The SecPath T5000 delivers high system performance with advanced architecture and components:
Latest 64-bit (MIPS) multi-core high-performance processor and high-speed cache—Provides high-performance security processing capability at over 10 Gbps.
CPU+switch structure—Uses the CPU to process security services and the switch to implement service port extension. The T5030, T5060, and T5080 each provide eight 10-GE fiber ports, eight GE bypass copper ports, and five expansion slots, where you can install interface modules to provide 40 Gbps ports. The T5000-C and T5000-S each provide four GE combo interfaces and eight expansion slots, where you can install interface modules to provide 40 Gbps ports.
Industry-leading virtualization solution
N:1, 1:N, and N:1:M virtualization solutions that allow resource pooling for cloud computing.
Creating, enabling, disabling, and deleting virtual IPS features.
Independent assignment of compute resources, such as CPU resources and memory resources.
Independent configuration management and saving.
Independent session management, NAT, and routing.
Powerful security protection features
Intrusion prevention and detection—Integrates IPS, antivirus, bandwidth management, and URL filtering features. By inspecting and analyzing Layer 7 application information of the traffic, the system can identify and block attacks and malicious behaviors in the network in real-time to secure the network applications, infrastructure, and performance.
Attack prevention technologies—Supported in both IPv4 and IPv6 network. In addition to the stateful firewall technology. The system detects and prevents various attacks, including:
● Single packet attacks, such as Land, Smurf, Fraggle, WinNuke, ping of death, Teardrop, and invalid TCP flag.
● IP spoofing attacks.
● IP scanning attacks and port scanning attacks.
● Flood attacks, such as Ack flood, DNS flood, Fin flood, HTTP flood, ICMP flood, ICMPv6 flood, Reset flood, SYNACK flood, SYN flood, and UDP flood.
Complete and updated security signature database
H3C has a professional team to track the security bulletins of global security organizations and enterprises. The team provides an up-to-date security signature database based on the threat analysis results.
The signature database not only provides all vulnerability signatures for the mainstream operation systems, network devices, database systems, and application software systems, but also includes signatures for attacks such as hackers, worms, viruses, Trojans, DoS/DDoS attacks, scanning attacks, spyware, Web fishing, and traffic of P2P, IM, and network games.
As a partner of Microsoft Active Protections Program, H3C has early access to the vulnerability information so that H3C can provide updated protections to customers faster.
With certificate of Common Vulnerabilities & Exposures (CVE) compatibility, H3C provides industry-leading vulnerability research and attack prevention technologies. At the same time, H3C pays close attention to the domestic network security events and provides real-time prevention methods.
With a global honeypot system deployed, H3C understands the latest attack technologies and trends, and use the following releasing methods:
● Weekly and emergency (for critical security vulnerability) security update publishing.
● Automatic or manual deployment to the IPS devices for real-time attack prevention.
Abundant protection actions for packet inspection results, including blocking, dropping, permit, TCP Reset, raw packet capture, redirection, logging, and sending alarms.
Flexible combination of actions for detected threats. Common combinations of actions are defined in the factory default settings.
Industry-leading IPv6 features
All features are supported in IPv6 networks.
Support for deployment in the IPv6 networks, IPv6 feature management, and IPv6 logs and auditing.
Carrier-level high availability
1:1 active/active and active/standby stateful failover for load balancing and service backup.
IRF for flexible management and extension.
Fault isolation. Modular design-based Comware 7 ensures one process fault does not affect the running of other processes, the kernel, and the hardware.
Configuration and management through Web, CLI, and SSH.
RBAC for controlling user access to functions, command lines, and menus based on user roles.
SSM unified management platform for configuration management, performance monitoring, and log auditing.
MIB nodes to manage and monitor performance.
Publicly available system interfaces
Programming interfaces—The Linux-based Comware 7 provides open standard programming interfaces for users to define dedicated features. Currently, the system provides NETCONF interfaces.
Tcl scripts—Comware 7 provides a built-in tool command language (Tcl) interpreter. You can use the Tcl language to execute the Tcl command and the Comware commands, the SNMP GET and SET operations, and the programming interfaces to implement specific features.
Embedded Automation Architecture—EAA allows you to self-define monitored events and actions to take in response to an event. EAA not only ensures HA, but also meets specific user requirements.