huge-inventory.webp
free-shipping.webp
extended-replacement.webp
  • AntiDDoS1500D-AC

    AntiDDoS1500-D AC Host(4GE(RJ45)+4GE Combo,4G Memory,2 AC Power)
  • Condition:

    New Factory Sealed
  • IN STOCK Delivery within 48 hours

  • Warranty:  3 Years *

  • AntiDDoS1500D-AC Specification

    AntiDDoS1500-D Specifications

    Flood defense performance

    3 Mpps

    Detecting/Cleaning performance

    5 Gbit/s (detecting)

    Defense start latency

    ≤ 2 seconds

    Fixed interface

    4 × GE (RJ45)+4 × GE (combo)

    Expansion slot

    2 × FIC

    Expansion interface card

    2 × 10GE (SFP+);2 × 10GE (SFP+)+8 × GE (RJ45);8 × 1GE (SFP);8 × 1GE (RJ45)

    Bypass card

    4 × 1 GE (RJ45);Dual-link LC/UPC multi-mode optical interface;Dual-link LC/UPC single-mode optical interface

    Dimensions (H × W × D)

    43.6 × 442 × 560

    Maximum power consumption

    150 W

    IPv4 defense types

    Anomaly filtering

    Blacklist, HTTP field-based filtering, and TCP/UDP/Other protocol load feature-based filtering

    Protocol vulnerability defense

    Defense against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, IP Option, IP fragment control packet, TCP label validity check, large ICMP control packet, ICMP redirect control packet, and ICMP unreachable control packet attacks

    Transport-layer attack defense

    Defense against SYN flood, ACK flood, SYN-ACK flood, FIN/RST flood, TCP fragment flood, UDP flood, UDP fragment flood, and ICMP flood attacks

    Scanning and sniffing attack defense

    Defense against port scanning, address scanning, Tracert control packet, IP Option, IP timestamp, and IP routing record attacks

    DNS attack defense

    Defense against forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks.

    Web attack defense

    Defense against HTTP get/post flood attacks, CC attacks, HTTP slow header/post attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, and TCP null connection attacks

    VoIP attack defense

    Defense against SIP flood attacks

    Zombie/Trojan horse/Worm attack defense

    Defense against over 200 zombies, Trojan horses, and worms, such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, and Thc-ssl-dos

    IPv6 defense types

    IPv6 defense types

    Defense against ICMP fragment attacks, blacklist, HTTP field-based filtering, TCP/UDP/Other protocol load feature-based filtering, SYN flood attacks, ACK flood attacks, SYN-ACK flood attacks, FIN/RST flood attacks, TCP fragment flood attacks, UDP flood attacks, UDP fragment flood attacks, ICMP flood attacks, Forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks, fast flux botnet, HTTP get/post flood attacks, CC attacks, HTTP slow header/post flood attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, TCP null connection attacks, and SIP flood attacks

    IPv4/IPv6 dual-stack attack defense

    Supported

  • View full specification...

  • 3 Years Extended Warranty 100% Ready Stock Best Price Match
    100% Genuine Products 24/7 Technical Support
AntiDDoS1500D-AC

AntiDDoS1500-D AC Host(4GE(RJ45)+4GE Combo...

Overview Specification Support Warranty

Overview Of AntiDDoS1500D-AC

No Data Found

Specification Of AntiDDoS1500D-AC

AntiDDoS1500D-AC Datasheet

AntiDDoS1500D-AC Specification

AntiDDoS1500-D Specifications

Flood defense performance

3 Mpps

Detecting/Cleaning performance

5 Gbit/s (detecting)

Defense start latency

≤ 2 seconds

Fixed interface

4 × GE (RJ45)+4 × GE (combo)

Expansion slot

2 × FIC

Expansion interface card

2 × 10GE (SFP+);2 × 10GE (SFP+)+8 × GE (RJ45);8 × 1GE (SFP);8 × 1GE (RJ45)

Bypass card

4 × 1 GE (RJ45);Dual-link LC/UPC multi-mode optical interface;Dual-link LC/UPC single-mode optical interface

Dimensions (H × W × D)

43.6 × 442 × 560

Maximum power consumption

150 W

IPv4 defense types

Anomaly filtering

Blacklist, HTTP field-based filtering, and TCP/UDP/Other protocol load feature-based filtering

Protocol vulnerability defense

Defense against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, IP Option, IP fragment control packet, TCP label validity check, large ICMP control packet, ICMP redirect control packet, and ICMP unreachable control packet attacks

Transport-layer attack defense

Defense against SYN flood, ACK flood, SYN-ACK flood, FIN/RST flood, TCP fragment flood, UDP flood, UDP fragment flood, and ICMP flood attacks

Scanning and sniffing attack defense

Defense against port scanning, address scanning, Tracert control packet, IP Option, IP timestamp, and IP routing record attacks

DNS attack defense

Defense against forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks.

Web attack defense

Defense against HTTP get/post flood attacks, CC attacks, HTTP slow header/post attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, and TCP null connection attacks

VoIP attack defense

Defense against SIP flood attacks

Zombie/Trojan horse/Worm attack defense

Defense against over 200 zombies, Trojan horses, and worms, such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, and Thc-ssl-dos

IPv6 defense types

IPv6 defense types

Defense against ICMP fragment attacks, blacklist, HTTP field-based filtering, TCP/UDP/Other protocol load feature-based filtering, SYN flood attacks, ACK flood attacks, SYN-ACK flood attacks, FIN/RST flood attacks, TCP fragment flood attacks, UDP flood attacks, UDP fragment flood attacks, ICMP flood attacks, Forged source DNS query flood attacks, real source DNS query flood attacks, DNS reply flood attacks, DNS cache poisoning attacks, DNS protocol vulnerability attacks, fast flux botnet, HTTP get/post flood attacks, CC attacks, HTTP slow header/post flood attacks, HTTPS flood attacks, SSL DoS/DDoS attacks, TCP connection attacks, Sockstress attacks, TCP retransmission attacks, TCP null connection attacks, and SIP flood attacks

IPv4/IPv6 dual-stack attack defense

Supported

Our Trusted Clientele Worldwide
Esr-Connect
Johnson-and-Johnson
Exon
Novartis
Siemens-Healthineers
Sheraton
Sk-Telecom
ASDA
DHL
UPS
Lezzat-ltd
Electrotechnical-certification-scheme
WHY ORM SYSTEMS
why orm system image
why orm system image
Technical Support

ORM Systems offers reliable and scalable renowned products that allow seamless expansion to performance and adaptability to network enterprises. Our professional team of highly skilled engineers provides 360 technical support to help you with presale and after-sales journeys to enable customers with features and capabilities of the products.

We strive to deliver a seamless experience that guarantees complete satisfaction along with guidance and support in service settings to promptly resolve issues.

Standard Services
Standard Services image
Standard Services image
Get Quote
Get a free quote!
× Thank you! your form has been submitted successfully. Our expert will be in touch with you shortly.
×
ORM Registered Companies