Specifications
Brand Name :
H3C
Model Number :
H3C SecPath F100-C-A
Place of Origin :
china
MOQ :
1
Price :
Subject to the specific model and configuration
Payment Terms :
T/T
Delivery Time :
15
Packaging Details :
See the hardware specification sheet for details based on the specific model.
Description
H3C SecPath F100-C-A Desktop Firewall

H3C SecPath F100-C-A1/A2/A3/A5 desktop firewall is a next-generation high-performance firewall product launched by H3C Technology Co., Ltd. (hereinafter referred to as H3C) with the advent of the Web 2.0 era and the current technology trend of deep integration of security and networking, targeting small and medium-sized enterprises, campus network Internet exports, and WAN branch markets.

H3C SecPath F100-C-A1/A2/A3/A5 desktop firewall supports multi-dimensional integrated security protection, which can carry out integrated security access control such as IPS, AV, DLP and other traffic from multiple dimensions such as user, application, time, and pentagram, which can effectively ensure network security. It supports a variety of VPN

Model Official Firewall Throughput Concurrent Connections New Connections Per Second (CPS) Official Recommended Concurrent Users
F100-C-A1 800Mbps 600,000 10,000 120 Users
F100-C-A2 800Mbps 600,000 10,000 120 Users
F100-C-A3 700Mbps 1,000,000 24,000 50-70 Users
F100-C-A5 700Mbps 1,000,000 24,000 70-120 Users

project

F100-C-A1

F100-C-A2

F100-C-A3

F100-C-A5

interface

5*GE+2*SFP+1*Console

10*GE+2*SFP+1*Console

8*GE+1*Console

8*GE+1*Console

storage media

Support up to 500G TF card

Not supported

Ambient temperature

Operation: 0~45°C

Non-working: -40~70°C

Operating mode

Routing mode, transparent mode, promiscuous mode

AAA services

Portal Certification, RADIUS Certification, HWTACACS Certification, PKI/CA (X.509 Format) Certification,

Domain authentication, CHAP verification, PAP verification

Firewall

Support security zone division

It can protect against various malicious attacks such as Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, ARP Sharding, ARP Active Reverse Query, TCP Packet Flag Bit Illegal Oversized ICMP Packets, Address Scanning, Port Scanning, SYN Flood, UPD Flood, ICMP Flood, DNS Flood, and so on

Basic and extended access control lists

Access control lists based on time periods

User-based, application-based access control lists

ASPF application layer packet filtering

Static and dynamic blacklist capabilities

MAC and IP binding function

MAC-based access control list

Support 802.1q VLAN transmission

Virus protection

Detection based on viral characteristics

Supports manual and automatic upgrades of virus databases

Message flow processing mode

Support HTTP, FTP, SMTP, POP3 protocols

Supported virus types: Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, Virus, etc

Support for virus logs and reports

Deep intrusion defense

It supports defense against common attacks such as hacker attacks, worms/viruses, Trojans, malicious code, spyware/adware, DoS/DDoS, and more

Supports defense against attacks such as buffer overflow, SQL injection, and IDS/IPS escape

Support the classification and classification of attack feature databases (classification according to attack type and target machine system) (high, medium, low, and prompt levels)

Support for manual and automatic upgrades of attack signature libraries (TFTP and HTTP)

Support P2P/IM recognition and control of BT and other P2P/IM

Mail/web/app layer filtering

Mail filtering

SMTP email address filtering

Message header filtering

Email content filtering

Email attachment filtering

Web filtering

HTTP URL filtering

HTTP content filtering

Apply layer filtering

Java Blocking

ActiveX Blocking

SQL injection attack prevention

NAT

Supports mapping multiple internal addresses to the same public network address

Supports mapping multiple internal addresses to multiple public addresses

You can map internal addresses to public network addresses one by one

Support simultaneous conversion of source and destination addresses

External web hosts are supported to access internal servers

Supports direct mapping of internal addresses to public IP addresses of APIs

DNS mapping is supported

Configurable valid time to support address translation

Supports a variety of NAT ALGs, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, SIP, etc

VPN

L2TP VPN,IPSec VPN,GRE VPN,SSL VPN

IPv6

IPv6-based stateful firewall and attack prevention

IPv6 protocols: IPv6 forwarding, ICMPv6, PMTU, Ping6, DNS6, TraceRT6, Telnet6, DHCPv6 Client, DHCPv6 Relay, etc

IPv6 routes: RIPng, OSPFv3, BGP4+, static routes, policy routes, PIM-SM, PIM-DM, etc

IPv6 security: NAT-PT, IPv6 Tunnel, IPv6 Packet Filter, Radius, IPv6 Inter-Domain Policy, IPv6 Connection Limit, etc

Easy maintenance

Supports command-line configuration management

Supports remote configuration management via web

Support H3C SSM Security Management Center for device management

SNMPv3 is supported and is compatible with SNMP v1 and v2

Intelligent security policies

Environmental protection and certification

Support European strict RoHS environmental protection certification

High-performance hardware and software processing platform
  • The H3C SecPath F100-C-A1 and F100-C-A2 feature the latest 64-bit ARM multi-core multi-threaded processor architecture.
  • The H3C SecPath F100-C-A3 and F100-C-A5 feature the latest advanced 64-bit MIPS multi-core multi-threaded processor architecture.
Carrier-grade equipment with high reliability
  • It adopts the software and hardware platform of H3C company with independent intellectual property rights. The product has been used by telecom operators to small and medium-sized enterprise users for many years.
Powerful security protection functions
  • Support rich attack prevention functions. These attacks include Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP Sharded Packets, ARP Spoofing, ARP Active Reverse Query, Unlawful TCP Packet Flag Bits, Oversized ICMP Packets, Address Scanning, Port Scanning, and other attacks, as well as SYN Flood, UPD Flood, ICMP Flood, and DNS Detection and defense against common DDoS attacks such as Flood.
  • Support safe zone management. Security zones can be divided based on interfaces and VLANs.
  • Package filtering is supported. Filter packets by using standard or extended access control rules between security zones and using information such as UDP or TCP ports in packets. In addition, it can be filtered by time period.
  • Support application-based and user-based access control, treat applications and users as the basic elements of security policies, and combine defense-in-depth to achieve next-generation access control functions.
  • Support Application Layer State Packet Filtering (ASPF) function. By checking application layer protocol information (e.g., FTP, HTTP, SMTP, RTSP, and other TCP/UDP-based application layer protocols) and monitoring the connection-based application layer protocol status, it dynamically determines whether packets are allowed through the firewall or dropped.
  • Validation, authorization, and billing (AAA) services are supported. Including: certification based on RADIUS/HWTACACS+, CHAP, PAP, etc.
  • Support static and dynamic blacklists.
  • NAT and NAT multi-instance are supported.
  • Support VPN function. Including: support L2TP, IPSec/IKE, GRE, SSL, etc., and realize docking with intelligent terminals.
  • Supports rich routing protocols. It supports static routing, policy routing, and dynamic routing protocols such as RIP and OSPF.
  • Support for security logs.
  • Support traffic monitoring statistics and management.
Flexible and scalable all-in-one DPI deep security
  • An integrated security service processing platform that is highly integrated with basic security protection.
  • Comprehensive application layer traffic identification and management: Through H3C's long-term accumulation of state machine detection and traffic interaction detection technology, it can accurately detect Thunder/Web Thunder, BitTorrent, eMule/eDonkey, QQ, MSN, PPLive and other P2P/IM/online games/stock trading/network video/network multimedia applications; It supports the P2P traffic control function, which can accurately identify P2P traffic by matching network packets with P2P protocol packet characteristics, and can provide different control strategies to achieve flexible P2P traffic control.
  • High-precision, high-efficiency intrusion detection engine. It adopts H3C's FIRST (Full Inspection with Rigorous State Test) engine. The FIRST engine integrates a number of detection technologies to achieve comprehensive detection based on accurate state, with extremely high intrusion detection accuracy. At the same time, the FIRST engine adopts parallel detection technology, and the software and hardware can be flexibly adapted, which greatly improves the efficiency of intrusion detection.
  • Real-time virus protection: Kaspersky's stream engine antivirus technology is used to quickly and accurately detect viruses and other malicious code in network traffic.
  • Fast URL classification filtering: Provides basic URL blacklist and whitelist filtering, and you can configure the URL classification filtering server for online query.
  • Comprehensive and timely security feature library. Through years of operation and accumulation, H3C has a senior attack signature library team in the industry, and is equipped with a professional attack and defense laboratory to keep up with the latest developments in the field of network security, so as to ensure the timely and accurate update of the feature library.
Industry-leading IPv6
  • IPv6 state firewall is supported, which truly realizes the firewall function under IPv6 conditions and completes IPv6 attack prevention.
  • It supports IPv4/IPv6 dual protocol stacks, and supports IPv6 data packet forwarding, static routing, dynamic routing, and multicast routing.
  • It supports various IPv6 transition technologies, including NAT-PT, IPv6 over IPv4 GRE tunneling, manual tunneling, 6to4 tunneling, IPv4 compatible IPv6 automatic tunneling, ISATAP tunneling, NAT444, DS-Lite, etc.
  • It supports IPv6 ACL, Radius, and other security technologies.
Next-generation multi-service features
  • Integrate link load balancing features to effectively realize multi-link automatic balancing and automatic switching of enterprise Internet egress through link status detection, link busy protection, and other technologies.
  • It can not only combine USB-Key and SMS for mobile user identity authentication, but also combine with the original authentication system of the enterprise to achieve integrated authentication access.
  • DLP basic function support, support email filtering, provide SMTP email address, title, attachment, and content filtering; Support web filtering, provide HTTP URL and content filtering; Support file filtering for network transmission protocols; Support application-layer filtering to prevent Java/ActiveX blocking and SQL injection attacks.
Professional intelligent management
  • Support intelligent security policies: Implement policy redundancy detection, policy matching optimization suggestions, and dynamically detect intranet services to dynamically generate security policies and recommend them.
  • SNMPv3 is supported and is compatible with SNMP v1 and v2.
  • Provides a graphical interface for simple and easy-to-use web management.
  • Device management and firewall function configuration can be carried out through the command line interface to meet the needs of professional management and mass configuration.
  • The H3C IMC SSM security management center realizes unified management, integrating security information and event collection, analysis, response and other functions, solving the problems of network and security equipment isolation from each other, unintuitive network security status, slow security incident response, and difficulty in network fault location, so that IT and security administrators can get rid of cumbersome management work, greatly improve work efficiency, and focus on core business.
  • Based on advanced deep mining and analysis technology, it provides users with centralized log management functions by actively collecting and passively receiving, and normalizes logs in different types of formats (syslog, binary stream logs, etc.). At the same time, high-polymerization compression technology is used to store massive events, and log files can be automatically compressed, encrypted, and saved to external storage systems such as DAS, NAS, or SAN to avoid the loss of important security events.
  • Provides rich reports, mainly including application-based reports and network flow-based analysis reports.
  • Support output in various formats such as PDF, HTML, WORD, and TXT.
  • The report can be customized through the web interface, including the time range of the data, the source device of the data, the generation cycle, and the output type.
Send your message to this supplier
Send Now

H3C SecPath F100-C-A Series Enterprise Firewall With Multi Dimensional Security Protection

Ask Latest Price
Brand Name :
H3C
Model Number :
H3C SecPath F100-C-A
Place of Origin :
china
MOQ :
1
Price :
Subject to the specific model and configuration
Payment Terms :
T/T
Contact Supplier
H3C SecPath F100-C-A Series Enterprise Firewall With Multi Dimensional Security Protection
H3C SecPath F100-C-A Series Enterprise Firewall With Multi Dimensional Security Protection
H3C SecPath F100-C-A Series Enterprise Firewall With Multi Dimensional Security Protection
H3C SecPath F100-C-A Series Enterprise Firewall With Multi Dimensional Security Protection

Hubei Mailian International Trade Co., Ltd.

Verified Supplier
1 Years
hubei, wuhan
Business Type :
Distributor/Wholesaler, Agent
Total Annual :
300 million RMB-500 million RMB
Employee Number :
100~120
Certification Level :
Verified Supplier
Contact Supplier
Submit Requirement