Beijing Zhuoyue Xintong Electronics Co., Ltd
Home>Products>NS6000-IDS series intrusion detection system
NS6000-IDS series intrusion detection system
Product Overview:
Product details

NS6000-IDSThe series is a professional intrusion detection system launched by Excellent Communication. The system is a domestically produced enterprise level intrusion detection system independently developed by Excellent Communication based on a deep understanding of users' security needs, years of practical experience in applying security theory research and the latest detection and defense technologies. The system can detect network and system security status in real time and detect abnormal attack behaviors online. At the same time, it can effectively block attack behaviors by linking with firewalls, effectively protecting target networks or hosts. It can provide comprehensive protection for network systems with 2-7 layers, and provide deep and effective security protection for the network.

This system is dedicated to solving the information system hazards caused by malicious attacks such as hacker attacks, worms, network viruses, backdoor trojans, etc. It is widely applicable to governments, operators, and enterprises and institutions using the network. Can help customers proactively protect their networks and host systems, providing maximum security for user information.

[Product Features]

10G high concurrency technology

The excellent intrusion detection system can achieve millions of concurrent connections by using unique software technology to deeply optimize the underlying network protocols.

Comprehensive built-in feature library

The Excellent Intrusion Detection System is equipped with a comprehensive feature library, providing a total of over 6000 rule libraries and comprehensive attack feature introductions and analyses. Based on intelligent pattern matching methods, it accurately identifies various known attacks, including viruses, Trojan horses P2PApplications, instant messaging, etc., and continuously upgrading attack features to ensure timely detection of attack behavior.

Multiple encoding restoration techniques

The excellent intrusion detection system can effectively prevent hackers from bypassing the detection engine through capitalization and various encoding transformations. The built-in decoding module can restore complex encoded data to its original format for matching.

A sophisticated traffic analysis engine

The excellent intrusion detection system intelligently identifies various networks, applications, and packet protocols, supporting IP fragmentation packet reassembly and identification. Provide network monitoring, application business positioning, network planning, and data mining functions. When abnormal traffic is detected, it can be promptly blocked to maximize network security.
Support HA deployment capability
The excellent intrusion detection system has HA deployment capability, which can switch between the host and backup in a timely manner in the event of equipment downtime, port failure, and other failures, ensuring the continuous normal operation of critical applications.

Abnormal behavior and detection

The Excellent Intrusion Detection System provides precise protocol restriction and protocol anomaly detection functions for application layer protocols,The supported protocols include HTTP, SMTP, POP3, IMAP, and DNS The "Excellent Intrusion Detection System" supports anomaly detection of application level protocols, preventing illegal packets by rejecting them and maximizing network security.

Virus filtering

The Excellent Intrusion Detection System has powerful and flexible antivirus capabilities, enabling it to target HTTP、 The virus traffic monitoring and control of various protocols such as SMTP, POP3, IMAP, FTP, IM, etc. can perform real-time scanning and killing of Trojan viruses, worm viruses, macro viruses, and script viruses, eliminating or reducing the harm of the above threats to the system.

Internet behavior management

The "Excellent Intrusion Detection System" has internet behavior management functions and can effectively identify various mainstream P2P networksUsers engage in online activities such as downloading, QQ instant messaging, online video, online games, and online stock trading, in order to better assist enterprises in understanding the current status of network applications and promptly restrict or block unauthorized network traffic upon discovery

1)Detect/block from IM/P2PThe behavior and threats of software

2)Block online game programs

3)Block remote control software

4)The scope covers general and customized application software

antivirus

lSupport various file transfer protocols

lAutomatically upgrade virus database

lSupport file compression

Anti-Spam

lSupports SMTP/POP3/IMAP protocols

lOnline query library

lIP address and email blacklist

lKeyword Filtering

virtualization

lHardware platform virtualization

lSupport VMware iPadOS, Xen, KVM

Intrusion Detection System

lSupports over 6000 feature libraries

lBased on policy deployment

lYou can set a non blocking IP address

lCan record the content of data packets

lDOS and DDOS attack control

lAutomatically upgrade feature library

lCustomizable feature library

lSupport isolating attackers and setting isolation time

lSupport online and bypass deployment

lSupport automatic policy generation and sending Reset to block attacks

Internet behavior management

lSupports over 2000 applications

lBased on policy deployment

lSupport application monitoring, blocking, and bandwidth limitation

lIdentify applications through feature fingerprinting

lSupport online and bypass deployment

lBased on IP bandwidth management

ordering information

model

describe

NS6000-IDS1600A2

Rack mounted intrusion detection system, 6A gigabit electrical port with a throughput of 4Gbps/Anti virus 300Mbps, 20000 new connections per second, concurrent 100W, single power 220VAC

NS6000-IDS1612A

Rack mounted intrusion detection system, 6Two gigabit electrical portsA gigabit optical port with a throughput of 4Gbps/antivirus 600Mbps, creating 80000 new connections per second, concurrency of 300W, single power supply 220VAC

NS6000-IDS1814A

Rack mounted intrusion detection system, 8One gigabit electrical port, 4A gigabit optical port, throughput of 8Gbps/antivirus 1.5Gbps, 200000 new connections per second, concurrency of 600W, dual hot swappable power supply 220VAC (standard single power supply)

Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!