Sign In | Join Free | My howtoaddlikebutton.com |
|
Products Status : Stock
Type : Wired
VPN Support : Yes
Throughput : 1Gbps
Simultaneous Sessions : 750000
Certification : CE FCC RoHS
Brand Name : Huawei
Model Number : NIP2000D
Place of Origin : China
Packaging Details : Export carton package
Port : SHENZHEN
Supply Ability : 200 Piece/Pieces per Week
Price : Negotiable
MOQ : Negotiable
Delivery Time : 7-15 days
Payment Terms : L/C, D/A, D/P, T/T, Western Union, MoneyGram
The NIP2000D/5000D Series integrated defense detection and response systems dynamically detect threats to traffic and applications in enterprise, IDC, and campus networks.
Detects thousands of intrusions across 30 categories, including network scanning, Trojan horse, worm virus, DoS or DDoS attack, and malicious code attacks. Delivers instant alarm and response mechanisms to intrusions or suspicious behaviors. Especially suited to organizations with highly sensitive communications and data.
Face network threats head-on with NIP2000D/5000D Series dynamic intrusion detection systems from Huawei.
Specifications | NIP2050D/2100D/2130D | NIP2150D/2200D | NIP5100D/5200D | NIP5500D |
Fixed Ports | 4 x GE (RJ45) 4 x GE (combo) | 4 x GE (RJ45) 4 x GE (combo) | 4 x GE (RJ45) 4 x GE (combo) | 4 x GE (RJ45) 4 x GE (combo) 2 x 10 GE (SFP) |
Server Attack Detection | All-round server protection addresses problems with system and service vulnerability exploits, brute force, SQL injection, and cross-site scripting | |||
Client Attack Detection | Security protection for web browsers and plug-ins (Java and ActiveX) | |||
Traffic Attack Detection | Malformed packet attack prevention, defense against special packets, scanning attack prevention, TCP/UDP flooding attack prevention | |||
Application Awareness | Identifies more than 850 mainstream application protocols, including P2P, IM, online games, online stock trading software, voice applications, online video, streaming media, web mail, mobile terminals, and remote login | |||
Device Management | GUI configuration, hierarchical management, permission-based access control, and centralized device management | |||
Log | Device status monitoring, event information record backup, log querying and filtering, real-time monitoring of network status, and specialized reports | |||
Alarm Response | Real-time alarms, alarm recording, Syslog, SNMP traps, email, SMS messaging, third-party device linkages, attack packet capturing, TCP reset |
![]() |
NIP2000/5000 Intrusion Prevention Systems NIP2000D/5000D Intrusion Detection Systems Images |