DATA SHEET CISCO TRAFFIC ANOMALY DETECTOR XT 5600 PRODUCT OVERVIEW ® ® The Cisco Traffic Anomaly Detector XT 5600 from Cisco Systems is a complete solution to help large organizations protect against distributed denial-of-service (DDoS) or other cyber attacks, enabling users to quickly initiate mitigation services to block the attack before business is adversely affected. Based on a unique, patented multiverification process (MVP) architecture, the Cisco Traffic Anomaly Detector XT utilizes the latest behavioral analysis and attack recognition technology to proactively detect and identify all types of cyber assaults. By constantly monitoring traffic destined for a protected device, such as a Web or e-commerce application server, the Cisco Traffic Anomaly Detector XT compiles detailed profiles that indicate how individual devices behave under “normal” operating conditions. If the Cisco Traffic Anomaly Detector XT detects any per-flow deviations from the profile, it considers the anomalous behavior of a potential attack and responds based on user preference: by sending an operator alert to initiate a manual response, by triggering an existing management system, or by launching the Cisco Guard XT DDoS Mitigation Appliance to immediately begin mitigation services. Combined with the Cisco Guard XT, the Cisco Traffic Anomaly Detector XT contributes to the industry’s most comprehensive DDoS defense system. Through the MVP architecture, the Cisco Traffic Anomaly Detector XT and Cisco Guard XT detect, divert, isolate, and remove malicious attack flows without impacting legitimate transactions, helping to deliver robust protection to networks and business-critical traffic. APPLICATIONS Cyber attacks are on the rise, with DDoS assaults representing the fastest-growing threat facing online businesses today. These attacks, which have evolved from simple acts of publicity-seeking vandalism to highly focused events designed to disrupt the business operations of targeted victims, have grown increasingly relentless and malicious, driving many businesses to the brink of ruin. Attack techniques are also growing more sophisticated. Attackers mimic valid requests, spoof source identification, and use armies of compromised “zombie” hosts to overwhelm Internet data centers and existing defenses, while making identification and blocking of the malicious traffic flows virtually impossible. Cisco Systems, Inc. All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 6 The Cisco Traffic Anomaly Detector XT works with the Cisco Guard XT to provide a complete detection and mitigation solution that protects enterprises, hosting centers, government agencies, and service provider environments from DDoS attacks. When the Traffic Anomaly Detector XT identifies a potential attack by noticing deviations from known “normal” behavior, it alerts the Guard XT to begin diverting traffic destined for the targeted devices—and only that traffic—for inspection. All other traffic continues to flow freely, reducing the impact on overall business operations while increasing the number of devices or zones a single Guard XT can protect. Diverted traffic is rerouted through the Cisco Guard XT, which is typically deployed off the critical path at any point in the network— from enterprise entrance access points to peering points off an ISP backbone. The diverted traffic is then scrutinized to identify and separate “bad” flows from legitimate transactions. Attack packets are identified and removed, while legitimate traffic is forwarded to its original destination, ensuring that real users and real transactions always get through, guaranteeing maximum availability. Figure 1 Cisco Systems, Inc. All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 2 of 6 KEY FEATURES AND BENEFITS Recognition and Learning The Cisco Traffic Anomaly Detector XT resides off the critical path to monitor mirrored traffic flows at full gigabit line rates, building detailed profiles of “normal” behavior for each protected device without consuming valuable switch or router resources. Using sophisticated behavior-based anomaly detection technology, the Cisco Traffic Anomaly Detector XT will detect any activity that deviates from those profiles at both global and granular session levels, enabling highly accurate identification of all types of known and Day Zero attacks. Granular, per-connection state analysis of all packets enable fast and thorough detection and identification of the most elusive and sophisticated attacks—from subtle, low-rate server resource exhaustion attacks to large-scale attacks launched by hundreds of thousands of distributed zombies. The Traffic Anomaly Detector XT also includes a behavioral recognition engine that eliminates the need to continually update profiles, and reduces the large number of alerts and false positives common with static signature-based approaches. In addition, the Cisco Traffic Anomaly Detector XT comes preconfigured with default profiles for immediate operation out of the box; automated learning allows users to create specific tuning recommendations that can be reviewed by the operator. Finally, session-state context recognizes validated session traffic and identifies session-abusive attacks to provide additional protection against malicious activity. High Performance The high-performance Cisco Traffic Anomaly Detector XT monitors attack flows at full gigabit line rates—enough to identify more than 100,000 sources per device in a single attack, providing robust protection for large, high-volume environments against distributed attacks. In addition, multistage analysis of fully mirrored traffic delivers fast recognition of even the most stealthy low-rate attacks. To provide the greatest possible protection, the Cisco Traffic Anomaly Detector XT can be deployed downstream—close to protected resources in the data center, or upstream—adjacent to a Cisco Guard XT for more widespread coverage. Reporting and Management The Cisco Traffic Anomaly Detector XT uses a Web-based graphical user interface (GUI) that displays information in a simple, intuitive manner, dramatically simplifying configuration, operation, and attack identification and analysis. Multiple real-time and historical reporting levels provide network operators, security administrators, and clients with detailed information to assist in attack detection, policy setting, and mitigation. Report statistics can also be exported to text files for back-end customization or for later review. The Cisco Traffic Anomaly Detector XT can also be configured to proactively send alerts to network operators and to the Cisco Guard XT to initiate rapid response to attack conditions, including automated mitigation services to quickly thwart the attack. A Simple Network Management Protocol (SNMP) management information base (MIB) also makes all device-, protected zone-, and attack-level statistics available to standards-based management systems. SUMMARY Designed for large hosting centers and online enterprises, the Cisco Traffic Anomaly Detector XT combines with the Cisco Guard XT DDoS Mitigation Appliance to provide a security solution that can help ensure uninterrupted business operations, even in the face of the most malicious assaults. For users, that translates into a significant competitive advantage as it can help ensure uncompromised availability and unparalleled protection of valuable business assets. Cisco Systems, Inc. All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 3 of 6 PRODUCT SPECIFICATIONS Table 1. Product Specifications Memory 2 GB DDRAM Hard Drive 80 GB Interfaces Two Gigabit Ethernet Two 100BASE-T (management) Power Supply Dual 110-220V, 350W Weight 62 lb /28.2 Kg Height 3.36 in. / 8.53 cm Width 17.5 in. / 44.5 cm Depth 27.5 in. / 69.9 cm Operating Temperature 10 to 35C (50.0 to 95.0F) Nonoperating Temperature 10 to 43C (50.0 to 109.4F) Humidity Operating: 8% to 80% Non-Operating: 8% to 80% Rack-mountable Yes Management Secure Web-based GUI CLI: Console, Telnet, SSH Cisco (Riverhead) SNMP MIB and MIB II TACACS+ Syslog Certifications UL recognized CE FCC Rules Part 15 compliant Attack Protection • Spoofed and Non-spoofed Attacks – TCP (syns, syn-acks, acks, fins, fragments) – UDP (random port floods, fragments) – ICMP (unreachable, echo, fragments) – DNS • Client Attacks – Inactive and total connections – HTTP Get flood • BGP Attacks Cisco Systems, Inc. All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 4 of 6 ORDERING INFORMATION Table 2. Ordering Information Product Name Part Number SMARTnet Number Cisco Traffic Anomaly Detector XT 5600 with 1000BASE-SX Multi Mode Fiber Optic Ports with LC Connectors, Dual AC Power, RAID ADXT-5600-MMF-A-K9 CON-SNT-ADX5600M Cisco Traffic Anomaly Detector XT Appliance 5.0 Software SC-ADXT-5.0-K9 To place an order, visit the Cisco Ordering Home Page. TECHNICAL SUPPORT SERVICES Whether your company is a large organization, a commercial business, or a service provider, Cisco is committed to maximizing the return on your network investment. Cisco offers a portfolio of technical support services to help ensure that your Cisco products operate efficiently, remain highly available, and benefit from the most up-to-date system software. The Cisco Technical Support Services organization offers the following features, providing network investment protection and minimal downtime for systems running mission-critical applications: • Provides Cisco networking expertise online and on the telephone • Creates a proactive support environment with software updates and upgrades as an ongoing integral part of your network operations, not merely a remedy when a failure or problem occurs • Makes Cisco technical knowledge and resources available to you on demand • Augments the resources of your technical staff to increase productivity • Complements remote technical support with onsite hardware replacement • Cisco Technical Support Services include: ® – Cisco SMARTnet support – Cisco SMARTnet Onsite support • Cisco Software Application Services, including Software Application Support and Software Application Support plus Upgrades For more information, visit: http://www.cisco.com/en/US/products/svcs/ps3034/serv_category_home.html Cisco Systems, Inc. All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 5 of 6 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 0 20 357 1000 Fax: 31 0 20 357 1100 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-7660 Fax: 408 527-0883 Asia Pacific Headquarters Cisco Systems, Inc. 168 Robinson Road #28-01 Capital Tower Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799 Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Web site at www.cisco.com/go/offices. Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica Croatia • Cyprus • Czech Republic • Denmark • Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR Hungary • India • Indonesia • Ireland • Israel • Italy • Japan • Korea • Luxembourg • Malaysia • Mexico The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal • Puerto Rico • Romania • Russia Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spain • Sweden • Switzerland • Taiwan Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela • Vietnam • Zimbabwe Copyright 2004 Cisco Systems, Inc. All rights reserved. Catalyst, Cisco, Cisco IOS, Cisco Systems, the Cisco Systems logo, PIX, and SMARTnet are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the propertyCisco of theirSystems, respective owners. Inc. The use of the word partner does not imply a partnership relationship between Cisco any otherare company. (0403R) BG/LW6448 0604 Alland contents Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 6 of 6 Cisco Systems, Inc. All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 7 of 6