H3C SecPath F5000-AI Series Firewall
- Classification:H3C Data Network Security Products
- Release time:2025-11-15
- Page views:0
H3C SecPath F5000-AI Series Firewall
- Classification:H3C Data Network Security Products
- Release time:2025-11-15
- Page views:0
With the continuous popularization and development of network technology, network attacks are becoming increasingly frequent. Through various attack software, even beginners with general computer knowledge can launch attacks on networks. At the same time, the proliferation of various network viruses has exacerbated the danger of network attacks.
The H3C SecPath F5000-AI-15, F5000-AI-20, and F5000-AI-40 are high-performance, ultra-10 Gigabit firewall VPN integrated gateway products for the industry market. Hardware-wise, they are based on multi-core, multi-threaded ARM/MIPS architecture processors. The F5000-AI-15 is a 1U standalone box firewall, while the F5000-AI-20 and F5000-AI-40 are 2U standalone box firewalls. This series of firewall products offers rich interface expansion capabilities.
The H3C SecPath F5000-AI120, F5000-AI160, F5000-AI360, and F5000-E are high-performance firewall products targeting the industrial and carrier markets, respectively. Hardware-wise, they are based on a multi-core, multi-threaded x86 processor + FPGA architecture, and are high-density 1U standalone box firewalls, supporting 6 100G interfaces, 8 25G interfaces, and 20 10G interfaces, giving them a leading interface advantage. This series of firewalls also offers rich interface expansion capabilities, supporting dual-hard drive RAID0/RAID1. They also provide a wealth of service features, including IPS/AV/ACG/WAF/TI/URL, to meet differentiated competitive needs.
In terms of security features, as an NGFW product, this series not only supports firewall security functions such as security control, VPN, NAT, and DOS/DDOS defense, but also integrates in-depth security defense functions such as IPS (Intrusion Prevention), AV (Antivirus), ACG (Application Control), WAF (Web Vulnerability Detection), TI (Threat Intelligence), and URL (Classification and Filtering), realizing multi-dimensional policy control functions based on users, applications, time, geographical location, and security status.
In terms of virtualization and reliability, it is based on H3C's leading Comware V7 platform, supporting multi-device clusters and 1:N virtualization. It also offers better elastic scalability to meet the requirements of cloud computing.
In terms of scalability, this series of firewall products provides rich RESTful API and NETCONF API interface extension capabilities, which can adapt to various network deployment requirements and support the integration and adaptation of various platforms through API interfaces.

1. High-performance hardware and software processing platform
The H3C SecPath F5000-AI features an advanced, latest 64-bit multi-core high-performance processor and high-speed memory.
2. High reliability of telecom-grade equipment
It utilizes H3C's proprietary software and hardware platform. The product has undergone years of market testing, with applications ranging from telecom operators to small and medium-sized enterprises.
It supports H3C SCF virtualization technology, which can virtualize two devices into one logical device, presenting it as a single network node to the outside world. This enables unified resource management, business backup, and improved overall system performance.
It supports virtual firewall functionality, including the creation, startup, shutdown, and deletion of virtual firewalls; virtual firewalls can be managed independently and their configurations can be saved independently; virtual firewalls have independent session management, NAT, routing, and other functions.
3. Powerful security protection functions
It supports a wide range of attack prevention features, including: protection against Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP fragmentation, ARP spoofing, ARP reverse lookup, invalid TCP packet flags, oversized ICMP packets, address scanning, and port scanning. It also includes detection and defense against common DDoS attacks such as SYN Flood, UPD Flood, ICMP Flood, and DNS Flood.
The latest version supports SOP 1:N full virtualization. Multiple logical virtual firewalls can be partitioned on the H3C SecPath F5000-AI device. Based on containerized virtualization technology, the virtual system has the same characteristics as the actual physical system, and performance allocation such as throughput, concurrency, creation, and policies can be performed based on the virtual system.
Supports security zone management. Security zones can be divided based on interfaces and VLANs.
Packet filtering is supported. Data packets can be filtered using standard or extended access control rules between secure zones, leveraging information such as UDP or TCP port numbers within the packets. Furthermore, filtering can be performed based on time periods.
It supports application- and user-based access control, using applications and users as the basic elements of security policies, and combines them with defense in depth to achieve next-generation access control functions.
Supports Application Layer Stateful Packet Filtering (ASPF). By inspecting application layer protocol information (such as FTP, HTTP, SMTP, RTSP, and other TCP/UDP-based application layer protocols) and monitoring the connection-based application layer protocol status, it dynamically determines whether packets are allowed to pass through the firewall or are dropped.
Supports authentication, authorization, and accounting (AAA) services. This includes authentication based on RADIUS/HWTACACS+, CHAP, PAP, etc.
Supports both static and dynamic blacklists.
Supports NAT and NAT multiple instances.
VPN functionality is supported, including L2TP, IPSec/IKE, GRE, SSL, and integration with smart terminals.
It supports a wide range of routing protocols, including static routing, policy-based routing, and dynamic routing protocols such as RIP and OSPF.
Supports security logs.
Supports traffic monitoring, statistics, and management.
4. Flexible and scalable integrated DPI deep security
An integrated security business processing platform that is highly integrated with basic security protection.
Comprehensive application-layer traffic identification and management: Leveraging H3C's long-standing expertise in state machine detection and traffic interaction detection technologies, it can accurately detect applications such as Thunder/Web Thunder, BitTorrent, eMule/eDonkey, WeChat, Weibo, QQ, MSN, and PPLive, including P2P/IM/online games/stock trading/online video/online multimedia. It supports P2P traffic control by employing deep traffic detection methods, matching network packets with P2P protocol packet characteristics to accurately identify P2P traffic and manage it. Different control strategies are also available for flexible P2P traffic control.
A high-precision, high-efficiency intrusion detection engine. It employs H3C's proprietary FIRST (Full Inspection with Rigorous State Test) engine. The FIRST engine integrates multiple detection technologies, achieving comprehensive inspection based on precise state conditions, resulting in extremely high intrusion detection accuracy. Simultaneously, the FIRST engine utilizes parallel detection technology, allowing for flexible software and hardware adaptation, significantly improving intrusion detection efficiency.
Real-time virus protection: Employing stream engine virus detection technology, it can quickly and accurately detect and eliminate viruses and other malicious code in network traffic.。
Massive URL categorization and filtering: Supports local and cloud-based methods, 141 category libraries, and over 20 million URL rules.
A comprehensive and timely security signature database. Through years of operation and accumulation, H3C has developed an industry-leading attack signature database team, equipped with a professional attack and defense laboratory, to keep abreast of the latest developments in the cybersecurity field, thereby ensuring the timely and accurate updating of the signature database.
5. Industry-leading IPv6
It supports IPv6 stateful firewall, truly realizing firewall functionality under IPv6 conditions, and simultaneously preventing IPv6 attacks.
It supports IPv4/IPv6 dual protocol stacks and functions such as IPv6 data packet forwarding, static routing, dynamic routing, and multicast routing.
Supports various IPv6 transition technologies, including NAT-PT, IPv6 over IPv4 GRE tunnel, manual tunnel, 6to4 tunnel, IPv4 compatible IPv6 automatic tunnel, ISATAP tunnel, NAT444, DS-Lite, etc.
Supports security technologies such as IPv6 ACL and Radius.
6. Next-generation multi-service features
Intrusion Prevention System (IPS) supports web attack identification and protection, such as cross-site scripting attacks and SQL injection attacks, and its virus signature database is updated periodically.
Antivirus (AV) features a high-performance virus engine that can protect against more than 6 million types of viruses and Trojans, with a periodically updated virus signature database.
Application Identification and Control (ACG) accurately identifies accessing applications, effectively allowing or blocking them, improving work efficiency, and the application identification feature database is updated periodically.
Web security protection (WAF) can effectively identify and protect against DDoS attacks, and supports feature classification of network devices, web servers, databases and other devices.
Threat Intelligence Detection (TI) supports IP reputation databases, domain reputation databases, and URL reputation databases, efficiently identifying threatening traffic and recording alerts. The threat intelligence signature database is updated regularly.
URLs are categorized and managed to improve the efficient use of network broadband resources.
The load balancing function integrates link load balancing features and effectively achieves automatic balancing and switching of multiple links at the enterprise's Internet egress through technologies such as link status detection and link busy protection.
It integrates SSL VPN features to meet the secure access needs of mobile office workers and employees on business trips. It can not only combine USB-Key and SMS for mobile user authentication, but also integrate with the enterprise's existing authentication system to achieve unified authentication access.
Data Loss Prevention (DLP) supports email filtering, providing filtering for SMTP email addresses, headers, attachments, and content; supports web page filtering, providing filtering for HTTP URLs and content; supports file filtering for network transmission protocols; and supports application layer filtering, providing protection against Java/ActiveX Blocking and SQL injection attacks.
7. Professional intelligent management
Supports intelligent security policies: Enables policy redundancy detection, policy matching optimization suggestions, dynamic detection of internal network services to dynamically generate and recommend security policies.
It supports standard network management SNMPv3 and is compatible with SNMP v1 and v2.
It provides a graphical interface and easy-to-use web management.
Device management and firewall configuration can be performed through the command-line interface, meeting the needs of professional management and large-scale configuration.
The H3C IMC SSM Security Management Center enables unified management, integrating functions such as security information and event collection, analysis, and response. It solves problems such as the isolation between network and security devices, the lack of intuitive network security status, slow response to security events, and difficulty in locating network faults. This frees IT and security administrators from tedious management work, greatly improves work efficiency, and allows them to focus on core business.
Leveraging advanced deep mining and analysis technologies, and employing both proactive collection and passive reception methods, this system provides users with centralized log management capabilities and normalizes logs of different formats (Syslog, binary stream logs, etc.). Simultaneously, it utilizes high-aggregation compression technology to store massive amounts of events and can automatically compress, encrypt, and save log files to external storage systems such as DAS, NAS, or SAN to prevent the loss of critical security events.
It provides a rich set of reports, mainly including application-based reports and network flow analysis reports.
It supports output in multiple formats such as PDF, HTML, WORD, and TXT.
Reports can be customized via a web interface, with customization options including the time range of the data, the source device of the data, the generation cycle, and the output type.
Networking applications

H3C SecPath F5000-AI Series Networking Application Diagram
SCF 2:1 virtualization technology, high-reliability network design
It has powerful processing capabilities and supports GE, 10GE, and 100G networking.
Enriching routing protocols to achieve security and network convergence
It has powerful VPN encryption capabilities.
Comprehensive and in-depth security defense prevents malicious attacks, while also enabling filtering of emails, web pages, and files.
Enriching routing protocols to achieve security and network convergence
Product Specifications
eye | F5000-AI-15 | F5000-AI-20 | F5000-AI-40 |
interface | One configuration port (CON) 1 RJ45 management port 2 MGMT interfaces 2 USB ports 1 Micro USB port 14 Gigabit Ethernet ports 8 gigabit Ethernet ports 8 10 Gigabit Ethernet ports | One configuration port (CON) 1 RJ45 management port 2 USB ports 4 Gigabit Ethernet Combo Ports Standard interface card: An 8-port Gigabit Ethernet interface card An 8-port 10 Gigabit optical interface card | One configuration port (CON) 1 RJ45 management port 2 USB ports 4 Gigabit Ethernet Combo Ports Standard interface card: An 8-port Gigabit Ethernet interface card An 8-port gigabit optical interface card An 8-port 10 Gigabit optical interface card |
Expansion slots | 2 | 6 | 5 |
storage media | Supports dual hard drives (RAID0/RAID1) | Supports dual hard drives (RAID0/RAID1) | Supports dual hard drives (RAID0/RAID1) |
Ambient temperature | Operating temperature: 0~45℃, with hard drive: 5℃~40℃ Non-working temperature: -40~70℃ | ||
Operating mode | Routing mode, transparent mode, promiscuous mode | ||
AAA service | Portal authentication, RADIUS authentication, HWTACACS authentication, PKI/CA (X.509 format) authentication, domain authentication, CHAP authentication, PAP authentication | ||
Firewall | SOP virtual firewall technology supports full virtualization of hardware resources such as CPU, memory, and storage. Safe zone division It can defend against a variety of malicious attacks, including Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP fragmentation, ARP spoofing, ARP reverse lookup, invalid TCP packet flags causing excessively large ICMP packets, address scanning, port scanning, SYN Flood, UDP Flood, ICMP Flood, and DNS Flood. Basic and extended access control lists Time-based access control lists User- and application-based access control lists ASPF Application Layer Packet Filtering Static and dynamic blacklist functions MAC and IP binding function MAC-based access control lists Supports 802.1q VLAN pass-through | ||
Virus protection | Detection based on virus characteristics Supports manual and automatic virus definition updates. Message Stream Processing Mode Supports HTTP, FTP, SMTP, and POP3 protocols. Supported virus types: Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, Virus, etc. Supports virus logs and reports | ||
Deep Intrusion Prevention | Supports defense against common attacks such as hacker attacks, worms/viruses, Trojans, malicious code, spyware/adware, DoS/DDoS attacks, etc. Supports defense against attacks such as buffer overflow, SQL injection, and IDS/IPS escape. Supports attack signature database classification (based on attack type and target system) and grading (high, medium, low, and warning levels). Supports manual and automatic updates of the attack signature database (TFTP and HTTP). Supports identification and control of P2P/IM such as BitTorrent. | ||
Email/Webpage/Application Layer Filtering | Email filtering SMTP email address filtering Email title filtering Email content filtering Email attachment filtering Webpage filtering HTTP URL filtering HTTP content filtering Application layer filtering Java Blocking ActiveX Blocking SQL injection attack prevention | ||
NAT | Supports mapping multiple internal addresses to the same public IP address. Supports mapping multiple internal addresses to multiple public IP addresses. Supports one-to-one mapping from internal addresses to public addresses. Supports simultaneous source and destination address translation Supports external network hosts to access internal servers Supports direct mapping of internal addresses to public IP addresses of interfaces. Supports DNS mapping function Configurable valid time for address translation Supports various NAT ALGs, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, SIP, etc. | ||
VPN | L2TP VPN、IPSec VPN、GRE VPN、SSL VPN | ||
IPv6 | IPv6-based stateful firewall and attack prevention IPv6 protocols: IPv6 forwarding, ICMPv6, PMTU, Ping6, DNS6, TraceRT6, Telnet6, DHCPv6 Client, DHCPv6 Relay, etc. IPv6 routing: RIPng, OSPFv3, BGP4+, static routing, policy routing, PIM-SM, PIM-DM, etc. IPv6 security: NAT-PT, IPv6 Tunnel, IPv6 Packet Filter, Radius, IPv6 inter-domain policies, IPv6 connection limits, etc. | ||
High reliability | Supports SCF 2:1 virtualization Supports dual-machine hot standby (Active/Active and Active/Backup working modes). Supports dual-machine configuration synchronization Supports IKE state synchronization for IPSec VPN VRRP Support | ||
Maintainability | Supports command-line based configuration management Supports remote configuration management via web interface Supports device management by H3C SSM Security Management Center Supports standard network management SNMPv3, and is compatible with SNMP v1 and v2. Smart security strategy | ||
Environmental Protection and Certification | Supports Europe's stringent RoHS environmental certification | ||
project | F5000-AI120/F5000-AI160 | F5000-AI360 | F5000-E |
interface | One configuration port (RJ45 or Micro USB) 2 external USB 3.0 ports 2 RJ45 management ports 6 100G Ethernet ports 8 25G Ethernet ports 20 10 Gigabit Ethernet ports 2 HA interfaces (10 Gigabit optical) | One configuration port (RJ45 or Micro USB) 2 external USB 3.0 ports 2 RJ45 management ports 6 100G Ethernet ports 16 25G Ethernet ports 12 10 Gigabit Ethernet Ports 2 HA interfaces (10 Gigabit optical) | One configuration port (RJ45 or Micro USB) 2 external USB 3.0 ports 2 RJ45 management ports 6 100G Ethernet ports 8 25G Ethernet ports 20 10 Gigabit Ethernet ports 2 HA interfaces (10 Gigabit optical) |
Expansion slots | 0 | 0 | 0 |
storage media | Supports dual hard drives (RAID0/RAID1) | Supports dual hard drives (RAID0/RAID1) | Supports dual hard drives (RAID0/RAID1) |
Ambient temperature | Operating temperature: 0~45℃, with hard drive: 5℃~40℃ Non-working temperature: -40~70℃ | ||
Operating mode | Routing mode, transparent mode, promiscuous mode | ||
AAA service | Portal authentication, RADIUS authentication, HWTACACS authentication, PKI/CA (X.509 format) authentication, domain authentication, CHAP authentication, PAP authentication | ||
Firewall | SOP virtual firewall technology supports full virtualization of hardware resources such as CPU, memory, and storage. Safe zone division It can defend against a variety of malicious attacks, including Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP fragmentation, ARP spoofing, ARP reverse lookup, invalid TCP packet flags causing excessively large ICMP packets, address scanning, port scanning, SYN Flood, UDP Flood, ICMP Flood, and DNS Flood. Basic and extended access control lists Time-based access control lists User- and application-based access control lists ASPF Application Layer Packet Filtering Static and dynamic blacklist functions MAC and IP binding function MAC-based access control lists Supports 802.1q VLAN pass-through | ||
Virus protection | Detection based on virus characteristics Supports manual and automatic virus definition updates. Message Stream Processing Mode Supports HTTP, FTP, SMTP, and POP3 protocols. Supported virus types: Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, Virus, etc. Supports virus logs and reports | ||
Deep Intrusion Prevention | Supports defense against common attacks such as hacker attacks, worms/viruses, Trojans, malicious code, spyware/adware, DoS/DDoS attacks, etc. Supports defense against attacks such as buffer overflow, SQL injection, and IDS/IPS escape. Supports attack signature database classification (based on attack type and target system) and grading (high, medium, low, and warning levels). Supports manual and automatic updates of the attack signature database (TFTP and HTTP). Supports identification and control of P2P/IM such as BitTorrent. | ||
Email/Webpage/Application Layer Filtering | Email filtering SMTP email address filtering Email title filtering Email content filtering Email attachment filtering Webpage filtering HTTP URL filtering HTTP content filtering Application layer filtering Java Blocking ActiveX Blocking SQL injection attack prevention | ||
NAT | Supports mapping multiple internal addresses to the same public IP address. Supports mapping multiple internal addresses to multiple public IP addresses. Supports one-to-one mapping from internal addresses to public addresses. Supports simultaneous source and destination address translation Supports external network hosts to access internal servers Supports direct mapping of internal addresses to public IP addresses of interfaces. Supports DNS mapping function Configurable valid time for address translation Supports various NAT ALGs, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, SIP, etc. | ||
VPN | L2TP VPN、IPSec VPN、GRE VPN、SSL VPN | ||
IPv6 | IPv6-based stateful firewall and attack prevention IPv6 protocols: IPv6 forwarding, ICMPv6, PMTU, Ping6, DNS6, TraceRT6, Telnet6, DHCPv6 Client, DHCPv6 Relay, etc. IPv6 routing: RIPng, OSPFv3, BGP4+, static routing, policy routing, PIM-SM, PIM-DM, etc. IPv6 security: NAT-PT, IPv6 Tunnel, IPv6 Packet Filter, Radius, IPv6 inter-domain policies, IPv6 connection limits, etc. | ||
High reliability | Supports dual-machine hot standby (Active/Active and Active/Backup working modes). Supports dual-machine configuration synchronization Supports IKE state synchronization for IPSec VPN VRRP Support | ||
Maintainability | Supports command-line based configuration management Supports remote configuration management via web interface Supports device management by H3C SSM Security Management Center Supports standard network management SNMPv3, and is compatible with SNMP v1 and v2. Smart security strategy | ||
Environmental Protection and Certification | Supports Europe's stringent RoHS environmental certification | ||