Cisco WS-SVC-AGM-1-K9= Ficha de datos

Busca en linea o descarga Ficha de datos para Componentes del interruptor de red Cisco WS-SVC-AGM-1-K9=. Cisco Catalyst 6500 Anomaly Guard Module Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 12
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
Data Sheet
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 11
Cisco Anomaly Guard Module
The Cisco
®
Anomaly Guard Module is an integrated services module for Cisco Catalyst
6500 Series switches and Cisco 7600 Series routers that delivers a powerful and
extensive solution for defending online resources against massive distributed denial-of-
service (DDoS) attacks. Designed to meet the performance and scalability requirements
of the largest and most demanding enterprise and service provider environments, the
Cisco Anomaly Guard Module delivers unprecedented levels of protection for defeating
today’s increasingly complex and elusive attacks.
A single Cisco Anomaly Guard Module (Figure 1) provides the platform for processing attack traffic
at multigigabit line rates. The Anomaly Guard Module employs a unique “on-demand” deployment
model, diverting and scrubbing only traffic addressed to targeted devices or zones without
affecting other traffic. Integrated multiple layers of defense within the Anomaly Guard Module
enable it to identify and block malicious attack traffic while allowing legitimate transactions to
continue flowing to their original destinations. Business operations continue uninterrupted, even in
the midst of attack.
Figure 1. Cisco Anomaly Guard Module
Multiple Cisco Anomaly Guard Modules, working together in a single chassis, can incrementally
scale to support many times the single module rate, delivering a scalable solution that easily
adapts to large and growing enterprise and service provider environments. The Anomaly Guard
Module’s multiprocessor architecture can support future licensed software upgrades to enhance
and improve performance for defending against massive attacks.
Evolving DDoS Attacks
Today’s DDoS attacks are more destructive and focused than ever. These attacks can easily elude
and overwhelm the most common defenses. Composed of requests that appear legitimate,
massive numbers of “zombie” sources, and spoofed identities that make it virtually impossible to
identify and block these malicious flows, DDoS attacks paralyze their victims and prevent them
from conducting business, costing billions of dollars per year in losses—from lost transactions and
customers to damaged reputations and legal liabilities.
The Cisco Anomaly Guard Module defends against all types of DDoS attacks, enabling businesses
to identify and block malicious traffic without compromising their mission-critical and revenue-
bearing operations. Based on a unique, patented multiverification process architecture, the Cisco
Vista de pagina 0
1 2 3 4 5 6 ... 11 12

Indice de contenidos

Pagina 1 - Cisco Anomaly Guard Module

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 11

Pagina 2 - How It Works

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 11

Pagina 3 - Data Sheet

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 11

Pagina 4 - Performance

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 11

Pagina 5

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 11

Pagina 6

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 11

Pagina 7 - Applications

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 11

Pagina 8

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 11

Pagina 9

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 11

Pagina 10 - System Requirements

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 11

Pagina 11 - Ordering Information

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 11

Pagina 12 - For More Information

Data Sheet All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 11

Comentarios a estos manuales

Sin comentarios