D-Link DFL-2400 Data Sheet
Key Features
DFL-2400
Network-Based Intrusion Detection System for Enterprise
Intrusion Detection System
Designed to meet the unique security requirements of the enterprise, the DFL-2400 Intrusion Detection System (IDS)
offers comprehensive features that bring improved security to your network. With its network-based detection capabilities and
event management, the DFL-2400 provides a reliable solution for detecting a broad array of attacks present in today's
constantly changing security landscape.
offers comprehensive features that bring improved security to your network. With its network-based detection capabilities and
event management, the DFL-2400 provides a reliable solution for detecting a broad array of attacks present in today's
constantly changing security landscape.
Intrusion Prevention and Damage Assess
Active On-Line IDS
Your network is susceptible to a multitude of attacks. Your
office is exposed to a variety of potential vulnerabilities,
including Internet connections, communication channels
between remote and corporate offices and links between
trusted business partners. Unfortunately, many preventive
measures employed to secure resources and internal traffic do
not provide the breadth or depth of analysis needed to
identify attempted attacks or uncover potential threats across
the organization. Deploying firewalls or virtual private
networks can minimize exposure, but they do not provide
enough protection.
office is exposed to a variety of potential vulnerabilities,
including Internet connections, communication channels
between remote and corporate offices and links between
trusted business partners. Unfortunately, many preventive
measures employed to secure resources and internal traffic do
not provide the breadth or depth of analysis needed to
identify attempted attacks or uncover potential threats across
the organization. Deploying firewalls or virtual private
networks can minimize exposure, but they do not provide
enough protection.
Intrusion detection solutions provide an additional layer of
vital security. The DFL-2400 can detect suspicious activity,
prevent the intrusion and assess the damage.
vital security. The DFL-2400 can detect suspicious activity,
prevent the intrusion and assess the damage.
DFL-2400 is an active and on-line network-based Intrusion
Detection System. Its responsibility is to detect malicious and
suspicious packets on computer network and take actions in
Detection System. Its responsibility is to detect malicious and
suspicious packets on computer network and take actions in
real time. It analyzes the incoming and outgoing packets
with a mixed approach combined with misused and
anomaly model. With this hybrid mechanism, DFL-2400
can detect unknown type packet flooding and extend the
ability to detect new pattern-based attack types easily. A
flexible rule-set is provided to allow new policies to be
added easily. DFL-2400 is built on real-time OS equipped
with high performance appliance that enables you to do
much more than other software-based IDS.
with a mixed approach combined with misused and
anomaly model. With this hybrid mechanism, DFL-2400
can detect unknown type packet flooding and extend the
ability to detect new pattern-based attack types easily. A
flexible rule-set is provided to allow new policies to be
added easily. DFL-2400 is built on real-time OS equipped
with high performance appliance that enables you to do
much more than other software-based IDS.
Equipped with a powerful CPU, most up-to-date database
and ample memory to execute the necessary tasks, the
DFL-2400 can provide up to 128,000 concurrent
connections in an enterprise network. A large database can
be easily maintained/updated and policy management and
monitoring can be easily carried out from any designated
computer on your network.
and ample memory to execute the necessary tasks, the
DFL-2400 can provide up to 128,000 concurrent
connections in an enterprise network. A large database can
be easily maintained/updated and policy management and
monitoring can be easily carried out from any designated
computer on your network.
Designed for Small to Medium Size Business
On-line real-time active network intrusion detection
Policy-based detection and access control
Multiple protocol support including ARP, IP, TCP, UDP,
ICMP, IGMP, IPX, NetBEUI
Policy management and centralized management monitoring,
analysis and reporting
Third-party routers, switches, firewalls, applications, web
servers monitoring
Policy-based detection and access control
Multiple protocol support including ARP, IP, TCP, UDP,
ICMP, IGMP, IPX, NetBEUI
Policy management and centralized management monitoring,
analysis and reporting
Third-party routers, switches, firewalls, applications, web
servers monitoring
Real-time reporting and historical forensics
Large signature database
Up to 128,000 concurrent connections
3 10/100Mbps Fast Ethernet ports each for WAN, LAN,
and management connection
Console port provided
Large signature database
Up to 128,000 concurrent connections
3 10/100Mbps Fast Ethernet ports each for WAN, LAN,
and management connection
Console port provided
IDS supporting 128,000 concurrent connections