDoS-application layer attacks, including flood attacks HTTP, HTTPS, DNS and SIP.
В·В В В В В В В В Scanning for viruses in files transferred via HTTP, FTP, SMTP, POP3, IMAP, NFS, and SMB, to prevent the spread of infected file transfers.
В·В В В В В В В В Recognize more than 6,000 applications, including P2P, instant messaging, online games, social networks, video and audio players, and take appropriate protection measures (blocking, traffic restriction, displaying the application load level)
|
Web Application Security
|
В·В В В В В В В В Decryption HTTPS-traffic and threat detection
В·В В В В В В В В Providing a blacklist URL-addresses to control behavior on the network
|
Network Security
|
В·В В В В В В В В Threat detection in traffic VLAN, QinQ, MPLS, GRE, as well as IPv4 tunnel traffic transmitted over IPv6, and IPv6, transmitted over IPv4.
В·В В В В В В В В Protection against single-packet attacks of various kinds
В·В В В В В В В В Adding IP addresses of the source or destination of the attack to the "black" list for the subsequent blocking of all packets transmitted to or from these IP addresses.
|
High availability
|
Support for hot standby protocols such as VRRP, VGMP and HRP. Implementation of a "hot" standby mechanism, which provides automatic and imperceptible switching of services to the backup system in case of failure of the active system.
|
Signature database update
|
Database update IPS-SDB, SA_SDB and antivirus database SDB real-time and offline ensures device protection features are up to date.
|
Log In