NSFOCUS ADS-M Data Sheet

[Data Sheet]
NSFOCUS ADS-M System
Overview
What does ADS-M do?

Centrally manage ADS
devices and regions

Policy enforcement

Monitoring for traffic and
device

Report
Where is ADS-M for?

Large-scale IDCs/ISPs

Enterprise networks

Carrier backbone networks
Nowadays, more and more Internet Service Providers (ISPs) are inclined to
depend on large-scale anti-DDoS systems to protect against attacks in a
controllable manner. To cater for this requirement, NSFOCUS launched
NSFOCUS Clean Matrix system, an integrated solution that consists of
anomaly traffic detection system, anomaly traffic cleaning system and
centralized management & forensics system.
ADS-M (ADS –M for short) management and forensics system is used to
collect status data from different locations in the network to make
correlation analysis for taking corresponding processing, efficiently manage
user-groups that are customized based on logic objects (such as protection
group and traffic group), provide many types of reports separately to each
group, centrally configure prevention/monitoring devices located in
different nodes and assign privileges, and capture packets for forensics
purpose.
Features
What to work with?

ADS system
Centralized Management

NTA, Network Traffic
Analysis
Centrally configure parameters and security policies, and uniformly
distribute configuration documents for all ADS devices and NTA devices.
Security Policy
ADS-M helps the network administrator to centrally manage all ADS devices
and configure various prevention policies for them. Policy templates are
used to granularly configure policies. For example, specific attack methods
can be used to select the most effective prevention algorithms if the attacks
are of the same type. Policy distribution ensures that the latest security
policy is sent to the corresponding ADS devices. It also supports
configuration for the detection policies of NTA devices.
1/8
[Data Sheet]
Customized Business Domain
Features
ADS-M categorizes the targets to be protected and the devices to implement
protection into different business domains per customers, physical
deployment, service difference or other customized demands. It presents a
security configuration view of the objects to be protected, to facilitate
security maintenance. With the help of the ADS-M, the administrator can
centrally configure and manage these business domains on all ADS devices.
ADS-M can also distribute the business domain policies to NTA.

Centralized Management

Security Policy

Customized Region

Packet Capturing

Centralized Monitoring

Traffic analysis

Report System

Log Enquiry
ADS-M has an internal abnormal traffic analysis module. By leveraging
NetFlow technology and advanced traffic baseline algorithms, ADS-M
addresses a wide range of external and internal security threats for
customers with traffic statistics and analysis and abnormal traffic detection.

Multistage Privilege Levels
Packet Capturing
Traffic Analysis
With growing loss resulted from the extension of DDoS attacks and increase
of attack frequency, users began to have the awareness of tracing attack
sources. As one of the victims, the telecom carriers are also eager to find out
the sources of attacks. Besides, e-discovery can be considered as additional
value in business. As shown in Figure 3.1, the ADS-M sends the capture task
to the ADS, from which data packets complying with the capture conditions
will be duplicated and sent to the ADS-M for evidence to deter DDoS
attacks.
2/8
[Data Sheet]
ADS-M Packet Capturing Management
Centralized Device Monitoring
NSFOCUS ADS-M monitors the CPU usage rate, port status, memory usage
rate, traffic passing by the ports and network status, provides real-time
traffic monitoring and Top N statistic information in the latest 30 minutes,
and monitors devices according to traffic alerts and performance alerts.
Report System
Based on powerful statistic function, NSFOCUS ADS-M provides diversified
types of reports to satisfy all requirements in operation and maintenance.
Report System contains traffic report, security report, attack event report
and integrated report. Traffic report provides statistic information about
traffic trends, protocol trends, TCP package trends, attack types, protocol
types, TCP package types, attack targets and attack ports. Security report
focuses on statistic information about alert periods and alert types. The
attack event report describes the attack events happened or happening.
Integrated report concludes the status of the entire network, including
network operation, device performance and network alert, after which an
analysis result is generated.
Log Enquiry
3/8
Log Enquiry
The users are allowed to view the logs of all the ADS devices including the
[Data Sheet]
The users can view the logs about all ADS devices and NTA devices. The log
about ADS device logs contain attack logs, login logs, operation logs, data
link status logs and performance logs. The log about NTA devices records
attack summary logs , login and logout logs, operation logs, link state logs,
diversion logs, performance logs, operation alert logs, HA logs, and traffic
alert logs.
Diversion

BGP

OSPF
Re-injection

PBR

GRE

MPLS

VLAN
By inquiring the self-audited logs of the ADS-M, the information about login
and operation behaviors can be viewed by users, fully embodying the
controllability of the ADS-M.
Multistage Privilege Levels
Multistage privilege levels are classified to manage different users accessing
to the ADS-M. There are three groups: Supervisor, Administrator and
Common User. The Supervisor is held by the admin, the only default user;
those who hold “Administrator” privilege are in charge of the daily
maintenance of the system; Common Users are people who use system to
analyze but not allowed to set any values to the system. Multistage and
Multi-privilege Management enables the enhancement of self-security, and
complies with users’ practice in operation and maintenance.
Deployment Scenario
Traffic Diversion Deployment with NTA
In systems of IDCs, ICPs, or other system with crucial businesses, traffic
diversion technique is used in NSFOCUS ADS to protect against anomaly
traffic. NTA, the traffic detection appliance, is generally deployed at any
position of the network, but the ADS is deployed at the ingress
out-of-the-path network. NTA detects incoming traffic at the network
ingress and alerts the ADS if anomaly traffic is discovered. After receiving
the alert, ADS starts to divert the traffic from the core router or the switch
and filter out the anomaly traffic. And then, the clean traffic will be
re-injected into the mainstream of the network and sent to its destination.
In this solution, ADS-M system is designed to establish control and data
channels for both ADS and NTA systems, monitor device status in real time,
collect and analyze attack information, and modify and distribute policy
configuration or device operation and maintenance information to all ADS
devices. It is a centralized management center integrating monitoring,
control, statistics, analysis, configuration management and user
management together.
4/8
[Data Sheet]
ADS traffic diversion deployment
Traffic Diversion Deployment with Internal traffic analysis
With internal traffic analysis module, ADS-M detects incoming traffic and
alerts the ADS if anomaly traffic is discovered instead of NTA. In this solution,
ADS-M system is designed to establish control and data channels for ADS
systems, monitor both traffic and device status in real time, collect and
analyze attack information, and modify and distribute policy configuration or
device operation and maintenance information to all ADS devices.
ADS traffic diversion deployment with internal traffic analysis
5/8
[Data Sheet]
Functions
The following table describes the main functions of ADS-M 1600:
Function
Functions

System Monitoring

Traffic analysis

Statistical Reports

Logs

Centralized Management
and Configuration

Region & User Management
Description
System
Device status monitoring
Monitoring
Traffic and performance alert
Traffic analysis
DDoS Attacks
ADS M-1600
Y
Y
Attack event report, traffic trend
Statistical
report, TopN traffic report,
Reports
integrated report, attack summary
Y
report
Attack summary logs, login and
logout logs, operation logs, link state
Logs
logs, diversion logs, performance
Y
logs, operation alert logs, HA logs,
and traffic alert logs
Add /delete devices
Configure devices
Centralized
Management
&Configuration
Configure policies
Traffic diversion
Re-injection management
Y
Forensic analysis
ADS clustering
HA function
Region & User
Management
Region and user management
Y
6/8
[Data Sheet]
Performance
The following table describes performance of NSFOCUS ADS-M 1600:
Performance
Limitation
Statistical period
30 seconds
Max. managed devices
40*ADS and 20*NTA
Storage life
5 years
Initial data storage life
3 months
UI operation response
<10 seconds
delay
Policy operation delay
<10 seconds
Max. concurrent users
<50
Flow number
50,000/second
Max. region number
1024
Max. IP numbers for one
65,535
region
7/8
[Data Sheet]
For more information:
Hardware Specifications
For more information about
NSFOCUS products and services,
please contact the NSFOCUS
sales
The following table describes hardware specifications of NSFOCUS ADS-M
1600:
U.S.
TEL: +1 408 907 6638
Index
Interfaces
TEL: +44 (0)20 30786850
1*RJ45; 2*100/1000M copper; 4* 1000M SFP slots;
Single 1T hard disk
EMAIL: [email protected]
EMEA
ADS-M 1600
Weight
19 Kg
Dimension
443mm*512*88
EMAIL:
(W*D*H)
[email protected]
Rack
2U
APAC
Power Supply
AC, DC
TEL: +65 6809-3128
Power
400 W
EMAIL: [email protected]
Consumption
Japan
MTBF
60,000 hours
Operating
0-45℃ (32-113F)
TEL: +81 3 6206 8156
EMAIL: [email protected]
China
Temperature
Storage
-20-65℃
Temperature
TEL: +86 10-6843-8880
EMAIL: [email protected]
For more information visit
NSFOCUS Website:
www.nsfocus.com/en/
About NSFOCUS
http://www.nsfocus.com/en/
NSFOCUS is a proven global leader in active perimeter network security
for service providers, data centers, and corporations. It focuses on
providing network security solutions including: carrier-grade Anti-DDoS
System, Web Application Firewall, and Network Intrusion Prevention
System - all designed to help customers secure their networks and
corporate-critical information. More detailed information is available
at http://www.nsfocus.com..
“NSFOCUS” is the trademark of NSFOCUS
Information Technology Co., Ltd.
NSFOCUS enjoys all copyrights with respect
to all textual narrations, document formats,
illustrations,
photographs,
methods,
8/8