SlideShare a Scribd company logo
1 of 2
Download to read offline
Protect Your Network
 Eudemon All-in-One UTM

                                                                     Leading UTM Performance
                                                                     Huawei firewalls have leading
                                                                     performance in the industry. The three
                                                                     main indexes of the firewall, namely,
                                                                     number of connections established per
                                                                     second, maximum number of
                                                                     concurrent connections, and
                                                                     throughput of the integrated device,
                                                                     are in leading roles in the industry. In
                                                                     particular, the number of connections
                                                                     established per second of Huawei
                                                                     Eudemon 1000E series products is
                                                                     three to five times that of the industry
                                                                     average level. The UTM signature
                                                                     (globally updatable) effectively protects
                                                                     enterprises against intrusion and
                                                                     attacks exploiting network
                                                                     vulnerabilities, worms, Spam, phishing,
                                                                     and malicious websites.

                                                                     DDoS Attack Defense
                                                                     Huawei has professional DDoS attack
                                                                     analysis teams. Huawei firewalls can
                                                                     effectively identify and defend against
                                                                     various DDoS attacks including SYN,
                                                                     UDP, ICMP, DNS, CC attacks, and
                                                                     others. In addition, for the new variants
                                                                     of DDoS attacks, as the DDoS attack
Exploring Network Security                                           defense signature database is
                                                                     synchronously updated, the DDoS
                                                                     attack defense capabilities of users are
Huawei Secoway Eudemon series of unified security gateways are       continuously improved. Comprehensive
high performance unified security gateways. The Eudemon provides     DDoS attack operation solutions or
                                                                     DDoS attack defense solutions can be
the high-performance network security helping enterprises increase   provided for various users.
work efficiency. The Eudemon gateways based on Huawei VRP
software platform, has a wide range of features:
                                                                     Integration
           Firewall, VPN, L2TP, MPLS and Traffic Shaping
           DDoS Protection                                          The Eudemon series products have
                                                                     integrated multiple functions such as
           IPS, Antispam, Antivirus                                 the firewall, router, UTM (IPS, AV, URL,
           URL Filtering, P2P blocking                              AS), VPN, 3G and WiFi to provide users
                                                                     with completely all-in-one solutions,
           Traffic Control                                          thus greatly saving users’ investments
           IM Software Control                                      and reducing users’ maintenance costs.
                                                                     In addition, the Eudemon supports the
           L2/L3 Routing
                                                                     L2TP, IPSec, SSL, and MPLS VPN
           WAN Optimization                                         services. The Eudemon integrates
           Virtual Firewalling                                      major security functions into a device,
                                                                     which helps customers improve the
           Multiple Security Zones                                  security capability and work efficiency,
           Link Bundling                                            and save investment.

           Comprehensive QoS
Multi-Core Architecture
 The Eudemon adopts the embedded multi-core
 architecture. The multi-core architecture improves
 the performance, ensuring the high-speed concurrent
 processing of services, such as IPS, anti-spam, NAT,
 ASPF, DDoS protection, and VPN. In addition, the
 multi-core architecture ensures the smooth usage
 and performance of UTM functions.

 Multi Adaptable
 The Eudemon supports multiple VPN networking
 technologies such as GRE, L2TP, IPSec, SSL and MPLS.
 The Eudemon adopts built-in high performance
 hardware encryption and decryption chips making
 Eudemon the leader on the market. The Eudemon
 support various algorithms and protocols such as
 DES/3DES, AES, IKEv2, Auth, NAT, etc.

 Beside FE and GE, depends on platform, the Eudemon
 through fixed board interfaces or expansion slots can
 support E1, CE1, ADSL, ADSL2+, WiFi, 3G

 Table 1: Eudemon 200E Series Performance
      Eudemon                             200E-B     200E-X1/X1W         200E-X2/X2W          200E-C         200E-F        200E-X3       200E-X5       200E-X6           200E-X7
      Throughput (Mbps/Gbps)              200M            200M                300M             400M             1G            2G            3G             5G               6G
      Maximum number of                   20000          100000              200000           400000        1200000        1000000       1000000       1200000          1200000
      concurrent connections
       New connections per                 2000            2000               3000             25000         25000          20000         20000         40000             40000
      second
       IPSEC VPN                            60              40                  50              300             500           300           500            1G               2G
      Throughput(Mbps)
       IPSEC Tunnels                        64              64                  64             2000           2000           2000          2000          2000             2000
       SSL VPN Maximum                      20              20                  20             100            100            100           100            150             200
      number of concurrent users



 Table 2: Eudemon 1000E Series Performance
               Eudemon                    Eudemon            Eudemon              Eudemon              Eudemon              Eudemon               Eudemon               Eudemon
                                          1000E-U2           1000E-U3             1000E-U5             1000E-U6             1000E-X3              1000E-X5              1000E-X6
     Maximum throughput                       2G                  4G                  6G                   8G                   6G                   10G                   15G
     Connections per second                   60K                 80K                100K                 150K                 100K                  150K                  200K
     Number of concurrent                    1.6M                1.6M                1.6M                  2M                   2M                    3M                    4M
     connections
     Maximum VPN                               2G                 4G                  5G                   6G                    4G                   5G                    7G
     throughput
     Number of VPN tunnels                    15K                 15K                 15K                  15K                  15K                   15K                  15K
     Maximum number of                        100                 100                 100                  100                  100                   100                  100
     virtual firewalls




                                                                                                                                                                 www.huawei.com

Huawei Technologies, May 2011: The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and
operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed
or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the
information at any time without notice.

More Related Content

What's hot

English version mobile computers reference catalog
English version   mobile computers reference catalogEnglish version   mobile computers reference catalog
English version mobile computers reference catalogerolcet
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01Niit Care
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08Niit Care
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12Niit Care
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfOpenStack Foundation
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04Niit Care
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02Niit Care
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05Niit Care
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & Moreceriumnetworks
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Whats the weather tomorrow
Whats the weather tomorrowWhats the weather tomorrow
Whats the weather tomorrowLearon Dalby
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07Niit Care
 

What's hot (20)

English version mobile computers reference catalog
English version   mobile computers reference catalogEnglish version   mobile computers reference catalog
English version mobile computers reference catalog
 
Panda 2010
Panda 2010Panda 2010
Panda 2010
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Cloud circle Simon Withers
Cloud circle Simon WithersCloud circle Simon Withers
Cloud circle Simon Withers
 
Cinemeccanica
Cinemeccanica Cinemeccanica
Cinemeccanica
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Whats the weather tomorrow
Whats the weather tomorrowWhats the weather tomorrow
Whats the weather tomorrow
 
Mcafee 3
Mcafee 3Mcafee 3
Mcafee 3
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07
 

Similar to Huawei Network Security Newsletter

Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochureIEI Integration Corp.
 
Paetec Security Solutions
Paetec Security SolutionsPaetec Security Solutions
Paetec Security SolutionsDavid Santos
 
Paetec security solutions brochure
Paetec security solutions brochurePaetec security solutions brochure
Paetec security solutions brochureDavid Santos
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceSoftchoice Corporation
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesNiranjana Padmanabhan
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Muhammad Farooq Hussain
 
The Future of IT
The Future of ITThe Future of IT
The Future of ITSimon May
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-maindsfsadfas
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Private Cloud
 

Similar to Huawei Network Security Newsletter (20)

Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 
Paetec Security Solutions
Paetec Security SolutionsPaetec Security Solutions
Paetec Security Solutions
 
Paetec security solutions brochure
Paetec security solutions brochurePaetec security solutions brochure
Paetec security solutions brochure
 
Utm
UtmUtm
Utm
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Sonicwall tz series new
Sonicwall tz series newSonicwall tz series new
Sonicwall tz series new
 
At&t2
At&t2At&t2
At&t2
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
Sonic Wall Product Line Brochure
Sonic Wall Product Line BrochureSonic Wall Product Line Brochure
Sonic Wall Product Line Brochure
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Huawei Network Security Newsletter

  • 1. Protect Your Network Eudemon All-in-One UTM Leading UTM Performance Huawei firewalls have leading performance in the industry. The three main indexes of the firewall, namely, number of connections established per second, maximum number of concurrent connections, and throughput of the integrated device, are in leading roles in the industry. In particular, the number of connections established per second of Huawei Eudemon 1000E series products is three to five times that of the industry average level. The UTM signature (globally updatable) effectively protects enterprises against intrusion and attacks exploiting network vulnerabilities, worms, Spam, phishing, and malicious websites. DDoS Attack Defense Huawei has professional DDoS attack analysis teams. Huawei firewalls can effectively identify and defend against various DDoS attacks including SYN, UDP, ICMP, DNS, CC attacks, and others. In addition, for the new variants of DDoS attacks, as the DDoS attack Exploring Network Security defense signature database is synchronously updated, the DDoS attack defense capabilities of users are Huawei Secoway Eudemon series of unified security gateways are continuously improved. Comprehensive high performance unified security gateways. The Eudemon provides DDoS attack operation solutions or DDoS attack defense solutions can be the high-performance network security helping enterprises increase provided for various users. work efficiency. The Eudemon gateways based on Huawei VRP software platform, has a wide range of features: Integration  Firewall, VPN, L2TP, MPLS and Traffic Shaping  DDoS Protection The Eudemon series products have integrated multiple functions such as  IPS, Antispam, Antivirus the firewall, router, UTM (IPS, AV, URL,  URL Filtering, P2P blocking AS), VPN, 3G and WiFi to provide users with completely all-in-one solutions,  Traffic Control thus greatly saving users’ investments  IM Software Control and reducing users’ maintenance costs. In addition, the Eudemon supports the  L2/L3 Routing L2TP, IPSec, SSL, and MPLS VPN  WAN Optimization services. The Eudemon integrates  Virtual Firewalling major security functions into a device, which helps customers improve the  Multiple Security Zones security capability and work efficiency,  Link Bundling and save investment.  Comprehensive QoS
  • 2. Multi-Core Architecture The Eudemon adopts the embedded multi-core architecture. The multi-core architecture improves the performance, ensuring the high-speed concurrent processing of services, such as IPS, anti-spam, NAT, ASPF, DDoS protection, and VPN. In addition, the multi-core architecture ensures the smooth usage and performance of UTM functions. Multi Adaptable The Eudemon supports multiple VPN networking technologies such as GRE, L2TP, IPSec, SSL and MPLS. The Eudemon adopts built-in high performance hardware encryption and decryption chips making Eudemon the leader on the market. The Eudemon support various algorithms and protocols such as DES/3DES, AES, IKEv2, Auth, NAT, etc. Beside FE and GE, depends on platform, the Eudemon through fixed board interfaces or expansion slots can support E1, CE1, ADSL, ADSL2+, WiFi, 3G Table 1: Eudemon 200E Series Performance Eudemon 200E-B 200E-X1/X1W 200E-X2/X2W 200E-C 200E-F 200E-X3 200E-X5 200E-X6 200E-X7 Throughput (Mbps/Gbps) 200M 200M 300M 400M 1G 2G 3G 5G 6G Maximum number of 20000 100000 200000 400000 1200000 1000000 1000000 1200000 1200000 concurrent connections New connections per 2000 2000 3000 25000 25000 20000 20000 40000 40000 second IPSEC VPN 60 40 50 300 500 300 500 1G 2G Throughput(Mbps) IPSEC Tunnels 64 64 64 2000 2000 2000 2000 2000 2000 SSL VPN Maximum 20 20 20 100 100 100 100 150 200 number of concurrent users Table 2: Eudemon 1000E Series Performance Eudemon Eudemon Eudemon Eudemon Eudemon Eudemon Eudemon Eudemon 1000E-U2 1000E-U3 1000E-U5 1000E-U6 1000E-X3 1000E-X5 1000E-X6 Maximum throughput 2G 4G 6G 8G 6G 10G 15G Connections per second 60K 80K 100K 150K 100K 150K 200K Number of concurrent 1.6M 1.6M 1.6M 2M 2M 3M 4M connections Maximum VPN 2G 4G 5G 6G 4G 5G 7G throughput Number of VPN tunnels 15K 15K 15K 15K 15K 15K 15K Maximum number of 100 100 100 100 100 100 100 virtual firewalls www.huawei.com Huawei Technologies, May 2011: The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.