3com FIREWALL PC CARD TYPE II hardware firewall

3com FIREWALL PC CARD TYPE II hardware firewall

MPN: 3CRFW102
🚚 Select the country of delivery:
Delivery from:
Germany
Updating price ... 📣 Send Price inquiry Не поставляется
Delivery cost & estimated delivery time:
От
days

Where to buy and prices (Advertising *)

On Top
в наличии
* Alle Preise inkl. der jeweils geltenden gesetzlichen Mehrwertsteuer, ggfs. zzgl. Versandkosten. Alle Angaben ohne Gewähr. Preisänderungen sind in der Zwischenzeit möglich.

Technical specifications

On Top

Performance

Processor frequency 100 MHz

Protocols

Data link protocols Ethernet, Fast Ethernet (IP protocols only)
Management protocols SNMP, DMI 2.0 manageable

Other features

Interface Type II PC Card slot
Special features VPN, auto-negotiation, manageable. Extend firewall filtering and auditing capabilities across your enterprise both inside and outside the network perimeter. Secures open Internet connections.Complements other 802.3-standard compliant security solutions.\nIP protocols only, non IP protocols (IPX, NetBEUI, PPPoE) can be blocked or passed through without filtering.
Networking features TCP/IP, ISO 8802-3

System requirements

Minimum RAM 16 MB

Additionally

Transfer rate (Mbps) 100 Mbit/s
Wireless technologies Wired
3Com® Firewall PC Card with 10/100 LAN, Type II 3CRFW102 Distributed Firewall Hardware for Mobile Notebooks
The 3Com® Firewall PC Card with 10/100 LAN, Type II works with our 3Com Embedded Firewall Policy Server or Starter Policy Server (required and sold separately) to extend firewall filtering and auditing capabilities across your enterprise—both inside and outside the network perimeter.

These centrally managed firewall cards protect your mobile notebooks with superior tamper-resistance that software-only firewalls can't match. Built into each firewall card is an onboard RISC processor that enforces security transparently to end users, local applications, and operating systems. This embedded firewall hardware is practically impervious to Internet attacks, end user actions, or malicious code.

Equally important, the firewall card can be configured and managed only through an authenticated 3Com Embedded Firewall Policy Server. Even if a protected system is corrupted, the firewall card prevents its host from being used as a launching pad for further invasion into the network.

This firewall card for CardBus-compatible notebooks replaces the conventional Ethernet or Fast Ethernet LAN connection for a Type II PC Card slot. In Windows 2003, 2000 or XP environments, it offloads TCP and security tasks to boost system performance. The included 3Com Mobile Connection Manager software gives mobile users secure network access from multiple locations with a single click.

It's easy to expand network security in economical increments by simply installing firewall cards on a system-by-system basis, as needed. Once the firewall cards are installed, use the policy server to configure and push security policies to firewall-enabled notebooks across the network.
Provides superior resistance to malicious code, hostile users, unauthorized access, and disabling; firewall cards only accept instructions from authenticated policy servers

Facilitates assigning security by group role or function and enables immediate response to detected network attacks

Receives centrally configured and deployed security policies and management instructions from authenticated policy servers, independent of routers or traffic streams

Provides host-independent enforcement, 24x7 intrusion resistance, and robust security functionality that bolsters administrative confidence in the safety of the network

Secures open Internet connections, such as VPN endpoints and broadband access gateways, located inside or outside the perimeter firewall

Protects users with multiple levels of protection wherever they work—more relaxed for internal LAN connections and more restricted for shared and Internet-accessible systems

Hardens mobile systems against Internet attacks and unauthorized access independent of their location, even when connecting to someone else's LAN

Automatically limits system-to-system communication when connecting outside the network perimeter; ignores nonessential protocols, shuts down unnecessary ports, denies "ping" requests, and disables packet sniffing and IP spoofing

Provides around-the-clock peace of mind; if firewall cards cannot communicate with the policy server, they will default to your maximum security levels

Complements other 802.3-standard compliant security solutions—including security services switches, firewall/VPNs, antivirus scanners, and intrusion-detection systems (IDSs)
Фотографии

    Password recovery
    To recover your password, please enter in the box below your email address with which you have registered:
    The password reset code has been sent to your Email.
    Код уже был отправлен Вам ранее.
    Вы можете ввести его в поле выше, или получить новый код через сек.
    An error has occurred. Please check your e-mail address and try again.
    Ваш новый пароль:

    Name is empty


    Выберите страну доставки

    You have not written a message

    By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.

    Your message has been sent!

    Close

    1
    Catalog
    Cancel Close
    Бренды:
      Выберите бренды
        Show more close
          Area search
          Worldwide
          Категории
            Product