Other features
Special features |
TCP segmentation, TCP/UDP/IP checksum |
Safety |
FCC B, CE, C Tick, VCCI, MIC, BSMI |
Interface |
32-bit, 33 MHz PCI |
Networking features |
TCP/IP, ISO 8802-3 |
Protocols
Management protocols |
SNMP manageable |
Security
Firewall security |
IP protocols only, non IP protocols (IPX, NetBEUI, PPPoE) can be blocked or passed through without filtering. |
Additionally
Wireless technologies |
Wired |
The 3Com® Firewall PCI Card with 10/100 LAN works with our 3Com Embedded Firewall Policy Server or Starter Policy Server (required and sold separately) to extend tamper-resistant firewall filtering and auditing capabilities across your enterprise—both inside and outside the network perimeter.
These centrally managed firewall cards protect servers and desktops with superior tamper-resistance that software-only firewalls can't match. Built into each firewall card is an onboard RISC processor that enforces security transparently to end users, local applications, and operating systems. This embedded firewall hardware is practically impervious to Internet attacks, end user actions, or malicious code.
Equally important, the firewall card can be configured and managed only through an authenticated 3Com Embedded Firewall Policy Server. Even if a protected system is corrupted, the firewall card prevents its host from being used as a launching pad for further invasion into the network.
The 3Com Firewall PCI Card plugs into a standard PCI slot, replacing the conventional 10/100 LAN connection. In Windows 2003, 2000, or XP environments, the firewall card offloads TCP and security processing for improved system performance. Because the firewall cards are installed on a system-by-system basis, it's easy to expand network security when and where it's needed, in economical increments. Once the firewall cards are installed, simply use the policy server to configure and push security policies to firewall-enabled systems across the network.
Provides superior resistance to malicious code, hostile users, unauthorized access, and disabling; firewall cards only accept instructions from authenticated policy servers
Facilitates assigning security by group role or function and enables immediate response to detected network attacks
Receives centrally configured and deployed security policies and management instructions from authenticated policy servers, independent of routers or traffic streams
Provides host-independent enforcement, 24x7 intrusion resistance, and robust security functionality that bolsters administrative confidence in the safety of the network
Secures open Internet connections, such as VPN endpoints and broadband access gateways, located inside or outside the perimeter firewall
Protects users with multiple levels of protection wherever they work—more relaxed for internal LAN connections and more restricted for shared and Internet-accessible systems
Hardens web and e-commerce servers, DMZ subnets, and customer databases against Internet attacks and unauthorized access
Automatically limits system-to-system communication when connecting outside the network perimeter; ignores nonessential protocols, shuts down unnecessary ports, denies "ping" requests, and disables packet sniffing and IP spoofing
Provides around-the-clock peace of mind; if firewall cards cannot communicate with the policy server, they will default to your maximum security levels
Complements other 802.3-standard compliant security solutions—including security services switches, firewall/VPNs, antivirus scanners, and intrusion-detection systems (IDSs)
Lowers IT administration costs with 24/7 intrusion resistance that helps eliminate false alarms generated by IDS monitoring