Product Overview
Faced with increasingly serious network threats and dramatically
Product Series
Product Features
Advanced and scalable distributed structure
The Eudemon8040 and the Eudemon8080 are configured with
four and eight expansion slots respectively. The number of service
processing boards and interface boards to be configured is at
users' option. The Eudemon8000 series products adopt the
advanced distributed hardware architecture, and load balancing
is implemented among service boards. The Eudemon8000 series
products support the scalable security solution with throughput at a
maximum of 20 Gbps.
Eudemon8080
at a speed of 6000000 pps. Even under the attacks with the line
distinguish the attack traffic from the normal traffic and then clean
the attack traffic to guarantee the secure transmission of service
service boards support load balancing and hot backup; thus the failure
of a single board does not affect the normal operation of the system.
series products divert and clean the abnormal traffic, and then
inject the cleaned traffic to the original path. In addition, the
Eudemon8000 series products control abnormal traffic such as
DDoS attack traffic and P2P traffic with fine granularity to prevent
the junk traffic from saturating network links.
address pools. The Eudemon series products can support the NAT
log server software to process binary logs, which can avoid the loss
Typical Networking
SIG
Inspection and
analysis center
Management
center
Divert traffic
MAN
Inject
Eudemon8000
Control and cleaning center
Intranet user
Big customer/
Internet cafe
IDC
Internet
Eudemon8000
IDC
Basic-service zone
Value-addedservice zone
Management &
Maintenance zone
Other zones
Product Specifications
Item
Eudemon8040
Eudemon8080
Fixed interface
Expansion slot
Ethernet interfaces: 2GE, 4GE, 16FE, 32FE, 2GE+8FE, 2GE+16 FE, 110GE
POS interface: 4155M, 2622M, 12.5G, 110G
482.6420352.8
482.6420797.3
Weight
50Kg
85Kg
Item
Eudemon8040
Eudemon8080
Input voltage
600W
1000W
37.54 years
37.54 years
SYN flood, ICMP flood, UDP flood, CC attack, IP Spoofing, LAND attack, Smurf attack, Fraggle attack,
Winnuke, Ping of Death, Tear Drop, address scanning, port scanning, IP Option control, IP fragments control,
TCP flag validity check, super ICMP packet control, ICMP redirection packet, ICMP unreachable packet,
TRACERT packet, HTTP Get attack, BGP Flood attack, DNS Flood attack, etc.
NO WARRANTY
THE CONTENTS OF THIS BROCHURE ARE PROVIDED AS IS. EXCEPT AS REQUIRED BY APPLICABLE LAWS, NO WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE MADE IN RELATION TO THE
ACCURACY, RELIABILITY OR CONTENTS OF THIS MANUAL.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO CASE SHALL HUAWEI TECHNOLOGIES CO., LTD BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, OR
CONSEQUENTIAL DAMAGES, OR LOST PROFITS, BUSINESS, REVENUE, DATA, GOODWILL OR ANTICIPATED SAVINGS.