English
You are here: Home » Products » H3C » SMB Products » H3C SecPath F100-C-A1 Firewalls Enterprises Network Integration Firewalls

Product Category

Contact Us

Tel:  +86-0755-28447806

Phone:  +86-18929367032
Skype:  +86-18929367032
Whatsapp:  +86-18929367032
QQ:  578405965

loading

Share to:
sharethis sharing button

H3C SecPath F100-C-A1 Firewalls Enterprises Network Integration Firewalls

H3C SecPath F100-C-A1 and F100-C-A2 firewalls are next-generation high-performance firewalls for small- and medium-size enterprises, campus network egress, and WAN branches to embrace the Web 2.0 era and follow the technology trend of deep security and network integration.

H3C SecPath F100-C-A1 and F100-C-A2 firewalls support multi-dimensional integrated security protection, which can perform integrated security access control of IPS, AV, DLP and other traffic from multiple dimensions such as user, application, time, and quintuple.

F100-C-A1 and F100-C-A2 support multiple VPN services, such as L2TP VPN, GRE VPN, IPsec VPN, and SSL VPN. They can cooperate with intelligent endpoints to provide mobile office service, and provide rich routing capabilities, support RIP, OSPF, BGP, routing strategies, and policy routing based on applications and URLs. The firewalls also support IPv4/IPv6 security protection.
  • F100-C-A1

  • H3C

  • New

  • 1 Year

Availability:
Quantity:

H3C SecPath F100-C-A1 Firewalls

High-performance software and hardware processing platform

F100-C-A1 and F100-C-A2 use advanced 64-bit multi-core high-performance processors and caches.

Carrier-level high availability

· Use H3C highly available proprietary software and hardware platforms that have been proven by Telecom carriers and small- to medium-sized enterprises.

· Support H3C SCF, which can virtualize multiple devices into one device for unified resources management, service backup, and system performance improvement.

Powerful security protection features

· Attack protection—Detects and prevents various attacks, including Land, Smurf, Fraggle, ping of death, Tear Drop, IP spoofing, IP fragment, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, IP/port scanning, and common DDoS attacks such as SYN flood, UDP flood, DNS flood, and ICMP flood.

· Security zone—Allows you to configure security zones based on interfaces and VLANs.

· Packet filtering—Allows you to apply standard or advanced ACLs between security zones to filter packets based on information contained in the packets, such as UDP and TCP port numbers. You can also configure time ranges during which packet filtering will be performed.

· Access control—Supports access control based on users and applications and integrates deep intrusion prevention with access control.

· ASPF—Dynamically determines whether to forward or drop a packet by checking its application layer protocol information and state. ASPF supports inspecting FTP, HTTP, SMTP, RTSP, and other TCP/UDP-based application layer protocols.

· AAA—Supports authentication based on Local, RADIUS/HWTACACS+, CHAP, and PAP.

Blacklist—Supports static blacklist and dynamic blacklist.

· NAT and VRF-aware NAT.

· VPN—Supports L2TP, IPsec/IKE/IKEv2, GRE, and SSL VPNs. Allows smart devices to connect to the VPNs.

· Routing—Supports static routing, RIP, OSPF, BGP, routing policies, and application- and URL-based policy-based routing.

· Security logs—Supports operation logs, zone pair policy matching logs, attack protection logs, DS-LITE logs, and NAT444 logs.

· Traffic monitoring, statistics, and management.

Item

F100-C-A1


Size (WxDxH)

266mmx161mmx44mm


Ports

5 × GE + 2 × SFP

(MTU: 1500 defaultly)



Storage media

TF card with a maximum size of 500 GB

Ambient temperature

Operating: 0°C to 45°C (32°F to 113°F)

Storage: –40°C to +70°C (–40°F to +158°F)

Operating mode

Route, transparent, or hybrid

AAA

Portal authentication

RADIUS authentication

HWTACACS authentication

PKI/CA (X.509 format) authentication

Domain authentication

CHAP authentication

PAP authentication

Firewall

SOP virtual firewall technology, which supports full virtualization of hardware resources, including CPU, memories, and storage

Security zone

Attack protection against malicious attacks, such as land, smurf, fraggle, ping of death, teardrop, IP spoofing, IP fragmentation, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, address/port scanning, SYN flood, ICMP flood, UDP flood, and DNS query flood

Basic and advanced ACLs

Time range-based ACL

User-based and application-based access control

ASPF application layer packet filtering

Static and dynamic blacklist function

MAC-IP binding

MAC-based ACL

802.1Q VLAN transparent transmission

Sub-Interface VLAN

Antivirus

Signature-based virus detection

Manual and automatic upgrade for the signature database

Stream-based processing

Virus detection based on HTTP, FTP, SMTP, and POP3

Virus types include Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, and Virus

Virus logs and reports

Deep intrusion prevention

Prevention against common attacks such as hacker, worm/virus, Trojan, malicious code, spyware/adware, DoS/DDoS, buffer overflow, SQL injection, and IDS/IPS bypass

Attack signature categories (based on attack types and target systems) and severity levels (including high, medium, low, and notification)

Manual and automatic upgrade for the attack signature database (TFTP and HTTP).

P2P/IM traffic identification and control

Email/webpage/ application layer filtering

Email filtering

SMTP email address filtering

Email subject/content/attachment filtering

Webpage filtering

HTTP URL/content filtering

Java blocking

ActiveX blocking

SQL injection attack prevention

NAT

Many-to-one NAT, which maps multiple internal addresses to one public address

Many-to-many NAT, which maps multiple internal addresses to multiple public addresses

One-to-one NAT, which maps one internal address to one public address

NAT of both source address and destination address

External hosts access to internal servers

Internal address to public interface address mapping

NAT support for DNS

Setting effective period for NAT

NAT ALGs for NAT ALG, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, and SIP

VPN

L2TP VPN

IPSec VPN

GRE VPN

SSL VPN




IP Services

IP Forwarding

ICMP, Tracert, ping, Telnet, DHCP Server, DCHP Relay, and DHCP Client

Routing: Static, RIP, OSPF, BGP

Multicast: IGMP, PIM-SM and PIM-DM

VRRP

IPv6 status firewall

IPv6 attack protection

IPv6 forwarding

IPv6 protocols such as ICMPv6, PMTU, Ping6, DNS6, TraceRT6, Telnet6, DHCPv6 Client, and DHCPv6 Relay

IPv6 routing: RIPng, OSPFv3, BGP4+, static routing, policy-based routing

IPv6 multicast: PIM-SM, and PIM-DM

IPv6 transition techniques: NAT-PT, IPv6 tunneling, NAT64 (DNS64), and DS-LITE

IPv6 security: NAT-PT, IPv6 tunnel, IPv6 packet filter, RADIUS, IPv6 zone pair policies, IPv6 connection limit

Encryption algorithm

MD5/SHA1/SHA256/SHA384/SHA512/SM3/3DES-CBC/AES-CBC-128/ AES-CBC-192/ AES-CBC-256/DES-CBC/SM1-CBC-128/SM4-CBC

Configuration management

CLI Configuration management via console port

Remote management through Web, SSH

Device management through H3C IMC SSM

SNMPv3, compatible with SNMPv2 and SNMPv1

Intelligent security policy

Environmental protection

EU RoHS compliance

EMC

EN 55032 ClassA

VCCI-CISPR 32 ClassA

FCC Part 15 Subpart B ClassA

AS/NZS CISPR32 ClassA

ICES-003 ClassA

ETSI EN 300 386

EN 61000-3-2

EN 61000-3-3

EN 55035

Safety

GB 4943.1

UL 62368-1

CAN/CSA C22.2 No 62368-1

IEC 62368-1

EN 62368-1

AS/NZS 62368-1

FDA 21 CFR Subchapter J

741

Previous: 
Next: 

QUICK LINKS

OUR PRODUCTS

CONTACT US

  B609,Bantian International Center, Bantian Street, Longgang District, Shenzhen,China
  +86-0755-28447806
  +86-18929367032
  +86-18929367032
  +86-18929367032
  578405965
FEEDBACK
Copyright  2005-2023 Importgm International limited  All Rights Reserved