Ecer asks for your consent to use your personal data to:
Personalised advertising and content, advertising and content measurement, audience research and services development
Store and/or access information on a device
Your personal data will be processed and information from your device (cookies, unique identifiers, and other device data) may be stored by, accessed by and shared with 135 TCF vendor(s) and 65 ad partner(s), or used specifically by this site or app.
Some vendors may process your personal data on the basis of legitimate interest, which you can object to by do not consent. Contact our platform customer service, you can also withdraw your consent.
Your message must
be between 20-3,000 characters!
Submit Requirement
Thank You!
Your requirement has been sent. we will contact you quickly!
{"title":"H3C SecPath F100-C-A Series Enterprise Firewall With Multi Dimensional Security","imgUrl":"https:\/\/img.chinax.com\/nimg\/29\/f7\/868b62743e4b46013f6c690bf5ea-200x200-1\/h3c_secpath_f100_c_a_series_enterprise_firewall_with_multi_dimensional_security.jpg","attrs":{"Brand Name":"H3C","Model Number":"H3C SecPath F100-C-A","Place of Origin":"china","Minimum Order Quantity":"1"}}
{"title":"H3C SecPath ACG1000-B30-G PoE Integrated Application Control Gateway for Small &","imgUrl":"https:\/\/img.chinax.com\/nimg\/dd\/d1\/b68b9b8206f51428c1e2798a705e-200x200-1\/h3c_secpath_acg1000_b30_g_poe_integrated_application_control_gateway_for_small_26_medium_enterprise_networks.jpg","attrs":{"Brand Name":"H3C","Model Number":"H3C ACG1000-B30-G","Place of Origin":"China","Minimum Order Quantity":"1"}}
{"title":"H3C SecPath ACG1000-B100 Enterprise Application Control Gateway with High","imgUrl":"https:\/\/img.chinax.com\/nimg\/7f\/08\/65df7e5ed5bffe0d3a1d60bc855d-200x200-1\/h3c_secpath_acg1000_b100_enterprise_application_control_gateway_with_high_performance_traffic_management_2c_url_filtering_and_user.jpg","attrs":{"Brand Name":"H3C","Model Number":"H3C ACG1000-B100","Place of Origin":"China","Minimum Order Quantity":"1"}}
{"title":"H3C SecPath F100-G5 Gigabit Firewall Multi Core Processor IPv6 Support for","imgUrl":"https:\/\/img.chinax.com\/nimg\/c2\/5a\/b95e0c02968bd4c48c490b332387-200x200-1\/h3c_secpath_f100_g5_gigabit_firewall_multi_core_processor_ipv6_support_for_enterprise_network_security.jpg","attrs":{"Brand Name":"H3C","Model Number":"H3C SecPath F100-G5","Place of Origin":"china","Minimum Order Quantity":"1"}}
{"title":"H3C SecPath F1000-C8300 Cloud Firewall Enterprise Security Gateway VPN DDoS","imgUrl":"https:\/\/img.chinax.com\/nimg\/a7\/9b\/f53a37cf0ccc6c93845f4fd9ec96-200x200-1\/h3c_secpath_f1000_c8300_cloud_firewall_enterprise_security_gateway_vpn_ddos_protection.jpg","attrs":{"Brand Name":"H3C","Model Number":"SecPath F100-XI","Place of Origin":"china","Minimum Order Quantity":"1"}}
{"title":"H3C SecPath F1000-G5 Enterprise Network Firewall With VPN Integrated Gateway","imgUrl":"https:\/\/img.chinax.com\/nimg\/4a\/df\/356f1beb68a9f6faa7f02a4aadc1-200x200-1\/h3c_secpath_f1000_g5_enterprise_network_firewall_with_vpn_integrated_gateway.jpg","attrs":{"Brand Name":"H3C","Model Number":"SecPath F100-XI","Place of Origin":"china","Minimum Order Quantity":"1"}}
{"title":"H3C SecPath F1000-900-AI Series Network Next Generation Firewall With VPN IPS","imgUrl":"https:\/\/img.chinax.com\/nimg\/38\/49\/7d2b0037479af8078aef438d59f4-200x200-1\/h3c_secpath_f1000_900_ai_series_network_next_generation_firewall_with_vpn_ips_ddos_protection.jpg","attrs":{"Brand Name":"H3C","Model Number":"SecPath F100-XI","Place of Origin":"china","Minimum Order Quantity":"1"}}
H3C SecPath F100-C-A1/A2/A3/A5 desktop firewall is a next-generation high-performance firewall product launched by H3C Technology Co., Ltd. (hereinafter referred to as H3C) with the advent of the Web 2.0 era and the current technology trend of deep integration of security and networking, targeting small and medium-sized enterprises, campus network Internet exports, and WAN branch markets.
H3C SecPath F100-C-A1/A2/A3/A5 desktop firewall supports multi-dimensional integrated security protection, which can carry out integrated security access control such as IPS, AV, DLP and other traffic from multiple dimensions such as user, application, time, and pentagram, which can effectively ensure network security. It supports a variety of VPN
Domain authentication, CHAP verification, PAP verification
Firewall
Support security zone division
It can protect against various malicious attacks such as Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, ARP Sharding, ARP Active Reverse Query, TCP Packet Flag Bit Illegal Oversized ICMP Packets, Address Scanning, Port Scanning, SYN Flood, UPD Flood, ICMP Flood, DNS Flood, and so on
Basic and extended access control lists
Access control lists based on time periods
User-based, application-based access control lists
ASPF application layer packet filtering
Static and dynamic blacklist capabilities
MAC and IP binding function
MAC-based access control list
Support 802.1q VLAN transmission
Virus protection
Detection based on viral characteristics
Supports manual and automatic upgrades of virus databases
It supports defense against common attacks such as hacker attacks, worms/viruses, Trojans, malicious code, spyware/adware, DoS/DDoS, and more
Supports defense against attacks such as buffer overflow, SQL injection, and IDS/IPS escape
Support the classification and classification of attack feature databases (classification according to attack type and target machine system) (high, medium, low, and prompt levels)
Support for manual and automatic upgrades of attack signature libraries (TFTP and HTTP)
Support P2P/IM recognition and control of BT and other P2P/IM
Mail/web/app layer filtering
Mail filtering
SMTP email address filtering
Message header filtering
Email content filtering
Email attachment filtering
Web filtering
HTTP URL filtering
HTTP content filtering
Apply layer filtering
Java Blocking
ActiveX Blocking
SQL injection attack prevention
NAT
Supports mapping multiple internal addresses to the same public network address
Supports mapping multiple internal addresses to multiple public addresses
You can map internal addresses to public network addresses one by one
Support simultaneous conversion of source and destination addresses
External web hosts are supported to access internal servers
Supports direct mapping of internal addresses to public IP addresses of APIs
DNS mapping is supported
Configurable valid time to support address translation
Supports a variety of NAT ALGs, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, SIP, etc
VPN
L2TP VPN,IPSec VPN,GRE VPN,SSL VPN
IPv6
IPv6-based stateful firewall and attack prevention
Support H3C SSM Security Management Center for device management
SNMPv3 is supported and is compatible with SNMP v1 and v2
Intelligent security policies
Environmental protection and certification
Support European strict RoHS environmental protection certification
High-performance hardware and software processing platform
The H3C SecPath F100-C-A1 and F100-C-A2 feature the latest 64-bit ARM multi-core multi-threaded processor architecture.
The H3C SecPath F100-C-A3 and F100-C-A5 feature the latest advanced 64-bit MIPS multi-core multi-threaded processor architecture.
Carrier-grade equipment with high reliability
It adopts the software and hardware platform of H3C company with independent intellectual property rights. The product has been used by telecom operators to small and medium-sized enterprise users for many years.
Powerful security protection functions
Support rich attack prevention functions. These attacks include Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP Sharded Packets, ARP Spoofing, ARP Active Reverse Query, Unlawful TCP Packet Flag Bits, Oversized ICMP Packets, Address Scanning, Port Scanning, and other attacks, as well as SYN Flood, UPD Flood, ICMP Flood, and DNS Detection and defense against common DDoS attacks such as Flood.
Support safe zone management. Security zones can be divided based on interfaces and VLANs.
Package filtering is supported. Filter packets by using standard or extended access control rules between security zones and using information such as UDP or TCP ports in packets. In addition, it can be filtered by time period.
Support application-based and user-based access control, treat applications and users as the basic elements of security policies, and combine defense-in-depth to achieve next-generation access control functions.
Support Application Layer State Packet Filtering (ASPF) function. By checking application layer protocol information (e.g., FTP, HTTP, SMTP, RTSP, and other TCP/UDP-based application layer protocols) and monitoring the connection-based application layer protocol status, it dynamically determines whether packets are allowed through the firewall or dropped.
Validation, authorization, and billing (AAA) services are supported. Including: certification based on RADIUS/HWTACACS+, CHAP, PAP, etc.
Support static and dynamic blacklists.
NAT and NAT multi-instance are supported.
Support VPN function. Including: support L2TP, IPSec/IKE, GRE, SSL, etc., and realize docking with intelligent terminals.
Supports rich routing protocols. It supports static routing, policy routing, and dynamic routing protocols such as RIP and OSPF.
Support for security logs.
Support traffic monitoring statistics and management.
Flexible and scalable all-in-one DPI deep security
An integrated security service processing platform that is highly integrated with basic security protection.
Comprehensive application layer traffic identification and management: Through H3C's long-term accumulation of state machine detection and traffic interaction detection technology, it can accurately detect Thunder/Web Thunder, BitTorrent, eMule/eDonkey, QQ, MSN, PPLive and other P2P/IM/online games/stock trading/network video/network multimedia applications; It supports the P2P traffic control function, which can accurately identify P2P traffic by matching network packets with P2P protocol packet characteristics, and can provide different control strategies to achieve flexible P2P traffic control.
High-precision, high-efficiency intrusion detection engine. It adopts H3C's FIRST (Full Inspection with Rigorous State Test) engine. The FIRST engine integrates a number of detection technologies to achieve comprehensive detection based on accurate state, with extremely high intrusion detection accuracy. At the same time, the FIRST engine adopts parallel detection technology, and the software and hardware can be flexibly adapted, which greatly improves the efficiency of intrusion detection.
Real-time virus protection: Kaspersky's stream engine antivirus technology is used to quickly and accurately detect viruses and other malicious code in network traffic.
Fast URL classification filtering: Provides basic URL blacklist and whitelist filtering, and you can configure the URL classification filtering server for online query.
Comprehensive and timely security feature library. Through years of operation and accumulation, H3C has a senior attack signature library team in the industry, and is equipped with a professional attack and defense laboratory to keep up with the latest developments in the field of network security, so as to ensure the timely and accurate update of the feature library.
Industry-leading IPv6
IPv6 state firewall is supported, which truly realizes the firewall function under IPv6 conditions and completes IPv6 attack prevention.
It supports IPv4/IPv6 dual protocol stacks, and supports IPv6 data packet forwarding, static routing, dynamic routing, and multicast routing.
It supports various IPv6 transition technologies, including NAT-PT, IPv6 over IPv4 GRE tunneling, manual tunneling, 6to4 tunneling, IPv4 compatible IPv6 automatic tunneling, ISATAP tunneling, NAT444, DS-Lite, etc.
It supports IPv6 ACL, Radius, and other security technologies.
Next-generation multi-service features
Integrate link load balancing features to effectively realize multi-link automatic balancing and automatic switching of enterprise Internet egress through link status detection, link busy protection, and other technologies.
It can not only combine USB-Key and SMS for mobile user identity authentication, but also combine with the original authentication system of the enterprise to achieve integrated authentication access.
DLP basic function support, support email filtering, provide SMTP email address, title, attachment, and content filtering; Support web filtering, provide HTTP URL and content filtering; Support file filtering for network transmission protocols; Support application-layer filtering to prevent Java/ActiveX blocking and SQL injection attacks.
Professional intelligent management
Support intelligent security policies: Implement policy redundancy detection, policy matching optimization suggestions, and dynamically detect intranet services to dynamically generate security policies and recommend them.
SNMPv3 is supported and is compatible with SNMP v1 and v2.
Provides a graphical interface for simple and easy-to-use web management.
Device management and firewall function configuration can be carried out through the command line interface to meet the needs of professional management and mass configuration.
The H3C IMC SSM security management center realizes unified management, integrating security information and event collection, analysis, response and other functions, solving the problems of network and security equipment isolation from each other, unintuitive network security status, slow security incident response, and difficulty in network fault location, so that IT and security administrators can get rid of cumbersome management work, greatly improve work efficiency, and focus on core business.
Based on advanced deep mining and analysis technology, it provides users with centralized log management functions by actively collecting and passively receiving, and normalizes logs in different types of formats (syslog, binary stream logs, etc.). At the same time, high-polymerization compression technology is used to store massive events, and log files can be automatically compressed, encrypted, and saved to external storage systems such as DAS, NAS, or SAN to avoid the loss of important security events.
Provides rich reports, mainly including application-based reports and network flow-based analysis reports.
Support output in various formats such as PDF, HTML, WORD, and TXT.
The report can be customized through the web interface, including the time range of the data, the source device of the data, the generation cycle, and the output type.