Hillstone E-3000 Series V5.5R7 EN

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

E3662 / E3668 / E3960 / E3965 / E3968

Hillstone E-3000 Series


Next-Generation Firewall

The Hillstone E-3000 Series Next Generation Firewall (NGFW) is designed for the specific function
of security and provides comprehensive and granular visibility and control of applications. It can
identify and prevent potential threats associated with high-risk applications while providing poli-
cy-based control over applications, users, and user-groups. Policies can be defined that guarantee
bandwidth to mission-critical applications while restricting or blocking unauthorized or malicious
applications. The Hillstone E-3000 Series NGFW incorporates comprehensive network security and
advanced firewall features, provides superior price performance, excellent energy efficiency, and
comprehensive threat prevention capability.

Product Highlights
Granular Application Identification and Control Comprehensive Threat Detection and Prevention
The Hillstone E-3000 Series NGFW is optimized for content The Hillstone E-3000 Series NGFW provides real-time protec-
analysis of Layer 7 applications, providing fine-grained control tion for applications from network attacks including viruses,
of web applications regardless of port, protocol, or evasive spyware, worms, botnets, ARP spoofing, DoS/DDoS, Trojans,
action. It can identify and prevent potential threats associated buffer overflows, and SQL injections. It incorporates a unified
with high-risk applications while providing policy-based con- threat detection engine that shares packet details with multi-
trol over applications, users, and user-groups. Security ple security engines (AD, IPS, URL filtering, Antivirus, Sandbox
policies can be defined that guarantee bandwidth to mis- etc.), which significantly enhances the protection efficiency
sion-critical applications while restricting or blocking unautho- and reduces network latency.
rized or malicious applications.

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 1


Hillstone E-3000 Series Next-Generation Firewall

Features
Network Services • ARP attack defense • Support query based on IP, endpoint quantity,
• Dynamic routing (OSPF, BGP, RIPv2) control policy and status etc.
URL Filtering • Support the identification of accessed endpoints
• Static and policy routing
• Flow-based web filtering inspection quantity across layer 3, logging and interference
• Route controlled by application
• Manually defined web filtering based on URL, web on overrun IP
• Built-in DHCP, NTP, DNS Server and DNS proxy content and MIME header • Redirect page display after custom interference
• Tap mode – connects to SPAN port • Dynamic web filtering with cloud-based real-time operation
• Interface modes: sniffer, port aggregated, categorization database: over 140 million URLs • Supports blocking operations on overrun IP
loopback, VLANS (802.1Q and Trunking) with 64 categories (8 of which are security related)
• L2/L3 switching & routing • Additional web filtering features: Data Security
• Virtual wire (Layer 1) transparent inline - Filter Java Applet, ActiveX or cookie • File transfer control based on file type, size and
deployment name
- Block HTTP Post
• File protocol identification, including HTTP, FTP,
Firewall - Log search keywords
SMTP and POP3
• Operating modes: NAT/route, transparent (bridge), - Exempt scanning encrypted connections on
• File signature and suffix identification for over 100
and mixed mode certain categories for privacy
file types
• Policy objects: predefined, custom, and object • Web filtering profile override: allows administrator
• Content filtering for HTTP-GET, HTTP-POST, FTP
grouping to temporarily assign different profiles to user/
and SMTP protocols
group/IP
• Security policy based on application, role and • IM identification and network behavior audit
geo-location • Web filter local categories and category rating
override • Filter files transmitted by HTTPS using SSL Proxy
• Application Level Gateways and session support:
MSRCP, PPTP, RAS, RSH, SIP, FTP, TFTP, HTTP, • Support multi-language Application Control
dcerpc, dns-tcp, dns-udp, H.245 0, H.245 1, H.323 • Over 3,000 applications that can be filtered by
Cloud-Sandbox
• NAT and ALG support: NAT46, NAT64, NAT444, name, category, subcategory, technology and risk
SNAT, DNAT, PAT, Full Cone NAT, STUN • Upload malicious files to cloud sandbox for
analysis • Each application contains a description, risk
• NAT configuration: per policy and central NAT factors, dependencies, typical ports used, and
table • Support protocols including HTTP/HTTPS, POP3,
URLs for additional reference
IMAP, SMTP and FTP
• VoIP: SIP/H.323/SCCP NAT traversal, RTP pin • Actions: block, reset session, monitor, traffic
holing • Support file types including PE, ZIP, RAR, Office,
shaping
PDF, APK, JAR and SWF
• Global policy management view • Identify and control cloud applications in the cloud
• File transfer direction and file size control
• Security policy redundancy inspection, policy • Provide multi-dimensional monitoring and
group, policy configuration rollback • Provide complete behavior analysis report for
statistics for cloud applications, including risk
malicious files
• Policy Assistant for easy detailed policy category and characteristics
deployment • Global threat intelligence sharing, real-time threat
blocking Quality of Service (QoS)
• Policy analyzing and invalid policy cleanup
• Support detection only mode without uploading • Max/guaranteed bandwidth tunnels or IP/user
• Comprehensive DNS policy files basis
• Schedules: one-time and recurring
• Tunnel allocation based on security domain,
Botnet C&C Prevention
Intrusion Prevention interface, address, user/user group, server/server
• Discover intranet botnet host by monitoring C&C group, application/app group, TOS, VLAN
• Protocol anomaly detection, rate-based detection, connections and block further advanced threats
custom signatures, manual, automatic push or • Bandwidth allocated by time, priority, or equal
such as botnet and ransomware
pull signature updates, integrated threat encyclo- bandwidth sharing
• Regularly update the botnet server addresses
pedia • Type of Service (TOS) and Differentiated Services
• Prevention for C&C IP and domain (DiffServ) support
• IPS Actions: default, monitor, block, reset
(attackers IP or victim IP, incoming interface) with • Support TCP, HTTP, and DNS traffic detection • Prioritized allocation of remaining bandwidth
expiry time • IP and domain whitelists • Maximum concurrent connections per IP
• Packet logging option • Bandwidth allocation based on URL category
IP Reputation
• Filter Based Selection: severity, target, OS, appli- • Bandwidth limit by delaying access for user or IP
• Identify and filter traffic from risky IPs such as
cation or protocol • Automatic expiration cleanup and manual cleanup
botnet hosts, spammers, Tor nodes, breached
• IP exemption from specific IPS signatures hosts, and brute force attacks of user used traffic
• IDS sniffer mode • Logging, dropping packets, or blocking for
• IPv4 and IPv6 rate based DoS protection with
Server Load Balancing
different types of risky IP traffic
threshold settings against TCP Syn flood, TCP/ • Weighted hashing, weighted least-connection, and
• Periodical IP reputation signature database
UDP/SCTP port scan, ICMP sweep, TCP/UDP/ weighted round-robin
upgrade
SCIP/ICMP session flooding (source/destination) • Session protection, session persistence and
• Active bypass with bypass interfaces SSL Decryption session status monitoring
• Predefined prevention configuration • Application identification for SSL encrypted traffic • Server health check, session monitoring and
• IPS enablement for SSL encrypted traffic session protection
Antivirus
• AV enablement for SSL encrypted traffic Link Load Balancing
• Manual, automatic push or pull signature updates
• URL filter for SSL encrypted traffic • Bi-directional link load balancing
• Flow-based antivirus: protocols include HTTP,
• SSL encrypted traffic whitelist • Outbound link load balancing includes policy
SMTP, POP3, IMAP, FTP/SFTP
• SSL proxy offload mode based routing, ECMP and weighted, embedded
• Compressed file virus scanning
ISP routing and dynamic detection
Endpoint Identification and Control • Inbound link load balancing supports SmartDNS
Attack Defense
• Support to identify endpoint IP, endpoint quantity, and dynamic detection
• Abnormal protocol attack defense
on-line time, off-line time, and on-line duration • Automatic link switching based on bandwidth,
• Anti-DoS/DDoS, including SYN Flood, UDP Flood,
• Support 10 operating systems including Windows, latency, jitter, connectivity, application etc.
DNS Query Flood defense, TCP fragment, ICMP
iOS, Android, etc. • Link health inspection with ARP, PING, and DNS
fragment, etc.

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 2


Hillstone E-3000 Series Next-Generation Firewall

Features (Continued)
VPN • IPS, Application identification, URL filtering, • System Integration: SNMP, syslog, alliance
• IPSec VPN Antivirus, Access control, ND attack defense, iQoS partnerships
- IPSEC Phase 1 mode: aggressive and main ID • Track address detection • Rapid deployment: USB auto-install, local and
protection mode remote script execution
- Peer acceptance options: any ID, specific ID, ID in VSYS • Dynamic real-time dashboard status and drill-in
dialup user group • System resource allocation to each VSYS monitoring widgets
- Supports IKEv1 and IKEv2 (RFC 4306) • CPU virtualization • Language support: English
- Authentication method: certificate and • Non-root VSYS support firewall, IPSec VPN, SSL
Logs & Reporting
pre-shared key VPN, IPS, URL filtering
• Logging facilities: local memory and storage (if
- IKE mode configuration support (as server or • VSYS monitoring and statistic
available), multiple syslog servers and multiple
client) Hillstone Security Audit (HSA) platforms
High Availability
- DHCP over IPSEC • Encrypted logging and log integrity with HSA
• Redundant heartbeat interfaces
- Configurable IKE encryption key expiry, NAT scheduled batch log uploading
traversal keep alive frequency • Active/Active and Active/Passive mode
• Reliable logging using TCP option (RFC 3195)
- Phase 1/Phase 2 Proposal encryption: DES, • Standalone session synchronization
• Detailed traffic logs: forwarded, violated sessions,
3DES, AES128, AES192, AES256 • HA reserved management interface local traffic, invalid packets, URL etc.
- Phase 1/Phase 2 Proposal authentication: • Failover: • Comprehensive event logs: system and adminis-
MD5, SHA1, SHA256, SHA384, - Port, local & remote link monitoring trative activity audits, routing & networking, VPN,
SHA512 user authentications, WiFi related events
- Stateful failover
- Phase 1/Phase 2 Diffie-Hellman support: 1,2,5 • IP and service port name resolution option
- Sub-second failover
- XAuth as server mode and for dialup users • Brief traffic log format option
- Failure notification
- Dead peer detection • Three predefined reports: Security, Flow and
• Deployment options:
- Replay detection Network reports
- HA with link aggregation
- Autokey keep-alive for Phase 2 SA • User defined reporting
- Full mesh HA
• IPSEC VPN realm support: allows multiple custom • Reports can be exported in PDF, Word and HTML
- Geographically dispersed HA
SSL VPN logins associated with user groups (URL via Email and FTP
paths, design) Twin-mode HA (not available on E3662, E3668)
• IPSEC VPN configuration options: route-based or Statistics and Monitoring
• High Availability mode among multiple devices
policy based • Application, URL, threat events statistic and
• Multiple HA deployment modes
• IPSEC VPN deployment modes: gateway-to- monitoring
gateway, full mesh, hub-and-spoke, redundant • Configuration and session synchronization among
• Real-time traffic statistic and analytics
tunnel, VPN termination in transparent mode multiple devices
• System information such as concurrent session,
• One time login prevents concurrent logins with the User and Device Identity CPU, memory and temperature
same username • iQOS traffic statistic and monitoring, link status
• Local user database
• SSL portal concurrent users limiting monitoring
• Remote user authentication: TACACS+, LDAP,
• SSL VPN port forwarding module encrypts client Radius, Active • Support traffic information collection and
data and sends the data to the application server forwarding via Netflow (v9.0)
• Single-sign-on: Windows AD
• Supports clients that run iOS, Android, and
• 2-factor authentication: 3rd party support, CloudView
Windows XP/Vista including 64-bit Windows OS
integrated token server with physical and SMS
• Host integrity checking and OS checking prior to • Cloud-based security monitoring
• User and device-based policies
SSL tunnel connections • 24/7 access from web or mobile application
• User group synchronization based on AD and
• MAC host check per portal • Device status, traffic and threat monitoring
LDAP
• Cache cleaning option prior to ending SSL VPN • Cloud-based log retention and reporting
• Support for 802.1X, SSO Proxy
session
• WebAuth page customization IoT Security
• L2TP client and server mode, L2TP over IPSEC,
and GRE over IPSEC • Interface based authentication • Identify IoT devices such as IP Cameras and
• Agentless ADSSO (AD Polling) Network Video Recorders
• View and manage IPSEC and SSL VPN connec-
tions • Use authentication synchronization based on • Support query of monitoring results based on
SSO-monitor filtering conditions, including device type, IP
• PnPVPN
• Support MAC-based user authentication address, status, etc.
IPv6 • Support customized whitelists
• Management over IPv6, IPv6 logging and HA Administration
• IPv6 tunneling, DNS64/NAT64 etc • Management access: HTTP/HTTPS, SSH, telnet,
console
• IPv6 routing including static routing, policy routing,
ISIS, RIPng, OSPFv3 and BGP4+ • Central Management: Hillstone Security Manager
(HSM), web service APIs

www.HillstoneNet.com © 2020 Hillstone Networks All Rights Reserved. | 3


Hillstone E-3000 Series Next-Generation Firewall

Specifications
SG-6000-E3662 SG-6000-E3668 SG-6000-E3960 SG-6000-E3965 SG-6000-E3968

FW Throughput (1) 8 Gbps 8 Gbps 10 Gbps 10 Gbps 310 Gbps


IPSec Throughput (2) 3 Gbps 3 Gbps 4 Gbps 6 Gbps 4 Gbps
AV Throughput (3) 1.6 Gbps 1.6 Gbps 2.5 Gbps 3 Gbps 2.5 Gbps
IPS Throughput (4) 3 Gbps 3 Gbps 4 Gbps 4 Gbps 4Gbps
IMIX Throughput (5) 2 Gbps 2 Gbps 3 Gbps 4 Gbps 3 Gbps
NGFW Throughput (6) 1.2 Gbps 1.2 Gbps 1.5 Gbps 3 Gbps 1.5 Gbps
Threat Protection Throughput (7) 900 Mbps 900 Mbps 1.1 Gbps 2 Gbps 1.1 Gbps
New Sessions/s (8) 120,000 120,000 150,000 170,000 150,000
Maximum Concurrent Sessions 3 Million 3 Million 3.2 Million 6 Million 3.2 Million
IPSec Tunnel Number 6,000 6,000 10,000 10,000 10,000
SSL VPN Users (Default/Max) 8 / 4,000 8 / 4,000 8 / 6,000 8 / 8,000 8 / 6,000
Virtual Systems (Default/Max) 1 / 50 1 / 50 1 / 100 1 / 100 1 / 100

Storage Options N/A 128G / 256G / 512G SSD N/A N/A 128G / 256G / 512G SSD
(E3668 / E3668A / E3668B) (E3968 / E3968A / E3968B)
1 x Console Port, 1 x AUX 1 x Console Port, 1 x AUX, 1 x Console Port, 1 x AUX, 1 x Console Port, 1 x AUX, 1 x Console Port, 1 x AUX,
Management Ports Port, 1 x USB Port, 1 x HA, 1 Port, 1 x USB Port, 1 x HA, 1 Port, 1 x USB Port, 1 x HA, 1 Port, 1 x USB Port, 1 x HA, 1 Port, 1 x USB Port, 1 x HA, 1
x MGT x MGT x MGT x MGT x MGT
6 x GE (one pair bypass), 4 x 4 x GE (one pair bypass), 4 x 6 x GE (one pair bypass), 4 x
Fixed I/O Ports 6 x GE, 4 x SFP 6 x GE, 4 x SFP
SFP, 2 X SFP+ SFP, 2 X SFP+ SFP, 2 X SFP+
Available Slots for Expansion 2 x Generic Slot 2 x Generic Slot 2 x Generic Slot 4 x Generic Slot 2 x Generic Slot
Modules
IOC-4GE-B-M, IOC-8GE-M,
IOC-4GE-B-M, IOC-8GE-M, IOC-4GE-B-M, IOC-8GE-M, IOC-4GE-B-M, IOC-8GE-M, IOC-4GE-B-M, IOC-8GE-M,
Expansion Module Option IOC-8SFP-M, IOC-4SFP+,
IOC-8SFP-M IOC-8SFP-M IOC-8SFP-M IOC-8SFP-M
IOC-8SFP+, IOC-2SFP+-Lite
Twin-mode HA N/A N/A Yes Yes Yes

150W, Single AC or DC, Dual 150W, Single AC, Dual AC 150W, Single AC or DC, Dual 450W, Dual AC or Dual DC 150W, Single AC, Dual AC
Power Specification
AC Redundant Redundant AC Redundant Redundant Redundant

Power Supply AC 100-240 V 50/60 Hz AC 100-240 V 50/60 Hz AC 100-240 V 50/60 Hz


AC 100-240 V 50/60 Hz AC 100-240 V 50/60 Hz
DC -40 ~ -60 V DC -40 ~ -60 V DC -40 ~ -60 V
1U 17.2 x 14.4x 1.7 in 1U 17.2 x 14.4x 1.7 in 1U 17.2 x 14.4x 1.7 in 2U 17.3 x 20.9 x 3.5 in 1U 17.2 x 14.4x 1.7 in
Dimension (W×D×H, mm)
(436 x 366 x 44 mm) (436 x 366 x 44 mm) (436 x 366 x 44 mm) (440 x530 x 88 mm) (436 x 366 x 44 mm)
Weight 12.3 lb (5.6 kg) 12.3 lb (5.6 kg) 12.3 lb (5.6 kg) 27.1 lb (11.8 kg) 27.1 lb (11.8 kg)
Temperature 32-104°F (0-40°C) 32-104°F (0-40°C) 32-104°F (0-40°C) 32-104°F (0-40°C) 32-104°F (0-40°C)
Relative Humidity 10-95% (no dew) 10-95% (no dew) 10-95% (no dew) 10-95% (no dew) 10-95% (no dew)
Compliance and Certificate CE, CB, FCC, UL/cUL, ROHS, IEC/EN61000-4-5 Power Surge Protection, ISO 9001:2015, ISO 14001:2015, CVE Compatibility, IPv6 Ready, ICSA Firewalls

Module Options
IOC-8GE-M IOC-8SFP-M IOC-4GE-B-M IOC-2SFP+-Lite IOC-8SFP+ IOC-4SFP+

Names 4GE Bypass Expansion


8GE Expansion Module 8SFP Expansion Module 2SFP+ Expansion Module 8SFP+ Expansion Module 4SFP+ Expansion Module
Module
8 x SFP, SFP module not 4 x GE Bypass (2 pair 2 x SFP+, SFP+ module not 8 x SFP+, SFP+ module not 4 x SFP+, SFP+ module not
I/O Ports 8 x GE
included bypass ports) included included included
½ U (Occupies 1 generic ½ U (Occupies 1 generic ½ U (Occupies 1 generic ½ U (Occupies 1 generic 1 U (Occupies 2 generic 1 U (Occupies 2 generic
Dimension
slot) slot) slot) slot) slots) slots)
Weight 1.8 lb (0.8 kg) 2.0 lb (0.9 kg) 1.8 lb (0.8 kg) 0.7 lb (0.3 kg) 1.5 lb (0.7 kg) 1.5 lb (0.7 kg)

NOTES:
(1) FW throughput data is obtained under single-stack UDP traffic with 1518-byte packet size;
(2) IPSec throughput data is obtained under Preshare Key AES256+SHA-1 configuration and 1400-byte packet size;
(3) AV throughput data is obtained under HTTP traffic with file attachment;
(4) IPS throughput data is obtained under bi-direction HTTP traffic detection with all IPS rules being turned on;
(5) IMIX throughput data is obtained under UDP traffic mix (64 byte : 512 byte : 1518 byte =5:7:1);
(6) NGFW throughput data is obtained under 64 Kbytes HTTP traffic with application control and IPS enabled;
(7) Threat protection throughput data is obtained under 64 Kbytes HTTP traffic with application control, IPS, AV and URL filtering enabled;
(8) New sessions/s is obtained under TCP traffic.
Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R7. Results may vary based on StoneOS® version and deployment.

www.HillstoneNet.com
© 2020 Hillstone Networks All Rights Reserved.
Version: EX-08.01-NGFW-5.5R7-0420-EN-01

You might also like