HUAWEI NIP2000D NIP5000D intrusion detection system (IDS) NIP2050D NIP2100D NIP2130D NIP2150D NIP2200D NIP5100D NIP5200DNIP5500D
USD $200 - $3,000 /Piece
Min.Order:1 Piece
HUAWEI USG2000 Unified Security Gateway Firewall&UTM USG2110 USG2160 USG2230 USG2260
HUAWEI USG5100 Unified Security Gateway Firewall&UTM USG5120 USG5150
HUAWEI USG9500 Cloud Data Centers Security Gateway Firewall&UTM USG9520 USG9560 USG9580
Juniper MAG4610 Junos Pulse SSL VPN Gateways Firewall Juniper MAG4610
Juniper SSG20 Secure Services Gateways Firewall SSG-20-SH SSG-20-SB SSG-20-SH
HUAWEI NIP2000D NIP5000D intrusion detection system (IDS) NIP2050D NIP2100D NIP2130D NIP2150D NIP2200D NIP5100D NIP5200D NIP5500D
As a new generation of intrusion detection system (IDS) products, the Huawei NIP 2000/5000 series offer an integrated defense-detection-response solution by helping users locate network threats, detecting traffic in violation of security policies, and providing detailed and effective guidelines. Using multiple detection technologies and sticking to the concept of comprehensive detection, accurate analysis, and diversified presentation, the NIP improves users' security capabilities and measures.
Comprehensive Protection Ranging from System Service to Application Software
The NIP provides traditional intrusion protection system (IPS) functions such as vulnerability attack defense, web application protection, malicious-software control, application management, and network-layer DDoS attack prevention.
The NIP provides comprehensive protection for client systems exposed to the prevalent attacks that target web browsers, media files, and other document file formats.
The NIP provides industry-leading defense against application-layer DDoS attacks that spread through HTTP, DNS, or SIP.
The NIP can detect attacks and upgrade signatures in a timely manner with the global vulnerability trace capability.
Accurate Detection and Intelligent Interception
The NIP detects attacks accurately without false positive errors with the advanced vulnerability feature detection technology.
The NIP automatically learns the traffic baselines to prevent incorrect threshold configurations.
The NIP automatically intercepts major and severe threats without signature modification.
Application Awareness for Accurate Control of User Behavior
The NIP can identify more than 1000 network applications. With precise bandwidth allocation strategies, the NIP restricts the bandwidth used by unauthorized applications and reserves sufficient bandwidth for office applications such as OA and ERP.
The NIP can fully monitor and manage various network behaviors, such as instant messaging (IM), online games, online video, and online stock trading. This enables enterprises to identify and prevent unauthorized network behaviors and better implement security policies.
Hardware Specifications(NIP2000D)
Model | NIP2050D | NIP2100D | NIP2130D | NIP2150D | NIP2200D |
Product performance | Low-end megabit | Low-end megabit | High-end megabit | Low-end gigabit | Low-end gigabit |
Dedicated management port | 1×GE(RJ45) | 1×GE(RJ45) | 1×GE(RJ45) | 1×GE(RJ45) | 1×GE(RJ45) |
Fixed interface | 4×GE(RJ45) | 4×GE(RJ45) | 4×GE(RJ45) | 4×GE(RJ45) | 4×GE(RJ45) |
4×GE(combo) | 4×GE(combo) | 4×GE(combo) | 4×GE(combo) | 4×GE(combo) | |
|
|
|
|
|
Hardware Specifications(NIP5000D)
Model | NIP5100D | NIP5200D | NIP5500D | |
Product performance | Mid-range gigabit | High-end gigabit | 10 gigabit | |
Dedicated management port | 1×GE(RJ45) | 1×GE(RJ45) | 1×GE(RJ45) | |
Fixed interface | 4×GE(RJ45) | 4×GE(RJ45) | 4×GE(RJ45) | |
Extension slot | 3×FIC | 3×FIC | 2×FIC | |
Extension network port | 8×GE(RJ45) | 8×GE(RJ45) | 8×GE(RJ45) | |
Functions and Features Specifications
Model | NIP2000D-NIP5000D |
Attack detection technologies | Intelligent protocol identification technology, data packet and stream reassembly technology, protocol and file restoration technology, attack feature detection technology, vulnerability feature detection technology, traffic model self-learning technology, network anomaly detection technology, protocol anomaly detection technology, and advanced evasive detection technology |
Server attack detection | All-round server protection, addressing problems including system and service vulnerability exploits, brute force, SQL injection, and cross site scripting |
Client attack detection | Security protection for web browsers and plug-ins (Java and ActiveX) |
Protection for files with common formats: PDF, Word, Flash, and AVI | |
Malicious software detection | Trojans, worms, spyware, remote control, Botnet, and adware |
Traffic attack detection | Malformed packet attack prevention, special packet control, scanning attack prevention, TCP/UDP flooding attack prevention |
Application awareness | Identification and management of more than 850 application protocols, covering mainstream application protocols including P2P, IM, online games, stock Software, voice application, online video, streaming media, Web mail, mobile terminals, and remote login |
Alarm response | Real-time alarm, recording into database, Syslop, SNMP Trap, E-mail, sending short messages, third-party device linkage, attack packet capturing, TCP resetting |
Device management | GUI-based configuration, hierarchical management, permission-based access control, and centralized device management |
Periodic upgrade of engine repository, rollback of engine repository, and Intranet upgrade | |
Log | Device status monitoring, event information record backup, log querying and filtering, real-time monitoring of network status, and specialized reports |
About the distribution:
As a golden distributor of HUAWEI, all of HUAWEI prodcucts from Polytrade/Sandes Technology are 100 % Original and Brandnew unless per clients’ requests; customers could claim 10time cost if you find we offer used or fake products. We offer one year warranty for all on-display products.
The HUAWEI products by us are whole series of hot-sell products, and if you did not find what you need on alibaba web, please contact us via sales[at] to gain supports.
Photos: