Produktnummer: RABE 4500

RAVEN Intrusion Detection System - RAVEN 4500

2U-Rackmontage, 5 × feste FE/GE-TX-Ports, 1 × erweiterter Medienmodulsteckplatz, festes redundantes Netzteil

  • Verfügbarkeit:
    Asien-Pazifik
  • Status:
    Aktiv

Technische Daten

Typ

RABE 4500

Name

RABE 4500

Beschreibung

2U-Rackmontage, 5 × feste FE/GE-TX-Ports, 1 × erweiterter Medienmodulsteckplatz, festes redundantes Netzteil

Port-Typ und Anzahl

5 × feste FE/GE TX-Ports, 2 × USB, 1 × RJ45-Konsolenport, 1 × GE TX Out-of-Band-Management-Port

Art der Wärmestrahlung

Feste Lüftung

Erweiterter Steckplatz

1 × Steckplatz für erweitertes Medienmodul

Stromversorgung

2 × Festinstallierte redundante Netzteile

Betriebsspannung

100–240 VAC, 50–60 Hz, redundantes Netzteil unterstützt

Zulässige Feuchtigkeit (Lagerung/Transport)

5 % bis 95 %

Betriebstemperatur

0-+40 °C

Minimale Lagertemperatur

-20°C Zu +70 °C

Relative Luftfeuchte (nicht kondensierend)

5-85 %

Gesamtbreite

435 mm

Gesamthöhe

88 mm

Tiefe

360 mm

Gewicht

9.6 kg

Montage-Typ

Rackmontage

Software-Spezifikationen

Data Collection and Analysis Standard data collection, standard protocol analysis, customized data collection, customized protocol analysis
Threat Detection Event detection with pre-defined feature
Event detection with customized feature
Threat detection basing on threat intelligence database
SQL injection and XXS attack detection
APT static detection of malicious samples
Virus detection basing on virus database
Detection basing on secondary event
Threat Display Display the total amount of all attacks in latest 24hours
Display the total amount of the denial of service attack in latest 24hours
Display the total amount of port scanning attack in latest 24hours
Display the total amount of worms attack in latest 24hours
Display the total amount of Trojan horse attack in latest 24hours
Display the Top5 attack type whose attack amount are the most among all the attacks in latest 24hours
Display the amount of each attack type in latest 24hours
Display the traffic trend in latest 24hours
Display the detailed information of the attack, including source ID, destination IP, source port, destination port, the time when the attack take place, illustration of the attack, the parameter that returns
Using the attack event as clues is supported, it can show the distribution of historical event and the threat intelligence of the IP which is related to the attack event in the form of asset portraits
Support attack event tracing basing on the source IP or the destination IP of the attack
Traffic Accounting Support macro traffic monitoring in network, including total flow, web flow, email flow, database flow, P2P flow and other flow
Support micro traffic recording in network, including the recording of P2P flow, DNS flow, IP/port flow, the flow of important protocol, the flow of key operating and maintenance and the flow of key web behavior
Threat Response Support web alarm of attack event
Support to send out the attack event
Support local record of the attack event
Support the original message record of the attack event
Support the RST blocking of the attack
Support the cooperation with firewall
Support the cooperation with ATP
Asset Configuration Support to configure the monitoring of key web server
Support to configure the binding of IP-MAC
Report Management Support to create analysis report
Support to create basic report
Support to create advanced accounting report
Support to create detailed event report
Support to create the report in various format, including PDF, Word, HTML, Excel
System Management Support to configure the syslog server to send out the event
Support SNMP configuration
Support email notification
Support to configure the cooperation with firewall
Support manual updates of database via web, including the event database and the threat intelligence database etc.
Support the maintenance and alarm of disk
Support proxy configuration
Support the configuration of the attention degree of an event
Resource Monitoring Support to monitor the usage rate of the CPU of device
Support to monitor the usage rate of the RAM of device
Support to monitor the usage rate of the disk of device

IEC 60068-2-6 Vibration

1 mm, 2 Hz–13,2 Hz, 90 min.; 0,7 g, 13,2 Hz–100 Hz, 90 min.; 3.5 mm, 3 Hz–9 Hz, 10 Zyklen, 1 Oktave/Min.; 1 g, 9 Hz–150 Hz, 10 Zyklen, 1 Oktave/Min.

IEC 60068-2-27 Stoß

15 g, 11 ms Dauer, 18 Stöße

EN 61000-4-2 elektrostatische Entladung (Electrostatic Discharge, ESD)

4 kV Kontaktentladung, 8 kV Luftentladung

EN 61000-4-3 elektromagnetisches Feld

10 V/m (80-1000 MHz), 3 V/m (1000-6000 MHz)

DE 61000-4-4 schnelle Transienten (Burst)

2 kV Stromleitung, 1 kV Datenleitung

DE 61000-4-5 Stoßspannung

Stromleitung: 2 kV (Ader/Erde), 1 kV (Ader/Ader), 1 kV Datenleitung

DE 61000-4-6 Leitungsgeführte Immunität

10 V (150 kHz bis 80 MHz)

EN 61000-4-8 Netzfrequenz Magnetfeld

30A/m

EN 61000-4-11 Spannungseinbrüche, Kurzunterbrechung

0 % (20 ms), 40 % (300 ms), 70 % (500 ms), 0 % (5 s)

EN 55032

EN 55032 Klasse A

EN 61000-3-2

EN 61000-3-2 Klasse A

EN 61000-3-3

EN 61000-3-3

FCC CFR47 Teil 15

FCC 47CFR Teil 15, Klasse A

FCC

Konform

China Network Access Certificate

Konform

RoHS-konform

Entspricht der Norm RoHS (EU 2015/863) und RoHS (GB/T26572-2011)

Zubehör gesondert zu bestellen

Medienmodul

Lieferumfang

1 × Gerät, 1 × Erdungskabel, 2 × Netzkabel, 1 × Konsolenkabel, 1 × Cat5UTP 2M, 1 × Installationspaket

Aktualisierung und Überarbeitung

Revisionsnummer: 0.12 Revisionsdatum: 05-14-2024

Aktualisierung und Überarbeitung

Revisionsnummer: 0.12 Revisionsdatum: 05-14-2024