Hillstone E-1000 Series Next-Generation Firewall: E1100W / E1100WG3w / E1600 / E1606 / E1700
Hillstone E-1000 Series Next-Generation Firewall: E1100W / E1100WG3w / E1600 / E1606 / E1700
Hillstone E-1000 Series Next-Generation Firewall: E1100W / E1100WG3w / E1600 / E1606 / E1700
The Hillstone E-1000 Series Next Generation Firewall (NGFW) provides comprehensive and granular visibility and control of
applications. It can identify and prevent potential threats associated with high-risk applications while providing
policy-based control over applications, users, and user-groups. Policies can be defined that guarantee bandwidth to
mission-critical applications while restricting or blocking unauthorized or malicious applications. The Hillstone E-1000
Series NGFW incorporates comprehensive network security and advanced firewall features, provides superior price perfor-
mance, excellent energy efficiency, and comprehensive threat prevention capability.
Product Highlights
Granular Application Identification and Control Comprehensive Threat Detection and Prevention
The Hillstone E-1000 Series NGFW provides fine-grained The Hillstone E-1000 Series NGFW provides real-time protec-
control of web applications regardless of port, protocol, or tion for applications from network attacks including viruses,
evasive action. It can identify and prevent potential threats spyware, worms, botnets, ARP spoofing, DoS/DDoS, Trojans,
associated with high-risk applications while providing buffer overflows, and SQL injections. It incorporates a unified
policy-based control over applications, users, and user-groups. threat detection engine that shares packet details with multiple
Security Policies can be defined that guarantee bandwidth to security engines (AD, IPS, URL filtering, Anti-Virus, Sandbox
mission-critical applications while restricting or blocking unau- etc.), which significantly enhances the protection efficiency and
thorized or malicious applications. reduces network latency.
www.hillstonenet.com
Phone: 1-800-889-9860
Hillstone E-1000 Series Next-Generation Firewall E-1000 Series
Features
Network Services
ï Support protocols including HTTP/HTTPS, POP3, IMAP, SMTP and FTP
ï Dynamic routing (OSPF, BGP, RIPv2) ï Support file types including PE,ZIP, RAR, Office, PDF, APK, JAR and SWF
ï Static and Policy routing ï File transfer direction and file size control
ï Route controlled by application ï Provide complete behavior analysis report for malicious files
ï Built-in DHCP, NTP, DNS Server and DNS proxy ï Global threat intelligence sharing, real-time threat blocking
• Tap mode – connects to SPAN port ï Support detection only mode without uploading files
ï Interface modes: sniffer, port aggregated, loopback, VLANS (802.1Q and
Trunking) Botnet C&C Prevention
ï L2/L3 switching & routing
ï Discover intranet botnet host by monitoring C&C connections and block
ï Virtual wire (Layer 1) transparent inline deployment
further advanced threats such as botnet and ransomware
ï Regularly update the botnet server addresses
Firewall
ï prevention for C&C IP and domain
ï Operating modes: NAT/route, transparent (bridge), and mixed mode ï Support TCP, HTTP, and DNS traffic detection
ï Policy objects: predefined, custom, and object grouping ï IP and domain whitelists
ï Security policy based on application, role and geo-location
ï Application Level Gateways and session support: MSRCP, PPTP, RAS, RSH, SIP, IP Reputation
FTP, TFTP, HTTP, dcerpc, dns-tcp, dns-udp, H.245 0, H.245 1, H.323
ï Identify and filter traffic from risky IPs such as botnet hosts, spammers, Tor
ï NAT and ALG support: NAT46, NAT64, NAT444, SNAT, DNAT, PAT, Full Cone
nodes, breached hosts, and brute force attacks
NAT, STUN
ï Logging, dropping packets, or blocking for different types of risky IP traffic
ï NAT configuration: per policy and central NAT table
ï Regular IP reputation signature database upgrade
ï VoIP: SIP/H.323/SCCP NAT traversal, RTP pin holing
ï Global policy management view
SSL Decryption
ï Security policy redundancy inspection, policy group, policy configuration
ï Application identification for SSL encrypted traffic
rollback
ï IPS enablement for SSL encrypted traffic
ï Comprehensive DNS policy
ï AV enablement for SSL encrypted traffic
ï Schedules: one-time and recurring
ï URL filter for SSL encrypted traffic
ï SSL Encrypted traffic whitelist
Intrusion Prevention
ï SSL proxy offload mode
ï Protocol anomaly detection, rate-based detection, custom signatures,
manual, automatic push or pull signature updates, integrated threat
Endpoint Identification and Control
encyclopedia
ï Support to identify endpoint IP, endpoint quantity, on-line time, off-line time,
ï IPS Actions: default, monitor, block, reset (attackers IP or victim IP, incoming
and on-line duration
interface) with expiry time
ï Support 10 operation systems
ï Packet logging option
ï Support query based on IP, endpoint quantity, control policy and status etc.
ï Filter Based Selection: severity, target, OS, application or protocol
ï Support the identification of accessed endpoints quantity across layer 3,
ï IP exemption from specific IPS signatures
logging and interference on overrun IP
ï IDS sniffer mode
ï IPv4 and IPv6 rate based DoS protection with threshold settings against TCP
Data Security
Syn flood, TCP/UDP/SCTP port scan, ICMP sweep, TCP/UDP/SCIP/ICMP session
ï File transfer control based on file type
flooding (source/destination)
ï File protocol identification, including HTTP, FTP, SMTP and POP3
ï Active bypass with bypass interfaces
ï File signature and suffix identification for over 100 file types
ï Predefined prevention configuration
ï Content filtering for HTTP-GET, HTTP-POST, FTP and SMTP protocols
ï IM identification and network behavior audit
Anti-Virus
ï Manual, automatic push or pull signature updates
Application Control
ï Flow-based Antivirus: protocols include HTTP, SMTP, POP3, IMAP, FTP/SFTP
ï Over 3,000 applications that can be filtered by name, category, subcategory,
ï Compressed file virus scanning
technology and risk
ï Each application contains a description, risk factors, dependencies, typical
Attack Defense
ports used, and URLs for additional reference
ï Abnormal protocol attack defense
ï Actions: block, reset session, monitor, traffic shaping
ï Anti-DoS/DDoS, including SYN Flood, DNS Query Flood defense
ï Identify and control cloud applications in the cloud
ï ARP attack defense
ï Provide multi-dimensional monitoring and statistics for cloud applications,
including risk category and characteristics
URL Filtering
ï Flow-based web filtering inspection
Quality of Service (QoS)
ï Manually defined web filtering based on URL, web content and MIME header
ï Max/guaranteed bandwidth tunnels or IP/user basis
ï Dynamic web filtering with cloud-based real-time categorization database:
ï Tunnel allocation based on security domain, interface, address, user/user
over 140 million URLs with 64 categories (8 of which are security related)
group, server/server group, application/app group, TOS, VLAN
ï Additional web filtering features:
ï Bandwidth allocated by time, priority, or equal bandwidth sharing
- Filter Java Applet, ActiveX or cookie
ï Type of Service (TOS) and Differentiated Services (DiffServ) support
- Block HTTP Post
ï Prioritized allocation of remaining bandwidth
- Log search keywords
ï Maximum concurrent connections per IP
- Exempt scanning encrypted connections on certain categories for privacy
ï Bandwidth allocation based on URL category
ï Web filtering profile override: allows administrator to temporarily assign
ï Bandwidth limit by delaying access for user or IP
different profiles to user/group/IP
ï Web filter local categories and category rating override
Server Load balancing
ï Weighted hashing, weighted least-connection, and weighted round-robin
Cloud-Sandbox
ï Session protection, session persistence and session status monitoring
ï Upload malicious files to cloud sandbox for analysis
ï Server health check, session monitoring and session protection
www.hillstonenet.com
Hillstone E-1000 Series Next-Generation Firewall E-1000 Series
Features
VSYS CloudView
ï System resource allocation to each VSYS ï Cloud-based security monitoring
ï CPU virtualization ï 7/24 access from web or mobile application
ï Non-root VSYS support firewall, IPSec VPN, SSL VPN, IPS, URL filtering ï Device status, traffic and Threat monitoring
ï VSYS monitoring and statistic ï Cloud-based log retention and reporting
ï Not supported on E1600, E1100W and E1100W3Gw
Wireless
High Availability ï Multi-SSID and wireless traffic control (only on E1100W and E1100WG3w)
ï Redundant heartbeat interfaces ï Wire link and WCDMA link back up (Only on E1100WG3w)
ï Active/Active and Active/Passive ï WCDMA IPSec VPN (Only on E1100WG3w)
ï Standalone session synchronization
ï HA reserved management interface
ï Failover:
www.hillstonenet.com
Hillstone E-1000 Series Next-Generation Firewall E-1000 Series
Product Specification
(4)
IPS Throughput 400Mbps 400Mbps 400Mbps 400Mbps 600Mbps
Threat Protection
300Mbps 300Mbps 300Mbps 300Mbps 400Mbps
Throughput(7)
Maximum Concurrent
Sessions (Default/Max) 200k 200k 200k 400k 600k/1M
1 x Console Port 1 x Console Port 1 x Console Port 1 x Console Port 1 x Console Port
Management Ports
1 x USB Port 1 x USB Port 1 x USB Port 1 x USB Port 1 x USB Port
AC:100-240V
AC:100-240V
Power Supply AC 100-240V 50/60Hz AC 100-240V 50/60Hz AC 100-240V 50/60Hz 50/60Hz
50/60Hz
DC-40~-60V
Weight 3.3lb (1.5KG) 3.3lb (1.5KG) 3.3lb (1.5KG) 5.5Ib (2.5kg) 5.5Ib (2.5kg)
Temperature 32-104 F (0-40°C) 32-104 F (0-40°C) 32-104 F (0-40°C) 32-104F (0-40°C) 32-104F (0-40°C)
Relative Humidity 10-95% (no dew) 10-95% (no dew) 10-95% (no dew) 10-95% (no dew) 10-95% (no dew)
Compliance and CE, CB, FCC, UL/cUL, ROHS, IEC/EN61000-4-5 Power Surge Protection, ISO 9001:2015, ISO 14001:2015, CVE Compatibility, IPv6 Ready, ICSA
Certificate Firewalls
Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R6. Results may vary based on StoneOS®version and deployment.
NOTES: (1) FW throughput data is obtained under single-stack UDP traffic with 1518-byte packet size; (2) IPSec throughput data is obtained under Preshare Key AES256+SHA-1
configuration and 1400-byte packet size packet; (3) AV throughput data is obtained under HTTP traffic with file attachment; (4) IPS throughput data is obtained under bi-direc-
tion HTTP traffic detection with all IPS rules being turned on; (5) IMIX throughput data is obtained under UDP traffic mix (64 byte : 512 byte : 1518 byte =5:7:1); (6) NGFW
throughput data is obtained under 64 Kbytes HTTP traffic with application control and IPS enabled; (7) Threat protection throughput data is obtained under 64 Kbytes HTTP traffic
with application control, IPS, AV and URL filtering enabled; (8) New Sessions/s is obtained under TCP traffic.