SlideShare a Scribd company logo
Protect Your Network
 Eudemon All-in-One UTM

                                                                     Leading UTM Performance
                                                                     Huawei firewalls have leading
                                                                     performance in the industry. The three
                                                                     main indexes of the firewall, namely,
                                                                     number of connections established per
                                                                     second, maximum number of
                                                                     concurrent connections, and
                                                                     throughput of the integrated device,
                                                                     are in leading roles in the industry. In
                                                                     particular, the number of connections
                                                                     established per second of Huawei
                                                                     Eudemon 1000E series products is
                                                                     three to five times that of the industry
                                                                     average level. The UTM signature
                                                                     (globally updatable) effectively protects
                                                                     enterprises against intrusion and
                                                                     attacks exploiting network
                                                                     vulnerabilities, worms, Spam, phishing,
                                                                     and malicious websites.

                                                                     DDoS Attack Defense
                                                                     Huawei has professional DDoS attack
                                                                     analysis teams. Huawei firewalls can
                                                                     effectively identify and defend against
                                                                     various DDoS attacks including SYN,
                                                                     UDP, ICMP, DNS, CC attacks, and
                                                                     others. In addition, for the new variants
                                                                     of DDoS attacks, as the DDoS attack
Exploring Network Security                                           defense signature database is
                                                                     synchronously updated, the DDoS
                                                                     attack defense capabilities of users are
Huawei Secoway Eudemon series of unified security gateways are       continuously improved. Comprehensive
high performance unified security gateways. The Eudemon provides     DDoS attack operation solutions or
                                                                     DDoS attack defense solutions can be
the high-performance network security helping enterprises increase   provided for various users.
work efficiency. The Eudemon gateways based on Huawei VRP
software platform, has a wide range of features:
                                                                     Integration
           Firewall, VPN, L2TP, MPLS and Traffic Shaping
           DDoS Protection                                          The Eudemon series products have
                                                                     integrated multiple functions such as
           IPS, Antispam, Antivirus                                 the firewall, router, UTM (IPS, AV, URL,
           URL Filtering, P2P blocking                              AS), VPN, 3G and WiFi to provide users
                                                                     with completely all-in-one solutions,
           Traffic Control                                          thus greatly saving users’ investments
           IM Software Control                                      and reducing users’ maintenance costs.
                                                                     In addition, the Eudemon supports the
           L2/L3 Routing
                                                                     L2TP, IPSec, SSL, and MPLS VPN
           WAN Optimization                                         services. The Eudemon integrates
           Virtual Firewalling                                      major security functions into a device,
                                                                     which helps customers improve the
           Multiple Security Zones                                  security capability and work efficiency,
           Link Bundling                                            and save investment.

           Comprehensive QoS
Multi-Core Architecture
 The Eudemon adopts the embedded multi-core
 architecture. The multi-core architecture improves
 the performance, ensuring the high-speed concurrent
 processing of services, such as IPS, anti-spam, NAT,
 ASPF, DDoS protection, and VPN. In addition, the
 multi-core architecture ensures the smooth usage
 and performance of UTM functions.

 Multi Adaptable
 The Eudemon supports multiple VPN networking
 technologies such as GRE, L2TP, IPSec, SSL and MPLS.
 The Eudemon adopts built-in high performance
 hardware encryption and decryption chips making
 Eudemon the leader on the market. The Eudemon
 support various algorithms and protocols such as
 DES/3DES, AES, IKEv2, Auth, NAT, etc.

 Beside FE and GE, depends on platform, the Eudemon
 through fixed board interfaces or expansion slots can
 support E1, CE1, ADSL, ADSL2+, WiFi, 3G

 Table 1: Eudemon 200E Series Performance
      Eudemon                             200E-B     200E-X1/X1W         200E-X2/X2W          200E-C         200E-F        200E-X3       200E-X5       200E-X6           200E-X7
      Throughput (Mbps/Gbps)              200M            200M                300M             400M             1G            2G            3G             5G               6G
      Maximum number of                   20000          100000              200000           400000        1200000        1000000       1000000       1200000          1200000
      concurrent connections
       New connections per                 2000            2000               3000             25000         25000          20000         20000         40000             40000
      second
       IPSEC VPN                            60              40                  50              300             500           300           500            1G               2G
      Throughput(Mbps)
       IPSEC Tunnels                        64              64                  64             2000           2000           2000          2000          2000             2000
       SSL VPN Maximum                      20              20                  20             100            100            100           100            150             200
      number of concurrent users



 Table 2: Eudemon 1000E Series Performance
               Eudemon                    Eudemon            Eudemon              Eudemon              Eudemon              Eudemon               Eudemon               Eudemon
                                          1000E-U2           1000E-U3             1000E-U5             1000E-U6             1000E-X3              1000E-X5              1000E-X6
     Maximum throughput                       2G                  4G                  6G                   8G                   6G                   10G                   15G
     Connections per second                   60K                 80K                100K                 150K                 100K                  150K                  200K
     Number of concurrent                    1.6M                1.6M                1.6M                  2M                   2M                    3M                    4M
     connections
     Maximum VPN                               2G                 4G                  5G                   6G                    4G                   5G                    7G
     throughput
     Number of VPN tunnels                    15K                 15K                 15K                  15K                  15K                   15K                  15K
     Maximum number of                        100                 100                 100                  100                  100                   100                  100
     virtual firewalls




                                                                                                                                                                 www.huawei.com

Huawei Technologies, May 2011: The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and
operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed
or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the
information at any time without notice.

More Related Content

What's hot

English version mobile computers reference catalog
English version   mobile computers reference catalogEnglish version   mobile computers reference catalog
English version mobile computers reference catalog
erolcet
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
Yustinus Malawau
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01
Niit Care
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08
Niit Care
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12
Niit Care
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
OpenStack Foundation
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
Niit Care
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
Cisco Public Relations
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
Niit Care
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cisco Public Relations
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05
Niit Care
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco Public Relations
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
Cisco Public Relations
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07
Niit Care
 

What's hot (20)

English version mobile computers reference catalog
English version   mobile computers reference catalogEnglish version   mobile computers reference catalog
English version mobile computers reference catalog
 
Panda 2010
Panda 2010Panda 2010
Panda 2010
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Cloud circle Simon Withers
Cloud circle Simon WithersCloud circle Simon Withers
Cloud circle Simon Withers
 
Cinemeccanica
Cinemeccanica Cinemeccanica
Cinemeccanica
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Whats the weather tomorrow
Whats the weather tomorrowWhats the weather tomorrow
Whats the weather tomorrow
 
Mcafee 3
Mcafee 3Mcafee 3
Mcafee 3
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07
 

Similar to Huawei Network Security Newsletter

Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
Paetec security solutions brochure
Paetec security solutions brochurePaetec security solutions brochure
Paetec security solutions brochure
David Santos
 
Paetec Security Solutions
Paetec Security SolutionsPaetec Security Solutions
Paetec Security Solutions
David Santos
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
Niranjana Padmanabhan
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
Simon May
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
Edie II
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
dsfsadfas
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
IJORCS
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Private Cloud
 

Similar to Huawei Network Security Newsletter (20)

Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 
Paetec security solutions brochure
Paetec security solutions brochurePaetec security solutions brochure
Paetec security solutions brochure
 
Paetec Security Solutions
Paetec Security SolutionsPaetec Security Solutions
Paetec Security Solutions
 
Utm
UtmUtm
Utm
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Sonicwall tz series new
Sonicwall tz series newSonicwall tz series new
Sonicwall tz series new
 
At&t2
At&t2At&t2
At&t2
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
Sonic Wall Product Line Brochure
Sonic Wall Product Line BrochureSonic Wall Product Line Brochure
Sonic Wall Product Line Brochure
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
 

Recently uploaded

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 

Huawei Network Security Newsletter

  • 1. Protect Your Network Eudemon All-in-One UTM Leading UTM Performance Huawei firewalls have leading performance in the industry. The three main indexes of the firewall, namely, number of connections established per second, maximum number of concurrent connections, and throughput of the integrated device, are in leading roles in the industry. In particular, the number of connections established per second of Huawei Eudemon 1000E series products is three to five times that of the industry average level. The UTM signature (globally updatable) effectively protects enterprises against intrusion and attacks exploiting network vulnerabilities, worms, Spam, phishing, and malicious websites. DDoS Attack Defense Huawei has professional DDoS attack analysis teams. Huawei firewalls can effectively identify and defend against various DDoS attacks including SYN, UDP, ICMP, DNS, CC attacks, and others. In addition, for the new variants of DDoS attacks, as the DDoS attack Exploring Network Security defense signature database is synchronously updated, the DDoS attack defense capabilities of users are Huawei Secoway Eudemon series of unified security gateways are continuously improved. Comprehensive high performance unified security gateways. The Eudemon provides DDoS attack operation solutions or DDoS attack defense solutions can be the high-performance network security helping enterprises increase provided for various users. work efficiency. The Eudemon gateways based on Huawei VRP software platform, has a wide range of features: Integration  Firewall, VPN, L2TP, MPLS and Traffic Shaping  DDoS Protection The Eudemon series products have integrated multiple functions such as  IPS, Antispam, Antivirus the firewall, router, UTM (IPS, AV, URL,  URL Filtering, P2P blocking AS), VPN, 3G and WiFi to provide users with completely all-in-one solutions,  Traffic Control thus greatly saving users’ investments  IM Software Control and reducing users’ maintenance costs. In addition, the Eudemon supports the  L2/L3 Routing L2TP, IPSec, SSL, and MPLS VPN  WAN Optimization services. The Eudemon integrates  Virtual Firewalling major security functions into a device, which helps customers improve the  Multiple Security Zones security capability and work efficiency,  Link Bundling and save investment.  Comprehensive QoS
  • 2. Multi-Core Architecture The Eudemon adopts the embedded multi-core architecture. The multi-core architecture improves the performance, ensuring the high-speed concurrent processing of services, such as IPS, anti-spam, NAT, ASPF, DDoS protection, and VPN. In addition, the multi-core architecture ensures the smooth usage and performance of UTM functions. Multi Adaptable The Eudemon supports multiple VPN networking technologies such as GRE, L2TP, IPSec, SSL and MPLS. The Eudemon adopts built-in high performance hardware encryption and decryption chips making Eudemon the leader on the market. The Eudemon support various algorithms and protocols such as DES/3DES, AES, IKEv2, Auth, NAT, etc. Beside FE and GE, depends on platform, the Eudemon through fixed board interfaces or expansion slots can support E1, CE1, ADSL, ADSL2+, WiFi, 3G Table 1: Eudemon 200E Series Performance Eudemon 200E-B 200E-X1/X1W 200E-X2/X2W 200E-C 200E-F 200E-X3 200E-X5 200E-X6 200E-X7 Throughput (Mbps/Gbps) 200M 200M 300M 400M 1G 2G 3G 5G 6G Maximum number of 20000 100000 200000 400000 1200000 1000000 1000000 1200000 1200000 concurrent connections New connections per 2000 2000 3000 25000 25000 20000 20000 40000 40000 second IPSEC VPN 60 40 50 300 500 300 500 1G 2G Throughput(Mbps) IPSEC Tunnels 64 64 64 2000 2000 2000 2000 2000 2000 SSL VPN Maximum 20 20 20 100 100 100 100 150 200 number of concurrent users Table 2: Eudemon 1000E Series Performance Eudemon Eudemon Eudemon Eudemon Eudemon Eudemon Eudemon Eudemon 1000E-U2 1000E-U3 1000E-U5 1000E-U6 1000E-X3 1000E-X5 1000E-X6 Maximum throughput 2G 4G 6G 8G 6G 10G 15G Connections per second 60K 80K 100K 150K 100K 150K 200K Number of concurrent 1.6M 1.6M 1.6M 2M 2M 3M 4M connections Maximum VPN 2G 4G 5G 6G 4G 5G 7G throughput Number of VPN tunnels 15K 15K 15K 15K 15K 15K 15K Maximum number of 100 100 100 100 100 100 100 virtual firewalls www.huawei.com Huawei Technologies, May 2011: The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.