Logo ID | 02-C-001037 |
---|---|
Approved Date | 2024/08/05 |
Application ID | CN-2-C-20240726-001390 |
Applied Date | 2024/07/26 |
Usage Agreement | Agreed |
OEM Licensor's Logo ID | - |
Note | - |
Target Information | ||
---|---|---|
Test Category | Core Protocols | |
Vendor Name | Beijing TopsecNetwork Security Technology Co.,Ltd | |
Country | CN | |
Product Name | Topsec Intrusion Prevention System TopIDP3000 | |
Product Version | V3 | |
Product Classification | Host | |
Product Description | Topsec Intrusion Prevention System Collective Attack Protection WEB security protection DDoS protection, weak password detection, brute force cracking detection, zombie host detection, illegal external connection detection, malicious program detection The ten major functions of APT detection and threat intelligence are integrated to achieve comprehensive detection and deep defense of network threats. The device has an attack detection rule library, application recognition library, geographic information library, zombie host rule library, threat intelligence library The URL classification library consists of six major knowledge bases, which are professional, authoritative, rich, and multi-dimensional, making the product more precise and rapid in threat defense. | |
Vendor's Note | - | |
Test Information | Test Specification | 5.1.3 |
Interoperability Test Scneario | 5.0.6 | |
Information for Series of Product |
|
Interoperable Devices |
Router | |||
---|---|---|---|---|
1 | Vendor Name | FreeBSD Project | ||
Device Name | FreeBSD | |||
Version | 9.1-release | |||
2 | Vendor Name | OpenBSD Project | ||
Device Name | OpenBSD | |||
Version | 5.3 | |||
Host | ||||
1 | Vendor Name | Microsoft | ||
Device Name | Windows 10 | |||
Version | 1903 | |||
2 | Vendor Name | Ubuntu Project | ||
Device Name | Ubuntu | |||
Version | 18.04.5 | |||
Target supporting Advanced Functions: |
o Transmitting Echo Requests(Passive Node)
- Configuring Multicast Packet Size - Multicast Routing(Router Only) o RFC 4191 Type C Host(Host Only) o Duplicate Overlapping Fragments - Beyond Scope of Source Address(Router Only) - Tracking Connections for ICMPv6 - Router Advertisement DNS (Host Only) |
Logo ID | 02-C-001037 |
---|---|
Approved Date | 2013/08/14 |
Application ID | CN-2-C-20130731-000270 |
Applied Date | 2013/07/31 |
Usage Agreement | Agreed |
OEM Licensor's Logo ID | - |
Note | - |
Target Information | ||
---|---|---|
Test Category | Core Protocols | |
Vendor Name | Beijing TopsecNetwork Security Technology Co.,Ltd | |
Country | CN | |
Product Name (original) | TopIDP3000(G) /TopIDP3000(10G) | |
Product Version (original) | V3 | |
Product Description (original) | TopSec Network Intrusion Detection and Prevention System (TopIDP) developed by TopSec adopts an online deployment, can detect and deter 11 types of over 3500 network attack behaviors, such as overflow attack, RPC attack, WEBCGI attack, denial of service, Trojans, worms, system vulnerability, etc, for the IT service resources of user's network in real time by an online layout manner. TopIDP can deter or contain the abuses of network wideband, such as P2P download, online video, online game, etc for the unobstructed network services. Moreover, TopIDP can offer the detailed attack logs and statistical reports, visualize them dynamically and analyze the real-time network threats. | |
Product Name | Topsec Intrusion Prevention System TopIDP3000(G)/TopIDP3000(10G) | |
Product Version | V3 | |
Product Classification | Host | |
Product Description | TopSec Network Intrusion Detection and Prevention System (TopIDP) developed by TopSec adopts an online deployment, can detect and deter 11 types of over 3500 network attack behaviors, such as overflow attack, RPC attack, WEBCGI attack, denial of service, Trojans, worms, system vulnerability, etc, for the IT service resources of user's network in real time by an online layout manner. TopIDP can deter or contain the abuses of network wideband, such as P2P download, online video, online game, etc for the unobstructed network services. Moreover, TopIDP can offer the detailed attack logs and statistical reports, visualize them dynamically and analyze the real-time network threats. | |
Vendor's Note | - | |
Test Information | Test Specification | 4.0.6 |
Interoperability Test Scneario | 4.0.4 | |
Information for Series of Product |
|
Interoperable Devices |
Router | |||
---|---|---|---|---|
1 | Vendor Name | FreeBSD Project | ||
Device Name | FreeBSD | |||
Version | 9.1-release | |||
2 | Vendor Name | Ubuntu Project | ||
Device Name | Ubuntu | |||
Version | 3.5.0 | |||
Host | ||||
1 | Vendor Name | OpenBSD Project | ||
Device Name | OpenBSD | |||
Version | 5.3 | |||
2 | Vendor Name | NetBSD Project | ||
Device Name | NetBSD | |||
Version | 6.0 | |||
Target supporting Advanced Functions: |
- Transmitting Echo Requests(Passive Node)
- Configuring Multicast Packet Size - Multicast Routing(Router Only) - RFC 4191 Type C Host(Host Only) - Duplicate Overlapping Fragments - Beyond Scope of Source Address(Router Only) - Tracking Connections for ICMPv6 - Router Advertisement DNS (Host Only) |