Logo ID | 02-C-000942 |
---|---|
Approved Date | 2024/08/11 |
Application ID | CN-2-C-20240731-001394 |
Applied Date | 2024/07/31 |
Usage Agreement | Agreed |
OEM Licensor's Logo ID | - |
Note | - |
Target Information | Application Phase | Phase-2 |
---|---|---|
Test Category | Core Protocols | |
Vendor Name | NSFOCUS TECHNOLOGIES, INC. | |
Country | CN | |
Product Name | NSFOCUS Network Intrusion Detection System | |
Product Version | V5.6 | |
Product Classification | Host | |
Product Description | The NSFOCUS Network Intrusion Detection System (Abbreviated as NSFOCUS NIDS) is based on a powerful attack feature library, which can detect attacks such as network attacks, information destruction, harmful programs, and vulnerabilities. At the same time, the linkage sandbox achieves three-dimensional detection of unknown threats; Collaborate with the NSFOCUS Threat Intelligence to effectively detect hotspot attacks. Rich threat status presentation and professional threat analysis capabilities enable intuitive and global security operations and efficient management. | |
Vendor's Note |
Note1: |
|
Test Information | Test Specification | 5.1.3 |
Interoperability Test Scneario | 5.0.6 | |
Information for Series of Product |
|
Interoperable Devices |
Router | |||
---|---|---|---|---|
1 | Vendor Name | FreeBSD Project | ||
Device Name | FreeBSD | |||
Version | 9.1-release | |||
2 | Vendor Name | OpenBSD Project | ||
Device Name | OpenBSD | |||
Version | 5.3 | |||
Host | ||||
1 | Vendor Name | Microsoft | ||
Device Name | Windows 10 | |||
Version | 1903 | |||
2 | Vendor Name | Ubuntu Project | ||
Device Name | Ubuntu | |||
Version | 18.04.5 | |||
Target supporting Advanced Functions: |
o Transmitting Echo Requests(Passive Node)
- Configuring Multicast Packet Size - Multicast Routing(Router Only) o RFC 4191 Type C Host(Host Only) o Duplicate Overlapping Fragments - Beyond Scope of Source Address(Router Only) - Tracking Connections for ICMPv6 - Router Advertisement DNS (Host Only) |
Logo ID | 02-C-000942 |
---|---|
Approved Date | 2013/03/30 |
Application ID | CN-2-C-20130226-000247 |
Applied Date | 2013/02/26 |
Usage Agreement | Agreed |
OEM Licensor's Logo ID | - |
Note | - |
Target Information | Application Phase | Phase-2 |
---|---|---|
Test Category | Core Protocols | |
Vendor Name | NSFOCUS INFORMATION TECHNOLOGY CO., LTD. | |
Country | CN | |
Product Name | NSFOCUS Network Intrusion Detection System | |
Product Version | V5.6 | |
Product Classification | Host | |
Product Description | NSFOCUS Network Intrusion Detection System (referred to as NSFOCUS NIDS) is developed by NSFOCUS with independent intellectual property rights. As a supplement to firewalls, this product implements an integrated solution that consists of prevention in advance, protection in process and forensics afterwards: It detects network traffic in real time, monitors various network behaviors, and promptly reports and prevents traffic that violates security policies. | |
Vendor's Note |
1.In Test IP6Interop.1.6 Path MTU discovery and Fragment Mention, the first ping does not succeed while the NUT performing NS/NA. It is acceptable since the examiner confirmed by captured packets that NUT is performing NS/NA and following ping succeeded. |
|
Test Information | Test Specification | 4.0.6 |
Interoperability Test Scneario | 4.0.4 | |
Information for Series of Product |
|
Interoperable Devices |
Router | |||
---|---|---|---|---|
1 | Vendor Name | Ubuntu Project | ||
Device Name | Ubuntu 7.10 | |||
Version | 2.6.15-26 | |||
2 | Vendor Name | The KAME Project | ||
Device Name | KAME on FreeBSD 5.4-RELEASE | |||
Version | kame-20060116-freebsd54-snap | |||
Host | ||||
1 | Vendor Name | The FreeBSD Project | ||
Device Name | FreeBSD | |||
Version | 7.1-RELEASE-p15 | |||
2 | Vendor Name | USAGI Project | ||
Device Name | USAGI | |||
Version | usagi-linux26-s20060327 | |||
Target supporting Advanced Functions: |
- Transmitting Echo Requests(Passive Node)
- Configuring Multicast Packet Size - Multicast Routing(Router Only) - RFC 4191 Type C Host(Host Only) - Duplicate Overlapping Fragments - Beyond Scope of Source Address(Router Only) - Tracking Connections for ICMPv6 - Router Advertisement DNS (Host Only) |