High-performance software and hardware platforms
F1000 series devices feature state-of-the-art 64-bit multi-core processors and cache memory.
High availability of carrier class
H3C’s own hardware and software platforms are used, which have proven themselves among telecom operators, as well as medium and small businesses .
Supports H3C SCF technology, which allows you to virtualize multiple devices into a single device for unified resource management, service redundancy and improved system performance.
n
Powerful security features
Protection fromattacks b> – Detect and prevent various attacks such as Land, Smurf, Fraggle, ping of death, Tear Drop, IP spoofing, IP fragmentation, ARP response forgery, reverse ARP lookups, invalid TCP flags, large packets ICMP, IP address/port scanning, and common distributed denial of service (DDoS) attacks such as SYN flood, UDP flood, DNS flood, and ICMP flood.
< p style="font-weight: 400;">VirtualizationSOPby< /strong>schemeN:1< /b> – use of container virtualization technologies. The F1000 Series firewall can be virtualized into multiple logical firewalls that provide the same functionality as a physical firewall. Each of the virtual firewalls can have its own security policy defined, and they can be managed independently of each other.
Zones
Zones strong>security – ability to configure security zones based on interfaces and VLANs.< /p>
Identificationandcontroltraffic strong>applied< b>level.
Use of technology state machines and traffic inspection to detect peer-to-peer (P2P) traffic, instant messaging (IM), online gaming, trading systems, network video, and networked multimedia applications such as Thunder, Web Thunder, BitTorrent, eMule, eDonkey, WeChat , Weibo, QQ, MSN and PPLive.
Using deep packet analysis technology to accurately identify P2P traffic and the ability to apply various policies for flexible control and management of P2P traffic .
The most accurate and efficient intrusion control mechanism –uses a proprietary full analysis module with strict state checking from H3C (Full Inspection with Rigorous State Test, FIRST) and various intrusion control technologies for accurate intrusion identification based on application state. The FIRST module also supports simultaneous monitoring of software and hardware to improve inspection efficiency.
Protection< b>fromviruses< /strong>in realtime – using the antivirus streaming module for prevent, detect and remove malicious code from network traffic.
Antivirus(AV) – uses a high-performance virus detection engine and a daily updated signature database to prevent attacks from more than 5 million viruses.
Protection strong>fromunknown threats – Leverages a situational awareness platform to quickly detect and contain threats, enabling the firewall to trigger global security measures. security immediately upon detection of an attack on any individual node.
Intelligent management
Intelligent management of security policies – detection of duplicates policies, optimization of matching rules in policies, detection and dynamic recommendations for security policies in the internal network.
SNMPv3 – compatible with SNMPv1 and SNMPv2.
Configuration and management via the command line interface (CLI).
Management via simple and convenient graphical Web interface.
Unified management using H3C IMC SSM – collection and analysis of security information, as well as visual display of the situation in the network and system security, which reduces labor costs and increases management efficiency.
Centralized log management using advanced tracking and data analysis mechanisms – the ability to issue requests and obtain information to generate audit trails logs, converting various log formats (including syslog and bitstream logs) to a common format, and compressing and storing large logs. Saved logs can be encrypted and exported to external storage devices such as direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SAN) to prevent the loss of important security logs.
Wide range of reports – includes application reports and flow analysis reports.
Export reports in various formats – in including PDF, HTML, Word and txt.