存储介质
硬盘容量 |
74 GB |
安装的硬盘驱动器的数量 |
2 |
总存储容量 |
148 GB |
环境条件
非运行高度 |
0 - 12192 m |
工作高度 |
0 - 3048 m |
另外
以太网路(RJ-45)连接接口数量 |
1 |
连接方式 |
Wired |
IDP Series Intrusion Detection and Prevention Appliances, 10 Gbps, 16 GB
Juniper Networks IDP Series Intrusion Detection and Prevention Appliances provide comprehensive management of unwanted applications and easy-to-use in-line protection that stops network- and application-level attacks before they inflict any damage, minimizing the time and costs associated with maintaining a secure network. Using industry-recognized stateful detection and prevention techniques, the IDP Series provides zero-day protection against worms, trojans, spyware, key loggers, and other malware from penetrating the network or spreading from already infected users.
IDP Series Intrusion Detection and Prevention Appliances not only help protect networks against attacks, they provide information on rogue servers, as well as types and versions of applications and operating systems that may have unknowingly been added to the network. Application signatures, available on the IDP Series, go a step further by enabling accurate detection and reporting of volume used by applications such as social networking, peer-to-peer, or instant messaging. Armed with the knowledge of specific applications running in the network, administrators can use application policy enforcement rules to easily manage these applications by limiting bandwidth, restricting their use, or prioritizing them lower with DiffServ marking. Not only can administrators control the access of specific applications, they can ensure that business-critical applications receive a predictable quality of service (QoS) while enforcing security policies to maintain compliance with corporate application usage policies.
Collaborative projects are commonplace in today’s workplace. Making sure that security policies are easily enforced requires knowledge of how those collaborative user groups are formed. The IDP Series works in harmony with Juniper Networks Unified Access Control infrastructure to enforce application and security policies based on user-role information learned from the IC Series Unified Access Control Appliances. The IC Series interacts with companies’ Active Directory (AD) or LDAP servers to assign users to roles and provides host information upon which the IDP Series can act. This extends the application policy enforcement (APE) and IPS rules for management of applications and more control over threats.