H3C SecPath F50X0 Series Скачать руководство пользователя страница 6

Figure 3 Security zones 

 

 

A firewall device provides default security zones 

Local

Management

Trust

DMZ

, and 

Untrust

Default security zones cannot be deleted. The function  and application scenario  of each default 

security zone are as follows: 

 

Local

—Refers to the device itself. You cannot add interfaces to security zone 

Local

. For 

communication between a non-Management security zone and the device, you must configure 

a security policy to permit the packets between the corresponding security zone and security 

zone 

Local

 

Management

—Refers to the security zone used for managing the device. The device permits 

packets between security zones 

Management

 and 

Local

 by default and you do not need to 

configure a security policy. By default, the device management interface belongs to security 

zone 

Management.

 You can log in to the device management interface to configure the device 

from a PC. 

 

Trust

—Refers to the trusted security zone. You can assign the interface connected to the 

internal network to security zone 

Trust

 and configure a security policy to perform threat 

detection on incoming packets from other security zones. In this way, you can protect internal 

hosts and strictly control outgoing packets destined for other security zones to prevent data 

leakage. 

 

DMZ

—A demilitarized zone is an isolated security zone that typically incorporates the 

interfaces connected to various public services or resources (such as Web servers or FTP 

servers). You can configure a security policy to audit packets sent to security zone 

DMZ

 from 

other security zones, so as to protect the servers from attacks and prevent data theft. 

 

Untrust

—Refers to the untrusted network security zone. You can assign the interface 

connected to the Internet to security zone 

Untrust

 and configure a security policy to strictly 

detect packets sent to other security zones, so as to block external attacks and threats such as 

viruses. 

Содержание SecPath F50X0 Series

Страница 1: ...anual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co Ltd Except for the trademarks of New H3C Technologies Co Ltd any trademarks that may be mentioned in this document are the property of their respective owners The information in this document is subject to change without notice ...

Страница 2: ...ernet access through a specific IP address 12 Internet access through DHCP 16 Internet access through PPPoE 19 Internet access in transparent mode 23 Configuring signature library upgrade 24 Configuring automatic signature library upgrade 25 Triggering a signature library upgrade 28 Performing a manual signature library upgrade 32 Activating and installing a license for the first time 32 Configuri...

Страница 3: ...the F100 C A1 device as an example The configuration interfaces and configurations might differ depending on the hardware model or software version This guide applies to the following models and versions F5000 series F5000 series Model F50X0 series F5010 F5020 F5040 F5030 F5030 6GW F5030 6GW G F5060 F5080 F5000 M F5000 A F5000 C F5000 S F5000 AI series F5000 AI 15 F5000 AI 20 F5000 AI 40 F1000 ser...

Страница 4: ...he following ports on the front panel Two 1000BASE X Ethernet fiber ports Five 10 100 1000BASE T autosensing Ethernet copper ports including one management Ethernet port One USB port One console port One Micro SD card slot Figure 1 Front panel 1 10 100 1000BASE T copper ports 2 1000BASE X fiber ports 3 Console port 4 USB port host mode Type A 5 Micro SD card slot 6 Reset button 7 DC input power re...

Страница 5: ...needed protecting one network against attacks and intrusions from another network You can configure the firewall to permit valid traffic and deny invalid traffic A firewall controls network traffic mainly based on security zones and security policies Interfaces and security zones As shown in Figure 3 you can configure security zones to implement security zone based security management A security z...

Страница 6: ...ace to configure the device from a PC Trust Refers to the trusted security zone You can assign the interface connected to the internal network to security zone Trust and configure a security policy to perform threat detection on incoming packets from other security zones In this way you can protect internal hosts and strictly control outgoing packets destined for other security zones to prevent da...

Страница 7: ...cy Configuring basic firewall settings Obtaining the factory default settings Table 1 shows the factory default settings of the device You can also obtain the default username and password of the device through the nameplate on the device Table 1 Factory default settings of the device Item Default Remarks Username admin N A Password admin N A Login type Device login from the Web interface Device l...

Страница 8: ... zone to connect the carrier network for external communication To configure the device from the CLI use the console cable to connect the serial port on the management PC to the console port on the device for first login Figure 5 Connecting cables Logging in to the Web interface Restrictions and guidelines As a best practice using the following browsers Chrome 40 and higher Firefox 19 and higher I...

Страница 9: ...ing or JavaScript depending on the Web browser If you are using an Internet Explorer browser you must enable the following security settings Script ActiveX controls marked safe for scripting Run ActiveX controls and plug ins To ensure correct display of webpage contents after software upgrade or downgrade clear data cached by the browser before you log in Procedure ...

Страница 10: ...8 ...

Страница 11: ...9 ...

Страница 12: ...10 ...

Страница 13: ...11 ...

Страница 14: ...ides the following methods to fast access the Internet Specified IP address Obtains a fixed public network IP address from the carrier Users in the internal network must use this public network IP address to access the Internet DHCP The device dynamically obtains a public network IP address through the DHCP service provided by the carrier to access the Internet PPPoE The user can access the Intern...

Страница 15: ...13 ...

Страница 16: ...14 ...

Страница 17: ...15 ...

Страница 18: ...6 Internet access through DHCP The device dynamically obtains a public network IP address through the DHCP service provided by the carrier to access the Internet The configuration procedure is as follows ...

Страница 19: ...17 ...

Страница 20: ...18 ...

Страница 21: ...19 Internet access through PPPoE The user can access the Internet through a PPPoE access authentication account obtained from the carrier The configuration procedure is as follows ...

Страница 22: ...20 ...

Страница 23: ...21 ...

Страница 24: ...22 ...

Страница 25: ...2 mode In this mode the device is typically deployed on the inner side of enterprise gateway The device is not directly connected to the Internet but is capable of monitoring and controlling network traffic for security purposes This mode does not require routing or NAT configuration and can implement fast device deployment and security service onboarding without changing the network structure The...

Страница 26: ...t cannot upgrade the signature library The following methods are available for upgrading the signature library for a service module Automatic upgrade The device automatically downloads the most up to date signature file to upgrade its local signature library periodically Online upgrade The device downloads the most up to date signature file to upgrade its local signature library immediately after ...

Страница 27: ...n the device cannot obtain the signature file automatically You must manually download the most up to date signature file and then use the file to upgrade the signature library on the device Configuring automatic signature library upgrade ...

Страница 28: ...26 ...

Страница 29: ...27 ...

Страница 30: ...28 Triggering a signature library upgrade ...

Страница 31: ...29 ...

Страница 32: ...30 ...

Страница 33: ...31 ...

Страница 34: ...signature library upgrade Activating and installing a license for the first time Some features require a license to run on the device You must activate and install a license to use such a feature Configuring a security policy ...

Страница 35: ...33 ...

Страница 36: ...34 Restoring the factory defaults IMPORTANT Use this feature with caution This feature delete all configurations and files except bin files and license files ...

Страница 37: ...35 ...

Страница 38: ...36 Upgrading software Performing maintenance and diagnostics ...

Страница 39: ...se this feature in routing mode In the initial configuration the quick wizard in routing mode automatically generates a NAT policy to ensure internal to external access You can directly use the NAT policy or configure different NAT policies based on the network requirements Figure 6 Network diagram for NAT For more information see the configuration guide for the product Device Trust Untrust Intern...

Страница 40: ...establish a secure connection to an SSL VPN gateway through an SSL enabled browser to access protected resources behind the gateway Figure 8 Network diagram for SSL VPN For more information see the configuration guide for the product Hot backup Hot backup is a device level high availability HA solution It enables two devices to back up each other dynamically to ensure user service continuity upon ...

Страница 41: ...ndby group VRID 4 Backup VRRP Active group VRID 3 Master VRRP GE1 0 2 10 1 1 2 24 Active group VRID 4 Master VRRP Standby group VRID 3 Backup VRRP Switch B Router Switch A Internet Untrust Trust VRID 3 10 1 1 3 24 VRID 4 10 1 1 4 24 VRID 2 2 1 1 4 24 VRID 1 2 1 1 3 24 GE1 0 7 2 1 1 15 24 GE1 0 3 10 2 1 2 24 GE1 0 3 10 2 1 1 24 Host 1 IP 10 1 1 100 24 Gateway 10 1 1 3 24 Host 3 IP 10 1 1 200 24 Gat...

Отзывы: