NS6000-IDSThe series is a professional intrusion detection system launched by Excellent Communication. The system is a domestically produced enterprise level intrusion detection system independently developed by Excellent Communication based on a deep understanding of users' security needs, years of practical experience in applying security theory research and the latest detection and defense technologies. The system can detect network and system security status in real time and detect abnormal attack behaviors online. At the same time, it can effectively block attack behaviors by linking with firewalls, effectively protecting target networks or hosts. It can provide comprehensive protection for network systems with 2-7 layers, and provide deep and effective security protection for the network.
This system is dedicated to solving the information system hazards caused by malicious attacks such as hacker attacks, worms, network viruses, backdoor trojans, etc. It is widely applicable to governments, operators, and enterprises and institutions using the network. Can help customers proactively protect their networks and host systems, providing maximum security for user information.
[Product Features]
10G high concurrency technology
The excellent intrusion detection system can achieve millions of concurrent connections by using unique software technology to deeply optimize the underlying network protocols.
Comprehensive built-in feature library
The Excellent Intrusion Detection System is equipped with a comprehensive feature library, providing a total of over 6000 rule libraries and comprehensive attack feature introductions and analyses. Based on intelligent pattern matching methods, it accurately identifies various known attacks, including viruses, Trojan horses P2PApplications, instant messaging, etc., and continuously upgrading attack features to ensure timely detection of attack behavior.
Multiple encoding restoration techniques
The excellent intrusion detection system can effectively prevent hackers from bypassing the detection engine through capitalization and various encoding transformations. The built-in decoding module can restore complex encoded data to its original format for matching.
A sophisticated traffic analysis engine
The excellent intrusion detection system intelligently identifies various networks, applications, and packet protocols, supporting IP fragmentation packet reassembly and identification. Provide network monitoring, application business positioning, network planning, and data mining functions. When abnormal traffic is detected, it can be promptly blocked to maximize network security.
Support HA deployment capability
The excellent intrusion detection system has HA deployment capability, which can switch between the host and backup in a timely manner in the event of equipment downtime, port failure, and other failures, ensuring the continuous normal operation of critical applications.
Abnormal behavior and detection
“The Excellent Intrusion Detection System provides precise protocol restriction and protocol anomaly detection functions for application layer protocols,The supported protocols include HTTP, SMTP, POP3, IMAP, and DNS The "Excellent Intrusion Detection System" supports anomaly detection of application level protocols, preventing illegal packets by rejecting them and maximizing network security.
Virus filtering
“The Excellent Intrusion Detection System has powerful and flexible antivirus capabilities, enabling it to target HTTP、 The virus traffic monitoring and control of various protocols such as SMTP, POP3, IMAP, FTP, IM, etc. can perform real-time scanning and killing of Trojan viruses, worm viruses, macro viruses, and script viruses, eliminating or reducing the harm of the above threats to the system.
Internet behavior management
“The "Excellent Intrusion Detection System" has internet behavior management functions and can effectively identify various mainstream P2P networksUsers engage in online activities such as downloading, QQ instant messaging, online video, online games, and online stock trading, in order to better assist enterprises in understanding the current status of network applications and promptly restrict or block unauthorized network traffic upon discovery
1)Detect/block from IM/P2PThe behavior and threats of software
2)Block online game programs
3)Block remote control software
4)The scope covers general and customized application software
antivirus
lSupport various file transfer protocols
lAutomatically upgrade virus database
lSupport file compression
Anti-Spam
lSupports SMTP/POP3/IMAP protocols
lOnline query library
lIP address and email blacklist
lKeyword Filtering
virtualization
lHardware platform virtualization
lSupport VMware iPadOS, Xen, KVM
Intrusion Detection System
lSupports over 6000 feature libraries
lBased on policy deployment
lYou can set a non blocking IP address
lCan record the content of data packets
lDOS and DDOS attack control
lAutomatically upgrade feature library
lCustomizable feature library
lSupport isolating attackers and setting isolation time
lSupport online and bypass deployment
lSupport automatic policy generation and sending Reset to block attacks
Internet behavior management
lSupports over 2000 applications
lBased on policy deployment
lSupport application monitoring, blocking, and bandwidth limitation
lIdentify applications through feature fingerprinting
lSupport online and bypass deployment
lBased on IP bandwidth management
【ordering information】
model |
describe |
NS6000-IDS1600A2 |
Rack mounted intrusion detection system, 6A gigabit electrical port with a throughput of 4Gbps/Anti virus 300Mbps, 20000 new connections per second, concurrent 100W, single power 220VAC |
NS6000-IDS1612A |
Rack mounted intrusion detection system, 6Two gigabit electrical portsA gigabit optical port with a throughput of 4Gbps/antivirus 600Mbps, creating 80000 new connections per second, concurrency of 300W, single power supply 220VAC |
NS6000-IDS1814A |
Rack mounted intrusion detection system, 8One gigabit electrical port, 4A gigabit optical port, throughput of 8Gbps/antivirus 1.5Gbps, 200000 new connections per second, concurrency of 600W, dual hot swappable power supply 220VAC (standard single power supply) |