Carrier-class equipment with high reliability
Adopt H3C company's software and hardware platform with independent intellectual property rights. The product application has experienced many years of market tests from telecom operators to small and medium-sized enterprises.
It supports H3C SCF virtualization technology, which can virtualize multiple devices into one logical device and present it as a network node to the outside world, manage resources in a unified way, complete business backup and improve the overall performance of the system.
Powerful security protection
Supports rich attack defense functions. Including: Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP Fragmented Packet, ARP Spoofing, ARP Active Reverse Query, Invalid TCP Packet Flag Bit, Oversized ICMP Packet, Address Scanning, Port Defense against attacks such as scanning, as well as detection and defense against common DDoS attacks such as SYN Flood, UPD Flood, ICMP Flood, and DNS Flood.
The latest support for SOP 1:N full virtualization. The H3C SecPath F1000-G5 can be divided into multiple logical virtual firewalls. The container-based virtualization technology makes the characteristics of the virtual system consistent with the actual physical system, and can perform performance allocation such as throughput, concurrency, new creation, and policies based on the virtual system. .
Support safe area management. Security zones can be divided based on interfaces and VLANs.
Packet filtering is supported. By using standard or extended access control rules between security zones, data packets can be filtered with the help of information such as UDP or TCP ports in packets. In addition, you can filter by time period. It supports application-based and user-based access control, takes applications and users as the basic elements of security policies, and combines defense-in-depth to achieve next-generation access control functions.
Support Application Layer Stateful Packet Filtering (ASPF) function. By examining application-layer protocol information (such as FTP, HTTP, SMTP, RTSP, and other application-layer protocols based on TCP/UDP protocols), and monitoring the status of connection-based application-layer protocols, dynamically determine whether packets are allowed to pass through the firewall or thrown away.
Authentication, Authorization and Accounting (AAA) services are supported. Including: authentication based on RADIUS/HWTACACS+, CHAP, PAP, etc. Both static and dynamic blacklists are supported.
NAT and NAT multi-instance are supported.
Support VPN function. Including: support L2TP, IPSec/IKE, GRE, SSL, etc., and realize the connection with intelligent terminals.
Supports rich routing protocols. Support static routing, policy routing, and dynamic routing protocols such as RIP and OSPF. Security log is supported.
Supports traffic monitoring, statistics and management.
Flexible and scalable all-in-one DPI deep security
An integrated security business processing platform that is highly integrated with basic security protection.
Comprehensive application-layer traffic identification and management: Through H3C's long-term accumulation of state machine detection and traffic interaction detection technology, it can accurately detect Thunder/Web Thunder (Thunder/Web Thunder), BitTorrent, eMule (Emule)/eDonkey (eDonkey), WeChat , Weibo, QQ, MSN, PPLive and other P2P/IM/online games/stocks/network
video/network multimedia and other applications; support P2P flow control function, through in-depth detection of traffic, that is, by combining network packets with P2P By matching the characteristics of protocol packets, it can accurately identify P2P traffic to achieve the purpose of managing P2P traffic. At the same time, it can provide different control strategies to realize flexible P2P traffic control.
High precision and high efficiency intrusion detection engine . It adopts the FIRST (Full Inspection with Rigorous State Test, comprehensive inspection based on accurate state) engine with independent intellectual property rights of H3C Company. The FIRST engine integrates a number of detection technologies, realizes comprehensive detection based on accurate status, and has extremely
high intrusion detection accuracy; at the same time, the FIRST engine adopts parallel detection technology, and the software and hardware can be flexibly adapted, which greatly improves the intrusion detection. efficiency.
Real-time virus protection: Using the streaming engine virus detection technology, it can quickly and accurately detect and kill malicious codes such as viruses in network traffic .
Massive URL classification and filtering: support local + cloud mode, 139 classification libraries, and more than 20 million URL rules.Comprehensive and timely security signature library. Through years of operation and accumulation, H3C has a senior attack signature database team in the industry, and is equipped with a professional attack and defense laboratory to keep up with the latest developments in the field of network security, so as to ensure the timely and accurate update of the signature database.
Industry-leading IPv6
It supports IPv6 stateful firewall, which truly realizes the firewall function under IPv6 conditions, and completes IPv6 attack prevention at the same time.
Support IPv4/IPv6 dual protocol stack, and support IPv6 data packet forwarding, static routing, dynamic routing and multicast routing functions.
Support various IPv6 transition technologies, including NAT-PT, IPv6 Over IPv4 GRE tunnel, manual tunnel, 6to4 tunnel, IPv4 compatible IPv6 automatic tunnel, ISATAP tunnel, NAT444, DS-Lite, etc.
Support IPv6 ACL, Radius and other security technologies.
Next-generation multi-service features
The integrated link load balancing feature, through link status detection, link busy protection and other technologies, effectively realizes the multi-link automatic balancing and automatic switching of enterprise Internet egress. The integrated SSL VPN feature can meet the security access requirements of mobile office and employees on business trips. It can not only be combined with USB-Key and SMS for mobile user identity authentication, but also can be combined with the original authentication system of the enterprise to realize integrated authentication connection. enter.
Data leakage prevention (DLP), support mail filtering, provide SMTP mail address, header, attachment and content filtering; support web page filtering, provide HTTP URL and content filtering; support file filtering of network transfer protocols; support application layer filtering, provide Java/ ActiveX Blocking and SQL injection attack prevention.
Intrusion Prevention (IPS), supports the identification and protection of web attacks, such as cross-site scripting attacks, SQL injection attacks, etc.
Anti-virus (AV), high-performance virus engine, can protect more than 5 million kinds of viruses and Trojans, and the virus signature database is updated daily.
Unknown threat defense, with the help of the situational awareness platform, the NGFW can quickly detect attacks and locate problems, ensuring that once a single point is attacked, the entire network implements policy upgrades and comprehensive early warning and response.
Professional intelligent management
Supports intelligent security policies: implements policy redundancy detection, policy matching optimization recommendations, and dynamic detection of intranet services to dynamically generate and recommend security policies.
Supports standard network management SNMPv3, and is compatible with SNMP v1 and v2.
Provides a graphical interface and easy-to-use Web management.
Device management and firewall function configuration can be performed through the command line interface to meet the needs of professional management and mass configuration.
H3C SecCenter SMP Security Management Center realizes unified management, integrates security information and event collection, analysis, response and other functions, and solves the problem of network and security equipment being isolated from each other, network security status is not intuitive, security incident response is slow, and network fault location is difficult. and other problems, so that IT and security administrators get rid of tedious management work, greatly improve work efficiency, and can
focus on core business.
Based on advanced in-depth mining and analysis technology, active collection and passive reception are adopted to provide users with centralized log management functions, and to normalize logs in different types of formats (Syslog, binary flow log, etc.). At the same time, it uses high aggregation compression technology to store massive events, and can automatically compress, encrypt and save log files to external storage systems such as DAS, NAS or SAN to avoid the loss of important security events.
Provides rich reports, mainly including application-based reports and network flow-based analysis reports.
Supports output in various formats such as PDF, HTML, WORD and TXT.
The report can be customized through the web interface. The customized content includes the time range of the data, the source device of the data, the generation cycle and the output type.