SecBlade Firewall Cards NAT Configuration Examples

Size: px
Start display at page:

Download "SecBlade Firewall Cards NAT Configuration Examples"

Transcription

1 SecBlade Firewall Cards NAT Configuration Examples Keywords: NAT, PAT, private IP address, public IP address, IP address pool Abstract: This document describes the characteristics, applications scenarios, and configuration examples of the network address translation (NAT) features of SecBlade firewall cards. Acronyms: NAT ALG ACL VPN PAT No-PAT Acronyms Network Address Translator Application Level Gateway Access Control List Virtual Private Network Port Address Translation No-Port Address Translation Full spelling Hangzhou H3C Technologies Co., Ltd. 1/22

2 Table of Contents Feature Overview 3 Application Scenarios 3 Configuration Guide 3 Devices Supporting NAT 3 Software Version Used 3 Saving Configuration 4 NAT Configuration Examples 4 Network Requirements 5 Device Basic Configuration 5 NAT Configuration Examples 6 Easy IP 6 PAT 8 No-PAT 10 Static NAT 13 Internal server 17 NAT support for Multi-VPN 19 References 22 Protocols and Standards 22 Hangzhou H3C Technologies Co., Ltd. 2/22

3 Feature Overview NAT translates an IP address in an IP packet header to another IP address. In practice, NAT is primarily used to allow users using private IP addresses to access the Internet. With NAT, a small number of public IP addresses are used to enable a large number of internal hosts to access the Internet. Thus, NAT effectively alleviates the depletion of IP addresses. NAT protects the privacy of the internal network and enables the internal network to provide specific services for users on the Internet. The SecBlade firewall card uses a multi-core CPU, featuring excellent service processing capability and performance. It can be used as the security gateway of a large scale enterprise network to provide one-to-many, one-to-one, and internal server address translation functions. In addition, it supports multiple VPNs and the translation of VLAN interfaces addresses. Application Scenarios Using a small number of public IP addresses to enable a large number of internal hosts to access the Internet. Providing privacy for the internal network. Enabling the internal network to provide specific services for users on the Internet. Configuration Guide NAT basic configuration can be performed through the web interface. NAT supports multi-vpn, such as multi-vpn routing and multi-vpn access control list (ACL) can be configured only through the command line interface (CLI). You can configure the following NAT features through the web interface: Easy IP PAT No-PAT Static NAT NAT server Devices Supporting NAT SecBlade firewall cards on S7500E, S9500E, and S12500 Software Version Used SecBlade firewall card: Any of R3166 and F3166 series versions Hangzhou H3C Technologies Co., Ltd. 3/22

4 Saving Configuration Save your configuration in time. To do so, select Device Management > Maintenance from the navigation tree to enter the Save page, and click Apply, as shown in the following figure. NAT Configuration Examples A SecBlade firewall card inserted in an S7500E is used in this configuration example. Hangzhou H3C Technologies Co., Ltd. 4/22

5 Network Requirements Figure 1 Network diagram for configuring NAT Device Basic Configuration 1) Configuring the S7500E # Configure GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3. interface GigabitEthernet1/0/1 port access vlan 172 interface GigabitEthernet1/0/2 port access vlan 10 interface GigabitEthernet1/0/3 port access vlan 2 # Configure Ten-GigabitEthernet 2/0/1 that connects to the SecBlade firewall card. interface Ten-GigabitEthernet2/0/1 port link-type trunk port trunk permit vlan 1 to 200 2) Configuring the interfaces of the SecBlade firewall card. Select Device Management > Interface from the navigation tree. Create interfaces Ten-GigabitEthernet 0/0.2, Ten-GigabitEthernet 0/0.10, and Ten-GigabitEthernet 0/0.172 and add them to the corresponding zones. Hangzhou H3C Technologies Co., Ltd. 5/22

6 3) Configuring an ACL 4) Configure ACL 2000 to permit traffic from subnets /24 and /24 to subnet /24. Select Firewall > ACL from the navigation tree, and click Add to enter the following page: Type 2000 for ACL number. Select the match order Config. Click Apply. Click the icon of ACL 2000 to enter the ACL rule page. Click Add and configure as follows: NAT Configuration Examples Easy IP Requirements Use an ACL to permit only certain internal IP addresses to be NATed and use the public IP address of an interface as the translated source address. Configuration steps Select Firewall > NAT > Dynamic NAT from the navigation tree, to enter the page as shown in the following figure: Hangzhou H3C Technologies Co., Ltd. 6/22

7 Click Add in the Dynamic NAT field to enter the Add Dynamic NAT page. Select Ten-GigabitEthernet0/0.172 for Interface, type 2000 for ACL, select Easy IP for Address Transfer, and then click Apply. Access PC 3 in the Untrust zone from PC 2 in the DMZ zone, and perform ping, HTTP, FTP, DNS, and Telnet operations. Check the session list to view the results. Verification results The ping, HTTP, FTP, DNS, and Telnet operations are successful. Check the session list: Select Firewall > Session Table > Session Summary from the navigation tree to enter the following page: Hangzhou H3C Technologies Co., Ltd. 7/22

8 Type in the IP Address text box, and click Search to display the search results, as shown in the following figure. Configuration guidelines Remove the configuration in this example before performing other configuration. PAT Requirements Translate the source IP address of packets into an IP address in the NAT address pool and translate the source port of the packets. Configuration steps 1) Create an address pool. Select Firewall > NAT > Dynamic NAT from the navigation tree to enter the following page: Hangzhou H3C Technologies Co., Ltd. 8/22

9 Click Add in the Address Pool field to enter the Add NAT Address Pool page, as shown in the following figure. Type the address pool index, start IP address, and end IP address, and then click Apply. 2) Configure NAT PAT Select Firewall > NAT > Dynamic NAT from the navigation tree to enter the page as shown in the following figure: Hangzhou H3C Technologies Co., Ltd. 9/22

10 Click Add in the Dynamic NAT field to enter the Add Dynamic NAT page. Select Ten-GigabitEthernet0/0.172 for Interface, type 2000 for ACL, select PAT for Address Transfer, and then click Apply. Access PC 3 in the Untrust zone from PC 2 in the DMZ zone, and perform ping, HTTP, FTP, DNS, and Telnet operations. Check the session list to view the results. Verification results The ping, HTTP, FTP, DNS, and Telnet operations are successful. Check the session list: The destination IP address of the response is an IP address in the address pool, and the destination port of the response is different from the source port of the request. Type in the IP Address text box and click Search to display the search result, as shown in the following figure. Configuration guidelines Remove the configuration in this example before performing other configuration. No-PAT Requirements Translate the source IP address of a packet into an IP address in the NAT address pool without translating its source port number. Configuration steps 1) Create an address pool. Hangzhou H3C Technologies Co., Ltd. 10/22

11 Select Firewall > NAT > Dynamic NAT from the navigation tree to enter the following page: Click Add in the Address Pool field, to enter the Add NAT Address Pool page, as shown in the following figure. Type the address pool index, start IP address, and end IP address, and then click Apply. 2) Configure No-PAT. Select Firewall > NAT > Dynamic NAT from the navigation tree to enter the following page: Hangzhou H3C Technologies Co., Ltd. 11/22

12 Click Add in the Dynamic NAT field to enter the Add Dynamic NAT page. Select Ten-GigabitEthernet0/0.172 for Interface, type 2000 for ACL, select No-PAT for Address Transfer, and then click Apply. Access PC 3 in the Untrust zone from PC 2 in the DMZ zone, and perform ping, HTTP, FTP, DNS, and Telnet operations. Check the session list to view the results. Verification results The ping, HTTP, FTP, DNS, and Telnet operations are successful. Check the session list: The destination IP address (the translated address) of the session response is an IP address in the address pool and the source port of the request is not changed. Type in the IP Address text box and click Search to display the search result, as shown in the following figure. Hangzhou H3C Technologies Co., Ltd. 12/22

13 Configuration guidelines Remove the configuration in this example before performing other configuration. Static NAT Requirements Configure a static one-to-one NAT entry that does not translate the source or destination port. When an ACL is specified, the static NAT entry only translates packets permitted by the ACL. Configuration steps 1) Configure static address translation. Select Firewall > NAT > Static NAT from the navigation tree, as shown in following figure: Click Add in the Static Address Mapping field to enter the Add Static Address Mapping page. Type the internal and global IP addresses and click Apply. 2) Enable static address translation. Hangzhou H3C Technologies Co., Ltd. 13/22

14 Select Firewall > NAT > Static NAT from the navigation tree, as shown in following figure: Click Add in the Static Address Mapping field to enter the Enable Interface Static Translation page. Select Ten-GigatbitEthernet0/0.172 for Interface Name and click Apply. Access PC 3 from PC 2 and perform ping, HTTP, FTP, DNS, and Telnet operations. Check the session list. Verification result (1) is expected. 3) Create an ACL rule to control the access from the Untrust zone to the DMZ zone. By default, the SecBlade firewall card allows hosts in higher-priority security zones to access hosts in lower-priority security zones, but not vice versa. To allow an external host to access an internal host, you need to configure an interzone policy. Select Firewall > Security Policy > Interzone Policy from the navigation tree, as shown below: Click Add to enter the Add ACL Rule page, and perform the configuration to control the access from the Untrust zone to the Trust zone as shown in the figure below: Hangzhou H3C Technologies Co., Ltd. 14/22

15 In the same way, create an ACL rule to control the access from the Untrust zone to the Trust zone. The configured ACL rules are shown as follows: Access PC 2 in the DMZ zone from PC 3 in the Untrust zone, and perform ping, HTTP, FTP, DNS, and Telnet operations. Check the session list. Verification result (2) is expected. 4) Configure ACL 2000 as follows: Apply ACL 2000 to the static NAT entry. Hangzhou H3C Technologies Co., Ltd. 15/22

16 Access PC 3 from PC 2 and ping IP address Verification result (3) is expected. Access PC 2 from PC 4 and ping IP address Verification result (4) is expected. Verification results 1) The ping, HTTP, FTP, DNS, and Telnet operations are successful. Check the session list: Type in the IP Address text box and click Search to display the search result, as shown in the following figure. 2) The ping, HTTP, FTP, DNS, and Telnet operations are successful. Check the session list. The destination IP address is translated to the internal address but the destination port number keeps unchanged. Type in the IP Address text box, and click Search to display the search results. 3) PC 2 cannot access PC 3 because ACL 2000 only permits packets from subnet and denies packets from subnet ) PC 3 can access PC 2 because ACL 2000 permits packets from subnet Hangzhou H3C Technologies Co., Ltd. 16/22

17 Configuration guidelines Remove the configuration in this example before performing other configuration. Internal server Requirements Configure an internal server that provides services for external hosts. Upon receiving a request from an external host that wants to access the internal server, NAT translates the destination address and port of the request to the private IP address of the internal server and a specified destination port. Configuration steps 1) Configure an internal server. Select Firewall > NAT > Internal Server from the navigation tree to enter the page as shown below: Click Add to enter the Add Internal Server page, perform the configuration as shown in the page below, and click Apply. Hangzhou H3C Technologies Co., Ltd. 17/22

18 2) Create an ACL rule to permit access from the Untrust zone to the DMZ zone. In the same way, create another ACL to permit access from the Untrust zone to the Trust zone. Access PC 2 from PC 3 and ping public IP address Verification result (1) is expected. 3) Create ACL 2000 that denies all packets. 4) Apply ACL 2000 to the internal server as shown below: Hangzhou H3C Technologies Co., Ltd. 18/22

19 5) Access PC 2 from PC 3 and ping public IP address Verification result (2) is expected. Verification results 1) The ping operation is successful. Check the session list: Type in the IP Address text box, and click Search to display the search results. 2) The ping operation fails and the internal server does not work because ACL 2000 denies all packets. Configuration guidelines Remove the configuration in this example before performing other configuration. NAT support for Multi-VPN Requirements Easy IP is used in this example. Configuration steps Configure VPNs: 1) You can configure the VPNs in global view at the CLI as follows: Configure VPNs; Bind interfaces to VPNs; Configure VPN routes; Configure ACLs for VPNs. View Command Description [H3C] ip vpn-instance vpn1 [H3C-vpn-instance-vpn1] route-distinguisher 111:1 [H3C-vpn-instance-vpn1] vpn-target 111:1 export-extcommunity Configure a VPN instance. [H3C-vpn-instance-vpn1] vpn-target 111:1 import-extcommunity [H3C-vpn-instance-vpn1] quit [H3C] interface Ten-GigabitEthernet0/0.2 [H3C-Ten-GigabitEthernet0/ 0.2] ip binding vpn-instance vpn1 Bind the interface to the VPN instance. Hangzhou H3C Technologies Co., Ltd. 19/22

20 View Command Description [H3C-Ten-GigabitEthernet0/ 0.2] ip address Specify an IP address for the interface. [H3C-GigabitEthernet0/3] quit [H3C] interface Ten-GigabitEthernet0/0.10 [H3C- Ten-GigabitEthernet0/0.10] [H3C Ten-GigabitEthernet0/0.10] ip binding vpn-instance vpn1 ip address Bind the interface to the VPN instance. Specify an IP address for the interface. [H3C-GigabitEthernet0/1] quit [H3C] acl number 2000 [H3C-acl-basic-2000] rule permit Add an ACL rule. [H3C-acl-basic-2000] rule permit vpn-instance vpn1 Add a VPN ACL rule. [H3C] ip route-static vpn-instance vpn public Configure a VPN route to the public network. 2) Select Firewall > NAT > Dynamic NAT from the navigation tree, click Add in the Dynamic NAT field to enter the Add Dynamic NAT page, as shown in the following figure. Select Ten-GigabitEthernet0/0.172 for Interface, type 2000 for ACL, select Easy IP for Address Transfer, and then click Apply. Access PC 3 from PC 2 and perform ping, HTTP, FTP, DNS, and Telnet operations. Check the session list to view the results. Verification results The ping, HTTP, FTP, DNS, and Telnet operations are successful. Check the session list: Type in the IP Address text box and click Search to display the search result, as shown in the following figure. Hangzhou H3C Technologies Co., Ltd. 20/22

21 Configuration guidelines Remove the configuration in this example before performing other configuration. Specify a VPN instance when configuring a static NAT entry, as shown below: Specify a VPN instance when configuring an internal server. Hangzhou H3C Technologies Co., Ltd. 21/22

22 References Protocols and Standards RFC1631 RFC1918 Copyright 2010 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd. The information in this document is subject to change without notice Hangzhou H3C Technologies Co., Ltd. 22/22

SecBlade Firewall Cards ARP Attack Protection Configuration Examples

SecBlade Firewall Cards ARP Attack Protection Configuration Examples SecBlade Firewall Cards ARP Attack Protection Configuration Examples Keywords: ARP Abstract: ARP provides no security mechanism and can be easily utilized by attackers to launch attacks. The device provides

More information

SecBlade Firewall Cards Stateful Failover Configuration Examples

SecBlade Firewall Cards Stateful Failover Configuration Examples SecBlade Firewall Cards Stateful Failover Configuration Examples Keywords: Stateful failover, active/standby mode, active/active mode, data synchronization, traffic switchover Abstract: A network that

More information

SecBlade Firewall Cards Attack Protection Configuration Example

SecBlade Firewall Cards Attack Protection Configuration Example SecBlade Firewall Cards Attack Protection Configuration Example Keywords: Attack protection, scanning, blacklist Abstract: This document describes the attack protection functions of the SecBlade firewall

More information

H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5)

H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5) H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual

More information

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5)

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced

More information

H3C SecPath UTM Series. Configuration Examples. Hangzhou H3C Technologies Co., Ltd. Manual Version: 5W

H3C SecPath UTM Series. Configuration Examples. Hangzhou H3C Technologies Co., Ltd.  Manual Version: 5W H3C SecPath UTM Series Configuration Examples Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Manual Version: 5W101-20100520 Copyright 2009-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors

More information

Stateful Failover Technology White Paper

Stateful Failover Technology White Paper Stateful Failover Technology White Paper Keywords: Stateful failover, master/backup mode, load balancing mode, data synchronization, link switching Abstract: A firewall device is usually the access point

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls NAT and ALG Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATHF1000SAI&F1000AEI&F1000ESI-CMW520-R3721 SECPATH5000FA-CMW520-F3210

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

SecPath Series Firewalls Virtual Firewall Configuration Examples

SecPath Series Firewalls Virtual Firewall Configuration Examples SecPath Series Firewalls Virtual Firewall Configuration Examples Keywords: VPN instance, VRF, private address, public address, address pool Abstract: This document describes the virtual firewall implementation

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls NAT and ALG Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATH1000FE&SECBLADEII-CMW520-R3166 SECPATH5000FA-CMW520-R3206

More information

SecBlade Firewall Cards Log Management and SecCenter Configuration Example

SecBlade Firewall Cards Log Management and SecCenter Configuration Example SecBlade Firewall Cards Log Management and SecCenter Configuration Example Keywords: Syslog Abstract: This document describes the log management function of SecBlade firewall cards, and presents configuration

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls NAT and ALG Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATH1000FE&SECBLADEII-CMW520-R3166 SECPATH5000FA-CMW520-R3206

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls NAT and ALG Command Reference Part number: 5998-2639 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

HP Firewalls and UTM Devices

HP Firewalls and UTM Devices HP Firewalls and UTM Devices NAT and ALG Configuration Guide Part number: 5998-4166 Software version: F1000-A-EI: Feature 3722 F1000-S-EI: Feature 3722 F5000: Feature 3211 F1000-E: Feature 3174 Firewall

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Access Control Configuration Guide Part number: 5998-2648 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

H3C SecBlade NetStream Card Configuration Examples

H3C SecBlade NetStream Card Configuration Examples H3C SecBlade NetStream Card Configuration Examples Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any

More information

H3C SSL VPN Configuration Examples

H3C SSL VPN Configuration Examples H3C SSL VPN Configuration Examples Keywords: SSL, VPN, HTTPS, Web, TCP, IP Abstract: This document describes characteristics of H3C SSL VPN, details the basic configuration and configuration procedure

More information

SYN Flood Attack Protection Technology White Paper

SYN Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Keywords: flood, Cookie, Safe Reset Abstract: This document describes the technologies and measures provided

More information

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance Application Note Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance This application note describes how to configure a zone-based firewall on the Cisco ISA500 security appliance.

More information

H3C S7500E-X OSPF Configuration Examples

H3C S7500E-X OSPF Configuration Examples H3C S7500E-X OSPF Configuration Examples Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without

More information

Stateful Network Address Translation 64

Stateful Network Address Translation 64 The feature provides a translation mechanism that translates IPv6 packets into IPv4 packets and vice versa. The stateful NAT64 translator algorithmically translates the IPv4 addresses of IPv4 hosts to

More information

Network Address Translation Bindings

Network Address Translation Bindings In Network Address Translation (NAT), the term binding describes the address binding between a local address and the global address to which the local address is translated. A binding is also called a

More information

H3C S12500 sflow Configuration Examples

H3C S12500 sflow Configuration Examples H3C S12500 sflow Configuration Examples Copyright 2013 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Security Configuration Guide Part number: 5998-2686 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part

More information

H3C S12500 Unauthorized DHCP Server Detection Configuration Examples

H3C S12500 Unauthorized DHCP Server Detection Configuration Examples H3C S12500 Unauthorized DHCP Server Detection Configuration Examples Copyright 2013 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 Network Security Overview... 1-1 1.1 Introduction to the Network Security Features Provided by CMW... 1-1 1.2 Hierarchical Line Protection... 1-2 1.3 RADIUS-Based

More information

H3C S12500 VLAN Configuration examples

H3C S12500 VLAN Configuration examples H3C S12500 VLAN Configuration examples Copyright 2014 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without

More information

H3C SR6600 Routers DVPN Configuration Example

H3C SR6600 Routers DVPN Configuration Example H3C SR6600 Routers DVPN Configuration Example Keywords: DVPN, VPN, VAM, AAA, IPsec, GRE Abstract: This document describes the DVPN configuration example for the H3C SR6600 Routers Series. Acronyms: Acronym

More information

PKI Configuration Examples

PKI Configuration Examples PKI Configuration Examples Keywords: PKI, CA, RA, IKE, IPsec, SSL Abstract: The Public Key Infrastructure (PKI) is a general security infrastructure for providing information security through public key

More information

CCNA Course Access Control Lists

CCNA Course Access Control Lists CCNA Course Access Control Lists Access Control Lists (ACL) Traffic Filtering Permit or deny packets moving through router Permit or deny (VTY) access to or from a router Traffic Identifying for special

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any

More information

User FAQ for H3C Security Products

User FAQ for H3C Security Products User FAQ for H3C Security Products Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior

More information

Isolate-User-VLAN Technology White Paper

Isolate-User-VLAN Technology White Paper Isolate-User-VLAN Technology White Paper Keywords: Isolate-user-VLANs, secondary VLANs Abstract: Isolate-user-VLAN adopts a two-tier VLAN structure: an upper level isolate-user-vlan and multiple lower-level

More information

Advanced Security and Forensic Computing

Advanced Security and Forensic Computing Advanced Security and Forensic Computing Unit 2: Network Security Elements Dr Dr Bill Buchanan, Reader, School of of Computing. >Unit 2: 2: Network Security Elements Advanced Security and Forensic Computing

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls Attack Protection Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATHF1000SAI&F1000AEI&F1000ESI-CMW520-R3721 SECPATH5000FA-CMW520-F3210

More information

HC-711 Q&As. HCNA-CBSN (Constructing Basic Security Network) - CHS. Pass Huawei HC-711 Exam with 100% Guarantee

HC-711 Q&As. HCNA-CBSN (Constructing Basic Security Network) - CHS. Pass Huawei HC-711 Exam with 100% Guarantee HC-711 Q&As HCNA-CBSN (Constructing Basic Security Network) - CHS Pass Huawei HC-711 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved.   Worldwide Education Services Junos Security Chapter 3: Zones 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will be

More information

DHCP Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents

DHCP Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents DHCP Configuration Examples Table of Contents Table of Contents Chapter 1 DHCP Functions Overview... 1-1 1.1 Supported DHCP Functions... 1-1 1.2 Configuration Guide... 1-2 1.2.1 Configuring the DHCP Server...

More information

IPv6 ND Configuration Example

IPv6 ND Configuration Example IPv6 ND Configuration Example Keywords: IPv6 ND Abstract: This document describes the application environment and typical configuration of IPv6 ND. Acronyms: Acronym Full spelling ARP FIB Address Resolution

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks WJ Buchanan. ASMN (1) Advanced Security and Mobile Networks Unit 1: Network Security Application Presentation Session Transport Network Data Link Physical OSI Application Transport Internet Internet model

More information

PT Activity: Configuring a Zone-Based Policy Firewall (ZPF)

PT Activity: Configuring a Zone-Based Policy Firewall (ZPF) PT Activity: Configuring a Zone-Based Policy Firewall (ZPF) Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 R2 R3 Fa0/1 192.168.1.1 255.255.255.0

More information

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO Testpassport Q&A Exam : JN0-522 Title : FXV,Associate (JNCIA-FWV) Version : Demo 1 / 7 1.Address book entries identify hosts and networks by their location in relation to what? A. Network entries in the

More information

SCALANCE XM-400 / XR-500 as Static Router SCALANCE XM-400, SCALANCE XR-500 https://support.industry.siemens.com/cs/ww/en/view/109762688 Siemens Industry Online Support This entry is from the Siemens Industry

More information

Configure Basic Firewall Settings on the RV34x Series Router

Configure Basic Firewall Settings on the RV34x Series Router Configure Basic Firewall Settings on the RV34x Series Router Objective The primary objective of a firewall is to control the incoming and outgoing network traffic by analyzing the data packets and determining

More information

MAC-Based VLAN Technology White Paper

MAC-Based VLAN Technology White Paper MAC-Based VLAN Technology White Paper Keywords: MAC-based VLAN, 802.1X, MAC address authentication Abstract: As a way of grouping VLAN members, MAC address-based VLAN (MAC-based VLAN) decides the VLAN

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

EXAM - JN ACX, Specialist (JNCIS-ACX) Buy Full Product.

EXAM - JN ACX, Specialist (JNCIS-ACX) Buy Full Product. Juniper EXAM - JN0-740 ACX, Specialist (JNCIS-ACX) Buy Full Product http://www.examskey.com/jn0-740.html Examskey Juniper JN0-740 exam demo product is here for you to test the quality of the product. This

More information

CCNA Discovery 3 Chapter 8 Reading Organizer

CCNA Discovery 3 Chapter 8 Reading Organizer Name Date Chapter 8 Reading Organizer After completion of this chapter, you should be able to: Describe traffic filtering and explain how Access Control Lists (ACLs) can filter traffic at router interfaces.

More information

DHCP H3C Low-End Ethernet Switches Configuration Examples. Table of Contents

DHCP H3C Low-End Ethernet Switches Configuration Examples. Table of Contents DHCP Table of Contents Table of Contents Chapter 1 DHCP Functions Overview... 1-1 1.1 Supported DHCP Functions... 1-1 1.1.1 DHCP Functions Supported by the H3C Low-End Ethernet Switches... 1-1 1.2 Configuration

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series MCE Configuration Guide Part number: 5998-2896 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard Development

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

Configuring DHCP Features and IP Source Guard

Configuring DHCP Features and IP Source Guard CHAPTER 21 This chapter describes how to configure DHCP snooping and the option-82 data insertion features on the switch. It also describes how to configure the IP source guard feature.unless otherwise

More information

Information About NAT

Information About NAT CHAPTER 27 This chapter provides an overview of how Network Address Translation (NAT) works on the adaptive security appliance. This chapter includes the following sections: Why Use NAT?, page 27-1 NAT

More information

Sybex CCENT Chapter 12: Security. Instructor & Todd Lammle

Sybex CCENT Chapter 12: Security. Instructor & Todd Lammle Sybex CCENT 100-101 Chapter 12: Security Instructor & Todd Lammle Chapter 12 Objectives The CCENT Topics Covered in this chapter include: IP Services Describe the types, features, and applications of ACLs

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter includes the following sections: Network Address Translation Overview, on page 1 Information About Static NAT, on page 2 Dynamic NAT Overview, on page 3 Timeout Mechanisms, on page 3 NAT Inside

More information

Cisco ASA 5500 LAB Guide

Cisco ASA 5500 LAB Guide INGRAM MICRO Cisco ASA 5500 LAB Guide Ingram Micro 4/1/2009 The following LAB Guide will provide you with the basic steps involved in performing some fundamental configurations on a Cisco ASA 5500 series

More information

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter When the LAN interface is in a private IP DMZ, you can write the firewall rule-set to restrict the number of hosts the VBP can communicate with to only those devices. This enhances security. You can also

More information

Extended ACL Configuration Mode Commands

Extended ACL Configuration Mode Commands Extended ACL Configuration Mode Commands To create and modify extended access lists on a WAAS device for controlling access to interfaces or applications, use the ip access-list extended global configuration

More information

Case Study. Routing & Switching. Cisco Networking Academy Routing and Switching: Scaling Network Case Study

Case Study. Routing & Switching. Cisco Networking Academy Routing and Switching: Scaling Network Case Study Case Study Routing & Switching Cisco Networking Academy Routing and Switching: Scaling Network Case Study Overview and Objectives This case study allows students to build and configure a complex network

More information

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL Contents: UniNets CCNA Security LAB MANUAL Section 1 Securing Layer 2 Lab 1-1 Configuring Native VLAN on a Trunk Links Lab 1-2 Disabling

More information

PIX/ASA : Port Redirection(Forwarding) with nat, global, static and access list Commands

PIX/ASA : Port Redirection(Forwarding) with nat, global, static and access list Commands PIX/ASA : Port Redirection(Forwarding) with nat, global, static and access list Commands Document ID: 63872 Introduction Prerequisites Requirements Components Used Related Products Conventions Network

More information

IPv4 ACLs, identified by ACL numbers, fall into four categories, as shown in Table 1. Table 1 IPv4 ACL categories

IPv4 ACLs, identified by ACL numbers, fall into four categories, as shown in Table 1. Table 1 IPv4 ACL categories Table of Contents ACL Configuration 1 ACL Overview 1 IPv4 ACL Classification 1 IPv4 ACL Rule Order 1 Rule Numbering Step with IPv4 ACLs 3 Effective Time Period of an IPv4 ACL 3 IP Fragments Filtering with

More information

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD.

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 21 Date 2018-09-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Match-in-VRF Support for NAT

Match-in-VRF Support for NAT The feature supports Network Address Translation (NAT) of packets that communicate between two hosts within the same VPN routing and forwarding (VRF) instance. In intra-vpn NAT, both the local and global

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

Indicate whether the statement is true or false.

Indicate whether the statement is true or false. Indicate whether the statement is true or false. 1. Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall s database or violations of those rules. 2.

More information

CCNA Security PT Practice SBA

CCNA Security PT Practice SBA A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any Exam windows during the exam. 2. Do not close Packet Tracer when you are done.

More information

Configuring Network Address Translation

Configuring Network Address Translation Finding Feature Information, on page 1 Network Address Translation (NAT), on page 2 Benefits of Configuring NAT, on page 2 How NAT Works, on page 2 Uses of NAT, on page 3 NAT Inside and Outside Addresses,

More information

Configuring DHCP Features and IP Source Guard

Configuring DHCP Features and IP Source Guard CHAPTER 21 This chapter describes how to configure DHCP snooping and option-82 data insertion, and the DHCP server port-based address allocation features on the switch. It also describes how to configure

More information

Configuring Voice VLAN

Configuring Voice VLAN CHAPTER 15 This chapter describes how to configure the voice VLAN feature on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and a switch stack. Voice VLAN

More information

Multihoming with BGP and NAT

Multihoming with BGP and NAT Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

Implementing Management Plane Protection

Implementing Management Plane Protection The Management Plane Protection (MPP) feature in Cisco IOS XR software provides the capability to restrict the interfaces on which network management packets are allowed to enter a device. The MPP feature

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 6.8. AudioCodes Family of Multi-Service Business Routers (MSBR)

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 6.8. AudioCodes Family of Multi-Service Business Routers (MSBR) Configuration Guide AudioCodes Family of Multi-Service Business Routers (MSBR) Mediant MSBR Security Setup Version 6.8 Version 6.8 May 2014 Document # LTRT-31640 Configuration Guide Contents Table of

More information

Implementing Firewall Technologies

Implementing Firewall Technologies Implementing Firewall Technologies Network firewalls separate protected from non-protected areas preventing unauthorized users from accessing protected network resources. Technologies used: ACLs Standard,

More information

Information About NAT

Information About NAT CHAPTER 26 This chapter provides an overview of how Network Address Translation (NAT) works on the ASA and includes the following sections: Introduction to NAT, page 26-1 NAT Types, page 26-2 NAT in Routed

More information

Attack Prevention Technology White Paper

Attack Prevention Technology White Paper Attack Prevention Technology White Paper Keywords: Attack prevention, denial of service Abstract: This document introduces the common network attacks and the corresponding prevention measures, and describes

More information

Access Control Lists and IP Fragments

Access Control Lists and IP Fragments Access Control Lists and IP Fragments Document ID: 8014 Contents Introduction Types of ACL Entries ACL Rules Flowchart How Packets Can Match an ACL Example 1 Example 2 fragments Keyword Scenarios Scenario

More information

NAT Examples and Reference

NAT Examples and Reference The following topics provide examples for configuring NAT, plus information on advanced configuration and troubleshooting. Examples for Network Object NAT, page 1 Examples for Twice NAT, page 7 NAT in

More information

Juniper JN DX Specialist (JNCIS-DX) Download Full Version :

Juniper JN DX Specialist (JNCIS-DX) Download Full Version : Juniper JN0-730 DX Specialist (JNCIS-DX) Download Full Version : https://killexams.com/pass4sure/exam-detail/jn0-730 Answer: A, D QUESTION: 258 In the exhibit, you configure NAT-src to translate traffic

More information

Lab - Troubleshooting ACL Configuration and Placement Topology

Lab - Troubleshooting ACL Configuration and Placement Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway HQ G0/1 192.168.1.1

More information

NAT Examples and Reference

NAT Examples and Reference The following topics provide examples for configuring NAT, plus information on advanced configuration and troubleshooting. Examples for Network Object NAT, on page 1 Examples for Twice NAT, on page 6 NAT

More information

Implementing Management Plane Protection on Cisco IOS XR Software

Implementing Management Plane Protection on Cisco IOS XR Software Implementing Management Plane Protection on Cisco IOS XR Software The Management Plane Protection (MPP) feature in Cisco IOS XR software provides the capability to restrict the interfaces on which network

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls VPN Configuration Guide Part number:5998-2652 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection 21 CHAPTER This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 3560 switch. This feature helps prevent malicious attacks on the

More information

HPE IMC NTA MPLS VPN Traffic Analysis Configuration Examples

HPE IMC NTA MPLS VPN Traffic Analysis Configuration Examples HPE IMC NTA MPLS VPN Traffic Analysis Configuration Examples Part number: 5200-1404 Software version: IMC NTA 7.2 (E0401) The information in this document is subject to change without notice. Copyright

More information

IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance

IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance Objective The objective of this document to explain how to configure IPv4 firewall rules on Cisco SA540 Security Appliance. Firewall provide

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Implementing Traffic Filtering with ACLs

Implementing Traffic Filtering with ACLs Implementing Traffic Filtering with ACLs Managing Network Device Security 2013 Cisco Systems, Inc. ICND1 3-36 How can you restrict Internet access for PC2? 2013 Cisco Systems, Inc. ICND1 3-37 ACL operation

More information

Implementing NAT-PT for IPv6

Implementing NAT-PT for IPv6 Implementing NAT-PT for IPv6 Last Updated: August 1, 2012 Network Address Translation--Protocol Translation (NAT-PT) is an IPv6 to IPv4 translation mechanism, as defined in RFC 2765 and RFC 2766, allowing

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

DPtech ADX3000 Series Application Delivery Gateway User Configuration Guide

DPtech ADX3000 Series Application Delivery Gateway User Configuration Guide DPtech ADX3000 Series Application Delivery Gateway User Configuration Guide i Hangzhou DPtech Technologies Co., Ltd. provides full-range technical support. If you need any help, please contact Hangzhou

More information

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 6.8. Multi-Service Business Routers Product Series

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 6.8. Multi-Service Business Routers Product Series Configuration Guide Multi-Service Business Routers Product Series Mediant MSBR Security Setup Version 6.8 Version 6.8 May 2014 Document # LTRT-31640 Configuration Guide Contents Table of Contents 1 Introduction...

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

H3C S10500 IP Unnumbered Configuration Examples

H3C S10500 IP Unnumbered Configuration Examples H3C S10500 IP Unnumbered Configuration Examples Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means

More information

H3C S9800 Switch Series

H3C S9800 Switch Series H3C S9800 Switch Series OpenFlow Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 213x Document version: 6W101-20151130 Copyright 2015, Hangzhou H3C

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information