Numéro de produit: CORBEAU 4500

Système de détection d’intrusion RAVEN - RAVEN 4500

Montage en rack 2U, 5 ports TX FE/GE fixes, 1 emplacement pour module multimédia étendu, alimentation redondante fixe

  • Disponibilité:
    Asie-Pacifique
  • Statut:
    Actif

Spécifications

Type

CORBEAU 4500

Nom

CORBEAU 4500

Description

Montage en rack 2U, 5 ports TX FE/GE fixes, 1 emplacement pour module multimédia étendu, alimentation redondante fixe × ×

Type de port et quantité

5 ports FE/GE TX fixes, 2 ports USB, 1 port console RJ45, 1 port de gestion hors bande GE TX × × × ×

Type de rayonnement thermique

Ventilateur fixe

Emplacement étendu

1 × emplacement pour module multimédia étendu

Alimentation

2 × PSU redondants fixes

Tension de fonctionnement

100-240 VCA, 50-60 Hz, alimentation redondante prise en charge

Humidité admissible (stockage/transport)

5 % à 95 %

Température de fonctionnement

0-+40 °C

Température minimale de stockage

-20°C à + 70 °C

Humidité relative (sans condensation)

5-85 %

Largeur totale

435 mm

Hauteur totale

88 mm

Profondeur

360 mm

Poids

9.6 kg

Type de montage

Montage en rack

Caractéristiques du logiciel

Data Collection and Analysis Standard data collection, standard protocol analysis, customized data collection, customized protocol analysis
Threat Detection Event detection with pre-defined feature
Event detection with customized feature
Threat detection basing on threat intelligence database
SQL injection and XXS attack detection
APT static detection of malicious samples
Virus detection basing on virus database
Detection basing on secondary event
Threat Display Display the total amount of all attacks in latest 24hours
Display the total amount of the denial of service attack in latest 24hours
Display the total amount of port scanning attack in latest 24hours
Display the total amount of worms attack in latest 24hours
Display the total amount of Trojan horse attack in latest 24hours
Display the Top5 attack type whose attack amount are the most among all the attacks in latest 24hours
Display the amount of each attack type in latest 24hours
Display the traffic trend in latest 24hours
Display the detailed information of the attack, including source ID, destination IP, source port, destination port, the time when the attack take place, illustration of the attack, the parameter that returns
Using the attack event as clues is supported, it can show the distribution of historical event and the threat intelligence of the IP which is related to the attack event in the form of asset portraits
Support attack event tracing basing on the source IP or the destination IP of the attack
Traffic Accounting Support macro traffic monitoring in network, including total flow, web flow, email flow, database flow, P2P flow and other flow
Support micro traffic recording in network, including the recording of P2P flow, DNS flow, IP/port flow, the flow of important protocol, the flow of key operating and maintenance and the flow of key web behavior
Threat Response Support web alarm of attack event
Support to send out the attack event
Support local record of the attack event
Support the original message record of the attack event
Support the RST blocking of the attack
Support the cooperation with firewall
Support the cooperation with ATP
Asset Configuration Support to configure the monitoring of key web server
Support to configure the binding of IP-MAC
Report Management Support to create analysis report
Support to create basic report
Support to create advanced accounting report
Support to create detailed event report
Support to create the report in various format, including PDF, Word, HTML, Excel
System Management Support to configure the syslog server to send out the event
Support SNMP configuration
Support email notification
Support to configure the cooperation with firewall
Support manual updates of database via web, including the event database and the threat intelligence database etc.
Support the maintenance and alarm of disk
Support proxy configuration
Support the configuration of the attention degree of an event
Resource Monitoring Support to monitor the usage rate of the CPU of device
Support to monitor the usage rate of the RAM of device
Support to monitor the usage rate of the disk of device

Vibration CEI 60068-2-6

1 mm, 2 Hz-13,2 Hz, 90 min. ; 0,7 g, 13,2 Hz-100 Hz, 90 min. ; 3,5 mm, 3 Hz-9 Hz, 10 cycles, 1 octave/min. ; 1 g, 9 Hz-150 Hz, 10 cycles, 1 octave/min

Choc CEI 60068-2-27

15 g, durée 11 ms, 18 chocs

Décharge électrostatique (ESD) EN 61000-4-2

Décharge contact 4 kV, décharge air 8 kV

Champ électromagnétique EN 61000-4-3

10 V/m (80-1000 MHz), 3 V/m (1000-6000 MHz)

Transitoires rapides (éclatement) EN 61000-4-4

Ligne électrique 2 kV, ligne de données 1 kV

Surtension EN 61000-4-5

ligne électrique : 2 kV (ligne/terre), 1 kV (ligne/terre), 1 kV ligne de données

Immunité à la conduction EN 61000-4-6

10 V (150 kHz-80 MHz)

EN 61000-4-8 puissance fréquence champ magnétique

30A/m

EN 61000-4-11 chutes de tension, interruptions brèves

0 % (20 ms), 40 % (300 ms), 70 % (500 ms), 0 % (5 s)

EN 55032

EN 55032 Classe A

EN 61000-3-2

EN 61000-3-2 Classe A

EN 61000-3-3

EN 61000-3-3

FCC CFR47 Part 15

FCC 47CFR Part 15, classe A

FCC

Conforme

Certificat d'accès au réseau chinois

Conforme

Conforme au RoHS

Conforme à RoHS( (EU) 2015/863 ) et RoHS( GB/T26572-2011 )

Accessoires à commander séparément

Module média

Contenu de la livraison

1 appareil, 1 câble de mise à la terre, 2 cordons d'alimentation, 1 câble de console, 1 câble Cat5UTP 2M, 1 package d'installation × × × × × ×

Mise à jour et révision

Numéro de révision : 0.12 Date de révision : 14-05-2024

Mise à jour et révision

Numéro de révision : 0.12 Date de révision : 14-05-2024