H3C SecPath F100-C-A1 & F100-C-A2-H3C (2024)

High-performance software and hardware processing platform

F100-C-A1 and F100-C-A2 use advanced 64-bit multi-core high-performance processors and caches.

Carrier-level high availability

Use H3C highly available proprietary software and hardware platforms that have been proven by Telecom carriers and small- to medium-sized enterprises.

Support H3C SCF, which can virtualize multiple devices into one device for unified resources management, service backup, and system performance improvement.

Powerful security protection features

Attack protection—Detects and prevents various attacks, including Land, Smurf, Fraggle, ping of death, Tear Drop, IP spoofing, IP fragment, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, IP/port scanning, and common DDoS attacks such as SYN flood, UDP flood, DNS flood, and ICMP flood.

Security zone—Allows you to configure security zones based on interfaces and VLANs.

Packet filtering—Allows you to apply standard or advanced ACLs between security zones to filter packets based on information contained in the packets, such as UDP and TCP port numbers. You can also configure time ranges during which packet filtering will be performed.

Access control—Supports access control based on users and applications and integrates deep intrusion prevention with access control.

ASPF—Dynamically determines whether to forward or drop a packet by checking its application layer protocol information and state. ASPF supports inspecting FTP, HTTP, SMTP, RTSP, and other TCP/UDP-based application layer protocols.

AAA—Supports authentication based on Local, RADIUS/HWTACACS+, CHAP, and PAP.

Blacklist—Supports static blacklist and dynamic blacklist.

NAT and VRF-aware NAT.

VPN—Supports L2TP, IPsec/IKE/IKEv2, GRE, and SSL VPNs. Allows smart devices to connect to the VPNs.

Routing—Supports static routing, RIP, OSPF, BGP, routing policies, and application- and URL-based policy-based routing.

Security logs—Supports operation logs, zone pair policy matching logs, attack protection logs, DS-LITE logs, and NAT444 logs.

Traffic monitoring, statistics, and management.

Flexible and extensible, integrated, and advanced DPI security

Integrated security service processing platform—Highly integrates the basic and advanced security protection measures to a security platform.

Application layer traffic identification and management.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (1) Uses the state machine and traffic exchange inspection technologies to detect traffic of P2P, IM, network game, stock, network video, and network multi-media applications, such as Thunder, Web Thunder, BitTorrent, eMule, eDonkey, QQ, MSN, and PPLive.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (2) Uses the deep inspection technology to identify P2P traffic precisely and provides multiple policies to control and manage the P2P traffic flexibly.

Highly precise and effective intrusion inspection engine—Uses the H3C-proprietary Full Inspection with Rigorous State Test (FIRST) engine and various intrusion inspection technologies to implement highly precise inspection of intrusions based on application states. The FIRST engine also supports software and hardware concurrent inspections to improve the inspection efficiency.

Realtime virus protection—Uses the stream-based antivirus engine of Kaspersky to prevent, detect, and remove malicious code from network traffic.

Fast categorized filtering of URLs—Provides basic URL filtering blacklist and whitelist and allows you to query the URL category filtering server online.

Complete and updated security signature database—H3C has a senior signature database team and professional attack protection labs that can provide a precise and up-to-date signature database.

Industry-leading IPv6 features

IPv6 status firewall.

IPv6 attack protection.

IPv6 data forwarding, IPv6 static routing and dynamic routing, and IPv6 multicast.

IPv6 transition technologies, including NAT-PT, IPv6 over IPv4 GRE tunnel, manual tunnel, 6to4 tunnel, automatic IPv4-compatible IPv6 tunnel, ISATAP tunnel, NAT444, and DS-Lite.

IPv6 ACL and RADIUS.

Next-generation multi-service features

Integrated link load balancing feature—Uses link state inspection and link busy detection technologies, and applies to a network egress to balance traffic among links.

Integrated SSL VPN feature—Uses USB-Key, SMS messages, and the enterprise's existing authentication system to authenticate users, providing secure access of mobile users to the enterprise network.

Data leakage prevention (DLP)—Supports email filtering by SMTP mail address, subject, attachment, and content, HTTP URL and content filtering, FTP file filtering, and application layer filtering (including Java/ActiveX blocking and SQL injection attack prevention).

Wireless AC function:

Maximum support for 64 APs, suggestion support for 16-32 APs (F100-C has no license by default, need to purchase). Can configure automatically and plug and play, Support unified management, configuration, and upgrade for wireless AP.

Complete authentication technology for wireless terminals, support 802.1X/MAC/Portal authentication function

Intelligent management

H3C SecPath F100-C-A1 & F100-C-A2-H3C (3) Intelligent security policy management—Detects duplicate policies, optimizes policy matching rules, detects and proposes security policies dynamically generated in the internal network.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (4) SNMPv3—Compatible with SNMPv1 and SNMPv2.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (5) CLI-based configuration and management via console port.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (6) Web-based management, with simple, user-friendly GUI.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (7) H3C IMC SSM unified management—Collects and analyzes security information and offers an intuitive view into network and security conditions, saving management efforts and improving management efficiency.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (8) Centralized log management based on advanced data drill-down and analysis technology—Requests and receives information to generate logs, compiles different types of logs (such as syslogs and binary stream logs) in the same format, and compresses and stores large amounts of logs. You can encrypt and export saved logs to external storage devices such as DAS, NAS, and SAN to avoid loss of important security logs.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (9) Abundant reports—Include application-based reports and stream-based analysis reports.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (10) Various exported report formats—Include PDF, HTML, word, and txt.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (11) Report customization through the Web interface—Customizable contents include time range, data source device, generation period, and export format.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (12) In-service software upgrade (ISSU)—Upgrades software with a minimum amount of downtime.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (13) Log pagination—Divides BLS, ATK, and CFGLOG files into five types of log files. The firewall supports backend log pagination, clearing, and specifying log parameters, pagination query, and configuring logs for an independent module.

H3C SecPath F100-C-A1 & F100-C-A2-H3C (14) Cloudnet platform & APP management

H3C SecPath F100-C-A1 & F100-C-A2-H3C (2024)
Top Articles
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 6600

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.