NSFOCUS WAF Datasheet2
NSFOCUS WAF Datasheet2
NSFOCUS WAF Datasheet2
KEY BENEFITS
OVERVIEW Eliminate costly data breaches
Reduce false positives to
Attacks on web applications and servers are more complex and frequent than ever.
ensure business continuity
Organizations continue to suffer costly data breaches using WAFs that still rely on
Simplify PCI compliance
signatures and pattern matching as their primary defenses; technologies that are efforts
easily evaded. And moving applications to the cloud does not make them any safer.
KEY FEATURES
The NSFOCUS WAF uses next generation technologies to provide comprehensive Semantic analysis engine
application layer security, eliminating these problems and completely protecting your Semantic analysis and
critical web applications. With full out-of-the-box protection against the OWASP Top contextual logic-based attack
Ten, the WAF is specifically engineered to protect not just web applications, but their detection identifies unknown
underlying infrastructure, plug-ins, protocols, and more. threats and minimizes false
positive and false negative
SWITCH
DDoS Defenses to Block DDoS Defenses to
Upstream Block Upstream
SOFTWARE SPECIFICATIONS
Security Analysis
» Intelligent Detection™ next-gen advanced machine » Positive behavior-based protection model with
learning for lower false positive/negative rates enhanced dynamic profile learning and whitelist
identifying web attacks security
» Automated False Positive Behavioral Analysis » Negative signature-based model
Application Attack Prevention
» OWASP Top 10 » LDAP Injection Protection
» Cross-site Scripting (XSS) » Server-side Includes (SSI) Injection Protection
» Cross Site Request Forgery (CSRF) » xPath Injection Protection
» Command & SQL Injection » Path Traversal Protection
» Remote File Inclusion Protection » Webshell Protection
» Malicious Scanning » Anti-Leeching/Anti-Phishing
» Botnet Protection » Response control
» XML Attack Protection » Outbound Data Theft Protection to secure personal
» Cookie Signing and Encryption privacy information such as credit card, social
» URL Access Control security number, and ID
» Web Scraping Protection » Data Loss Protection
» File Upload and Download Control
Web Server and Networking
» Server cloaking » 802.1Q support
» Server extension security » VLAN decode
» Network-layer ACLs » Protection in Trunk
» ARP spoofing protection » Protection in Port-channels
» Real-time server status monitoring to ensure server
availability
DDoS Protection
» TCP Flood (SYN Flood/ACK Flood) » Brute Force Protection
» HTTP/S GET/POST Flood (Up to 1 Gbps) » Integration with external Anti-DDoS products
» Low-and-Slow Attacks » Integration with cloud based Anti-DDoS products
Security Services
» Content Filtering » Risk level policies
» Sensitive Information Filtering » Client IP-address tracking
» IP Reputation » Exception control
» Geo IP location » Base64 decode
» Virtual patching » False positive analysis and automatic/manual
» Customized policies and rules adjustment
High Availability
» Active/Active; » Fail-open hardware bypass NIC interfaces
» Active/Passive; » Emergency Mode based on thresholds of new
» VRRP connections, use of CPU and use of memory
» Internal “Software” bypass to pass traffic without
inspection (HW appliance)
Management and Reporting
» Secure web-based GUI » Real-time dashboard
» SSH-based CLI access network management » PCI-DSS compliance reporting
» SNMP » Centralized logging and reporting
» Syslog-based logging » Custom templates
» REST API » Central management for multiple NSFOCUS devices
» Built-in test tools » Session tracking and forensics
» Packet capture » Geo IP analytics and blocking
Virtual Machine & Cloud Support Certification
» VMware, KVM, Xen, Hyper-V » ICSA Labs Certified
» AWS, Microsoft Azure, AliCloud, HUAWEI, ZTE, Wo » Veracode VL4 Certified
Cloud, Softbank (Japan), OpenStack
DEPLOYMENT OPTIONS
Shown here are the most popular deployment options, with no changes to applications or networks
Transparent Proxy Mode Out-of-Path Mode Reverse Proxy Mode Cluster Deployment Plug-in Deployment
WAF
GATEWAY GATEWAY GATEWAY GATEWAY GATEWAY
WAF
NGINX
WAF LOAD
BALANCER
WAF WAF
NGINX CLUSTER
WEB SERVER
WEB SERVER WEB SERVER
WEB SERVER WEB SERVER WEB SERVER
HARDWARE SPECIFICATIONS
Gigabit Ethernet Ports 4GE RJ45 bypass 4GE RJ45 bypass 4GE RJ45 bypass
Power Supply AC, single or redundant AC, single or redundant AC, single or redundant
Physical AC Input (Amps) 2A 2A 2A
Ethernet
Interface 2SFP+
10 Gigabit Ethernet Ports -- -- --
(Transceiver
not included)
Extension Slot 1 4 3 4
Management Port 1GE RJ45 2GE RJ45 2GE RJ45 2GE RJ45
Management
Serial Port 1×RJ45 1×RJ45 1×RJ45 1×RJ45
Interface
USB Interface 2 2 2 2
Storage Hard Disk 1T, SATA 1T, SATA 1T, SATA 1T, SATA
HTTP Transactions 30,000 TPS 55,000 TPS 110,000 TPS 180,000 TPS
Performance Per Second
HTTP Connections 10,000 CPS 20,000 CPS 38,000 CPS 70,000 CPS
Per Second
HTTPS Transaction 15,500 TPS 15,500 TPS 20,000 TPS 68,000 TPS
Per Second (1KB)
D A T A S H E E T
Dimensions (in) 17.0 x 3.5 x 22.6 17.0 x 3.5 x 22.6 17.0 x 3.5 x 22.6 24.6 x 3.5 x 17.4
(W x H x D)"
Weight (lb) 27.8 28.9 24.3 36.4
VM SPECIFICATIONS
(C)V1000 (C)V500 (C)V200 (C)V100 (C)V50
HTTP Throughput 1 Gbps 500 Mbps 200 Mbps 100 Mbps 50 Mbps
» OpenStack Queen
CPU Cores 8 8 4 4 2
*The performance data is obtained when using Intel(R) Xeon(R) CPU E5-2680 v2 @ 2.80GHz.