DefensePro

Radware DefensePro Models and Technical Specifications

Ensure adaptive protection from today’s most advanced DDoS attacks.

 

๋ผ๋“œ์›จ์–ด์˜ DefensePro X ํ”Œ๋žซํผ ์ œํ’ˆ๊ตฐ:

DefensePro X10 ๋ฐ X20

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

์ตœ๋Œ€ 10Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰์„ ์ œ๊ณตํ•˜๋Š” ์ด ํ”Œ๋žซํผ์€ ๊ธฐ์—…์—์„œ ๋ฐฐ์น˜ํ•œ ์ค‘์†Œ ๊ทœ๋ชจ์˜ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ ๋ณดํ˜ธ์— ์ ํ•ฉํ•œ ์„ค๊ณ„์ž…๋‹ˆ๋‹ค.

  • ๋ชจ๋“ˆ์‹ ํ˜„์žฅ ์—…๊ทธ๋ ˆ์ด๋“œ ๊ฐ€๋Šฅ NIC ๋ฐ TLS ํ•˜๋“œ์›จ์–ด ๊ฐ€์†๊ธฐ ๋ชจ๋“ˆ
  • ๋‚ด๋ถ€ ๋ฐ”์ดํŒจ์Šค NIC๋กœ TCO ํ–ฅ์ƒ
  • ์„ฑ๋Šฅ ํ–ฅ์ƒ - DefensePro 6 ๋Œ€๋น„ ์ตœ๋Œ€ 2๋ฐฐ ๊ณต๊ฒฉ PPS ๋ฐ 2๋ฐฐ TLS ๊ณต๊ฒฉ CSP
  • ํ•˜๋“œ์›จ์–ด์—์„œ TLS ๊ฐ€์†๊ธฐ ๋ชจ๋“ˆ๋กœ TLS 1.3 ์ง€์›
  • ์ตœ๋Œ€ 10/20Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰ ๋ฐ 5/10Gbp์˜ ํ•ฉ๋ฒ• ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต
DefensePro X10 ๋ฐ X20
DefensePro X40

DefensePro X40

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

40Gbps์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰์„ ์ œ๊ณตํ•˜๋Š” ์ด ํ”Œ๋žซํผ์€ ๊ธฐ์—…์—์„œ ๋ฐฐํฌํ•œ ์ค‘๊ฐ„ ๊ทœ๋ชจ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ ๋ณดํ˜ธ์šฉ์œผ๋กœ ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

  • ๋†’์€ ํฌํŠธ ๋ฐ€๋„ - 40G ๋ฐ 10G ๊ฒฝ๊ฐ ์ธํ„ฐํŽ˜์ด์Šค
  • ํ•˜๋“œ์›จ์–ด์—์„œ TLS 1.3 ์ง€์›
  • ๊ฐ€์„ฑ๋น„ ์ถฉ์กฑ
  • ์ตœ์‹  CPU๋กœ ์„ฑ๋Šฅ ์ตœ์ ํ™”
  • ์ตœ๋Œ€ 40Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰๊ณผ ์ตœ๋Œ€ 40Gbp์˜ ํ•ฉ๋ฒ•์  ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต

DefensePro X50 & X50HP

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

Offering 50 Gbps of mitigation capacity, this platform is designed for medium & large size data centers protection deployed by enterprises.

  • Modular, Field Upgradable NICs, offering 40G and 10G Mitigation Interfaces with or without internal bypass.
  • Accelerated TLS 1.3 Support in Hardware
  • High Performance with up to 45MPPS (X50) / 200MPPS (X50HP)
  • ๊ฐ€์„ฑ๋น„ ์ถฉ์กฑ
  • ์ตœ๋Œ€ 50Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰๊ณผ ์ตœ๋Œ€ 40Gbp์˜ ํ•ฉ๋ฒ•์  ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต
DefensePro X50 & X50HP
DefensePro X40

DefensePro X80

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

80Gbps์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰์„ ์ œ๊ณตํ•˜๋Š” ์ด ํ”Œ๋žซํผ์€ ์ค‘๋Œ€ํ˜• ๊ธฐ์—…์ด๋‚˜ ์ „์ž์ƒ๊ฑฐ๋ž˜์—์„œ ๋ฐฐํฌํ•œ ๋Œ€๊ทœ๋ชจ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ ๋ณดํ˜ธ์šฉ์œผ๋กœ ๊ฐœ๋ฐœ๋˜์—ˆ์Šต๋‹ˆ๋‹ค

  • ๋†’์€ ํฌํŠธ ๋ฐ€๋„ - 40G ๋ฐ 10G ๊ฒฝ๊ฐ ์ธํ„ฐํŽ˜์ด์Šค
  • ํ•˜๋“œ์›จ์–ด์—์„œ TLS 1.3 ์ง€์›
  • ๊ฐ€์„ฑ๋น„ ์ถฉ์กฑ
  • ์ตœ์‹  CPU๋กœ ์„ฑ๋Šฅ ์ตœ์ ํ™”
  • ์ตœ๋Œ€ 80Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰๊ณผ ์ตœ๋Œ€ 40Gbp์˜ ํ•ฉ๋ฒ•์  ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต

DefensePro X90 & X90HP

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

Offering 90 Gbps of mitigation capacity, this platform is designed for medium & large size data centers protection deployed by enterprises.

  • Modular, Field Upgradable NICs, offering 40G and 10G Mitigation Interfaces with or without internal bypass.
  • Accelerated TLS 1.3 Support in Hardware
  • High Performance with up to 45MPPS (X90) / 200MPPS (X90HP)
  • ๊ฐ€์„ฑ๋น„ ์ถฉ์กฑ
  • ์ตœ๋Œ€ 90Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰๊ณผ ์ตœ๋Œ€ 40Gbp์˜ ํ•ฉ๋ฒ•์  ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต
DefensePro X50 & X50HP
DefensePro X100 ๋ฐ X200

DefensePro X100 ๋ฐ X200

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

100Gbps ๋ฐ 200Gbps์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰์„ ์ œ๊ณตํ•˜๋Š” ์ด ํ”Œ๋žซํผ์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ณณ์— ๋ฐ”๋žŒ์งํ•ฉ๋‹ˆ๋‹ค.

  • ๋†’์€ ํฌํŠธ ๋ฐ€๋„ - 100G ๋ฐ 40G ๊ฒฝ๊ฐ ์ธํ„ฐํŽ˜์ด์Šค
  • ์ตœ๋Œ€ 140MPPS์˜ ๊ณ ์„ฑ๋Šฅ
  • ํ•˜๋“œ์›จ์–ด์—์„œ TLS 1.3 ์ง€์›
  • ์ตœ๋Œ€ 100/200Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰ ๋ฐ 50/100Gbp์˜ ํ•ฉ๋ฒ• ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต

DefensePro X110 & X220 & X380

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

110Gbps, 220Gbps, 380Gbps์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰์„ ์ œ๊ณตํ•˜๋Š” ์ด ํ”Œ๋žซํผ์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ณณ์— ๋ฐ”๋žŒ์งํ•ฉ๋‹ˆ๋‹ค.

  • High port density - 100G and 40G mitigation interfaces
  • Ultra-high performance - up to 530MPPS
  • TLS 1.3 support in hardware
  • Offering up to 110/220/380 Gbps of mitigation capacity and 50/100/200 Gbps of legitimate traffic
DefensePro X110 & X220 & X380
DefensePro X800 ๋ฐ X400

DefensePro X400 ๋ฐ X800

ํ”Œ๋žซํผ ํ•˜์ด๋ผ์ดํŠธ

์ตœ๋Œ€ 400/800โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹Gbps์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰์„ ์ œ๊ณตํ•˜๋Š” ์ด ํ”Œ๋žซํผ์€ ๋‹ค์Œ์„ ์œ„ํ•ด ๊ฐœ๋ฐœ๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

  • ๋†’์€ ํฌํŠธ ๋ฐ€๋„ - 100G ๋ฐ 400G ๊ฒฝ๊ฐ ์ธํ„ฐํŽ˜์ด์Šค
  • ์ตœ๋Œ€ 1.119BPPS์˜ ํƒ์›”ํ•œ ์„ฑ๋Šฅ
  • ์ตœ๋Œ€ 400/800Gbp์˜ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰ ๋ฐ 200/380Gbp์˜ ํ•ฉ๋ฒ• ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต

๋ผ๋“œ์›จ์–ด ์˜์—…๋ถ€์— ๋ฌธ์˜ํ•˜๊ธฐ

๋ผ๋“œ์›จ์–ด ์ „๋ฌธ๊ฐ€๋“ค์ด ๊ท€ํ•˜์˜ ์งˆ๋ฌธ์— ๋‹ตํ•˜๊ณ , ์–ด๋–ค ํ•ด๊ฒฐ์ฑ…์ด ํ•„์š”ํ•œ์ง€ ์ง„๋‹จํ•˜๊ณ , ์–ด๋–ค ์ œํ’ˆ์ด ๊ท€์‚ฌ์˜ ์‚ฌ์—…์— ๊ฐ€์žฅ ์ ํ•ฉํ•œ์ง€ ์ดํ•ดํ•˜์‹ค ์ˆ˜ ์žˆ๋„๋ก ๋„์™€๋“œ๋ฆฝ๋‹ˆ๋‹ค.

ํ˜„์žฌ ๊ณ ๊ฐ์ด์‹ญ๋‹ˆ๊นŒ?

๊ธฐ์ˆ  ์ง€์› ๋˜๋Š” ์ถ”๊ฐ€ ์„œ๋น„์Šค๊ฐ€ ํ•„์š”ํ•˜์‹œ๊ฑฐ๋‚˜ ๋‹น์‚ฌ ์ œํ’ˆ ๋ฐ ์†”๋ฃจ์…˜์— ๊ด€ํ•ด ๊ถ๊ธˆํ•˜์‹  ์ ์ด ์žˆ๋‹ค๋ฉด ์ €ํฌ๊ฐ€ ์ฆ‰์‹œ ๋„์™€๋“œ๋ฆฌ๊ฒ ์Šต๋‹ˆ๋‹ค.

์‚ฌ์—…์žฅ ์†Œ์žฌ์ง€
์ฆ‰์‹œ ๋‹ต์„ ๊ตฌํ•  ์ˆ˜ ์žˆ๋Š” ์ง€์‹ ์ •๋ณด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค
๋ฌด๋ฃŒ ์˜จ๋ผ์ธ ์ œํ’ˆ ๊ต์œก
๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ  ์ง€์›๋ถ€์™€์˜ ์ƒ๋‹ด
๋ผ๋“œ์›จ์–ด ๊ณ ๊ฐ ํ”„๋กœ๊ทธ๋žจ ์ฐธ์—ฌ

์†Œ์…œ๋ฏธ๋””์–ด

์ „๋ฌธ๊ฐ€๋“ค๊ณผ ๊ต๋ฅ˜ํ•˜๊ณ  ๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ ์— ๊ด€ํ•œ ๋Œ€ํ™”์— ์ฐธ์—ฌํ•˜์„ธ์š”.

๋ธ”๋กœ๊ทธ
๋ณด์•ˆ ์—ฐ๊ตฌ ์„ผํ„ฐ
CyberPedia