, , ,

RAVEN 4300 – RAVEN Intrusion Detection System – RAVEN 4300


Call for Price

This product requires special shipping arrangements. Please Use the "ADD TO QUOTE BUTTON" or call us at (866) 650-3282 for more information.

Compare

Product description

Type: RAVEN 4300
Name: RAVEN 4300
Description: 1U rack mount, 5 × fixed FE/GE TX ports, 1 × extended media module slot, fixed single PSU
Part Number: 942999714
Port type and quantity: 5 × fixed FE/GE TX ports, 2 × USB, 1 × RJ45 console port, 1 × GE TX out of band management port
Heat Radiation Type: Fixed fan
Extended Slot: 1 × extended media module slot

More Interfaces

Power Supply: Fixed single PSU

Power requirements

Operating Voltage: 100-240VAC, 50-60Hz

Ambient conditions

Permissible Humidity (Storage/Transport): 5% to 95%
Operating temperature: 0-+40 °C
Storage/transport temperature: -20°C to +70 °C
Relative humidity (non-condensing): 5-85 %

Mechanical construction

Width: 435 mm
Height: 44 mm
Depth: 360 mm
Weight: 8.1 kg
Mounting: Rack mount
Software Specifications
Data Collection and Analysis Standard data collection, standard protocol analysis, customized data collection, customized protocol analysis
Threat Detection Event detection with pre-defined feature
Event detection with customized feature
Threat detection basing on threat intelligence database
SQL injection and XXS attack detection
APT static detection of malicious samples
Virus detection basing on virus database
Detection basing on secondary event
Threat Display Display the total amount of all attacks in latest 24hours
Display the total amount of the denial of service attack in latest 24hours
Display the total amount of port scanning attack in latest 24hours
Display the total amount of worms attack in latest 24hours
Display the total amount of Trojan horse attack in latest 24hours
Display the Top5 attack type whose attack amount are the most among all the attacks in latest 24hours
Display the amount of each attack type in latest 24hours
Display the traffic trend in latest 24hours
Display the detailed information of the attack, including source ID, destination IP, source port, destination port, the time when the attack take place, illustration of the attack, the parameter that returns
Using the attack event as clues is supported, it can show the distribution of historical event and the threat intelligence of the IP which is related to the attack event in the form of asset portraits
Support attack event tracing basing on the source IP or the destination IP of the attack
Traffic Accounting Support macro traffic monitoring in network, including total flow, web flow, email flow, database flow, P2P flow and other flow
Support micro traffic recording in network, including the recording of P2P flow, DNS flow, IP/port flow, the flow of important protocol, the flow of key operating and maintenance and the flow of key web behavior
Threat Response Support web alarm of attack event
Support to send out the attack event
Support local record of the attack event
Support the original message record of the attack event
Support the RST blocking of the attack
Support the cooperation with firewall
Support the cooperation with ATP
Asset Configuration Support to configure the monitoring of key web server
Support to configure the binding of IP-MAC
Report Management Support to create analysis report
Support to create basic report
Support to create advanced accounting report
Support to create detailed event report
Support to create the report in various format, including PDF, Word, HTML, Excel
System Management Support to configure the syslog server to send out the event
Support SNMP configuration
Support email notification
Support to configure the cooperation with firewall
Support manual updates of database via web, including the event database and the threat intelligence database etc.
Support the maintenance and alarm of disk
Support proxy configuration
Support the configuration of the attention degree of an event
Resource Monitoring Support to monitor the usage rate of the CPU of device
Support to monitor the usage rate of the RAM of device
Support to monitor the usage rate of the disk of device

Mechanical stability

IEC 60068-2-6 vibration: 1 mm, 2 Hz-13.2 Hz, 90 min.; 0.7 g, 13.2 Hz-100 Hz, 90 min.; 3.5 mm, 3 Hz-9 Hz, 10 cycles, 1 octave/min.; 1 g, 9 Hz-150 Hz, 10 cycles, 1 octave/min
IEC 60068-2-27 shock: 15 g, 11 ms duration, 18 shocks

EMC interference immunity

EN 61000-4-2 electrostatic discharge (ESD): 4 kV contact discharge, 8 kV air discharge
EN 61000-4-3 electromagnetic field: 10V/m (80-1000MHz), 3V/m (1000-6000MHz)
EN 61000-4-4 fast transients (burst): 2 kV power line, 1 kV data line
EN 61000-4-5 surge voltage: power line: 2 kV (line/earth), 1 kV (line/line), 1 kV data line
EN 61000-4-6 Conducted Immunity: 10 V (150 kHz-80 MHz)
EN 61000-4-8 power freq magnetic field: 30A/m
EN 61000-4-11 voltagedips,shortinterrupt: 0%(20ms), 40%(300ms), 70%(500ms), 0%(5s)

EMC emitted immunity

EN 55032: EN 55032 Class A
EN 61000-3-2: EN 61000-3-2 Class A
EN 61000-3-3: EN 61000-3-3
FCC CFR47 Part 15: FCC 47CFR Part 15, Class A

Approvals

FCC: Compliant
China Network Access Certificate: Compliant
RoHS Compliant: RoHS( (EU) 2015/863 ) and RoHS( GB/T26572-2011 ) compliant

Scope of delivery and accessories

Accessories to Order Separately: Media module
Scope of delivery: 1 × device, 1 × grounding wire, 1 × power cord, 1 × console cable, 1 × Cat5UTP 2M, 1 × installation package

History

Update and Revision: Revision Number: 0.12 Revision Date: 09-07-2023

You were not leaving your cart just like that, right?

Enter your details below to save your shopping cart for later. And, who knows, maybe we will even send you a sweet discount code :)