Eudemon Firewall Basic Function Features and Configuration ISSUE1.00
Eudemon Firewall Basic Function Features and Configuration ISSUE1.00
www.huawei.com
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page2
Objectives
⚫ Upon completion of this course, you will be able to:
Master main security technologies and features of the Eudemon
firewalls.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page3
Contents
1. Basic firewall technologies
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page4
Contents
1. Basic firewall technologies
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page5
Security Zone
⚫ The firewall divide different network based on security zones, After interfaces
are added to security zones, the firewall security check (security policy) will be
enabled between the security zones to filter the data flows that pass through
the security zone.
Untrust zone
Trust zone
Local zone
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page6
Data Flow Direction
⚫ The inter-zone data flows in the following two directions :
Inbound
Outbound outbound
Eudemon
......
Local
Internal
network External
Eth0/0/0 Eth2/0/0
network
Untrust
Trust
Eth1/0/0
......
Server Server
DMZ
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page7
Configuration of Security Zone-Topology
Description
Trust Huawei
GE 0/0/1 GE 0/0/2
172.1.1.1 10.0.0.1
⚫ as shown in the preceding ,the GE 0/0/1 interface is added to the Trust zone,
and the GE 0/0/2 interface is added to the Huawei zone. The Trust zone is a
default security zone and the Huawei zone is a user-defined security zone with
the priority of 60.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page8
Configuration of Security Zone-Configuration
Procedure
3 Add interface into zone The interface only belong to one zone at
same time
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page9
Configuration of Security-Configuration
Example
⚫ Create a user-defined zone.
⚫ Set priority
[Eudemon-zone-huawei] set priority 60 //user-defined zone must set
prority
⚫ Add interfaces to the security zone
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page10
Configuration of Security-Configuration
Verification
⚫ View configuration of firewall security zone
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page11
Packet Filtering
⚫ Currently, packet filtering mainly checks the following fields in IP packets: source
IP address, destination IP address, source MAC address, destination MAC address,
protocol, packet priority, and service type. To perform packet filtering, match
data flows with different rules.
Interzone packet filtering: Match the packets with the firewall policy.
MAC address-based packet filtering: Match the packets with the MAC address-based
ACL.
⚫ For packet filtering, there are two methods for processing the matched packets:
permit:allows the packet to pass the check of packet filtering. Then the packet is
processed by other security policies
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page12
Interzone Packet Filtering and Default
Interzone Packet Filtering
⚫ Interzone packet filtering of Eudemon firewalls controls the data flows
transmitted between security zones at different security levels. The following two
policies apply:
Interzone firewall policy
Action
Condition
packets matche The policy permits the packet through The device forwards the
interzone policys
packet.
The policy blocks the packet. The device discards the
packet.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page13
Configuring Interzone Packet Filtering -
Topology Description
Trust Huawei
GE 0/0/1 GE 0/0/2
172.1.1.1 10.0.0.1
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page14
Configuring Interzone Packet Filtering -
Configuration Procedure
Step Activity Dscription
1 Enter the interzone packet filtering policy Ignore the sequence of security
view. zones.
2 Create a policy and enter the A policy created earlier has a higher
configuration view. priority.
3 Specify the source address of the packets Optional
to match.
4 Specify the destination address of the Optional
packets to match.
5 Configure the action after packet The action can be permit or deny.
matching.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page15
Configuring Interzone Packet Filtering –
Configuration Example
⚫ Enter the interzone packet filtering policy view:
[Eudemon]policy interzone trust huawei outbound //The data flow direction is
outbound. To modify the data flow direction, change outbound to inbound.
⚫ Create a policy and enter the configuration view:
[Eudemon-policy-interzone-trust-huawei-outbound]policy 0
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page16
Configuring Interzone Packet Filtering-
Configuration Verification
⚫ Query the policy configured for interzone packet filtering :
[Eudemon]display policy interzone trust huawei outbound
policy interzone trust huawei outbound //The following contents display the interzone packet
filtering policy in the outbound direction.
firewall default packet-filter is deny //The action of default interzone packet filtering is set to
deny.
policy 0 (12 times matched) //User-defined packet filtering policy
action permit
policy service service-set ip
policy source 172.1.0.0 mask 16
policy destination 10.0.0.0 mask 8
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page17
Configuring Default Interzone Packet Filtering
- Example(1/2)
⚫ Run the display firewall packet-filter default all command to query the default
packet filtering policies:
<Eudemon>display firewall packet-filter default all
Firewall default packet-filter action is:
------------------------------------------------------------
packet-filter in public:
local -> trust :
inbound : default: permit; || IPv6-acl: null
outbound : default: permit; || IPv6-acl: null
local -> untrust :
inbound : default: deny; || IPv6-acl: null
outbound : default: deny; || IPv6-acl: null
local -> dmz :
inbound : default: deny; || IPv6-acl: null
outbound : default: deny; || IPv6-acl: null
trust -> untrust :
inbound : default: deny; || IPv6-acl: null
outbound : default: deny; || IPv6-acl: null
trust -> dmz :
inbound : default: deny; || IPv6-acl: null
outbound : default: deny; || IPv6-acl: null
dmz -> untrust :
inbound : default: deny; || IPv6-acl: null
outbound : default: deny; || IPv6-acl: null
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page18
Configuring Default Interzone Packet Filtering
- Example (2/2)
⚫ query the default packet filtering action configured for the two specific security
zones:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page19
Configuring Default Interzone Packet Filtering
- Configuration Procedure and Example
⚫ See the following figure for the steps to modify the default packet filtering
policies :
2 Configure the default packet Set the data flow direction to inbound
filtering policies or outbound.
<Eudemon>system-view
[Eudemon]firewall packet-filter default permit interzone trust huawei
direction inbound // //The word following direction indicates the direction of the data
flow that is inbound or outbound.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page20
Configuring Default Interzone Packet Filtering-
Configuration Verification
⚫ Query the packet filtering policies configured for the inbound direction.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page21
Session Table
⚫ A session table is established to record the source IP address, source
port, destination IP address, destination port, and protocol number. If
the firewall has the virtual firewall (VFW) function, the VPN-ID is also
included.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page22
Session Table-Example
⚫ For example, server A at 192.168.1.1 sends a TCP connection request through
port 20000 to server B at 1.1.1.1 which uses port 30000 to provide services. A
session table is established when the initial packet is sent. The following table
lists related information :
Source ip address Source port Destination ip address Destination port protocol
⚫ Server B sends a response packet after receiving the TCP connection request
from server A. The following table lists the quintuple of such packet:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page23
Querying a Session Table(1/2)
Trust Huawei
GE 0/0/1 GE 0/0/2
172.1.1.1 10.0.0.1
⚫ After the configuration is complete, PC1 and PC2 can normally communicate
with each other. After the first connection is established, the information about
the session table can be queried.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page24
Querying a Session Table (2/2)
⚫ run the display firewall session table verbose command on the firewall to query the
information about the session table:
<Eudemon>display firewall session table verbose
Current Total Sessions : 1
icmp VPN:public --> public // protocol
Zone: trust--> huawei TTL: 00:00:20 Left: 00:00:15 //Data flow direction
and aging time
Interface: GigabitEthernet0/0/2 NextHop: 10.0.0.2 MAC: 90-fb-a6-09-
0f-6d //Outbound interface, next hop, and MAC address
<--packets:4 bytes:240 -->packets:4 bytes:240 /Number of passed packets
172.1.1.2:768-->10.0.0.2:2048 //Source IP address, source port, destination IP, and
destination port
⚫ The query results show the quintuple and other information contained in the session table
and show that the data flow from PC1 to PC2 matches the session table.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page25
Persistent Connection
⚫ A persistent connection means that a longer aging time is configured for
some sessions to ensure that they will not be deleted in a long time.
When users need to query the data on the database server, the time
required is much longer than the aging time set for the TCP session .
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page26
Persistent Connection-Topology Description
Trust Huawei
GE 0/0/1 GE 0/0/2
172.1.1.1 10.0.0.1
⚫ Enable the FTP service on PC2, and set persistent connection for PC1 access to
FTP services on PC2. The aging time is set to two hours.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page27
Configuring the Persistent Connection-
Configuration Procedure
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page28
Configuring the Persistent Connection-
Configuration Example
⚫ Set the aging time for the persistent connection:
[Eudemon]firewall long-link aging-time 2
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page29
Configuring the Persistent Connection-
Configuration verification
⚫ After PC1 accesses the FTP services on PC2, query the session table:
⚫ The query results include the LongLink field, and the TTL is modified to two
hours
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page30
Hands-on Exercises
Untrust DMZ
GE 0/0/1 GE 0/0/2
172.1.1.1/16 10.0.0.1/8
PC1 Server
172.1.1.2/16 Eudemon 10.0.0.2/8
⚫ The PC1 belongs to the Untrust zone and the server belongs to the DMZ zone.
The figure shows corresponding interfaces and IP addresses. Configure PC1
telnet server and the persistent connection of one hour. Then query the
information about the session table.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page31
Interface Mode
⚫ The Ethernet interfaces are classified as follows according to the
location:
Layer 2 Ethernet interfaces: on the data link layer. These interfaces identify
the data frame according to the MAC address, and support layer 2 features
such as VLA.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page32
Changing the Interface Mode
-Configuration Example
⚫ In the interface view, run the portswitch command to change layer 3 interfaces
to layer 2 interfaces.
[Eudemon]interface GigabitEthernet 0/0/8
[Eudemon-GigabitEthernet0/0/8]portswitch
⚫ Change the interface mode in batches in the system view
<Eudemon>system-view
[Eudemon]portswitch batch GigabitEthernet 0/0/5 to 0/0/7
⚫ Run the undo command to change layer 2 interfaces to layer 3 interfaces
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page33
Changing the Interface Mode
-Configuration Verification
⚫ Run the display interface command to query the interface state:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page34
Contents
1. Basic firewall technologies
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page35
ASPF Concept
⚫ Application Specific Packet Filter (ASPF) is a function that the system
analyzes the packet payload, identifies a negotiated port according to
the multi-channel protocol, and establishes a record in the server-map
automatically to forward multi-channel protocol packets.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page36
ASPF Example
⚫ If the file is transferred through the FTP port, select a data channel port
ID (such as 2165) on the FTP client, and send the selected port ID over
the control channel to the FTP server. Then the FTP server initiates a
data connection to this port. If the ASPF function is configured, the
following server-map record is established.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page37
Server-map Table
⚫ The server-map table introduces only a few key fields to indicate the
connection state of some special services.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page38
Importance of the Server-map Table to Data
Forwarding
⚫ If a packet which matches no record in the session table passes the
security policy check, the system queries the server-map table before
configuring a route for the packet. Querying the server-map table is
intended to:
Check and confirm the connection state of the packet again.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page39
Example of the Server-map Table to Data
Forwarding(1/2)
⚫ If the file is transferred through the FTP port, the IP address of server A is
192.168.1.1, and server A sends an FTP connection request to server B through
port 20000. The IP address of server B is 1.1.1.1, and the port ID of server B is
21. The configured packet filtering policy permits the connection request from
server A at 192.168.1.1 to server B at 1.1.1.1 through port 21.
⚫ After the packet passes the security policy check, the system establishes a
record in the session table.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page40
Example of the Server-map Table to Data
Forwarding (2/2)
⚫ server A randomly select the data channel port 2165, and sends the port ID to
the FTP server through the control channel. After receiving the packet, the
system establishes a record in the server-map table.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page41
Relationship Between ASPF and Server-map
Table
⚫ The ASPF is mainly used to parse the application layer data to identify all
information contained in the payload, and provide basis for the system to
establish access rules.
⚫ Because the packet structure and negotiation mode vary with various protocols,
the Eudemon firewalls currently identify only certain types of protocols .
⚫ After the information identified using ASPF, the record will be established in
server-map commonly.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page42
Configuring ASPF-Topology Description
FTP Server
10.0.0.2/24
DMZ
10.0.0.0/24
PC1
GE 0/0/1 GE 0/0/2
Trust Untrust
192.168.1.0/24 1.0.0.0/24
Eudemon
⚫ The Eudemon firewalls are connected to the outbound interface on the internal
network that provides the FTP services. The interzone packet filtering policy and
ASPF function are configured to ensure that employees can access the FTP
server.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page43
Configuring ASPF-Configuration
Procedure
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page44
Configuring ASPF-Configuration Example
⚫ After the security policy is configured, access the FTP server. The PC can
successfully access the FTP server, but fails to read the data on the
server because the security policy does not permit the establishment of
the data channel.
⚫ Access the FTP server again. The PC can read the data on the FTP server
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page45
Configuring ASPF-Configuration Example
⚫ Query the server-map table on the firewall:
[Eudemon]display firewall server-map
server-map item(s) ------------------------------------------------
ASPF, 10.1.1.2 -> 192.168.1.2:1255[ANY], Zone: ---
Protocol: tcp(Appro: ftp-data), Left-Time: 00:00:25, Addr-Pool:
VPN: public -> public
⚫ Query the session table on the firewall:
<Eudemon>display firewall session table verbose
Current Total Sessions : 2
ftp VPN:public --> public
Zone: trust--> dmz TTL: 00:10:00 Left: 00:10:00
Interface: GigabitEthernet0/0/3 NextHop: 10.1.1.2 MAC: 90-fb-a6-09-0f-6d
<--packets:7 bytes:471 -->packets:11 bytes:492
192.168.1.2:1256+->10.1.1.2:21
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page46
Questions
⚫ SINGLE-CHOICE QUESTIONS:
Which command is used to query the aging time of the session
( ).
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page47
Contents
1. Basic firewall technologies
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page48
Blacklist
⚫ The blacklist is a set of IP addresses. The firewall discards all packets
from the IP addresses in the blacklist.
Static blacklist: The administrator can manually add IP addresses to the
blacklist one by one by using command lines or Web.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page49
Configuring Blacklist-Topology Description
Trust Untrust
LAN Internet
GE 0/0/1 GE 0/0/2
Eudemon
⚫ The Eudemon firewalls are connected to the outbound interface on the internal
network. Currently, different IP addresses have done a port scanning against
the internal network. Measures need to be taken to defend the attack. The IP
address 1.1.1.3 attacks the internal network for many times. The system is
expected to block all packets from this IP address.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page50
Configuring Backlist-Configuration Procedure
3 Configure a dynamic
blacklist
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page51
Configuring Backlist-Configuration Example
⚫ Configuring static blacklist
[Eudemon] firewall blacklist enable //enable the blacklist function first
[Eudemon] firewall blacklist item 1.1.1.3
[Eudemon] firewall defend port-scan enable //Enable the function of port scanning
attack defense.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page52
Configuring Backlist-Configuration
Verification
⚫ Query the blacklist:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page53
MAC Address Binding
⚫ IP address and MAC address binding means that the firewall establishes
mapping between IP addresses and MAC addresses.
After receiving a packet, the firewall queries the MAC address in the
mapping table according to the source IP address of the packets, and
compares it with the source MAC address contained in the packet header. If
they are inconsistent, the packet is deemed as an invalid packet and should
be discarded.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page54
Configuring MAC Address Binding
-Configuration Example
⚫ Enable the MAC address binding.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page55
MAC Address Binding-Configuration
Verification
⚫ Check whether the MAC address binding is enabled
[Eudemon]display firewall mac-binding enable
Mac-binding is enabled //The MAC address binding is enabled
⚫ Query the current binding on the firewall
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page56
Port Mapping
⚫ Port mapping allows a user to identify the packets destined for non-
well-known ports as well-known protocol packets.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page57
Configuring Port Mapping-Topology
Description B:Web Server A:FTP Server
10.0.0.2/24 10.0.0.3/24
DMZ
10.0.0.0/24
PC1
GE 0/0/3
10.0.0.1/24
Trust Untrust
192.168.1.0/24 GE 0/0/1 GE 0/0/2 1.0.0.0/24
192.168.1.1/24 1.0.0.1/24
Eudemon
⚫ The internal server A of a company wants to provide FTP services for the external network
by using port 21000. The data packets transmitted from the Trust zone to port 21000 at
10.1.1.0 are regarded as FTP packets for accessing the internal server. In this way, the
security level is improved to a certain extent.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page58
Configuring Port Mapping-Configuration
Procedure and Example
⚫ Configuration procedure
⚫ Configuration example
Configure the port mapping function to process the packets transmitted to port
21000 at 10.1.1.1 as FTP packets.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page59
Configuring Port Mapping-Configuration
Verification
⚫ Run the display port-mapping command to view the current port mapping
table configured in the system.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page60
IDS
⚫ Intrusion detection system (IDS) functions:
Monitor and analyze all data packets on the network in real time.
Discover exceptions and automatically cut off connections to the network or interact
with the firewalls to call other programs for exception handling.
⚫ IDS advantages:
Monitor and analyze all data packets on the network in real time. Discover and
process data packets captured in real time.
Summarize and analyze network events recorded by the system. Discover exceptions
and automatically cut off connections to the network or interact with the firewalls to
call other programs for exception handling.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page61
Interacting With IDS
⚫ the Eudemon firewalls open related interfaces for interacting with other
security software for the purpose of building a secure network.
⚫ IDSs which can interact with Eudemon firewalls include: Venustech IDS,
LinkTrust IDS, KINGNET IDS, and Huawei NIP IDS.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page62
Interacting With IDS -Topology Description
(1/2)
Eudemon
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page63
Interacting With IDS-Topology Description
(2/2)
⚫ The firewalls define security zones (as shown in the preceding figure),
and the IDS monitors the data destined for the DMZ. Based on the
traffic mirrored to the NIP IDS by using the port mirroring
technology,the IDS detects exceptions and notifies the system manager
by reporting an alarm or interacts with the firewalls which can block the
related attack stream.
The authentication type and authentication key of Eudemon firewalls and the IDS
server are MD5 and abcdef123 respectively。
Eudemon firewalls communicate with the IDS server through port 30000.。
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page64
Interacting With IDS-Configuration Procedure
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page65
Interacting With IDS-Configuration Example
⚫ Configure the IP address of the IDS server
⚫ Configure the port number for communication between Eudemon firewalls and
the IDS server
⚫ Configure the authentication type and the authentication key for Eudemon
firewalls:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page66
Interacting With IDS-Configuration
Verification
⚫ View the IDS configuration:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page67
Hands-on Exercises(1/2)
Server
10.0.0.2/24
DMZ
10.0.0.0/24 Web Server
10.0.0.2/24
PC1
GE 0/0/3
10.0.0.1/24
Trust Untrust
192.168.1.0/24 GE 0/0/1 GE 0/0/2 1.0.0.0/24
192.168.1.1/24 1.0.0.1/24
Eudemon
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page68
Hands-on Exercises(2/2)
Bind IP addresses to MAC addresses to prevent ARP attacks;
Configure the dynamic blacklist and set the threshold of the port scanning
rate to 6000 pps. Add PCs with the IP address scanning rate greater than
4000 pps to the blacklist. The blacklist timeout period is 20 minutes;
If the PC at 1.0.0.10 often sends attack packets to the server, add it to the
blacklist ;
Servers in the DMZ provide FTP services through port 2121 and provide
HTTP services through port 8080 。
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page69
Contents
1. Basic firewall technologies
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page70
SLB
⚫ Server load balancing (SLB) assigns the user traffic for accessing the same IP
address among different servers according to the pre-configured load balancing
algorithm.
⚫ This function resolves the problem of limited processing capability of one server.
The load balancing algorithms used include source hashing scheduling, round-
robin scheduling, and weighted round robin scheduling.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page71
Configuring SLB-Topology Description
server 1
10.1.1.3/24
GE0/0/1 GE0/0/2
202.2.2.1/24 10.1.1.1/24
PC
Eudemon
202.2.2.3/24 vip 202.2.2.2 Switch
server2 server3
10.1.1.4/24 10.1.1.5/24
⚫ In the internal DMZ, there are three real servers which can provide FTP services for the
external network. The IP addresses are 10.1.1.3/24, 10.1.1.4/24, and 10.1.1.5/24
respectively. The external virtual IP address is 202.2.2.2. PCs are in the Untrust zone on the
external network and configured with the SLB function for ensuring load balancing among
servers
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page72
Configuring SLB-Configuration Procedure
Step Acticity Dscription
1 Configure IP addresses, security See the preceding sections for related contents.
zones and interzone policies.
2 Enable the SLB function. Enable the SLB function and configure the IP
addresses for real servers.
3 Configure real servers and add Configure the group name and add real servers to
them to the load balancing group. the group.
4 Configure virtual servers. Configure IP addresses and ports for virtual servers
and ports for real servers.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page73
Configuring SLB-Configuration Example
⚫ Enable the SLB function :
[Eudemon] slb enable
[Eudemon] slb
[Eudemon-slb] rserver 1 rip 10.1.1.3 //Configure the IP addresses for real servers
[Eudemon-slb] rserver 2 rip 10.1.1.4
[Eudemon-slb] rserver 3 rip 10.1.1.5
⚫ Configure real servers and add them to the load balancing group :
[Eudemon-slb] group test //The group name is test
[Eudemon-slb-group-test] addrserver 1
[Eudemon-slb-group-test] addrserver 2
[Eudemon-slb-group-test] addrserver 3 //Add server 1, server 2, and server 3 to the
test group.
⚫ Configure IP addresses and ports for virtual servers and ports for real servers
[Eudemon-slb] vserver test vip 202.2.2.2 group test tcp vport 21 rport
21
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page74
Configuring SLB-Configuration Verification
⚫ After the configuration is complete, when a PC in the Untrust zone
accesses the server in the DMZ by using the IP address of 202.2.2.2/24
of the virtual server, information about the session table can be queried
by running the following command. The query results that there are
three sessions on the real server show that Eudemon firewalls assign
the traffic destined for the FTP server to multiple servers。
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page75
VFW
⚫ One Eudemon firewall is logically divided into multiple VPN instances
based on VFW(virtual-firewall) technology to provide independent
security services for multiple small internal networks.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page76
Configuring VFW-Topology Description(1/2)
VFW1 VFW1
Trust Untrust
VFW2 VFW2
Trust
Eudemon Untrust
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page77
Configuring VFW-Topology Description (2/2)
⚫ The Eudemon firewall can lease VFWs to multiple enterprises. For
example, it leases VFW1 to enterprise A and VFW2 to enterprise B .
Both the two internal networks can be divided into the Trust zone and the
Untrust zone. Users on the internal network are grouped into the Trust zone
while users on the external network are grouped into the Untrust zone .
Users in the Trust zone access the external network by using public IP
addresses .
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page78
Configuring VFW-Configuration Procedure
3 Add interfaces to the security Interfaces and security zones should be connected
zone on VFW1. to the same firewall
4 Configure interzone packet similar to that of common interzone policies
filtering policies for the VFW.
5 Configure the NAT. The VFW can only use addresses in its address pool
when communication with each other. Therefore,
the address pool and VFW1 should be bound during
the configuration of the address pool
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page79
Configuring VFW-Configuration Example
(1/3)
⚫ Configure VFW1:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page80
Configuring VFW-Configuration Example
(2/3)
⚫ Add interfaces to the security zone on VFW1 :
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page81
Configuring VFW-Configuration Example
(3/3)
⚫ Configure NAT Outbound to enable users in the Trust zone to access the
networks deployed in the Untrust zone with the public IP address
ranging from 2.1.1.5 to 2.1.1.10:
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page82
Configuring VFW-Configuration Verification
⚫ Ping the PC at 2.1.1.2/24 in the Untrust zone from the PC at 10.1.1.2/24
in the Trust zone on VFW1 and VFW2 and query the information about
the session table
<Eudemon> display firewall session table verbose
Current total sessions : 2
icmp VPN:vfw1 --> vfw1
Zone: trust--> untrust TTL: 00:00:20 Left: 00:00:05
Interface: GigabitEthernet 0/0/4 NextHop: 2.1.1.1 MAC: 00-e0-4c-83-
8c-5c
<--packets:4 bytes:240 -->packets:4 bytes:240
10.1.1.2:768[2.1.1.5:2048]-->2.1.1.2:2048
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page83
Questions
⚫ Why is the nat address-group 1 address- pool vpn-instance vfw-name
command executed in the system view during the configuration of NAT
Outbound for a VFW? ( )。
A. Enable different VFWs to use one public address pool.
C. The VFW can only use addresses in its address pool in the case of communication with
the external network. Therefore, the address pool and VFW1 should be bound during
the configuration of the address pool.
D. Configure a proper address pool for VFWs so that VFWs can find the corresponding
public IP address during the NAT.
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page84
Summary
⚫ What is a security zone?
Copyright © 2011 Huawei Technologies Co., Ltd. All rights reserved. Page85
Thank you
www.huawei.com