Guest

Cisco Catalyst 6500/Cisco 7600 Router Traffic Anomaly Detector Module

Enhanced Protection Against Attacks

The Cisco Traffic Anomaly Detector Services Module, an integrated services module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, protects large organizations against distributed denial of service (DDoS) attacks at multi-gigabit speeds by quickly detecting attacks as they happen in real time.

Working with Cisco Anomaly Guard Services Modules deployed in Cisco Catalyst 6500 Series Switches or Cisco 7600 Series Routers, the Cisco Traffic Anomaly Detector Services Module provides the industry’s most complete DDoS protection system by activating the Cisco Anomaly Guard to mitigate attacks, much before business operations can be adversely affected.

Working with Cisco Anomaly Guard services modules deployed in Cisco Catalyst 6500 Series switches or Cisco 7600 Series routers, the Cisco Traffic Anomaly Detector Services Module contributes to the industry’s most complete DDoS protection system. By constantly monitoring for and detecting the start of potential DDoS attacks, the Cisco Traffic Anomaly Detector Services Module enables the activation of intelligent mitigation by the Cisco Anomaly Guard. The combined solution provides a scalable, flexible and cost-effective method to help ensure that business integrity is always preserved, even while under attack.

By constantly monitoring traffic destined for a specified target using SPAN/VACL (VLAN Access Control List) Capture, the Cisco Traffic Anomaly Detector Services Module creates a baseline of how normal traffic appears during regular activity. This baseline enables the Cisco Traffic Anomaly Detector Services Module to detect any anomalies in traffic behavior and hence the start of potential DDoS attacks.

Capable of processing attack traffic at 2 Gbps line rates, the Cisco Anomaly Detector Services Module's anomaly recognition engine identifies the broadest range of DDoS attacks, including:

  • TCP-based attacks
  • UDP-based attacks
  • HTTP attacks
  • DNS attacks
  • SIP (VoIP) attacks
  • Botnet and zombie attacks

Product Literature

Let Us Help

Support