PDF(150.2 KB) View with Adobe Reader on a variety of devices
Updated:January 28, 2014
® Guard XT 5650 DDoS Mitigation Appliance from Cisco Systems
® delivers a powerful and extensive distributed denial-of-service (DDoS) protection system. Designed to meet the performance and scalability requirements of the largest and most demanding enterprise environments, the Cisco Guard XT provides unprecedented levels of protection against today's increasingly complex and elusive attacks.
Featuring two Gigabit Ethernet interfaces, a single Cisco Guard XT can process attack traffic at line rates as high as a full gigabit-per-second (Gbps). Working together, multiple Cisco Guard XTs can incrementally scale to support multi-gigabit rates, delivering an extensible solution that easily adapts to large and growing enterprise environments.
DDoS Attacks Evolving
Today's DDoS attacks are more malicious, more virulent, more destructive, and more focused than ever. Launched by disgruntled users or unscrupulous businesses targeting specific sites or competitors, these attacks easily elude and overwhelm the most common defenses. Composed of legitimate-appearing requests, massive numbers of "zombies" and spoofed identities that make it virtually impossible to identify and block these malicious flows, DDoS attacks literally paralyze their victims and prevent them from conducting business, costing billions of dollars per year in lost revenue.
The Cisco Guard XT defends against this new wave of DDoS attacks, enabling businesses to defeat these attacks without compromising their mission-critical and revenue-bearing operations. Based on a unique multiverification process (MVP) architecture, the Cisco Guard XT employs the most advanced anomaly recognition, source verification, and anti-spoofing technologies to identify and block individual attack flows while allowing legitimate transactions to pass. Combined with an intuitive, graphical user interface (GUI) and extensive multilevel monitoring and reporting designed to provide a comprehensive overview of all attack activity, the Cisco Guard XT delivers robust and comprehensive DDoS defense for protecting business operations.
The Cisco Guard XT MVP Architecture
The Cisco Guard XT is one part of a complete detection and mitigation solution that protects enterprises, hosting centers, government agencies, and service provider environments from DDoS attacks. Combined with the Cisco Traffic Anomaly Detector XT, which detects the presence of DDoS, worm, and other attacks, the Cisco Guard XT performs the detailed per-flow level attack analysis, identification and mitigation services required to block attack traffic and prevent it from disrupting network operations.
When the Cisco Traffic Anomaly Detector XT identifies a potential attack, it alerts the Cisco Guard XT to begin diverting traffic destined for the targeted devices-and only that traffic-for inspection. All other traffic continues to flow freely, reducing the impact on overall business operations while increasing the number of devices or zones a single Cisco Guard XT can protect.
Diverted traffic is rerouted through the Cisco Guard XT, which is typically deployed off the critical path at any point in the network-from enterprise entrance access points to peering points off an ISP backbone. The diverted traffic is subjected to intense scrutiny to identify and separate "bad" flows from legitimate transactions. Specific attack packets are identified and removed, while legitimate traffic is forwarded to its original destination, ensuring that real users and real transactions always get through, and guaranteeing maximum availability.
KEY FEATURES AND BENEFITS
The Cisco Guard XT performs detailed, granular, per-flow analysis and blocking to stop attack traffic with surgical precision-while allowing legitimate transactions to flow freely.
The innovative blocking techniques are based on the MVP architecture, developed by Cisco Systems, which delivers multiple interactive layers of defense to identify and block all types of attacks with extreme accuracy. Integrated dynamic filtering and active verification technologies, driven by a sophisticated profile-based anomaly recognition engine, enables rapid, automatic protection against all types of assaults, even Day Zero attacks that have never been seen before. Additional protocol analysis and rate limiting features help ensure only valid traffic gets through, and only in volumes that won't overwhelm downstream devices.
The Cisco Guard XT also features integrated "Zombie Killer" technologies that help identify and block all types and sizes of attacks, including those launched by hundreds of thousands of distributed zombie hosts-one of the most prevalent and difficult-to-stop DDoS attack sources.
Each Cisco Guard XT features dedicated network processors that support attack analysis and cleaning at full gigabit line rates in standalone mode, defending against large-scale DDoS attacks, including those launched by massively distributed attackers such as compromised zombie hosts.
The Guard XT also supports a unique clustering architecture that supports incremental scaling of both attack processing rates and zombie defense capacities-sufficient for protecting even the largest enterprise and service provider environments against the most serious threats.
Deployed off the critical path as a routing peer to ensure maximum reliability and straight-forward installation, the Cisco Guard XT diverts and cleans only that traffic destined for a targeted zone, enabling cost-effective resource and scaling.
Multilevel Monitoring and Reporting
The Guard XT features an intuitive, Web-based GUI that simplifies the policy definition, operational monitoring, and report generation processes.
Multiple monitoring and reporting levels provide network operators, security administrators, and clients with a wide range of detailed real-time and historical information. Attack reports provide details for individual attacks-including characteristics, lists of identified zombies, and specific enforcement actions used-enabling security experts to review and tune the Cisco Guard XT's security policies.
Meanwhile, customer-level historical summaries enable service providers to easily report on successful protection against the variety, duration and scale of attacks. In addition, an interactive mode allows users to review and approve recommended actions and policies prior to activation, providing manual control over attack responses if desired.
Designed for service providers, hosting centers, and online enterprises, the Cisco Guard XT can help ensure uninterrupted business operations, even in the face of the most malicious assaults. For users, that translates into a significant competitive advantage by ensuring uncompromised availability and unparalleled protection of the most valuable business assets.
Table 1. Product Specifications
2 GB DDRAM
Two Gigabit Ethernet Two 100BASE-T (management)
10 to 35C (50.0 to 95.0F)
Non Operating Temperature
10 to 43C (50.0 to 109.4F)
Operating: 8% to 80%
Non-Operating: 8% to 80%
Dual 110-220V, 350W
62 lbs/28.2 kg
3.36 in. / 8.53 cm
17.5 in. / 44.5 cm
27.5 in. / 69.9 cm
Secure Web-based GUI
CLI: Console, Telnet, SSH
Cisco (Riverhead) SNMP MIB and MIB II
FCC Rules Part 15 compliant
• Spoofed and non-spoofed attacks
• TCP (syns, syn-acks, acks, fins, fragments)
• UDP (random port floods, fragments)
• ICMP (unreachable, echo, fragments)
• Client Attacks
• Inactive and total connections
• HTTP Get flood
• BGP attacks
Table 2. Ordering Information
Cisco Guard XT 5650 with 1000BASE-SX Multimode Fiber Optic Ports with LC Connectors, Dual AC Power, RAID
Whether your company is a large organization, a commercial business, or a service provider, Cisco is committed to maximizing the return on your network investment. Cisco offers a portfolio of technical support services to help ensure that your Cisco products operate efficiently, remain highly available, and benefit from the most up-to-date system software.
The Cisco Technical Support Services organization offers the following features, providing network investment protection and minimal downtime for systems running mission-critical applications:
· Provides Cisco networking expertise online and on the telephone
· Creates a proactive support environment with software updates and upgrades as an ongoing integral part of your network operations, not merely a remedy when a failure or problem occurs
· Makes Cisco technical knowledge and resources available to you on demand
· Augments the resources of your technical staff to increase productivity
· Complements remote technical support with onsite hardware replacement
· Cisco Technical Support Services include:
– Cisco SMARTnet support
– Cisco SMARTnet Onsite support
· Cisco Software Application Services, including Software Application Support and Software Application Support plus Upgrades