HP F1000-S-EI VPN Firewall Appliance
- Brand
- Hewlett Packard Enterprise
- Product code
- JG213A
- SKU
- UZMLA4BUPBMX3
- High Performance
- Application Specific Packet Filter (ASPF)
- Zone-based access policies
- Application-level gateway (ALG)
- Layer 2 Tunneling Protocol (L2TP)
- Complete session logging
- Manager and operator privilege levels
- Command-line interface (CLI)
- Remote monitoring (RMON)
- FTP, TFTP, and SFTP support
- Border gateway protocol 4 (BGP-4)
- Dual IP stack
- Policy routing
- Defense against attacks
- Application layer content filtering
Description
High performance
High performance:up to 40 Gbps throughput secures traffic without compromising network performance; a maximum of 4 million concurrent connections and 180,000 connections per second enables high-volume networks to remain secure under peak traffic.
Application Specific Packet Filter (ASPF)
Application Specific Packet Filter (ASPF):dynamically determines whether to forward or drop a packet by checking its application layer protocol information, and other application layer protocols.
Zone-based access policies
Zone-based access policies:logically groups virtual LANs (VLANs) into zones that share common security policies; allows both unicast and multicast policy settings by zones instead of by individual VLANs.
Virtualization
Virtualization:multi-core architecture enables both multiple zones and multiple separate firewall instances to be created on the same device, centralized deployment of a single device offering multiple virtual firewalls lowers total cost of ownership through streamlined training, simplified deployment and management, and reduced power consumption.
Application-level gateway (ALG)
Application-level gateway (ALG):deep packet inspection in the firewall discovers the IP address and service port information embedded in the application data; the firewall then dynamically opens appropriate connections for specific applications.
IPsec
IPsec provides secure tunneling over an untrusted network such as the Internet or a wireless network; offers data confidentiality, authenticity, and integrity between two endpoints of the network.
Layer 2 Tunneling Protocol (L2TP)
Layer 2 Tunneling Protocol (L2TP):an industry standard-based traffic encapsulation mechanism supported by many common operating systems, will tunnel the Point-to-Point Protocol (PPP) traffic over the IP and non-IP networks; may use the IP/UDP transport mechanism in IP networks.
Complete session logging
Complete session logging provides detailed information for problem identification and resolution.
Manager and operator privilege levels
Manager and operator privilege levels:enable read-only (operator) and read-write (manager) access on CLI and Web browser management interfaces.
Command-line interface (CLI)
Command-line interface (CLI) provides a secure, easy-to-use command-line interface for configuring the module via SSH or a switch console; provides direct real-time session visibility.
Remote monitoring (RMON)
Remote monitoring (RMON):uses standard SNMP to monitor essential network functions; supports events, alarm, history, and statistics group plus a private alarm extension group.
FTP, TFTP, and SFTP support
FTP, TFTP, and SFTP support:FTP allows bidirectional transfers over a TCP/IP network and is used for configuration updates; Trivial FTP is a simpler method using User Datagram Protocol (UDP).
Border Gateway Protocol 4 (BGP-4)
Border Gateway Protocol 4 (BGP-4):Exterior Gateway Protocol (EGP) with path vector protocol uses TCP for enhanced reliability for the route discovery process reduces bandwidth consumption by advertising only incremental updates.
Dual IP stack
Dual IP stack:maintains separate stacks for IPv4 and IPv6 to ease transition from an IPv4-only network to an IPv6-only network design.
Policy routing
Policy routing:allows custom filters for increased performance and security; supports ACLs, IP prefix, AS paths, community lists, and aggregate policies.
Defense against attacks
Defense against attacks:a firewall series provides defense against various attacks, and supports binding of MAC address and IP addresses, as well as intelligent defense of worm viruses.
Application layer content filtering
Application layer content filtering:a firewall series supports mail filtering, based on SMTP mail address, titles, attachments, and content; supports Web page filtering.
General | |
---|---|
Device type | Security appliance |
Installed Modules Qty (Max) | 0 (2) |
Width | 44.2 cm |
Depth | 40 cm |
Height | 4.4 cm |
Weight | 5.5 kg |
Networking | |
Form factor | External |
Ports Qty | 12 |
Connectivity technology | Wired |
Data Link Protocol | Ethernet, Fast Ethernet, Gigabit Ethernet |
Network / Transport Protocol | UDP/IP, L2TP, NTP, ICMP/IP, IPSec, ARP, FTP |
Routing Protocol | OSPF, EGP, BGP-4, RIP-1, RIP-2, BGP, IGMPv2, IGMP, PIM-SM, static IP routing, PIM-DM, IGMPv3, GRE, OSPFv3, ECMP, RIPng, BGP-4+ |
Remote Management Protocol | SNMP 1, RMON, Telnet, SNMP 3, SNMP 2c, HTTP, HTTPS, TFTP, SSH, CLI |
Performance | Firewall throughput:2 Gbps VPN throughput (3DES/AES):600 Mbps Connection rate:30000 connections per second |
Capacity | Security policies:20480 Virtual interfaces (VLANs):4000 Concurrent connections:1000000 Concurrent IPSec tunnels:2000 Virtual firewalls:256 Security zones:256 |
Features | NAT support, VPN support, PAT support, NAPT support, Syslog support, DoS attack prevention, packet filtering, ALG support, DDos attack prevention, IPSec Virtual Private Network (VPN), Trivial File Transfer Protocol (TFTP) support, Access Control List (ACL) support, Application Specific Packet Filter (ASPF) |
Encryption Algorithm | Triple DES, MD5, AES, IKE, TLS, PKI |
Authentication method | RADIUS, PAP, TACACS, TACACS+, Extensible Authentication Protocol (EAP) |
Compliant Standards | IEEE 802.1Q, IEEE 802.1x |
Expansion / Connectivity | |
Expansion slots | 2 (total) / 2 (free) x expansion slot 12 (total) / 12 (free) x |
Interfaces | 12 x 1000Base-T - RJ-45 1 x management - RJ-45 |
Miscellaneous | |
Compliant Standards | EN 61000-3-2, EN55022, ICES-003, IEC 61000-4-11, IEC 61000-4-2, IEC 61000-4-3, IEC 61000-4-4, IEC 61000-4-5, IEC 61000-4-6, IEC 61000-4-8, EN 61000-3-3, EN55024, CISPR 22, EN 61000-4-4, EN 61000-4-2, EN 61000-4-3, EN 61000-4-6, FCC Part 15, EN 61000-4-5, EN 61000-4-11, EN 61000-4-8, VCCI V-3, EN 301 489-1, EN 300 386, EN 301 489-17 |
Power | |
Power Device | Internal power supply |
Environmental Parameters | |
Min Operating Temperature | 0 °C |
Max Operating Temperature | 45 °C |
Humidity Range Operating | 10 - 95% (non-condensing) |