Datasheet

DATA SHEET
Distributed-
hardware system
protection and
centralized security-
policy control
Network Diagram
The 3Com
®
Embedded Firewall solution
extends centrally managed, hardware-
enforced security to notebooks,
desktops, and servers across the organi-
zation—inside and outside the network
perimeter. This innovative combination
of policy server software and firewall
card hardware safeguards your network
assets with superior tamper-resistance
that software-only firewalls can't match.
The 3Com Embedded Firewall Policy
Server software provides central control
through configurable security policies.
These security policies can be used to
streamline and automate many routine
security chores, such as auditing and
filtering or blocking unnecessary ports.
Central management also helps ensure
that security cant be disabled or modi-
fied at the end system.
3Com Firewall PCI and PC Cards plug
into standard PCI or PC Card slots,
replacing the conventional Fast Ethernet
LAN connection. Security tasks are
offloaded to the firewall card’s security
processor, helping boost system perfor-
mance. The firewall cards operate
independently of their host systems and
are practically impervious to Internet
attacks, user actions, or malicious code.
Equally important, they're configurable
only through authenticated policy
servers. In other words, even if a fire-
wall-client system is invaded, it’s
practically impossible to exploit as an
attack launching pad.
3Com
®
Embedded Firewall Solution
Mobile user from
customer network
Mobile user from hotel
3Com Embe
dded
Firewall Policy Server
3Com
®
Embedded
Firewall Policy Ser
ver
Mail server
Web server
Workstation
Shared server
Firewall
Workstation
Mobile
workstation
Shared server
Router
3Com Firewall PCI Card
3Com Firewall PC Card
VPN tu
n
n
e
l
B
usiness Partner E
xtr
a
net
Home
Internal
LAN
T
elecommuter
DSL m
o
d
em
Mobile
workstation
Internet
V
P
N tunnel
VPN tunnel
Mobile user
from home
The 3Com Embedded Firewall solution extends
hardware-enforced firewall capabilities to internal
systems within the LAN as well as to remote
systems connecting from the outside.

Summary of content (4 pages)