H3C F100-C-A5-W 8-port All Gigabit Small and Medium-sized Desktop Dual-band Wireless Wi-Fi Enterprise-level VPN Firewall

Share on:

Price in USD:Details


Product Overview


The H3C F100-C-A5-W firewall is a new H3C Technology Co., Ltd. (hereinafter referred to as H3C) following the advent of the Web2.0 era and combined with the current technological trend of in-depth integration of security and networks. It is aimed at small and medium-sized enterprises, campus networks, Internet outlets, and WANs. Next-generation high-performance firewall products launched in the branch market.

H3C F100-C-A5-W firewall supports multi-dimensional integrated security protection, which can implement integrated security access control such as IPS, AV, and DLP from multiple dimensions such as user, application, time, quintuple, etc., which can effectively guarantee Network security; supports a variety of VPN services, such as L2TP VPN, GRE VPN, IPSec VPN and SSL VPN, and connects with smart terminals to achieve mobile office; provides rich routing capabilities, supports RIP/OSPF/BGP/routing strategies and based on applications Policy routing with URL; support IPv4/IPv6 dual protocol stack at the same time, it can realize IPV6 state protection and attack prevention.

The H3C F100-C-A5-W firewall adopts dual power supplies (1+1 backup) that are mutually redundant backup, and supports the SCF technology of dual-computer cluster deployment, which fully meets the reliability requirements of high-performance networks.

Firewall type
Small and medium-sized firewall
Product number
Fixed interface
Console port
Intrusion detection
Dos, DDoS
Input: 100-240V, 50/60Hz;
output: 12V,
Maximum power: 11W
Operating mode: routing mode, transparent mode, promiscuous mode
AAA services: Portal authentication, RADIUS authentication, HWTACACS authentication, PKI /CA (X.509 format) authentication, domain
authentication, CHAP authentication, PAP authentication
Firewall: SOP virtual firewall technology, fully virtualized security zone division that supports CPU, memory, storage and other
hardware resources division
It can defend against Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP fragmentation, ARP spoofing, ARP active
reverse query, illegal TCP packet flag bit, oversized ICMP packet, address scan, port scan , SYN Flood, UPD Flood, ICMP Flood, DNS
Flood and other malicious attacks
Basic and extended access control lists
Access control list based on time period
User-based, application-based access control list
ASPF application layer packet filtering
Static and dynamic blacklist function MAC and IP binding function
MAC-based access control list
Support 802.1q VLAN transparent transmission
Virus protection: detection based on virus characteristics Support manual and automatic update of virus database Packet flow
processing mode Support HTTP, FTP, SMTP, POP3 protocol
Supported virus types: Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, Virus, etc.
Support virus logs and reports
Deep intrusion system: support common attack defense against hacker attacks, worms/viruses, Trojan horses, malicious code,
spyware, adware, DoS/DDoS, etc.
Support buffer overflow, SQL injection, IDS/IPS escape attack defense
Support classification of attack signature database (classification according to attack type and target machine system),
classification (high, medium, low, prompt four levels)
Support manual and automatic upgrade of attack signature database (TFTP and HTTP)
Supports P2P/IM identification and control such as BT
Mail/web/application layer filtering: mail filtering, SMTP mail address filtering, mail header filtering, mail content filtering,
mail attachment filtering, web filtering, HTTP URL filtering, HTTP content filtering, application layer filtering, Java Blocking,
ActiveX Blocking, SQL injection attack prevention

0.0166 s.