Other features
Networking features |
TCP/IP, ISO 8802-3 |
Interface |
Type II PC Card slot |
Special features |
VPN, auto-negotiation, manageable. Extend firewall filtering and auditing capabilities across your enterprise both inside and outside the network perimeter. Secures open Internet connections.Complements other 802.3-standard compliant security solutions.\nIP protocols only, non IP protocols (IPX, NetBEUI, PPPoE) can be blocked or passed through without filtering. |
Performance
Processor frequency |
100 MHz |
Protocols
Data link protocols |
Ethernet, Fast Ethernet (IP protocols only) |
Management protocols |
SNMP, DMI 2.0 manageable |
Additionally
Transfer rate (Mbps) |
100 Mbit/s |
Wireless technologies |
Wired |
3Com® Firewall PC Card with 10/100 LAN, Type II (3CRFW102), 20 Units pack
Distributed Firewall Hardware for Mobile Notebooks
The 3Com® Firewall PC Card with 10/100 LAN, Type II works with our 3Com Embedded Firewall Policy Server or Starter Policy Server (required and sold separately) to extend firewall filtering and auditing capabilities across your enterprise—both inside and outside the network perimeter.
These centrally managed firewall cards protect your mobile notebooks with superior tamper-resistance that software-only firewalls can't match. Built into each firewall card is an onboard RISC processor that enforces security transparently to end users, local applications, and operating systems. This embedded firewall hardware is practically impervious to Internet attacks, end user actions, or malicious code.
Equally important, the firewall card can be configured and managed only through an authenticated 3Com Embedded Firewall Policy Server. Even if a protected system is corrupted, the firewall card prevents its host from being used as a launching pad for further invasion into the network.
This firewall card for CardBus-compatible notebooks replaces the conventional Ethernet or Fast Ethernet LAN connection for a Type II PC Card slot. In Windows 2003, 2000 or XP environments, it offloads TCP and security tasks to boost system performance. The included 3Com Mobile Connection Manager software gives mobile users secure network access from multiple locations with a single click.
It's easy to expand network security in economical increments by simply installing firewall cards on a system-by-system basis, as needed. Once the firewall cards are installed, use the policy server to configure and push security policies to firewall-enabled notebooks across the network.
Provides superior resistance to malicious code, hostile users, unauthorized access, and disabling; firewall cards only accept instructions from authenticated policy servers
Facilitates assigning security by group role or function and enables immediate response to detected network attacks
Receives centrally configured and deployed security policies and management instructions from authenticated policy servers, independent of routers or traffic streams
Provides host-independent enforcement, 24x7 intrusion resistance, and robust security functionality that bolsters administrative confidence in the safety of the network
Secures open Internet connections, such as VPN endpoints and broadband access gateways, located inside or outside the perimeter firewall
Protects users with multiple levels of protection wherever they work—more relaxed for internal LAN connections and more restricted for shared and Internet-accessible systems
Hardens mobile systems against Internet attacks and unauthorized access independent of their location, even when connecting to someone else's LAN
Automatically limits system-to-system communication when connecting outside the network perimeter; ignores nonessential protocols, shuts down unnecessary ports, denies "ping" requests, and disables packet sniffing and IP spoofing
Provides around-the-clock peace of mind; if firewall cards cannot communicate with the policy server, they will default to your maximum security levels
Complements other 802.3-standard compliant security solutions—including security services switches, firewall/VPNs, antivirus scanners, and intrusion-detection systems (IDSs)