Chapter 1 Product Introduction - H3C SecPath V100-S Installation Manual

Table of Contents

Advertisement

Installation Manual
H3C SecPath V100-S Security Gateway

Chapter 1 Product Introduction

1.1 Overview
H3C SecPath V100-S Security Gateway (referred to as the SecPath V100-S
throughout the manual) is new-generation network security device intended for
enterprise users. These enterprises have increasing demands for establishing secure,
reliable private networks which can meet specific QoS requirements over public
networks. The H3C SecPath V100-S can act as convergence and access gateways.
The SecPath V100-S provides one fixed Fast Ethernet (FE) interface (WAN interface)
and four 10/100 Mbps auto-sensing switched Ethernet interfaces (LAN interfaces), and
offers hardware encryption function.
The SecPath V100-S supports multiple VPN services, such as layer 2 tunneling
protocol (L2TP) VPN, IP security (IPsec) VPN, generic routing encapsulation (GRE)
VPN and dynamic VPN. It can connect to remote users through dial-up, leased line,
VLAN, or tunneling and set up Internet, intranet, and access VPNs. By integrating such
technologies as the firewall, authentication, authorization and accounting (AAA),
network address translation (NAT), and quality of service (QoS), the SecPath V100-S
can guarantee high security and reliability for private networks over the Internet.
The SecPath V100-S has the following features:
I. IP VPN solution
Networks benefit enterprises in many ways; company headquarters can send important
information to its branch offices quickly and conveniently. To interconnect the intranets
of a company over the Internet, however, you need VPN technologies. The SecPath
V100-S provides abundant IP VPN services: L2TP and GRE provide Layer 2 and Layer
3 tunneling respectively, and IPsec provides tunnels encapsulated with a security
protocol.
II. Data security and reliability
The security gateway supports:
NAT. Besides the basic functions, the NAT can limit the number of concurrent
connections for an individual user. This eliminates the malicious resource seizures
without any negative impact on general network applications. In addition, its
enhanced NAT application layer gateway (ALG) function provides NAT traversal
for H.323, FTP, ICMP, and so on.
NAT logging. By querying the NAT log, you can locate a specific access action
precisely, which can improve network security which has been degraded by
source IP address translation. NAT log can record streams of NAT data to allow
1-1
Chapter 1 Product Introduction

Advertisement

Table of Contents
loading

Table of Contents