Netscout Aed Aem
Netscout Aed Aem
DDoS attacks are evolving, the new preferred flavor of DDoS attack, is a direct path attack
that adjusts vectors and methodologies to continually evade existing DDoS defenses. Add to
KEY FEATURES & BENEFITS this the ransomware, phishing attempts, and compromised IoT devices and you can see how
organizations are under constant risk from all types of advanced cyber threats. To address
Adaptive DDoS Protection these evolving threats, security teams need solutions that can dynamically adapt to the changing
attacks - both entering or leaving their networks. Just as importantly, these solutions must also
Effectively detect and mitigate ever-changing
DDoS attacks without impacting legitimate
be able to integrate into an organization’s existing security stack and/or consolidate functionality
services by automatically detecting new to reduce cost, complexity, and risk.
attack techniques and providing targeted,
surgical mitigation. Enabled by AI and ML
powered traffic analysis technology, global INTERNAL NETWORK / DATA CENTER
attack visibility, and decades of DDoS
INTERNET
domain expertise.
SECURITY
l DATA SHEET l NETSCOUT’s Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM)
Power Options DC: 2 x DC redundant, hot swap capable Dual hot-swap, redundant (1+1) AC AC: Two 1500-watt redundant power
power supplies; power supplies or DC power supplies: supplies; 100-240V AC, 15-10 A, 50‑60 Hz
DC Power Ratings: -40 to -72 Vdc, 28/14 AC: 1100 W Platinum (derates to 1050 W (x2);
A max (per DC input); @ 110 VAC) DC: Two 1500-watt redundant power
AC: 2 x AC redundant, hot swap capable DC: 1100 W -48 VDC supplies; -48 to -60 Vdc, 44 A (x2)
power supplies;
AC Power Ratings: 100 to 240 VAC,
50 to 60 Hz, 12/6 A max;
Both AC and DC power options are
850‑watt.
Hard Drives 2 x 240GB SSD in RAID 1 Configuration 480GB SSD SATA 6Gbps 2.5in Hot-plug 2 x 480GB SSD drives, RAID 1
Protection • 4 x 1 GigE bypass ports (LX, SX or • 16 x 1 GigE bypass ports (LX, SX, or 4 x 100 GigE + 8 x 10 GigE = One to four
Interfaces copper) Copper) 100 GbE QSFP28 (LR) optical transceivers
• 8 x 1 GigE bypass ports (LX, SX, copper • 16 x 10 GigE bypass ports (LR or SR) + One or two 4 x 10 GbE QSFP+ (SR or LR
or mixed) • 4 x 40 GigE bypass ports (LR or SR) Lite) optical transceivers with one 4 x 10
• 12 x 1 GigE bypass ports (LX, SX, • 4 x 100 GigE bypass ports (LR4 or SR4)
GbE breakout cable on each transceiver
copper or mixed)
• 4 x 10 GigE bypass ports (LR or SR)
• 8 x 10 GigE bypass ports (LR, SR, or
mixed)
• 4 x 10 GigE bypass ports (LR or SR)
plus 4 x 1GigE bypass ports (LX, SX or
copper)
• 4 x 10 GigE bypass ports (LR or SR)
plus 8 x 1GigE bypass ports (LX, SX or
copper)
• 8 x 10 GigE bypass ports (LR or SR)
plus 4 x 1GigE bypass ports (LX, SX or
copper)
• 2 x 40 GigE bypass ports (LR or SR)
• 4 x 40 GigE bypass ports (LR or SR)
• 2 x 40 GigE bypass ports (LR or SR) plus
4 x 10 GigE bypass ports (LR or SR)
• 2 x 40 GigE bypass ports (LR or SR) plus
8 x 10 GigE bypass ports (LR or SR)
• 4 x 100 GigE bypass ports (LR4 or SR4)
SECURITY 2
l DATA SHEET l NETSCOUT’s Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM)
Traffic Bypass Integrated hardware bypass; Internal Integrated hardware bypass; Internal External hardware bypass via 3296 Inline
Options “software” bypass to pass traffic “software” bypass to Bypass Switch
without inspection pass traffic without inspection
Availability Inline bypass, dual power supplies, solid- Inline bypass, dual power supplies, solid- External bypass, dual power supplies
state hard drive RAID cluster state hard drive
RAID cluster
Regulatory UL/cUL/EN/IEC 62368-1; EN 55032; EN Regulatory M/N: E82S, UL/cUL/EN/IEC RoHS 6/6, IEC/EN/UL/ CSA 60950-1, FCC
Compliance 55035; CISPR 32, 35; ETSI EN 300 386; 62368-1; CSA C22.2 No. 62368-1:19, 3rd Part 15 Subpart BClass A, ETSI EN 300
cULus Mark; IC ICES-003 Class A; EN 61000- Ed; EN 55032; EN 55035; CISPR 32, 35; 386, CE Mark, RCM Mark, KCC Mark, EAC
3-2; EN 61000-3-3; EMC Directive 2014/30/ IC ICES-003 Class A; FCC 47 CFR Parts Mark, BIS, CCC Mark, CB Certificate and
EU; Low Voltage Directive 2014/35/EU; UL 15, Class A; CE, CB Certificate & Report Report to IEC62368-1 andIEC60950-1,
60950-1 2nd edition/CSA C22.2 No.60950- including all international deviations; 2nd edition and all international
1-07 2nd Edition; FCC 47 CFR Parts 15, RoHS, 2011/65/EU; Israel, Moroccan deviations, EMC Directive 2014/30/EU,
Class A; CB Certificate & Report including all Conformity Mark; VCCI (Japan); RCM Low Voltage Directive 2014/35/EU
international deviations; RoHS 2011/65/EU; (Australia/New Zealand); KCC (South
Moroccan Conformity Mark; VCCI (Japan); Korea); EAC-R Approval (Russia); South
BIS (India); CCC (China); RCM (Australia/ Africa LoA; Mexico.
New Zealand); KCC (South Korea); EAC-R
Approval (Russia); South Africa LoA; Mexico
(UL-CoC for Mexico); NEBS-ready
Licensed AED is licensed based on clean AED is licensed based on clean AED is licensed based on clean
Capacities traffic throughput (both inbound and traffic throughput (both inbound and traffic throughput (both inbound and
outbound). outbound). outbound).
AED 8100 supports the following licenses: AED 8200 supports the following licenses: AED-HD1000 supports the following
100 Mbps, 250 Mbps, 500 Mbps,1 Gbps, 2 100 Mbps, 250 Mbps, 500 Mbps,1 Gbps, licenses: 25 Gbps, 50 Gbps, 75 Gbps, 100
Gbps, 5 Gbps, 10 Gbps, 20 Gbps, 30 2 Gbps, 5 Gbps, 10 Gbps, 20 Gbps, 40 Gbps, 125 Gbps, 150 Gbps, 175 Gbps and
Gbps, and 40 Gbps. Gbps, 60 Gbps, 80 Gbps and 100 Gbps. 200 Gbps;
Licenses are software upgradeable. Licenses are software upgradeable. Hardware Mitigation Capacity: determined
by the number of PPMs with 25G per
PPM.
Up to 8.7 Mpps per PPM.
Note: Licensed Inspected Throughput
should not go above the Hardware
Mitigation Capacity.
SECURITY 3
l DATA SHEET l NETSCOUT’s Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM)
Protected Unlimited
Endpoints
SSL/TLS Traffic TLS, and CAM support can be found in the Decryption Capabilities table on page 8 Not Supported
Support
Capabilities
Management SNMP gets v1, v2c; SNMP traps v1, v2c, v3; CLI; Web UI; HTTPS; SSH customizable, role-based management; Up to 50 AED
(appliances and/or virtual AED running KVM hypervisor) can be managed by the AED Console; managed AED must at least be
running v.6.0 (v AED), v6.4 (HD1000), or v.6.6 (8100).
Reporting and Real-time and historical IPV4 and IPV6 traffic reporting, extensive drill-down by protection group and blocked host including total
Forensics traffic, passed/blocked,top destination URLs/services/domains, attack types, blocked sources, top sources by IP location. Packet
visibility in real-time.
DDoS TCP/UDP/HTTP(S) flood attacks, botnet protection, hacktivist protection, host behavioral protection, anti-spoofing, payload
Protection expression-based filtering, permanent and dynamic blacklists/whitelists, traffic shaping, multiple protections for HTTP, DNS and
SIP, TCP connection limiting, fragmentation attacks, connection attacks.
Modes Inline active; inline inactive (reporting, no blocking); SPAN port monitor
Cloud Signaling Yes (collaborative DDoS attack mitigation with service provider or Arbor Cloud)
Ioc Types & IP address, fully qualified domain names, URLs. Formats: Proprietary ATLAS Intelligence Feed format, STIX, and TAXII
Formats
SECURITY 4
l DATA SHEET l NETSCOUT’s Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM)
Virtual AED
Features VMware KVM
Virtual Network Cloud-Init v0.7.6, Openstack Kilo and Mitaka series, OpenStack Heat, OpenStack Tacker, Ansible, Nokia Cloudband, Cisco
Function (VNF) NSO/ESC, Cisco NFVIS, Amdocs, Netcracker and other ONAP or ETSI NFV management and orchestration technologies
Orchestration
Minimum Virtual 4 vCPUs; 100 GB Storage; 12 GB RAM; 4 Interfaces (4 x virtio on KVM, 4 x E1000 on VMWare)
Machine Requirements
Supported VMware vSphere 5.5 or newer KVM kernel 3.19 or newer, QEMU 2.0
Hypervisors
Number of Protection 50
Groups
Note: To use Adaptive DDoS Protection with a vAED, the minimum requirements are: 6 vCPUs; 100 GB Storage; 48 GB RAM.
Capacity Per vAED Instance EC2 Instance Type Reference CPU Cores
1 Gbps c5n.2xlarge 8
5 Gbps c5n.9xlarge 36
10 Gbps c5n.18xlarge 72
Azure VM
Managing up to 5 AEDs D4s_v5 with 512 GB
Managing up to 20 AEDs D8s_v5 with 1TB disk
Managing over 20 AEDs D16s_v5 with 2TB disk
Supported Browsers Google Chrome 80, Mozilla Firefox 74, Internet Explorer 11
SECURITY 5
l DATA SHEET l NETSCOUT’s Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM)
Hard Drives Minimum: Six 480GB solid state drives configured for RAID 5
Network Interfaces 2 x 10G RJ45 onboard, 4 x 10G pluggable ports via installed PCI card
Operating System Our proprietary, embedded ArbOS operating system, based on Linux
Regulatory UL 60950-1 2nd edition/CSA C22.2 No.60950-1-07 2nd Edition, EMC Directive 2014/30/EU, Low Voltage Directive 2014/35/
Compliance EU, CB Certificate and Report to IEC62368-1 and IEC60950-1, 2nd edition and all international deviations, CE, FCC 47CFR
Parts 15, Verified Class A limit, ICES-003 Class A Limit, VCCI Class A ITE, RoHS (recast) Directive 2011/65/ EU, Moroccan
Conformity Mark, KC (Korea) Approval, RCM (Australia/New Zealand) Approval, EAC (Russia)
SECURITY 6
l DATA SHEET l NETSCOUT’s Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM)
Decryption Capabilities
TLS_AES_128_GCM_SHA256 x
TLS_CHACHA20_POLY1305_SHA256 x
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 x
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 x
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 x
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 x
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 x
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 x
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA x
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA x
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x
TLS_RSA_WITH_AES_128_GCM_SHA256 x
TLS_RSA_WITH_AES_256_GCM_SHA384 x
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA x
TLS_RSA_WITH_AES_128_CBC_SHA256 x
SECURITY 7
l DATA SHEET l NETSCOUT’s Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM)
Note: Unlike the passive decryption capabilities provided by CAM, the TLS proxy plays an active role in cipher suite negotiation. This active role allows the
TLS proxy to select the most modern, secure cipher suites, which eliminates the need to support a larger set of older, less secure cipher suites.
If the client and server support a cipher suite that the TLS proxy supports, then the client can connect and the TLS proxy can decrypt traffic. In this case, the
cipher suite that AED uses with the TLS proxy might be different than the cipher suite that AED uses when the TLS proxy is not present.
For more information about the cipher suites and their security efficacy, refer to the SSL Labs web site at https://www.ssllabs.com/
NETSCOUT offers sales, support, and services in over 32 countries. Global addresses, and international numbers are
listed on the NETSCOUT website at: www.netscout.com/company/contact-us
© 2024 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT, the NETSCOUT logo, Omnis, Guardians of the Connected World, Adaptive Service Intelligence, Arbor, ATLAS, InfiniStream,
nGenius, and nGeniusONE are registered trademarks or trademarks of NETSCOUT SYSTEMS, INC., and/or its subsidiaries and/or affiliates in the USA and/or other countries.
Third-party trademarks mentioned are the property of their respective owners.
SECPDS_013_EN-2406 12/2024