Country / Region
Products and Solutions
Security
Products
Boundary Security
Blade Security Card
H3C SecBlade IV NGFW Module For H3C S5560X&S5590&S6520XThe H3C SecBlade IV NGFW module is a high-performance firewall module, suitable for H3C S5560X/S5590/S6520X series switches, and provides users with an integrated network security solution that integrates multiple services.
The H3C SecBlade IV NGFW module provide customers with professional and robust network security protection to safeguard data centers, IT infrastructure, and data assets.The SecBlade IV NGFW module meets the requirements of Web 2.0, and supports the following security and network features:
Security protection and access control based on users, applications, time, five tuples, and content security. Typical security protection features include IPS, AV, and URL filtering.
VPN services, including IPSec VPN, SSL VPN, L2TP VPN, GRE VPN, and ADVPN.
Routing capabilities, including static routing, RIP, OSPF, BGP, routing policies, and application- and URL-based policy-based routing.
IPv4 and IPv6 dual stacks, and state protection and attack prevention for IPv6.
The following contents are complex, and it is recommended to browse on PC.

Enter c.h3c.com.cn on the PC browser and operate according to the page to synchronize to the PC and continue browsing.
Continue by mobile
H3C SecBlade IV NGFW modules can adapt to different scenario requirements. Whether the enterprise environment is complex and changeable or pursuing high-efficiency and agility, they can fit perfectly.
All NGFW modules share a unified operating system Comware, ensuring operational consistency and convenience, and greatly reducing operation and maintenance costs. With this innovative design, H3C NGFW modules build an all-round, reliable, and user-friendly network security protection system for customers, fully safeguarding enterprise network security.
Also, H3C SecBlade IV NGFW can be managed by H3C management platform, enabling consistent distribution, detailed management and dynamic adjustment of policies based on risk levels across hardware, virtualized, cloud-native, and containerized firewalls. The firewalls also feedback the networking changes, security logs and attack findings back to the platform, helping constructing the security situation. In this regard the firewalls and platform work as a whole.
Comware is a unified network security operating system designed based on the TCP/IP architecture. H3C SecBlade IV NGFW module, hardware firewall, virtualized firewall, cloud firewall, and containerized firewall all run on this operating system. It supports comprehensive networking and security functions and has high scalability. At the same time, it provides high visibility to simplify operation and maintenance procedures. Sharing this common core system, H3C SecBlade IV NGFW module provide every defense in all types of scenarios.
Comware has a modularized designs presenting abundant features while keeping high reliability. It also quickly reacts to changing technology and realizes rapid delivery.
The comprehensive TCP/IP protocol stack functionality allows the firewall to participate in network deployments with any topology, ensuring seamless integration. Comware supports multi-CPU, multi-core and multi-processing, enhancing data forwarding and processing efficiency.
H3C excels in hardware design. Its elite R&D team meticulously designs from chip to system level, using advanced tech for innovative architecture optimization, ensuring high performance.
Notably, H3C SecBlade IV NGFW modules are highly reliable. They endure rigorous tests. With redundant designs for key components, failure risks are minimized, firmly supporting digital transformation across industries.
Meanwhile, the Comware operating system offers a variety of selectable reliability technologies to ensure high-reliability at the network level.
Supports the RBM (Remote Backup Mechanism) technology, enabling real-time backup of business data and meeting the requirements of active-active and active-standby networking.
H3C SecBlade IV NGFW modules boast outstanding security capabilities, integrating functions such as intrusion detection, virus protection, and URL filtering. They can accurately identify and block various malicious traffic, preventing the invasion of viruses and Trojans. The powerful application identification technology can manage a vast number of network applications. Meanwhile, intelligent security policies help flexibly address complex threats. From the network perimeter to the interior, it builds a comprehensive security defense line, safeguarding the security of enterprise information assets.
Intrusion prevention system (IPS)
Supports real-time active interception of DOS, brute force disassembly, port scanning, sniffing, worms and other network attacks or malicious traffic protecting internal network information from infringement.
Application layer traffic identification and management
Uses the state machine and traffic exchange inspection technologies to detect traffic of P2P, IM, network game, stock, network video, and network multi-media applications, such as Facebook, X(twitter), Youtube, Thunder, BitTorrent, eMule, eDonkey, WeChat, Weibo, QQ and MSN. H3C firewalls use the deep inspection technology to identify P2P traffic precisely and provides multiple policies to control and manage the P2P traffic flexibly. Also, H3C SecBlade IV NGFW modules support over 7,000 protocols and over 10,000 applications, which are updated every 2 weeks.
Categorized filtering of massive URLs
Uses the local+cloud mode to provide 143 categorized and 130 million URL rules*, providing basic URL filtering blacklist and whitelist and allows you to query the URL category filtering server on line.
Web Application Firewall (WAF)
Deep web security protection. Supports web application protection. For the most CC attacks, SQL injection, HTTP slow attacks, cross-site-scripts and other common attacks, content detection and verification of various requests from web application clients are carried out to ensure their security and legitimacy, and illegal requests are blocked in real time, So as to effectively protect all kinds of websites.
Data leakage prevention (DLP)
Supports email filtering by SMTP mail address, subject, attachment, and content, HTTP URL and content filtering, FTP file filtering, and application layer filtering (including Java/ActiveX blocking and SQL injection attack prevention).
Unknown threat prevention
Uses the situation awareness platform to quickly detect and locate threats. This ensures that the firewall can take global security measures as soon as a single point is under attack. The firewalls support an enhanced AI feature, which enables a more professional AI-based detection capability for unknown threats. The firewalls can also send the unidentified files to sandbox(H3C SecCenter CSAP-ATD).
Flood Attack protection
Detects and prevents various attacks, including Land, Smurf, Fraggle, ping of death, Tear Drop, IP spoofing, IP fragment, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, IP/port scanning, and common DDoS attacks such as SYN flood, UDP flood, DNS flood, and ICMP flood.
Complete and updated security signature database
H3C has a senior signature database team and professional attack protection labs that can provide a precise and up-to-date signature database.
Security zone
Allows you to configure security zones based on interfaces and VLANs.
Packet filtering
Allows you to apply standard or advanced ACLs between security zones to filter packets based on information contained in the packets, such as UDP and TCP port numbers. You can also configure time ranges during which packet filtering will be performed.
Access control
Supports access control based on users and applications and integrates deep intrusion prevention with access control.
ASPF
Dynamically determines whether to forward or drop a packet by checking its application layer protocol information and state. ASPF supports inspecting FTP, HTTP, SMTP, RTSP, and other TCP/UDP-based application layer protocols.
Blacklist
Supports static blacklist and dynamic blacklist.
- * URL libraries in cloud can be extended to 500 million
H3C SecCenter CSAP-SMP
SMP platform helps customers to manage the firewalls. SMP mainly focuses on local management installed in customer's own environment.
Web GUI and CLI
Web-based management, with simple, user-friendly GUI and integrated CLI-based configuration and management.
Intelligent security policy management
Detects duplicate, redundant or conflicting policies, optimizes policy configurations, detects and proposes security policies dynamically generated in the internal network.
Abundant reports
Include application-based reports and stream-based analysis reports. The reports can be customized covering different contents.
Security logs
H3C SecBlade IV NGFW modules support various logs including operation logs, security policy logs, threat logs, URL filtering logs, traffic logs and NAT logs.
Item | SecBlade NGFW (LSPM6FWDB) |
Suitable for | S5560X/S5590/S6520X |
Dimensions (W × D × H) | 95mm × 197.8mm × 41.1mm |
USB | 1×USB 2.0 |
Power consumption | 50W |
MTBF(Year) | 226.1 |
Ports | 1 x GE RJ45 Ports |
Item | Description |
Operation modes | Route, transparent, and hybrid |
AAA | Portal authentication RADIUS authentication HWTACACS authentication PKI/CA (X.509 format) authentication Domain authentication CHAP authentication PAP authentication |
Firewall | Context virtual firewall technology, which supports full virtualization of hardware resources, including CPU, memories, and storage Security zone allocation Security policy redundancy analysis Protection against malicious attacks, such as land, smurf, fraggle, ping of death, teardrop, IP spoofing, IP fragmentation, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, address/port scanning, SYN flood, ICMP flood, UDP flood, and DNS query flood Basic and advanced ACLs Time range-based ACL User-based and application-based access control ASPF application layer packet filtering Static and dynamic blacklist function MAC-IP binding MAC-based ACL MAC-Limitation 802.1Q VLAN transparent transmission Traffic policy Connection limit policy Bandwidth control |
Antivirus | Signature-based virus detection Manual and automatic upgrade for the signature database Stream-based processing Virus detection based on HTTP, FTP, SMTP, and POP3 Virus types include Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, and Virus Virus logs and reports |
Deep intrusion prevention | Prevention against common attacks such as hacker, worm/virus, Trojan, malicious code, spyware/adware, DoS/DDoS, buffer overflow, SQL injection, and IDS/IPS bypass Attack signature categories (based on attack types and target systems) and severity levels (including high, medium, low, and notification) Manual and automatic upgrade for the attack signature database (TFTP and HTTP). P2P/IM traffic identification and control Detection of the real source IP address of HTTP packet Source tracing and alarming base on attack event: log, email alert, collect hit statistics, packet capture, upload packet capture files |
Email/webpage/application layer filtering | Email filtering SMTP email address filtering Email subject/content/attachment filtering Flow-basedwebfiltering HTTP URL/content filtering Java blocking ActiveX blocking HTTPS traffic filtering: SNI extraction based on SSL negotiation process SQL injection attack prevention |
Asset-security analysis | Botnet Analysis: analyses all security logs related to botnets and supports displaying information about hosts that might be zombie hosts, including zombie host IP and peer IP Security Analysis: analyzes health status of hosts and supports displaying the number of compromised hosts and security event distribution in graphs and tables. Threat case management: an alarm resource pool to store threat logs and allows users to add the logs to cases for ease of log management. |
NAT | Many-to-one NAT, which maps multiple internal addresses to one public address Many-to-many NAT, which maps multiple internal addresses to multiple public addresses One-to-one NAT, which maps one internal address to one public address NAT of both source address and destination address External hosts access to internal servers Internal address to public interface address mapping NAT support for DNS Setting effective period for NAT NAT ALGs for NAT ALG, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, and SIP NAT64 Policy, NAT translation between IPv4 networks and IPv6 networks. NAT66 Policy, NAT translation between IPv6 networks. |
VPN | L2TP VPN IPSec VPN GRE VPN SSL VPN ADVPN |
IPSEC | IKEv1, IKEv2 negotiation IPsec smart link selection IPsec Reverse Route Injection Peer address backup and switchback |
IPSEC VPN authentication algorithm | MD5/SHA1/SM3 |
IPv6 | IPv6 status firewall IPv6 attack protection IPv6 forwarding IPv6 protocols such as ICMPv6, PMTU, Ping6, DNS6, TraceRT6, Telnet6, DHCPv6 Client, and DHCPv6 Relay IPv6 routing: RIPng, OSPFv3, BGP4+, IPv6 static routing, IPv6 policy-based routing IPv6 multicast: PIM-SM, and PIM-DM IPv6 transition techniques: NAT-PT, IPv6 tunneling, NAT64 (DNS64), NAT66, and DS-LITE IPv6 security: NAT-PT, IPv6 tunnel, IPv6 packet filter, RADIUS, IPv6 zone pair policies, IPv6 connection limit |
High availability | RBM with Active/active and active/standby stateful failover RBM with Mirroring Mode Configuration synchronization of two firewalls IKE state synchronization in IPsec VPN VRRP Track |
Virtualization | Context: virtualized logical firewalls vSystems: Lightweight virtualized independent logical devices |
Configuration management | Remote management through Web GUI Configuration management at the CLI SNMPv3, compatible with SNMPv2 and SNMPv1 Intelligent security policy Managed by H3C SDN controller |
Maintenance and diagnostics | Packet trace Packet capture IPsec diagnosis Dropped-Packet statistics |
Item | LSPM6FWDB |
20 Gbps | |
NGFW Throughput | 14 Gbps |
NGFW+IPS | 8 Gbps |
NGFW+IPS+AV | 8 Gbps |
Maximum concurrent sessions | 3 M |
Maximum New Connections per second | 180K |
IPSec Throughput | 5 Gbps |
Concurrent SSL-VPN Users | 50K |
Item | Description |
LSPM6FWDB | H3C S5560X/S5590/S6520X SecBlade NGFW module |
Service Category | Service offering |
Security services | H3C SecBlade NGFW module IPS Signature Update License |
H3C SecBlade NGFW module URL Signature Update License | |
H3C SecBlade NGFW module AV antivirus Signature Update License | |
H3C SecBlade NGFW module Application Identification Signature Update License | |
H3C SecBlade NGFW module WAF Signature Update License | |
H3C SecBlade NGFW module TI Signature Update License | |
Networking services | H3C SecBlade NGFW module LB License |
VPN services | H3C SecBlade NGFW module SSL VPN for X users |
Advanced service | Overseas security expert daily service |
