SlideShare a Scribd company logo
1 of 9
SO SÁNH SWITCH BẢO MẬT
CỦA HanDreamnet(HDN) VÀ
SWITCH CỦA CISCO
Namviet Telecom Ltd
Song Tran
+84 903212322.

1

www.namviettelecom.com
Spec comparison – Cisco(excluding security)
SG2024G
Power

4

4

48 Gbps / 71.4 Mpps

176 Gbps / 42 Mpps

Flash / DRAM

64M / 256M

64M / 128M

32k

8k

Yes

Yes

Smart Port Redundancy

Flexbile Link

Voice VLAN

Yes

Yes

Ring Protocol

Yes

No

UDLD, Cable diagnostic (TDR)

Yes

Yes

Queue per port

8

4

L2/L3/L4 ACL , ACL, Time based ACL,
VLAN ACL

Yes

Yes

DHCP Snooping, IPSG

Yes

Yes

802.1x (Multi user, MAC bypass…)

Yes

Yes

Stacking

Management

24

Port Redundancy

Security

24

STP/RSTP/MSTP/PVST+ / PVRST+

QoS

10/100/1000Base-T

MAC address

Layer 2

External RPS

Capacity/Forwarding Rate
Performance

Internal power redundancy

1000 Base-X

Hardware &
Interface

Catalyst 2960S-24TS

No

Yes

CDP, DHCP Server, SNMPv1/2/3,
TACACS+, RADIUS, IPv6 management,
LLDP, LLDP-MED

Yes

Yes

Flow Monitoring

sFlow

No

2
Security features comparison – Cisco
SG2024G
DoS, DDoS, Flooding, Scan Attack

OK

N.A.

Set up/Release security policy automatically

OK

N.A.

Real time report while Drop Attack traffic

OK

N.A.

Real time log & history for dropping attack on
CLI

OK

N.A.

IP Spoofing attack

Security
features

Catalyst 2960S-24TS

OK

N.A.

ARP Spoofing attack

OK

N.A.

NetBios flooding attack

OK

N.A.

Worm_port_Attack attack

OK

N.A.

TCP/UDP/ICMP DoS/DDoS_Attack

OK

N.A.

TCP SCAN_Attack

OK

N.A.

TCP/UDP/ICMP Flood_Attack

OK

N.A.

TCP Syn Flood Attack

OK

N.A.

Loop detection

OK

N.A.

3
Comparison - features

4
Detectable Attack List by Security Switch
No.

Attack Type

Protocol

Description

DoS Attack

Attacker kept sends bunch traffic to a specific target
based on well known port

IGMP

1

TCP
UDP
ICMP

Attack Name

Attacker kept sends multicast traffic to the pier fast.

2

IP Spoofing Attack

-

3

IP Spoofing Attack

ARP

4

Host scan attack
(IP Scanning)

5

DoS Attack

Attacker sends packet after falsifying SRC IP.
Attacker sends ARP Packets with reliable IP and
attacker MAC.

DDoS(IP Spoofing)

TCP
UDP
ICMP

Attacker sends TCP, UDP, ICMP request to all
reachable Host on the network.

Scan Attack
Scan Flooding

Port Scan Attack

TCP
UDP

Sending port scan packet to the target host.

Port Scan

Host Random
Flooding Attack

TCP
UDP
ICMP

Sending packets with any IP address to the target UDP,
TCP ports.

Random Attack

Flooding packets which are abnormal value on
destination port / source port of TCP or UDP.

Random Flooding

7

ICMP Redirect
Attack

ICMP

Sending ICMP redirect packet to the target host

ICMP Redirect Attack

8

ARP Attack

ARP

9

Broadcast Attack

10

MAC Flooding

-

Sending random source MAC Address to run out ARP
table

MAC Flooding

11

Self-Loop

-

Packet Loop

Self_Loop

12

HOST Drop

-

An attacker kept making 10 different attack

HOST Drop

6

IP

Attacker kept sending ARP Packet to the destination
fast.
Sending Broadcast packet fast to all host on the
network

5

ARP Spoofing

ARP Attack

Broadcast Attack
HDN Security Switch vs Cisco NAC
Cisco CSA Solution

HDN Solution

Security
Switch

CSA
Zero Update Protection


Switch features

Dynamic protection for unknown






Reduce downtime through applying
the urgent patch

Common

PoE/PoE+



threat

L2/L3 Switch

Looping detection

Detect/Drop harmful traffic

Behavior based protection


Run at the access level



Block the user access who is not

Block un-authorized user etc.

ARP Spoofing attack



Scanning / Flooding attack
Smart Protection



Check all application’s behavior



VNM(Visual Node Manager) –

Need company policy in-advance



DoS/DDoS attack





complied to company policy
Others

total management tool


Protect from malicious code through
Signature-Based Antivirus

6
HDN Security Switch vs Cisco NAC
Network Admission Control (NAC) is a solution that uses the network infrastructure
to ensure all devices seeking network access comply with an organization’s security
policy
• Cxx Clean Access Server

identity

Serves as an in-band or out-of-band device for
network access control

Please enter username:

device
security

NAC

network
security

• Cxx Clean Access Manager
Centralizes management for administrators, support
personnel, and operators

• Cxx Clean Access Agent
Si

Si

Optional lightweight client for device-based registry
scans in unmanaged environments
CSACS1121-K9

$14,995

NAC3315100-K9

NAC Appliance
3315 Server max 100 users

$8,990

NACMGRLTE-K9
7

ACS 1121
Appliance With
5.x SW And
Base license

NAC Appliance
3315 Manager max 3 Servers

$8,990
Comparison Summary

:

Cisco Switch

HDN Switch

2. Security

:

Cisco Switch
CSA
Cisco Prim LMS

HDN Switch

3. Mgmt

:

Cisco

HDN VNM

1. Switch

8
TẠI SAO NÊN CHỌN SWITCH CỦA HDN?
Là giải pháp bảo mật cứng cho Access Layer sử dụng công nghệ xử lý tiên tiến
nhất hiện nay MDS Security ASIC (Multi-Dimension Security engine)
Tự động phát hiện và chặn các gói tin chứa mã độc -> không chặn Port

Tự động phát cảnh báo khi phát hiện sự cố bất thường
Ghi log và hỗ trợ giám sát qua VNM
Hiệu suất tuyệt vời với tính năng bảo mật giúp mạng LAN ổn định 24/7
Dễ dàng quản lý và giám sát tình trạng mạng LAN theo thời gian thực.
Chi phí hợp lý (không đắt hơn Switch thường của Cisco)
Ngoài việc bảo vệ thông tin an toàn, chống xâm nhập và đánh cắp thông tin bởi
Attacker/Hacker thiết bị còn tự động cảnh báo và cô lập khi cáp bị loop.
Nếu mạng máy tính của Công ty bạn thường xuyên gặp tình trạng khi vào mạng
rất chậm, ứng dụng mạng chạy cứ đơ đơ… thì là lúc bạn nên quan tâm tới giải
pháp của HDN. Need more ? Please contact songk38@gmail.com
9

More Related Content

What's hot

LF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDKLF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK
 
Driver Development for applications of networking services for a WAVE based d...
Driver Development for applications of networking services for a WAVE based d...Driver Development for applications of networking services for a WAVE based d...
Driver Development for applications of networking services for a WAVE based d...
Janith Rukman
 

What's hot (20)

LF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDKLF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDK
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
ComNet CNGE2FE8MSPOEPLUS Data Sheet
ComNet CNGE2FE8MSPOEPLUS Data SheetComNet CNGE2FE8MSPOEPLUS Data Sheet
ComNet CNGE2FE8MSPOEPLUS Data Sheet
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP Infrastructures
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
 
How to build resilient industrial networks
How to build resilient industrial networksHow to build resilient industrial networks
How to build resilient industrial networks
 
Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points  Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points
 
9534715
95347159534715
9534715
 
Cipc
CipcCipc
Cipc
 
Driver Development for applications of networking services for a WAVE based d...
Driver Development for applications of networking services for a WAVE based d...Driver Development for applications of networking services for a WAVE based d...
Driver Development for applications of networking services for a WAVE based d...
 
"Morphology of Modern Data Center Networks: Overview". Dinesh Dutt, Cumulus N...
"Morphology of Modern Data Center Networks: Overview". Dinesh Dutt, Cumulus N..."Morphology of Modern Data Center Networks: Overview". Dinesh Dutt, Cumulus N...
"Morphology of Modern Data Center Networks: Overview". Dinesh Dutt, Cumulus N...
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
 
Icnd210 s06l01
Icnd210 s06l01Icnd210 s06l01
Icnd210 s06l01
 
6WINDGate™ - Powering the New-Generation of IPsec Gateways
6WINDGate™ - Powering the New-Generation of IPsec Gateways6WINDGate™ - Powering the New-Generation of IPsec Gateways
6WINDGate™ - Powering the New-Generation of IPsec Gateways
 
From virtual to high end HW routing for the adult
From virtual to high end HW routing for the adultFrom virtual to high end HW routing for the adult
From virtual to high end HW routing for the adult
 
The analysis of Microburs (Burstiness) on Virtual Switch
The analysis of Microburs (Burstiness) on Virtual SwitchThe analysis of Microburs (Burstiness) on Virtual Switch
The analysis of Microburs (Burstiness) on Virtual Switch
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
 
Icnd210 s08l01
Icnd210 s08l01Icnd210 s08l01
Icnd210 s08l01
 
Cubro subprocessor appliance in nic format
Cubro subprocessor appliance in nic formatCubro subprocessor appliance in nic format
Cubro subprocessor appliance in nic format
 
General bypass application v1.4 2016
General bypass application v1.4 2016General bypass application v1.4 2016
General bypass application v1.4 2016
 

Similar to Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco

IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)
Jeff Green
 

Similar to Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco (20)

I2O Solutions - HDN Network Security Solution
I2O Solutions - HDN Network Security SolutionI2O Solutions - HDN Network Security Solution
I2O Solutions - HDN Network Security Solution
 
L2 Attacks.pdf
L2 Attacks.pdfL2 Attacks.pdf
L2 Attacks.pdf
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
MC-1610MR 16-Slot Managed Media Converter Chassis with Redundant Power Supply...
MC-1610MR 16-Slot Managed Media Converter Chassis with Redundant Power Supply...MC-1610MR 16-Slot Managed Media Converter Chassis with Redundant Power Supply...
MC-1610MR 16-Slot Managed Media Converter Chassis with Redundant Power Supply...
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)
 
ICC icXchange Solution Brochure
ICC icXchange Solution BrochureICC icXchange Solution Brochure
ICC icXchange Solution Brochure
 
ADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptxADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptx
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
cisco-ws-c2960x-48fpd-l-datasheet.pdf
cisco-ws-c2960x-48fpd-l-datasheet.pdfcisco-ws-c2960x-48fpd-l-datasheet.pdf
cisco-ws-c2960x-48fpd-l-datasheet.pdf
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
 
cisco-ws-c2960x-24td-l-datasheet.pdf
cisco-ws-c2960x-24td-l-datasheet.pdfcisco-ws-c2960x-24td-l-datasheet.pdf
cisco-ws-c2960x-24td-l-datasheet.pdf
 
Lec21 22
Lec21 22Lec21 22
Lec21 22
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
Tavve Zone Ranger
Tavve   Zone RangerTavve   Zone Ranger
Tavve Zone Ranger
 
cisco-ws-c2960x-24ps-l-datasheet.pdf
cisco-ws-c2960x-24ps-l-datasheet.pdfcisco-ws-c2960x-24ps-l-datasheet.pdf
cisco-ws-c2960x-24ps-l-datasheet.pdf
 

Recently uploaded

Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
tbatkhuu1
 
Brand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdfBrand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdf
tbatkhuu1
 

Recently uploaded (20)

Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girl
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
Brand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdfBrand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdf
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
Elevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdfElevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdf
 
BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
 
25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...
25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...
25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com
 
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
 
What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
BDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort Service
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdf
 

Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco

  • 1. SO SÁNH SWITCH BẢO MẬT CỦA HanDreamnet(HDN) VÀ SWITCH CỦA CISCO Namviet Telecom Ltd Song Tran +84 903212322. 1 www.namviettelecom.com
  • 2. Spec comparison – Cisco(excluding security) SG2024G Power 4 4 48 Gbps / 71.4 Mpps 176 Gbps / 42 Mpps Flash / DRAM 64M / 256M 64M / 128M 32k 8k Yes Yes Smart Port Redundancy Flexbile Link Voice VLAN Yes Yes Ring Protocol Yes No UDLD, Cable diagnostic (TDR) Yes Yes Queue per port 8 4 L2/L3/L4 ACL , ACL, Time based ACL, VLAN ACL Yes Yes DHCP Snooping, IPSG Yes Yes 802.1x (Multi user, MAC bypass…) Yes Yes Stacking Management 24 Port Redundancy Security 24 STP/RSTP/MSTP/PVST+ / PVRST+ QoS 10/100/1000Base-T MAC address Layer 2 External RPS Capacity/Forwarding Rate Performance Internal power redundancy 1000 Base-X Hardware & Interface Catalyst 2960S-24TS No Yes CDP, DHCP Server, SNMPv1/2/3, TACACS+, RADIUS, IPv6 management, LLDP, LLDP-MED Yes Yes Flow Monitoring sFlow No 2
  • 3. Security features comparison – Cisco SG2024G DoS, DDoS, Flooding, Scan Attack OK N.A. Set up/Release security policy automatically OK N.A. Real time report while Drop Attack traffic OK N.A. Real time log & history for dropping attack on CLI OK N.A. IP Spoofing attack Security features Catalyst 2960S-24TS OK N.A. ARP Spoofing attack OK N.A. NetBios flooding attack OK N.A. Worm_port_Attack attack OK N.A. TCP/UDP/ICMP DoS/DDoS_Attack OK N.A. TCP SCAN_Attack OK N.A. TCP/UDP/ICMP Flood_Attack OK N.A. TCP Syn Flood Attack OK N.A. Loop detection OK N.A. 3
  • 5. Detectable Attack List by Security Switch No. Attack Type Protocol Description DoS Attack Attacker kept sends bunch traffic to a specific target based on well known port IGMP 1 TCP UDP ICMP Attack Name Attacker kept sends multicast traffic to the pier fast. 2 IP Spoofing Attack - 3 IP Spoofing Attack ARP 4 Host scan attack (IP Scanning) 5 DoS Attack Attacker sends packet after falsifying SRC IP. Attacker sends ARP Packets with reliable IP and attacker MAC. DDoS(IP Spoofing) TCP UDP ICMP Attacker sends TCP, UDP, ICMP request to all reachable Host on the network. Scan Attack Scan Flooding Port Scan Attack TCP UDP Sending port scan packet to the target host. Port Scan Host Random Flooding Attack TCP UDP ICMP Sending packets with any IP address to the target UDP, TCP ports. Random Attack Flooding packets which are abnormal value on destination port / source port of TCP or UDP. Random Flooding 7 ICMP Redirect Attack ICMP Sending ICMP redirect packet to the target host ICMP Redirect Attack 8 ARP Attack ARP 9 Broadcast Attack 10 MAC Flooding - Sending random source MAC Address to run out ARP table MAC Flooding 11 Self-Loop - Packet Loop Self_Loop 12 HOST Drop - An attacker kept making 10 different attack HOST Drop 6 IP Attacker kept sending ARP Packet to the destination fast. Sending Broadcast packet fast to all host on the network 5 ARP Spoofing ARP Attack Broadcast Attack
  • 6. HDN Security Switch vs Cisco NAC Cisco CSA Solution HDN Solution Security Switch CSA Zero Update Protection  Switch features Dynamic protection for unknown    Reduce downtime through applying the urgent patch Common PoE/PoE+  threat L2/L3 Switch Looping detection Detect/Drop harmful traffic Behavior based protection  Run at the access level  Block the user access who is not Block un-authorized user etc. ARP Spoofing attack  Scanning / Flooding attack Smart Protection  Check all application’s behavior  VNM(Visual Node Manager) – Need company policy in-advance  DoS/DDoS attack   complied to company policy Others total management tool  Protect from malicious code through Signature-Based Antivirus 6
  • 7. HDN Security Switch vs Cisco NAC Network Admission Control (NAC) is a solution that uses the network infrastructure to ensure all devices seeking network access comply with an organization’s security policy • Cxx Clean Access Server identity Serves as an in-band or out-of-band device for network access control Please enter username: device security NAC network security • Cxx Clean Access Manager Centralizes management for administrators, support personnel, and operators • Cxx Clean Access Agent Si Si Optional lightweight client for device-based registry scans in unmanaged environments CSACS1121-K9 $14,995 NAC3315100-K9 NAC Appliance 3315 Server max 100 users $8,990 NACMGRLTE-K9 7 ACS 1121 Appliance With 5.x SW And Base license NAC Appliance 3315 Manager max 3 Servers $8,990
  • 8. Comparison Summary : Cisco Switch HDN Switch 2. Security : Cisco Switch CSA Cisco Prim LMS HDN Switch 3. Mgmt : Cisco HDN VNM 1. Switch 8
  • 9. TẠI SAO NÊN CHỌN SWITCH CỦA HDN? Là giải pháp bảo mật cứng cho Access Layer sử dụng công nghệ xử lý tiên tiến nhất hiện nay MDS Security ASIC (Multi-Dimension Security engine) Tự động phát hiện và chặn các gói tin chứa mã độc -> không chặn Port Tự động phát cảnh báo khi phát hiện sự cố bất thường Ghi log và hỗ trợ giám sát qua VNM Hiệu suất tuyệt vời với tính năng bảo mật giúp mạng LAN ổn định 24/7 Dễ dàng quản lý và giám sát tình trạng mạng LAN theo thời gian thực. Chi phí hợp lý (không đắt hơn Switch thường của Cisco) Ngoài việc bảo vệ thông tin an toàn, chống xâm nhập và đánh cắp thông tin bởi Attacker/Hacker thiết bị còn tự động cảnh báo và cô lập khi cáp bị loop. Nếu mạng máy tính của Công ty bạn thường xuyên gặp tình trạng khi vào mạng rất chậm, ứng dụng mạng chạy cứ đơ đơ… thì là lúc bạn nên quan tâm tới giải pháp của HDN. Need more ? Please contact songk38@gmail.com 9