H3C SecPath F5080-D High-Performance Next-Generation Firewall
The H3C SecPath F5080-D is a robust, enterprise-grade next-generation firewall (NGFW) engineered to deliver advanced network protection, high throughput, and intelligent traffic management for large-scale businesses and data centers. Designed for demanding environments, the F5080 integrates firewall, intrusion prevention, VPN, and application control into a single powerful platform.
With its high-speed multi-core processing architecture and optimized security algorithms, the H3C SecPath F5080-D ensures real-time threat detection and comprehensive defense against sophisticated cyber threats, including malware, ransomware, and DDoS attacks. Its modular design supports flexible interface expansion, enabling seamless scalability as your network grows.
- H3C SecPath F5080 Firewall Appliance
- Ports: 4xGE combo, 8xGE copper, 8xGE fiber, 8x10GE
- Expansion slots: 5
- Storage media: 2x480G SSD drives (optional)
- Operation modes: Route, transparent, and hybrid
- L4 FW throughput: 80Gbps
- Concurrent sessions: 80M
- New sessions per second: 600k
- SSL VPN concurrent users: 30k/20k
- SSL VPN throughput: 4.6Gbps
- IPSec VPN tunnels: 50k/25k
- IPSec throughput: 17Gbps
- Security policy: 50k
Key features
-
Superior Firewall Performance: High throughput for firewall, VPN, and IPS services without compromise.
-
Advanced Threat Protection: Integrated IPS, anti-virus, URL filtering, and application visibility.
-
Flexible Connectivity: Supports multiple 10GE/GE ports with modular expansion options.
-
Secure VPN Capabilities: High-performance IPSec and SSL VPN for secure site-to-site and remote connections.
-
Centralized Management: Streamlined configuration and monitoring through an intuitive management console.
-
High Availability: Redundancy features like hot standby (HA) to ensure maximum uptime and business continuity.
-
Energy-Efficient Operation: Designed for reduced power consumption and operational costs.
Tech Specifications: H3C SecPath F5080-D
| Specifications | ||
| Ports | 4 × Gigabit combo interfaces | |
| 8 × Gigabit Ethernet copper ports | ||
| 8 × Gigabit Ethernet fiber ports | ||
| 8 × 10-Gigabit Ethernet ports | ||
| Expansion slots | 5 | |
| Storage media | 2 × 480G SSD drives (optional) | |
| AAA | Portal authentication. | |
| RADIUS authentication. | ||
| HWTACACS authentication. | ||
| PKI/CA (X.509 format) authentication. | ||
| Domain authentication. | ||
| CHAP authentication. | ||
| PAP authentication. | ||
| Firewall | Virtual firewall. | |
| Security zone. | ||
| Attack protection against malicious attacks, such as land, smurf, fraggle, ping of death, teardrop, IP spoofing, IP fragmentation, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, address/port scanning, SYN flood, ICMP flood, UDP flood, and DNS query flood. | ||
| Basic and advanced ACLs. | ||
| Time range-based ACL. | ||
| User-based and application-based access control. | ||
| Dynamic packet filtering. | ||
| ASPF application layer packet filtering. | ||
| Static and dynamic blacklist function. | ||
| MAC-IP binding. | ||
| MAC-based ACL. | ||
| 802.1Q VLAN transparent transmission. | ||
| Load balancing | Link and server load balancing. | |
| Application- and ISP-based Intelligent route selection. | ||
| Health monitoring through ICMP, UDP, and TCP. | ||
| Port-, HTTP-, and SSL-based sticky methods to implement busy bandwidth and fault protection. | ||
| Antivirus | Signature-based virus detection. | |
| Manual and automatic upgrade for the signature database. | ||
| Stream-based processing | ||
| Virus detection based on HTTP, FTP, SMTP, and POP3 | ||
| Virus types include Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, and Virus. | ||
| Virus logs and reports. | ||
| Deep intrusion prevention | Prevention against attacks such as hacker, worm/virus, Trojan, malicious code, spyware/adware, DoS/DDoS, buffer overflow, SQL injection, and IDS/IPS bypass. | |
| Attack signature categories (based on attack types and target systems) and severity levels (including high, medium, low, and notification) | ||
| Manual and automatic upgrade for the attack signature database (TFTP and HTTP). | ||
| P2P/IM traffic identification and control. | ||
| Email/webpage/application layer filtering | Email filtering | |
| SMTP email address filtering | ||
| Email subject/content/attachment filtering | ||
| Webpage filtering | ||
| HTTP URL/content filtering | ||
| Java blocking | ||
| ActiveX blocking | ||
| SQL injection attack prevention | ||
| Behavior and content audit | User-based content audit and tracking. | |
| File filtering | Identification of file types such as Word, Excel, PPT, PDF, ZIP, RAR, EXE, DLL, AVI, and MP4, and filtering of sensitive information in the files. | |
| URL filtering | Over 50 types of signature-based URL filtering rules, and discarding, reset, redirection, logging, and blacklisting of packets matching the rules. | |
| Application identification and control | Identification of various types of applications, and access control based on specific functions of an application. | |
| Combination of application identification and intrusion prevention, antivirus, and content filtering, improving detection performance and accuracy. | ||
| NAT | Many-to-one NAT, which maps multiple internal addresses to one public address. | |
| Many-to-many NAT, which maps multiple internal addresses to multiple public addresses. | ||
| One-to-one NAT, which maps one internal address to one public address. | ||
| NAT of both source address and destination address. | ||
| External hosts access to internal servers. | ||
| Internal address to public interface address mapping. | ||
| NAT support for DNS. | ||
| Setting effective period for NAT. | ||
| NAT ALGs for NAT ALG, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, and SIP. | ||
| VPN | L2TP VPN. | |
| IPsec VPN. | ||
| GRE VPN. | ||
| SSL VPN. | ||
| SM1 hardware encryption algorithm, SM2, SM3, and SM4 encryption algorithms. | ||
| Routing | Routing protocols such as RIP, OSPF, BGP, and IS-IS. | |
| VXLAN | VXLAN service chain. | |
| IPv6 | IPv6 status firewall. | |
| IPv6 attack protection. | ||
| IPv6 forwarding. | ||
| IPv6 protocols such as ICMPv6, PMTU, Ping6, DNS6, TraceRT6, Telnet6, DHCPv6 Client, and DHCPv6 Relay. | ||
| IPv6 routing: RIPng, OSPFv3, BGP4+, static routing, policy-based routing | ||
| IPv6 multicast: PIM-SM, and PIM-DM. | ||
| IPv6 transition techniques: NAT-PT, IPv6 tunneling, NAT64 (DNS64), and DS-LITE. | ||
| IPv6 security: NAT-PT, IPv6 tunnel, IPv6 packet filter, RADIUS, IPv6 zone pair policies, IPv6 connection limit. | ||
| High availability | SCF 2:1 virtualization | |
| Active/active and active/standby stateful failover. | ||
| Configuration synchronization of two firewalls | ||
| IKE state synchronization in IPsec VPN. | ||
| VRRP. | ||
| Built-in bypass module. | ||
| External bypass host. | ||
| Configuration management | Configuration management at the CLI. | |
| Remote management through Web. | ||
| Device management through H3C SSM. | ||
| SNMPv3, compatible with SNMPv2 and SNMPv1. | ||
| Intelligent security policy | ||
| Physical specifications | ||
| Operation modes | Route, transparent, and hybrid | |
| Ambient temperature | Operating: 0°C to 45°C (32°F to 113°F) | |
| Non operating: –40°C to +70°C (–40°F to +158°F) | ||
Application Scenarios: H3C SecPath F5080-D
-
Enterprise Campus Network Aggregation/Core
-
Acts as a high-speed aggregation or core switch for medium to large enterprises.
-
Supports seamless connection between access and core layers.
-
-
Data Center Top-of-Rack (ToR) Switch
-
Serves as a high-density ToR switch with advanced virtualization and cloud integration capabilities.
-
Supports VXLAN to meet modern data center deployment needs.
-
-
High-Density 10GE Access Scenarios
-
Provides high-bandwidth access for departments with demanding workloads such as video conferencing, cloud services, and large file transfers.
-
-
Intelligent Service Awareness and Automation
-
Enables AI-based operations and telemetry for automatic fault identification and network performance optimization.
-
| View catalog” |
