NIP2000D/5000D Intrusion Detection Systems

The NIP2000D/5000D Series integrated defense detection and response systems dynamically detect threats to traffic and applications in enterprise, IDC, and campus networks.

Detects thousands of intrusions across 30 categories, including network scanning, Trojan horse, worm virus, DoS or DDoS attack, and malicious code attacks. Delivers instant alarm and response mechanisms to intrusions or suspicious behaviors.


Specifications

Specifications NIP2050D/2100D/2130D NIP2150D/2200D NIP5100D/5200D NIP5500D
Fixed Ports 4 x GE (RJ45)

4 x GE (combo)

4 x GE (RJ45)

4 x GE (combo)

4 x GE (RJ45)

4 x GE (combo)

4 x GE (RJ45)

4 x GE (combo)

2 x 10 GE (SFP)

Server Attack Detection All-round server protection addresses problems with system and service vulnerability exploits, brute force, SQL injection, and cross-site scripting
Client Attack Detection Security protection for web browsers and plug-ins (Java and ActiveX)
Protection for files with common formats: PDF, Word, Flash, and AVI
Traffic Attack Detection Malformed packet attack prevention, defense against special packets, scanning attack prevention, TCP/UDP flooding attack prevention
Application-layer DDoS attack prevention: HTTP, HTTPs, DNS, SIP, and more
Traffic model self-learning: Sets thresholds for traffic attacks based on normal traffic statistics
Application Awareness Identifies more than 850 mainstream application protocols, including P2P, IM, online games, online stock trading software, voice applications, online video, streaming media, web mail, mobile terminals, and remote login
Device Management GUI configuration, hierarchical management, permission-based access control, and centralized device management
Periodic upgrade of Knowledge Database, rollback of Knowledge Database, and Intranet upgrades
Log Device status monitoring, event information record backup, log querying and filtering, real-time monitoring of network status, and specialized reports
Alarm Response Real-time alarms, alarm recording, Syslog, SNMP traps, email, SMS messaging, third-party device linkages, attack packet capturing, TCP reset