HP F1000-S-EI VPN Firewall Appliance
€7937.42

Brand
Hewlett Packard Enterprise
Product code
JG213A
SKU
UZMLA4BUPBMX3
  • High Performance
  • Application Specific Packet Filter (ASPF)
  • Zone-based access policies
  • Application-level gateway (ALG)
  • Layer 2 Tunneling Protocol (L2TP)
  • Complete session logging
  • Manager and operator privilege levels
  • Command-line interface (CLI)
  • Remote monitoring (RMON)
  • FTP, TFTP, and SFTP support
  • Border gateway protocol 4 (BGP-4)
  • Dual IP stack
  • Policy routing
  • Defense against attacks
  • Application layer content filtering
Sold Out

Description
High performance

High performance:up to 40 Gbps throughput secures traffic without compromising network performance; a maximum of 4 million concurrent connections and 180,000 connections per second enables high-volume networks to remain secure under peak traffic.

Application Specific Packet Filter (ASPF)

Application Specific Packet Filter (ASPF):dynamically determines whether to forward or drop a packet by checking its application layer protocol information, and other application layer protocols.

Zone-based access policies

Zone-based access policies:logically groups virtual LANs (VLANs) into zones that share common security policies; allows both unicast and multicast policy settings by zones instead of by individual VLANs.

Virtualization

Virtualization:multi-core architecture enables both multiple zones and multiple separate firewall instances to be created on the same device, centralized deployment of a single device offering multiple virtual firewalls lowers total cost of ownership through streamlined training, simplified deployment and management, and reduced power consumption.

Application-level gateway (ALG)

Application-level gateway (ALG):deep packet inspection in the firewall discovers the IP address and service port information embedded in the application data; the firewall then dynamically opens appropriate connections for specific applications.

IPsec

IPsec provides secure tunneling over an untrusted network such as the Internet or a wireless network; offers data confidentiality, authenticity, and integrity between two endpoints of the network.

Layer 2 Tunneling Protocol (L2TP)

Layer 2 Tunneling Protocol (L2TP):an industry standard-based traffic encapsulation mechanism supported by many common operating systems, will tunnel the Point-to-Point Protocol (PPP) traffic over the IP and non-IP networks; may use the IP/UDP transport mechanism in IP networks.

Complete session logging

Complete session logging provides detailed information for problem identification and resolution.

Manager and operator privilege levels

Manager and operator privilege levels:enable read-only (operator) and read-write (manager) access on CLI and Web browser management interfaces.

Command-line interface (CLI)

Command-line interface (CLI) provides a secure, easy-to-use command-line interface for configuring the module via SSH or a switch console; provides direct real-time session visibility.

Remote monitoring (RMON)

Remote monitoring (RMON):uses standard SNMP to monitor essential network functions; supports events, alarm, history, and statistics group plus a private alarm extension group.

FTP, TFTP, and SFTP support

FTP, TFTP, and SFTP support:FTP allows bidirectional transfers over a TCP/IP network and is used for configuration updates; Trivial FTP is a simpler method using User Datagram Protocol (UDP).

Border Gateway Protocol 4 (BGP-4)

Border Gateway Protocol 4 (BGP-4):Exterior Gateway Protocol (EGP) with path vector protocol uses TCP for enhanced reliability for the route discovery process reduces bandwidth consumption by advertising only incremental updates.

Dual IP stack

Dual IP stack:maintains separate stacks for IPv4 and IPv6 to ease transition from an IPv4-only network to an IPv6-only network design.

Policy routing

Policy routing:allows custom filters for increased performance and security; supports ACLs, IP prefix, AS paths, community lists, and aggregate policies.

Defense against attacks

Defense against attacks:a firewall series provides defense against various attacks, and supports binding of MAC address and IP addresses, as well as intelligent defense of worm viruses.

Application layer content filtering

Application layer content filtering:a firewall series supports mail filtering, based on SMTP mail address, titles, attachments, and content; supports Web page filtering.

General
Device type Security appliance
Installed Modules Qty (Max) 0 (2)
Width 44.2 cm
Depth 40 cm
Height 4.4 cm
Weight 5.5 kg
Networking
Form factor External
Ports Qty 12
Connectivity technology Wired
Data Link Protocol Ethernet, Fast Ethernet, Gigabit Ethernet
Network / Transport Protocol UDP/IP, L2TP, NTP, ICMP/IP, IPSec, ARP, FTP
Routing Protocol OSPF, EGP, BGP-4, RIP-1, RIP-2, BGP, IGMPv2, IGMP, PIM-SM, static IP routing, PIM-DM, IGMPv3, GRE, OSPFv3, ECMP, RIPng, BGP-4+
Remote Management Protocol SNMP 1, RMON, Telnet, SNMP 3, SNMP 2c, HTTP, HTTPS, TFTP, SSH, CLI
Performance Firewall throughput:2 Gbps VPN throughput (3DES/AES):600 Mbps Connection rate:30000 connections per second
Capacity Security policies:20480 Virtual interfaces (VLANs):4000 Concurrent connections:1000000 Concurrent IPSec tunnels:2000 Virtual firewalls:256 Security zones:256
Features NAT support, VPN support, PAT support, NAPT support, Syslog support, DoS attack prevention, packet filtering, ALG support, DDos attack prevention, IPSec Virtual Private Network (VPN), Trivial File Transfer Protocol (TFTP) support, Access Control List (ACL) support, Application Specific Packet Filter (ASPF)
Encryption Algorithm Triple DES, MD5, AES, IKE, TLS, PKI
Authentication method RADIUS, PAP, TACACS, TACACS+, Extensible Authentication Protocol (EAP)
Compliant Standards IEEE 802.1Q, IEEE 802.1x
Expansion / Connectivity
Expansion slots 2 (total) / 2 (free) x expansion slot 12 (total) / 12 (free) x
Interfaces 12 x 1000Base-T - RJ-45 1 x management - RJ-45
Miscellaneous
Compliant Standards EN 61000-3-2, EN55022, ICES-003, IEC 61000-4-11, IEC 61000-4-2, IEC 61000-4-3, IEC 61000-4-4, IEC 61000-4-5, IEC 61000-4-6, IEC 61000-4-8, EN 61000-3-3, EN55024, CISPR 22, EN 61000-4-4, EN 61000-4-2, EN 61000-4-3, EN 61000-4-6, FCC Part 15, EN 61000-4-5, EN 61000-4-11, EN 61000-4-8, VCCI V-3, EN 301 489-1, EN 300 386, EN 301 489-17
Power
Power Device Internal power supply
Environmental Parameters
Min Operating Temperature 0 °C
Max Operating Temperature 45 °C
Humidity Range Operating 10 - 95% (non-condensing)
We do not guarantee the completeness and accuracy of the product details, which are obtained from outside sources.
We use cookies!
By remembering your preferences and frequent visits, we can provide you with the most relevant experience on our website through the use of cookies. You can provide your permission for the usage of all cookies by clicking "Accept". To give a controlled consent, you can explore the Cookie Settings.