The Sensor component of Wanguard uses an extremely fast and highly innovative traffic anomaly detection engine that detects volumetric attacks by profiling the on-line behavior of users and by comparing over 130 live traffic parameters against user-defined thresholds. You can automate the reaction to threats by using predefined action modules that send notification emails, announce prefixes in BGP, generate SNMP traps, modify ACLs and execute custom scripts with access to an easy-to-use API exposing 80+ internal parameters. DDoS attacks can be detected by sniffing IP packets, using multi-vendor flow-based technologies, or through SNMP polling.
The Filter component of Wanguard ensures zero downtime for customers and services during Distributed Denial of Service attacks, without requiring an operator intervention. It defends against DDoS attacks by cleaning the malicious traffic on-premise when the upstream links are not congested and notifies the attacker's ISP on non-spoofed attacks. The malicious packets are blocked using intelligent, dynamic filtering rules that are applied to stateless software or hardware firewalls and on BGP FlowSpec-capable routers. Dedicated packet scrubbing servers can be deployed in the main data path, or can perform side-filtering with BGP off-ramping.
Wanguard and Wansight provide full network traffic visibility with distributed Sensors ("probes"), that can analyze IP packets, SNMP data and flow records exported by Cisco NetFlow, Huawei Netstream, Juniper jFlow, cflowd, sFlow and IETF IPFIX. All collected data are accessible in a rich, web-based user interface with custom dashboards, real-time traffic graphs, and top listings. You can quickly generate complex analytics with aggregated data for hosts, departments, interfaces, applications, protocols, autonomous systems and countries. You can view very accurate bandwidth graphs for thousands of IP addresses, inspect packets and flows, and much more.
Flow Sensor provided by Wanguard and Wansight is a fully-featured flow analyzer and collector that supports all major flow technologies: NetFlow version 5, 7 and 9; IETF IPFIX; sFlow version 4 and 5. It contains a highly scalable traffic correlation engine capable of continuously monitoring hundreds of thousands of IPv4 and IPv6 addresses and ranges. Flows can be stored for as long as you wish in a compressed binary format. You can generate top listings and almost any other aggregation report you can think of. The extensive flow filtering expression options allow you to query individual flows quickly for ad-hoc forensic investigation.
Packet Sensor provided by Wanguard and Wansight inspects IP packets by sniffing 10 Gbps port-mirrored or in-line interfaces at wire-speed. It contains an entirely scalable IP traffic analysis engine able to monitor, in real time, tens of thousands of IPv4 and IPv6 addresses and ranges. Users can save packet dumps for forensic investigation and to aid network troubleshooting. Packet dumps can be downloaded or viewed online in a Wireshark-like interface that displays detailed layer 7 information and hexadecimal raw and ASCI data for inclusion in regular expressions. It supports Libpcap, PF_RING Vanilla, PF_RING ZC, Netmap and Sniffer 10G.