Product Number: RAVEN 4500

RAVEN Intrusion Detection System - RAVEN 4500

2U rack mount, 5 × fixed FE/GE TX ports, 1 × extended media module slot, fixed redundant PSU

  • Availability:
    Asia Pacific
  • Global inventory:
    Available

Specifications

Type

RAVEN 4500

Name

RAVEN 4500

Description

2U rack mount, 5 × fixed FE/GE TX ports, 1 × extended media module slot, fixed redundant PSU

Port type and quantity

5 × fixed FE/GE TX ports, 2 × USB, 1 × RJ45 console port, 1 × GE TX out of band management port

Heat Radiation Type

Fixed fan

Extended Slot

1 × extended media module slot

Power Supply

2 × Fixed redundant PSUs

Operating Voltage

100-240VAC, 50-60Hz, redundant PSU supported

Permissible Humidity (Storage/Transport)

5% to 95%

Operating temperature

0-+40 °C

Storage/transport temperature

-20°C to +70 °C

Relative humidity (non-condensing)

5-85 %

Width

435 mm

Height

88 mm

Depth

360 mm

Weight

9.6 kg

Mounting

Rack mount

Software Specifications

Data Collection and Analysis Standard data collection, standard protocol analysis, customized data collection, customized protocol analysis
Threat Detection Event detection with pre-defined feature
Event detection with customized feature
Threat detection basing on threat intelligence database
SQL injection and XXS attack detection
APT static detection of malicious samples
Virus detection basing on virus database
Detection basing on secondary event
Threat Display Display the total amount of all attacks in latest 24hours
Display the total amount of the denial of service attack in latest 24hours
Display the total amount of port scanning attack in latest 24hours
Display the total amount of worms attack in latest 24hours
Display the total amount of Trojan horse attack in latest 24hours
Display the Top5 attack type whose attack amount are the most among all the attacks in latest 24hours
Display the amount of each attack type in latest 24hours
Display the traffic trend in latest 24hours
Display the detailed information of the attack, including source ID, destination IP, source port, destination port, the time when the attack take place, illustration of the attack, the parameter that returns
Using the attack event as clues is supported, it can show the distribution of historical event and the threat intelligence of the IP which is related to the attack event in the form of asset portraits
Support attack event tracing basing on the source IP or the destination IP of the attack
Traffic Accounting Support macro traffic monitoring in network, including total flow, web flow, email flow, database flow, P2P flow and other flow
Support micro traffic recording in network, including the recording of P2P flow, DNS flow, IP/port flow, the flow of important protocol, the flow of key operating and maintenance and the flow of key web behavior
Threat Response Support web alarm of attack event
Support to send out the attack event
Support local record of the attack event
Support the original message record of the attack event
Support the RST blocking of the attack
Support the cooperation with firewall
Support the cooperation with ATP
Asset Configuration Support to configure the monitoring of key web server
Support to configure the binding of IP-MAC
Report Management Support to create analysis report
Support to create basic report
Support to create advanced accounting report
Support to create detailed event report
Support to create the report in various format, including PDF, Word, HTML, Excel
System Management Support to configure the syslog server to send out the event
Support SNMP configuration
Support email notification
Support to configure the cooperation with firewall
Support manual updates of database via web, including the event database and the threat intelligence database etc.
Support the maintenance and alarm of disk
Support proxy configuration
Support the configuration of the attention degree of an event
Resource Monitoring Support to monitor the usage rate of the CPU of device
Support to monitor the usage rate of the RAM of device
Support to monitor the usage rate of the disk of device

IEC 60068-2-6 vibration

1 mm, 2 Hz-13.2 Hz, 90 min.; 0.7 g, 13.2 Hz-100 Hz, 90 min.; 3.5 mm, 3 Hz-9 Hz, 10 cycles, 1 octave/min.; 1 g, 9 Hz-150 Hz, 10 cycles, 1 octave/min

IEC 60068-2-27 shock

15 g, 11 ms duration, 18 shocks

EN 61000-4-2 electrostatic discharge (ESD)

4 kV contact discharge, 8 kV air discharge

EN 61000-4-3 electromagnetic field

10V/m (80-1000MHz), 3V/m (1000-6000MHz)

EN 61000-4-4 fast transients (burst)

2 kV power line, 1 kV data line

EN 61000-4-5 surge voltage

power line: 2 kV (line/earth), 1 kV (line/line), 1 kV data line

EN 61000-4-6 Conducted Immunity

10 V (150 kHz-80 MHz)

EN 61000-4-8 power freq magnetic field

30A/m

EN 61000-4-11 voltagedips,shortinterrupt

0%(20ms), 40%(300ms), 70%(500ms), 0%(5s)

EN 55032

EN 55032 Class A

EN 61000-3-2

EN 61000-3-2 Class A

EN 61000-3-3

EN 61000-3-3

FCC CFR47 Part 15

FCC 47CFR Part 15, Class A

FCC

Compliant

China Network Access Certificate

Compliant

RoHS Compliant

RoHS( (EU) 2015/863 ) and RoHS( GB/T26572-2011 ) compliant

Accessories to Order Separately

Media module

Scope of delivery

1 × device, 1 × grounding wire, 2 × power cords, 1 × console cable, 1 × Cat5UTP 2M, 1 × installation package

Update and Revision

Revision Number: 0.12 Revision Date: 05-14-2024

Update and Revision

Revision Number: 0.12 Revision Date: 05-14-2024