National Research and Education Network
Education Cloud Data Center
Multi-Channel HD Telemedicine Solution
Over The Top/Multi-Tenant Data Center (OTT/MTDC)
Internet Exchange Point (IXP)
Internet Access Provider (IAP)
Design & Simulation
Planning & Analytics
Oil & Gas IoT
HPC & Operations Management
Digital Urban Rail
Retail Cloud Platform
Logistics & Warehousing
Enterprise Data Center
Server - Intelligent Computing
Enterprise Cloud Communications
Network Management System
Ubiquitous Connectivity Makes Digital Transformation Possible
Economical and Powerful AI Computing
Secure And Resilient Solutions
Leading New ICT
211 Fortune Global 500 Companies Choose Huawei as Digital Transformation Partner
Buy from Huawei
If you want to get more information about your project, you can submit your information and we will contact you as soon as possible.
If your company has signed an eDeal contract with Huawei, please buy your required product/solution via the link below.
Buy from resellers
Search for a nearby reseller and get direct contact information.
Become a Partner
Resources and Support
Huawei Authorized Learning Partner
Huawei Authorized Information and Network Academy
The Huawei AntiDDoS1600 DDoS protection system utilizes Big Data analytics technology and supports modeling for 60+ types of network traffic to offer second-level attack response and comprehensive defense against 100+ types of attacks. The AntiDDoS1600 can be deployed on a user network using in-line mode to defend against volumetric and application attacks in real time.
When attack traffic exceeds the bandwidth or defense capability of a local scrubbing device, the AntiDDoS1600 associates with the AntiDDoS device of the upstream carrier or ISP to defend against flood attacks and guarantee service continuity.
60+ traffic models, defense against 100+ types of DDoS attacks, and second-level attack response.
In-line deployment to defend against volumetric attacks and applications.
Association with anti-DDoS devices of upstream carriers or ISPs to defend against flood attacks.
|Throughput||Up to 5 Gbit/s||Up to 8 Gbit/s|
|Mitigation Rate||Up to 3 Mpps||Up to 7 Mpps|
|Latency||80 μs||80 μs|
|Standard Interfaces||8 x GE (RJ45) + 4 x GE (SFP)||16 x GE (RJ45) + 8 x GE (SFP) + 4 x 10 GE (SFP)|
|Expansion Slots||2 x WSIC||5 x WSIC|
|Expansion Interfaces||8 x GE (RJ45); 8 x GE (RJ45) + 2 x 10 GE (SFP+); 8 x GE (SFP); and 4 x GE (RJ45) bypass card|
|Deployment Modes||In-line; Out-of-path (static defense); Out-of-patch (dynamic defense)|
|Function||Options for detecting or cleaning|
|DDoS Defense Specifications||