Huawei esight LogCenter Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date PUBLIC
|
|
- Reynold Hopkins
- 6 years ago
- Views:
Transcription
1 Huawei esight LogCenter Technical White Paper Issue 1.0 Date PUBLIC HUAWEI TECHNOLOGIES CO., LTD.
2 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China support@huawei.com i
3 Contents Contents 1 Summary Introduction Solution LogCenter Overview Functions System Composition Typical Networking Centralized Networking Distributed Networking Key Technical Principles Unified Log Management Log Storage Solution Intelligent Log Search Experience Application Scenarios Network-wide Log Audit NAT Source Tracing Security Service Analysis (Including Online Behavior Management) Authentication Fault Locating Performance Indicators Conclusion A Acronyms and Abbreviations ii
4 1 Summary 1 Summary The LogCenter is Huawei log management platform in the B/S architecture. It collects logs from devices, especially security devices, and analyzes security services. Therefore, it applies to many application scenarios, such as unified log management and analysis, network address translation (NAT) source tracing, and enterprise employee online behavior analysis. This document describes LogCenter functions and solutions. 1
5 2 Introduction 2 Introduction The LogCenter provides log management for Huawei all series devices and a large number of third-party devices by collecting logs from the devices and analyzing the logs in a fine-grained manner. Based on high-performance session log processing, the LogCenter provides an industry-leading NAT source tracing solution. The distributed architecture provides log collection, storage, and audit for an entire enterprise network. The LogCenter supports massive logs and helps rapidly understand network security conditions and user online behavior by providing service analysis reports based on device logs. Security threats can be rapidly detected and removed, improving enterprise working efficiency. 2
6 3 Solution 3 Solution 3.1 LogCenter Overview Functions Based on high-performance session log processing, the LogCenter provides an industry-leading NAT source tracing solution. The distributed architecture provides log collection, storage, and audit for an entire enterprise network. The LogCenter supports massive logs and helps rapidly understand network security conditions and user online behavior by providing service analysis reports based on device logs. Security threats can be rapidly detected and removed, improving enterprise working efficiency. NAT source tracing The LogCenter provides an industry-leading NAT source tracing solution. This solution applies to wireless and fixed networking scenarios, using call detail records (CDRs) to trace users. Log audit The distributed architecture allows the LogCenter to collect, store, and audit logs on an entire enterprise network. In addition, the LogCenter supports massive logs. Manageable log sources cover Huawei all series devices and a large number of third-party devices. The LogCenter supports most popular log formats and can rapidly collect, store, and audit logs. Security service analysis (including online behavior management) By efficiently collecting device logs, the LogCenter enables you to learn the running status of devices in a timely manner, trace user online behavior, and rapidly identify and eliminate security threats. Syslogs on Huawei firewalls are collected and analyzed in real time. If an attack occurs or abnormal traffic is detected, an alarm is sent to help rapidly identify and eliminate security threats. By collecting and analyzing session and security logs from Huawei firewalls, the LogCenter can trace online behavior of point-to-point (P2P), , hypertext transfer protocol (HTTP), Microsoft service network (MSN), and Tencent QQ users, analyze online behavior and application duration and traffic volume, and manage online behavior. Diversified reports are provided for Huawei firewalls to help understand real-time and historical security information about the devices and network attack conditions. 3
7 3 Solution System Composition Figure 3-1 shows LogCenter composition. Figure 3-1 LogCenter composition Table 3-1describes component functions. Table 3-1 Component functions and external interfaces Component Function External Interface Graphical user interface (GUI) Log server Log collector Is a unified platform for you to query logs, alarms, and reports. You can configure policies on the GUI. Provides log query, secondary log collection and analysis, statistical reports, security policy management, and user management. Collects, classifies, filters, sums up, and collects statistics on security device logs. Hypertext transfer protocol (HTTP)/Hypertext transfer protocol secure (HTTPS) Simple object access protocol (SOAP) 4
8 3 Solution 3.2 Typical Networking Centralized Networking Figure 3-2 LogCenter server and collector deployed in centralized mode The centralized networking applies to scenarios where there are a few devices deployed comparatively close to each other with less than 160,000 Events Per Second (EPS) session logs or 7000 EPS text logs. In this case, the LogCenter server and collector are deployed on one device. The centralized networking is cost-effective and applies to small networks on which devices are deployed in centralized mode. Consider the following factors when selecting this networking mode: Networking of managed NEs In centralized networking, it is recommended that managed NEs be deployed on the same local area network (LAN). If the NEs are deployed on a wide area network (WAN), mass log information occupies WAN bandwidth, affecting service running. Number of logs It is recommended that the number of logs generated on managed NEs does not exceed the processing capability of a log collector in centralized networking. If the log information amount on the live network exceeds the processing capability of a log collector, the server and the log collector must be deployed in distributed mode. One log collector can process 160,000 EPS session logs, 7000 EPS text logs (including syslogs and file transfer protocol (FTP)/secure file transfer protocol (SFTP) logs), or 20,000 EPS binary dataflow logs. 5
9 3 Solution Distributed Networking Figure 3-3 LogCenter server and collector deployed in distributed mode The distributed networking applies to scenarios where there are many scattered NEs with more than 160,000 EPS logs. The network administrator can configure one LogCenter server and more than 30 log collectors, which can be horizontally extended. Adding one collector can process more 160,000 EPS logs. The distributed networking applies to medium and large networks. Consider the following factors when selecting this networking mode: Networking of managed NEs NEs are distributed in multiple areas that are connected through a WAN. A log collector is deployed in each area to prevent mass log information from occupying bandwidth and reduce the cost of bandwidth rental. Number of logs If the log information amount on the live network exceeds the processing capability of a log collector, the server and the log collector must be deployed in distributed mode. One log collector can process 160,000 EPS session logs, 7000 EPS text logs (including syslogs and FTP/SFTP logs), or 20,000 EPS binary dataflow logs. Number of external disk chassis The storage cost of the server is lower than that of disk chassis. You can configure multiple log collectors to increase the storage space of the server and avoid or reduce disk chassis. 6
10 3 Solution 3.3 Key Technical Principles Unified Log Management Logs are from different types of devices and application programs. Log formats and collection modes differ a lot, such as syslogs, NAT logs, SFTP, and FTP. Therefore, unified log management is necessary. Figure 3-4 Log processing As shown in the previous figure, logs are processed in the following steps: Log collection The LogCenter receives and collects the logs generated on devices and application programs by multiple means. It also supports non-proxy log collection. It can use FTP and SFTP to collect binary and text logs. Log classification The LogCenter provides a simple and effective log classification method based on accumulated experience on device and application system logs. Logs of the same class use the same log structure, facilitating log query and analysis. Log formatting The LogCenter uses patented technology to format logs. Formatting rules support rapid upgrades. Log formatting converts heterogeneous logs into a unified log format. Log filtering The LogCenter can filter logs based on configured filtering policies. Unnecessary information is discarded to save disk space and provide log analysis performance. Log storage The LogCenter stores logs in the file database. Compared with the relational database, the file database has higher throughput and consumes less resources, meeting the massive data storage requirement. Log statistics The LogCenter needs to export a large number of log analysis reports complying with preventive maintenance inspection requirements and regulations. By analyzing formatted log data, the LogCenter records analysis results in the database, supporting rapid log report export. 7
11 3 Solution Log analysis Log Storage Solution Rapid detecting security events from massive logs is a major function of the LogCenter. The LogCenter provides policy-based log correlation analysis. If one or multiple logs complying with a policy are detected, the LogCenter notifies the administrator of the events by means of messages, short messages, or alarm sound. To store massive logs and save disk space, the LogCenter uses a 3-level log storage solution to ensure that log data can be stored for a long time and reduce log storage costs. On the LogCenter, log files are classified into the following types based on log lifetime: Online log Log data is not compressed. You can rapidly query online logs, but they consume large disk space. This storage mode applies to new logs. You can set the storage period for online logs based on user query habits. Dumped log When online logs reach a configured threshold (the storage period or disk space usage), the LogCenter compresses and dumps them. Generally, dumped logs consume only 1/4 of the disk space consumed before they are compressed. Backup log To meet long-term log storage requirements, you can store logs to cheaper storage devices. The LogCenter can re-import backup logs for query. The following figure shows the log file conversion process. Figure level log storage solution Intelligent Log Search The LogCenter supports keyword-based word segmentation and indexes. This function is implemented on log collectors that can be deployed in distributed mode. In addition, the LogCenter provides log query similar to that on a search engine and can drill and collect statistics on query results. 8
12 4 Experience 4 Experience 4.1 Application Scenarios Network-wide Log Audit Many routers, switches, and firewalls are deployed on an enterprise network. Different types of NEs generate logs in different formats, causing poor log readability. Massive logs are hardly stored, and the logs cannot be managed in a unified manner. As a result, the network management system cannot rapidly detect critical security threats from logs. The LogCenter can manage logs in a unified manner. It can collect binary and text logs using SFTP and FTP. In addition, the LogCenter can collect, classify, filter, sum up, analyze, store, and monitor logs reported by NEs to help you manage massive logs, understand NE operating status, trace user online behavior, and rapidly identify and eliminate security threats. Based on log management, the LogCenter analyzes logs in real time to provide real-time alarms. Figure 4-1 Security event management scenario 9
13 4 Experience NAT Source Tracing NAT is widely used on various types of Internet access modes and networks. NAT addresses the IP address shortage issue and effectively prevents external network attacks by hiding internal network PCs. NAT brings another issue: Hosts in an enterprise share one IP address, and therefore it is difficult to trace the responsible person for an online violation. The LogCenter collects and analyzes session logs from gateways, such as Eudemons, Unified Security Gateways (USGs), MA5200Gs, NE40s, NE80s, and ME60s, to obtain NAT information, including destination IP addresses, destination ports, source IP addresses before NAT, and protocols. With the help of traffic logs, the LogCenter can trace online behavior of users in the enterprise. Figure 4-2 NAT source tracing scenario NAT source tracing involves multiple IP addresses and ports, including the source IP address, source port, destination IP address, destination port, source IP address after NAT, source port after NAT, destination IP address after NAT, and destination port after NAT. The following example explains field meanings in port address translation (PAT) mode. Figure 4-3 IP address translation example for source tracing The internal user at accesses the external HTTP server at through NAT. The addresses and ports in the session are as follows: 10
14 4 Experience Source IP address/source port: :64244 Destination IP address/destination port: :80 Source IP address after NAT/source port after NAT: :57841 Figure 4-4 IP address translation example in NAT server mode The external user at accesses the internal HTTP server at The NAT device has mapped the internal HTTP server. The addresses and ports in the session are as follows: Source IP address/source port: :57841 Destination IP address/destination port: :8080 Destination IP address after NAT/destination port after NAT: :80 NAT can be implemented in three modes: static NAT, dynamic NAT, and PAT. Static NAT: Private IP addresses are translated into public IP addresses. A private IP address corresponds to a fixed public IP address. Dynamic NAT: Private IP addresses are randomly translated into public IP addresses. A private IP address of a user is translated into any valid public IP address before the user accesses the Internet. PAT: The source port is a packet destined for the Internet is translated into another. All hosts on an internal network can share one valid public IP address for Internet access, greatly saving IP address resources and hiding internal hosts to effectively prevent attacks from the Internet. This mode applies to most networks Security Service Analysis (Including Online Behavior Management) To manage enterprise employee online behavior, the LogCenter collects and analyzes session and security logs from NEs, such as firewalls, to trace and analyze employee online behavior (top N online traffic, top N online duration, web access analysis, and analysis). The LogCenter provides user-based analysis and query of online traffic, online duration, searched keywords, web access, sending and receiving, online applications, network threats, and file sending. The enterprise management personnel can manage employees based on online behavior analysis results. 11
15 4 Experience Figure 4-5 Enterprise employee online behavior management scenario Authentication Fault Locating Customer pain points: The employees of an enterprise must access a remote authentication dial in user service (RADIUS) server through access devices before accessing their enterprise network. There are many access devices, including switches and wireless local area network (WLAN) access controllers (ACs), generating a large number of logs. Logs cannot be queried on one device. Access device logs and RADIUS server authentication logs cannot be associated for query. If a fault occurs (for example, an access failure), the maintenance personnel must obtain logs from multiple devices and manually associate and analyze the logs with low efficiency. The customer hopes that there is a centralized device storing all switch authentication logs, WLAN authentication logs, and RADIUS authentication logs, providing keyword-based rapid query, and associating access device authentication logs and RADIUS server authentication logs. LogCenter solution: The LogCenter provides keyword-based indexes and intelligent search capabilities. It allows unified indexes among switch authentication logs, WLAN authentication logs, and RADIUS server authentication logs. The LogCenter has a search engine-like GUI, allowing you to query multiple types of logs within a given time range. In addition, query conditions can be 12
16 4 Experience regular expressions, associating multiple types of logs. Query results can be drilled and counted based on log types. 4.2 Performance Indicators Table 4-1 LogCenter technical specifications Item Sub-item Description Log performance indicator Log processing capability Binary session logs: 160,000 EPS Text logs: 7000 EPS Binary dataflow logs: 20,000 EPS You can add hardware to improve the log processing capability. One standard-configured log collector can collect 160,000 EPS binary logs or 7000 EPS text logs. 13
17 5 Conclusion 5 Conclusion The LogCenter supports log management for Huawei all series devices. It provides comprehensive log collection and service analysis capabilities. Therefore, it applies to many application scenarios for unified log management and analysis, NAT source tracing, and enterprise employee online behavior analysis. Deploying the LogCenter reduces IT system maintenance costs, enhances timely response capabilities to faults and security events occurring on Huawei security devices, helps enterprises cope with regulation compliance checks, and improves IT system auditability. 14
18 HUAWEI esight Technical White Paper (LogCenter) A Acronyms and Abbreviations A Acronyms and Abbreviations Figure A-1 Acronyms and abbreviations for the LogCenter Abbreviation EPS NAT FTP SFTP SOAP HTTP HTTPS Full Spelling Event per second Network Address Translation File Transfer Protocol Secure File Transfer Protocol Simple Object Access Protocol Hypertext Transfer Protocol Hypertext Transfer Protocol over Secure Socket Layer 15
AD SSO Technical White Paper
Issue V1.0 Date 2017-02-28 Huawei Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationHUAWEI Secospace USG Series User Management and Control White Paper
Doc. code HUAWEI Secospace USG Series User Management and Control White Paper Issue 1.0 Date 2014-03-27 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved.
More informationesight V300R001C10 SLA Technical White Paper Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
V300R001C10 Issue 01 Date 2013-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationHuawei Enterprise Network esight Channel Sales Guide HUAWEI TECHNOLOGIES CO., LTD. Issue 3.2. Date
Huawei Enterprise Network esight Channel Sales Guide Issue 3.2 Date 2013-11-20 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any
More informationHUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date
HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or
More informationAgile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
V100R002C10 Permission Control Technical White Paper Issue 01 Date 2016-04-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationTechnical White Paper for NAT Traversal
V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationBGP/MPLS VPN Technical White Paper
V300R001C10 BGP/MPLS VPN Technical White Paper Issue 01 Date 2013-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or
More informationAnti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationHuawei Sx7 Series Switches. SVF Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2014-11-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationHuawei FusionCloud Desktop Solution 5.3. Branch Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2015-06-30 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationHUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date
HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
More informationHUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI OceanStor Enterprise Unified Storage System HyperReplication Technical White Paper Issue 01 Date 2014-03-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may
More informationDatabase Security Service. Service Overview. Issue 16 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 16 Date 2019-03-08 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationAnti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationimanager M2000 V200R012 Basic Feature Description(eWBB2.1) HUAWEI TECHNOLOGIES CO., LTD. Issue 02 Date
(ewbb2.1) Issue 02 Date 2012-04-12 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
More informationespace UMS V100R001C01SPC100 Product Description Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
V100R001C01SPC100 Issue 03 Date 2012-07-10 HUAWEI TECHNOLOGIES CO., LTD. . 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior
More informationespace SoftConsole V200R001C02 Product Description HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date
espace SoftConsole V200R001C02 Issue 01 Date 2012-07-10 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
More informationAdvanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 17 Date 2018-08-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationOperation Guide for Security NEs Management
imanager U2000 Unified Network Management System V100R002C01 Operation Guide for Security NEs Management Issue 03 Date 2010-11-19 HUAWEI TECHNOLOGIES CO., LTD. 2010. All rights reserved. No part of this
More informationObject Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 04 Date 2017-12-20 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationHG531 V1 300Mbps Wireless ADSL2+ Router Product Description. Issue _01 HUAWEI TECHNOLOGIES CO., LTD.
HG531 V1 300Mbps Wireless ADSL2+ Router Issue 203275_01 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted
More informationHuawei OceanStor ReplicationDirector Software Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date
Huawei OceanStor Software Issue 01 Date 2015-01-17 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
More informationOceanStor 9000 InfiniBand Technical White Paper. Issue V1.01 Date HUAWEI TECHNOLOGIES CO., LTD.
OceanStor 9000 Issue V1.01 Date 2014-03-29 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be reproduced or transmitted in
More informationesdk Storage Plugins 1.0.RC4 Compilation Guide 01(vRO) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
1.0.RC4 Issue 01 Date 2017-04-06 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
More informationHuawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.
Huawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper Issue 01 Date 2014-03-26 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced
More informationHuawei esight IPSec VPN Promotional Theme Slides. Version: V1.0 ( )
Huawei esight Promotional Theme Slides Version: V1.0 (2013-10-17) Agenda 1 Network Management Click to add Challenges Title 2 Huawei esight IPSec Click VPN Management to add Title Solution 3 Competition
More informationElastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationCDN. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationesight V300R001C10 WLAN Technical White Paper Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
V300R001C10 Issue 01 Date 2013-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationDomain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationVirtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 21 Date 2018-09-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationS Series Switch. Cisco HSRP Replacement. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Cisco HSRP Replacement Issue 01 Date 2013-08-05 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior
More informationHUAWEI TE Mobile&TE Desktop V100R001C10. Product Overview. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
V100R001C10 Issue 01 Date 2014-10-10 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More informationSYN Flood Attack Protection Technology White Paper
Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Keywords: flood, Cookie, Safe Reset Abstract: This document describes the technologies and measures provided
More informationS Series Switches. MACsec Technology White Paper. Issue 1.0. Date HUAWEI TECHNOLOGIES CO., LTD.
S Series Switches MACsec Technology White Paper Issue 1.0 Date 2016-03-25 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2016. All rights reserved. No part of this document may be
More informationEnergy Saving Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date
Energy Saving Technology White Paper Issue 01 Date 2012-08-13 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
More informationPart Number: HG532s Home Gateway Product Description. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Part Number: 203192 HG532s Home Gateway Issue 01 Date 2012-03-26 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced
More informationLive Streaming Accelerator. Quick Start. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationVulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 20 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationCopyright Huawei Technologies Co., Ltd All rights reserved. Trademark Notice General Disclaimer
Copyright Huawei Technologies Co., Ltd. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies
More informationNetwork Performance Analysis System. White Paper
Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be
More informationDatabase Security Service. FAQs. Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 19 Date 2019-04-08 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationProduct Description. HUAWEI B593s-931 LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date
HUAWEI B593s-931 LTE CPE V200R001 Issue 01 Date 2013-12-19 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free
More informationSecBlade Firewall Cards Log Management and SecCenter Configuration Example
SecBlade Firewall Cards Log Management and SecCenter Configuration Example Keywords: Syslog Abstract: This document describes the log management function of SecBlade firewall cards, and presents configuration
More informationMPLS OAM Technology White Paper
MPLS OAM Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
More informationHWTACACS Technology White Paper
S Series Switches HWTACACS Technology White Paper Issue 1.0 Date 2015-08-08 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationHUAWEI UMA Full Product Datasheet
HUAWEI UMA Full Product Datasheet HUAWEI UMA Brief Product Datasheet Product Overview HUAWEI Unified Maintenance Audit (UMA) system centrally manages, monitors, and audits operations of all operation and
More informationUltraPath Technical White Paper
HUAWEI OceanStor Enterprise Unified Storage System Issue 01 Date 2014-04-02 HUAWEI TECHNOLOGIES CO, LTD Copyright Huawei Technologies Co, Ltd 2014 All rights reserved No part of this document may be reproduced
More informationHuawei FusionSphere 6.0 Technical White Paper on OpenStack Integrating FusionCompute HUAWEI TECHNOLOGIES CO., LTD. Issue 01.
Technical White Paper on OpenStack Integrating Issue 01 Date 2016-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationExetel. Product Description. HUAWEI B525s-65a LTE CPE V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 02. Date
Exetel HUAWEI B525s-65a LTE CPE V100R001 Issue 02 Date 2017-03-21 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationDomain Name Service. FAQs. Issue 07 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 07 Date 2019-03-05 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationCorente Cloud Services Exchange
Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to
More informationHuawei BYOD Network Solution
1 Trends of Enterprise Network 1 Under the circumstance of economic globalization, enterprises expand gradually and have branches distributed sparsely. It is a great challenge for enterprise staff, especially
More informationesight V300R002C00 Product Description Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.
V300R002C00 Issue 04 Date 2014-10-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationHUAWEI B310s-22 LTE CPE V200R001. Product Description. Issue. Date HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI B310s-22 LTE CPE V200R001 Issue 01 Date 2015-03-20 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
More informationHuawei Agile Campus Network Solution
Huawei Agile Campus Network Solution HUAWEI TECHNOLOGIES CO., LTD. Bantian, Longgang District Shenzhen518129, P. R. China Tel:+86-755-28780808 HUAWEI TECHNOLOGIES CO., LTD. 01 Network Development Trends
More informationSUN2000P-375 W Smart PV Optimizer. User Manual. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2017-08-01 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationSEP Technology White Paper
Issue 01 Date 2013-05-25 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationThird-Party Client (s3fs) User Guide
Issue 02 Date 2017-09-28 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationEudemon 1000E. Eudemon 1000E Series Product Quick Reference. Huawei Technologies Co., Ltd.
Eudemon 1000E Eudemon 1000E Series Product Quick Reference Huawei Technologies Co., Ltd. Eudemon 1000E The Eudemon 1000E series product is a new generation security gateway of multiple functions, which
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationSecBlade Firewall Cards Attack Protection Configuration Example
SecBlade Firewall Cards Attack Protection Configuration Example Keywords: Attack protection, scanning, blacklist Abstract: This document describes the attack protection functions of the SecBlade firewall
More informationHuawei MZ110 NIC V100R001. White Paper. Issue 07 Date HUAWEI TECHNOLOGIES CO., LTD.
V100R001 Issue 07 Date 2016-11-21 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
More informationStateful Failover Technology White Paper
Stateful Failover Technology White Paper Keywords: Stateful failover, master/backup mode, load balancing mode, data synchronization, link switching Abstract: A firewall device is usually the access point
More informationS2720-EI Series Enterprise Switches
Brochure S2720-EI Series Enterprise Switches The S2720-EI is a next-generation access switch that provides flexible 100M, GE access ports and GE uplink ports. Product Overview Building on next-generation,
More informationDesign and Implementation of Advanced Internet Management System
Design and Implementation of Advanced Internet Management System Chia-Sheng Tsai 1*, and Cheng-Wei Lin Abstract With the rapidly growing on Internet and variety applications through Internet, user reliabilities
More informationObject Storage Service. Client Guide (OBS Browser) Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 02 Date 2018-01-17 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationProduct Description. HUAWEI E5251 Mobile WiFi V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date
HUAWEI E5251 Mobile WiFi V100R001 Issue 01 Date 2013-02-21 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free
More informationORACLE ENTERPRISE COMMUNICATIONS BROKER
ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP
More informationHC-711 Q&As. HCNA-CBSN (Constructing Basic Security Network) - CHS. Pass Huawei HC-711 Exam with 100% Guarantee
HC-711 Q&As HCNA-CBSN (Constructing Basic Security Network) - CHS Pass Huawei HC-711 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money
More informationThird-Party Client (s3fs) User Guide
Issue 02 Date 2017-09-28 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationSecBlade Firewall Cards NAT Configuration Examples
SecBlade Firewall Cards NAT Configuration Examples Keywords: NAT, PAT, private IP address, public IP address, IP address pool Abstract: This document describes the characteristics, applications scenarios,
More informationGoAnywhere MFT System Architecture Guide. For High Availability, Scaling, and Performance
For High Availability, Scaling, and Performance Copyright 2016 Linoma Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationProduct Description. HUAWEI E5180s-610 LTE cube V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date
HUAWEI E5180s-610 LTE cube V200R001 Issue 01 Date 2014-11-10 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationICSA Labs Network Firewall Certification Testing Report Corporate Criteria Version 4.2. Huawei Technologies. USG Series/Eudemon-N Series
ICSA Labs Huawei Technologies USG Series/Eudemon-N Series 4/20/2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com FWXX HUAWEITECH-2015-0420-01 Table of
More informationEudemon200E-X Series Unified Security Gateway
Product Overview As a new-generation unified security gateway, Huawei Eudemon200E-X Series product family transforms today s Small Business and Enterprise s workspace experience by delivering them high
More informationivms-5200 ANPR Version Specification
ivms-5200 ANPR Version 1.0.2 Specification Specification COPYRIGHT 2016 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings,
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationHUAWEI B310s-927 LTE CPE V200R001. Product Description. Issue 03. Date HUAWEI TECHNOLOGIES CO., LTD.
V200R001 Issue 03 Date 2014-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
More informationObject Storage Service. Client Guide (OBS Browser) Issue 10 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 10 Date 2018-07-15 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationHG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.
HG658d Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway V100R001 User Guide Issue 01 Date 2013-07-23 Part Number 202633 Huawei Technologies Co., Ltd. provides customers with comprehensive
More informationOne Net Campus Huawei Campus Network Solution
One Net Campus Huawei Campus Network Solution 2 引言 3 园区网面临的挑战 4 华为园区网解决方案介绍 6 华为园区网解决方案对应产品组合 6 结束语 Introduction campus network is an internal network of an enterprise or organization, which covers indoor
More informationImage Recognition. SDK Reference. Issue 09 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 09 Date 2019-01-31 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationWHITE PAPER ARUBA SD-BRANCH OVERVIEW
WHITE PAPER ARUBA SD-BRANCH OVERVIEW June 2018 Table of Contents Overview of the Traditional Branch...1 Adoption of Cloud Services...1 Shift to the Internet as a Business Transport Medium...1 Increasing
More informationH3C SecBlade SSL VPN Card
H3C SecBlade SSL VPN Card Super Administrator Web Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 5PW105-20130801 Copyright 2003-2013, Hangzhou H3C Technologies
More informationQuidway S5700 Series Ethernet Switches V100R006C01. Configuration Guide - Ethernet. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.
V100R006C01 Issue 02 Date 2011-11-21 HUAWEI TECHNOLOGIES CO., LTD. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationSAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationCyberP3i Course Module Series
CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls
More informationMy Account. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-09-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationHG658 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.
HG658 Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658 Home Gateway V100R001 User Guide Issue 01 Date 2012-06-07 Part Number 202500 Huawei Technologies Co., Ltd. provides customers with comprehensive
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationIBM Security QRadar Version Architecture and Deployment Guide IBM
IBM Security QRadar Version 7.3.1 Architecture and Deployment Guide IBM Note Before you use this information and the product that it supports, read the information in Notices on page 41. Product information
More informationUNIFIED MANAGEMENT OF CONVERGED VOICE, DATA, AND VIDEO TECHNOLOGIES WITH AUTOMATED SUBSCRIBER AND SERVICE PROVISIONING
01010101000101010 10001010010001001 ZMS UNIFIED MANAGEMENT OF CONVERGED VOICE, DATA, AND VIDEO TECHNOLOGIES WITH AUTOMATED SUBSCRIBER AND SERVICE PROVISIONING SINGLE MANAGEMENT SYSTEM FOR THE ENTIRE LOCAL
More informationTALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT
DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.
More informationDRH Hardware Maintenance Guide
Issue 1.0 Date 2013-04-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More information