Hillstone虚拟防火墙技术解决方案白皮书

合集下载

下一代防火墙_绿盟_下一代防火墙产品白皮书

下一代防火墙_绿盟_下一代防火墙产品白皮书

绿盟下一代防火墙产品白皮书© 2014 绿盟科技■版权声明本文中出现的任何文字叙述、文档格式、插图、照片、方法、过程等内容,除另有特别注明,版权均属绿盟科技所有,受到有关产权及版权法保护。

任何个人、机构未经绿盟科技的书面授权许可,不得以任何方式复制或引用本文的任何片断。

目录一. 当今网络边界安全的新挑战 (1)二. 现有防火墙解决方案的不足 (2)三. 绿盟下一代防火墙产品 (3)3.1客户价值 (3)3.1.1 洞察网络应用,识别安全风险 (3)3.1.2 融合安全功能,保障应用安全 (4)3.1.3 高效安全引擎,实现部署无忧 (4)3.1.4 内网风险预警,安全防患未然 (4)3.1.5 云端高效运维,安全尽在掌握 (5)3.2产品概述 (5)3.3产品架构 (6)3.4主要功能 (7)3.4.1 识别和可视性 (7)3.4.2 一体化策略与控制 (8)3.4.3 应用层防护 (9)3.4.4 内网资产风险识别 (10)3.4.5 安全运维云端接入 (11)3.4.6 基础防火墙特性 (12)3.5产品优势 (13)3.5.1 全面的应用、用户识别能力 (13)3.5.2 细致的应用层控制手段 (15)3.5.3 专业的应用层安全防护能力 (16)3.5.4 卓越的应用层安全处理性能 (18)3.5.5 首创的内网资产风险管理 (18)3.5.6 先进的云端安全管理模式 (18)3.5.7 完全涵盖传统防火墙功能特性 (19)3.6典型部署 (19)四. 总结 (20)插图索引图1 核心理念 (5)图2 整体架构 (6)图3 资产管理 (10)图4 云端接入 (11)图5 应用/用户识别 (13)图6 应用控制 (15)图7 一体化安全引擎 (16)图8 双引擎多核并发 (18)图9 典型部署 (19)一. 当今网络边界安全的新挑战现阶段,随着以Web 2.0为代表的下一代网络技术的迅猛发展,Web化应用呈现出爆发式增长趋势,如今网络有近三分之二的流量都是HTTP和HTTPS应用。

Hillstone 入侵防御白皮书

Hillstone 入侵防御白皮书

Hillstone山石网科入侵防御白皮书Hillstone山石网科入侵防御白皮书1. 概述互联网的发展趋势表明:1. 网络攻击正逐渐从简单的网络层攻击向应用层转变,单纯的防火墙功能已经不能满足当下应用安全的需求。

旁路的入侵检测方式又不能满足对攻击源实时屏蔽的需求,与防火墙联动的入侵检测一直没有标准的联动协议来支撑。

入侵检测解决方案正在被入侵防御取代。

2. 安全漏洞、安全隐患的发生似乎是不可避免的,互联网的应用和业务却正在爆炸式的增长。

应用类型在增加,应用特征却更复杂,比如现在有很多应用都是基于HTTP等基础协议,让传统基于端口来识别应用的入侵防御解决方案已经不能适用。

如何识别出这些新的应用,从而去检测防御针对这些应用的攻击,是新一代入侵检测网关需要解决的问题。

3. 网络带宽在增加,应用类型在增加,应用协议在复杂化,攻击类型在增加,攻击方式在隐蔽化。

传统入侵防御设备受限于自身处理能力,已经不能胜任这样的趋势,如何去进行深度应用分析、深度攻击原理分析,也许所有的厂家都知道简单的攻击特征匹配已经不能满足时下用户对入侵防御漏判误判的要求,却受限与设备自身的处理能力,从而误判漏判的行为时有发生。

Hillstone山石网科的入侵防御是基于多核plus® G2架构、全并行的流检测引擎和基于攻击原理的入侵防御检测引擎。

基于多核plus®G2的安全架提供了高性能的入侵防御解决发难,并为入侵防御需要的深度应用分析和攻击原理分析提供了强劲的处理能力。

全并行流检测引擎则使用较少的系统资源,并且在并行扫描会话和开启其他多项应用处理功能提供了高可用性。

基于攻击原理的入侵防御有助于提高攻击检测率和降低攻击误判率。

Hillstone山石网科入侵防御解决方案具有以下特性:●基于深度应用识别,积极防范复杂应用攻击●基于多核Plus® G2构架满足深度应用分析、入侵防御功能的高CPU和高内存资源需求●基于深度应用原理、攻击原理的入侵防御解决方案●支持HTTP、FTP、SMTP、IMAP、POP3、TELNET、TCP、UDP、DNS、RPC、Hillstone山石网科入侵防御白皮书FINGER、MSSQL、ORACLE、NNTP、DHCP、LDAP、VOIP、NETBOIS、TFTP等多种常见的应用和协议的攻击防护。

山石网科 Hillstone山石网科 下一代防火墙 配置指南说明书

山石网科 Hillstone山石网科 下一代防火墙 配置指南说明书

Hillstone山石网科下一代防火墙基础配置手册V5.5版本Hillstone Networks Inc.服务热线:400 828 6655内容提交人审核人更新内容日期陈天骄陈天骄初次编写2016/1/14目录1 设备管理 (3)1.1 终端console登录 (3)1.2 网页WebUI登录 (3)1.3 恢复出厂设置 (5)1.3.1 CLI命令行操作 (5)1.3.2 WebUI图形化界面操作 (5)1.3.3 硬件CLR操作 (6)1.4 设备系统(StoneOS)升级 (6)1.4.1 通过sysloader升级 (6)1.4.2 通过CLI升级 (9)1.4.3 通过WebUI升级 (9)1.5 许可证安装 (10)1.5.1 CLI命令行安装 (10)1.5.2 WebUI安装 (11)2 基础上网配置 (11)2.1 接口配置 (11)2.2 路由配置 (13)2.3 策略配置 (14)2.4 源地址转换配置(SNAT) (15)3 常用功能配置 (16)3.1 PPPoE拨号配置 (16)3.2 动态地址分配(DHCP)配置 (17)3.3 IP-MAC地址绑定配置 (20)3.4 端到端IPSec VPN配置 (21)3.4.1 配置第一阶段P1提议 (22)3.4.2 配置ISAKMP网关 (23)3.4.3 配置第二阶段P2提议 (24)3.4.4 配置隧道 (25)3.4.5 配置隧道接口 (26)3.4.6 配置隧道路由和策略 (28)3.4.7 查看VPN状态 (29)3.5 远程接入SCVPN配置 (30)3.6 目的地址转换DNAT配置 (38)3.6.1 IP映射 (39)3.6.2 端口映射 (41)1设备管理安全网关支持本地与远程两种环境配置方法,可以通过CLI 和WebUI 两种方式进行配置。

CLI同时支持Console、Telnet、SSH等主流通信管理协议。

Hillstone网络地址转换技术解决方案白皮书

Hillstone网络地址转换技术解决方案白皮书

1.2 隐藏并保护内网主机使用网络地址转换(NAT)后,内网主机使用私网地址,而对外网却显示一个或多个公网地址,内网主机不直接暴露在公网上,避免被扫描探测和直接访问,从而增强网络安全性。

Hillstone网络地址转换基本功能2.1 SNAT(源地址转换)2.2 DNAT (目的地址转换)SNAT 是内网终端访问外网服务时使用的功能。

如图1所示,内网终端使用私网地址访问公网服务,数据包经过网关时,网关将“私网源地址:端口”修改成“公网源地址:端口”,并做下记录,当服务端返回数据包时,再按照之前的记录将“公网目的地址:端口”修改回“私网目的地址:端口”。

Hillstone 安全网关的SNAT 功能支持三种转换模式:① 静态地址静态源地址转换即一对一的转换。

该模式要求被转换到的公网地址条目包含的IP 地址数与流量的私网源地址的地址条目包含的IP 地址数相同。

② 动态地址动态源地址转换即多对多的转换。

该模式将私网源地址转换到指定的公网IP 地址。

每一个私网源地址会被映射到一个唯一的公网IP 地址做转换,直到指定公网地址全部被占用。

③ 动态端口多个私网源地址将被转换成指定公网IP 地址条目中的一个地址。

通常情况下,地址条目中的第一个地址将会首先被使用,当第一个地址的端口资源被用尽,第二个地址将会被使用。

DNAT 是外网终端访问内网服务时使用的功能。

如图2所示,外网终端使用公网地址访问内网服务,数据包经过网关时,网关将“公网目的地址:端口”修改成“私网目的地址:端口”,并做下记录,当服务端返回数据包时,再按照之前的记录将“私网源地址:端口”修改回“公网源地址:端口”。

图1 Hillstone 安全网关SNAT 工作原理图2 Hillstone 安全网关DNAT工作原理2.3 ALG (应用层网关)一些应用在通信过程中使用应用层携带网络地址信息,如SIP 协议;一些应用采用多通道数据传送,控制通道在应用层协商数据通道的网络地址,如FTP 协议。

Hillstone防火墙技术

Hillstone防火墙技术

Hi StoneOS安全模式山石网科通信技术(北京)有限公司Hillstone防火墙技术StoneOS安全模式1. 介绍传统防火墙通常可以在两种模式下进行操作:NAT/路由模式和透明模式。

NAT/路由模式部署灵活,并且支持防火墙和路由器两种设备的功能。

尽管如此,许多希望通过最少的网络中断而实现安全保护的客户却会选择透明模式。

随着二层与三层转换的扩展,安全集成到网络中变成一个更加困难的选择。

那么,在哪里部署能够控制所有二层和三层的所有类型流量的安全功能呢?Hillstone的StoneOS提供了一个强大的安全平台,它为安全管理者提供了“集成安全控制和网络管理的底层网络结构”。

StoneOS通过将网络功能从安全功能中分离出来,扩展了NAT/路由模式。

这样,用户就可以在一个完全灵活的环境下使用NAT功能。

StoneOS通过引入专有的Virtual Switch(虚拟交换机)的概念极大地扩展了透明模式。

在二层,用户可以定义VLAN域,并且可以将不同的安全策略应用到每一个VLAN。

StoneOS还拥有重新标记VLAN tag功能,这种功能只有高端的交换机才能实现。

StoneOS混合模式将NAT/路由模式与透明模式结合到同一个设备上。

根据配置的安全策略,部分数据在二层进行处理,而其它数据进行三层处理。

这个强大的功能将路由器和交换机的功能进行完美结合,并且能够降低网络部署的复杂性。

2. NAT/路由模式路由在NAT/路由模式下,设备被划分为多个三层域。

流量会在三层域之间进行转发,并且被转发的流量会被进行安全检查。

对于路由模式,IP地址不会被转换。

对于NAT模式,IP数据包在不同域间转发的过程中,其IP地址和端口号可以被转换。

Hillstone设备将安全管理从网络管理中分离出来。

Hillstone NAT策略是网络管理的一部分,用户可以基于特定接口或者五元组(IP地址、端口号和服务)进行灵活配置,或者将两者相结合。

Hillstone X系列数据中心防火墙X10800说明书

Hillstone X系列数据中心防火墙X10800说明书

Hillstone X-SeriesData Center Firewall X10800X10800The Hillstone X10800 Data Center Firewall offers outstanding performance, reliability, andscalability, for high-speed service providers, large enterprises and carrier networks. The product is based on an innovative fully distributed architecture that fully implements firewalls with high throughput, concurrent connections, and new sessions. Hillstone X10800 also supportslarge-capacity virtual firewalls, providing flexible security services for virtualized environments, and features such as application identification, traffic management, intrusion prevention, and attack prevention to fully protect data center network security.FrontRearProduct HighlightHigh Performance based on Elastic Security ArchitectureWith traffic explosively increasing, data center firewalls need powerful capabilities to handle high traffic and massive concurrent user access, as well as the ability to effectively cope with sudden bursts of user activity. Therefore, data center firewalls must not only have high throughput but also extremely high concurrent connections and new session processing capabilities.The Hillstone X10800 Data Center Firewall adopts an inno-vative, fully distributed architecture to implement distributed high-speed processing of service traffic on Service Modules (SSMs) and Interface Modules (IOMs) through intelligent traffic distribution algorithms. Through patented resource management algorithms, it allows for the full potential of dis-tributed multi-core processor platforms, to further increase the performance of firewall concurrent connections, new sessions per second, and achieve a fullly linear expansionof system performance. The X10800 data center firewall can process up to 1 Tbps, up to 10 million new sessionsper second, and up to 480 million concurrent connections. The device can provide up to 44 100GE interfaces, 88 10G interfaces, or 22 40GE interface, 132 10G interface expansion capabilities. Moreover, the packet forwarding delay is less than 10us, which can fully meet a data center’s demand for real-time service forwarding.Carrier Grade ReliabilityThe hardware and software of the X10800 data center fire-wall delivers 99.999% carrier-grade reliability. It can support active/active or active/passive mode redundant deployment solutions to ensure uninterrupted service during single failure. The entire system adopts a modular design, supporting con-trol module redundancy, service module redundancy, inter-face module redundancy and switching module redundancy, and all modules are hot-swappable.The X10800 data center firewall supports multi-mode and single-mode optical port bypass modules. When the device is running under a special condition, such as power off, the system will start in Bypass mode to ensure uninterrupted operation of business. It also provides power redundancy, fan redundancy and other key components to guarantee reliability.Twin-mode HA effectively solves the problem of asymmetric traffic in redundant data centers. The firewall twin-mode isa highly reliable networking mode building on dual-device backup. Two sets of active/passive firewalls in the two data centers are connected via a dedicated data link and control link. The two sets of devices synchronize session information and configuration information with each other.Leading Virtual Firewall TechnologyVirtualization technology is more and more widely used in data centers. The X10800 data center firewall can logically divide a physical firewall into upwards of 1000 virtual fire-walls for the data center’s virtualization needs, providing virtual firewall support capabilities for large data centers. At the same time, users can dynamically set resource for each virtual firewall based on actual business conditions, suchas CPUs, sessions, number of policies, ports, etc., to ensure flexible changes in service traffic in a virtualized environment. Each virtual firewall system of X10800 data center firewalls not only has independent system resources, but also can be individually and granularly managed to provide independent security management planes for different services or users. Granular Application Control and Comprehensive SecurityThe X10800 data center firewall uses advanced in-depth application identification technology to accurately iden-tify thousands of network applications based on protocol features, behavior characteristics, and correlation analysis, including hundreds of mobile applications and encrypted P2P applications. It provides sophisticated and flexible application security controls.The X10800 data center firewall provides intrusion prevention technology based on deep application identification, proto-col detection, and attack principle analysis. It can effectively detect threats such as Trojans, worms, spyware, vulnerability attacks, and escape attacks, and provide users with L2-L7Product Highlight (Continued) FeaturesNetwork Services• Dynamic routing (OSPF, BGP, RIPv2)• Static and Policy routing• Route controlled by application• Built-in DHCP, NTP, DNS Server and DNS proxy • Tap mode – connects to SPAN port• Interface modes: sniffer, port aggregated, loopback, VLANS (802.1Q and Trunking)• L2/L3 switching & routing• Virtual wire (Layer 1) transparent inline deploymentFirewall• Operating modes: NAT/route, transparent (bridge), and mixed mode• Policy objects: predefined, custom, and object grouping• Security policy based on application, role and geo-location• Application Level Gateways and session support: MSRCP, PPTP, RAS, RSH, SIP, FTP, TFTP, HTTP, dcerpc, dns-tcp, dns-udp, H.245 0, H.245 1, H.323 • NAT and ALG support: NAT46, NAT64, NAT444, SNAT, DNAT, PAT, Full Cone NAT, STUN• NAT configuration: per policy and central NAT table• VoIP: SIP/H.323/SCCP NAT traversal, RTP pin holing• Global policy management view• Security policy redundancy inspection, policygroup, policy configuration rollback• Policy Assistant for easy detailed policydeployment• Policy analyzing and invalid policy cleanup• Comprehensive DNS policy• Schedules: one-time and recurringIntrusion Prevention• Protocol anomaly detection, rate-based detection,custom signatures, manual, automatic push orpull signature updates, integrated threat encyclo-pedia• IPS Actions: default, monitor, block, reset(attackers IP or victim IP, incoming interface) withexpiry time• Packet logging option• Filter Based Selection: severity, target, OS, appli-cation or protocol• IP exemption from specific IPS signatures• IDS sniffer mode• IPv4 and IPv6 rate based DoS protection withthreshold settings against TCP Syn flood, TCP/UDP/SCTP port scan, ICMP sweep, TCP/UDP/SCIP/ICMP session flooding (source/destination)• Active bypass with bypass interfaces• Predefined prevention configurationAnti-Virus• Manual, automatic push or pull signature updates• Flow-based Antivirus: protocols include HTTP,SMTP, POP3, IMAP, FTP/SFTP• Compressed file virus scanningAttack Defense• Abnormal protocol attack defense• Anti-DoS/DDoS, including SYN Flood, DNS QueryFlood defense• ARP attack defenseURL Filtering• Abnormal protocol attack defense• Anti-DoS/DDoS, including SYN Flood, DNS QueryFlood defense• ARP attack defense• Flow-based web filtering inspection• Manually defined web filtering based on URL, webcontent and MIME header• Dynamic web filtering with cloud-based real-timecategorization database: over 140 million URLswith 64 categories (8 of which are security related)• Additional web filtering features:- Filter Java Applet, ActiveX or cookie- Block HTTP Post- Log search keywords- Exempt scanning encrypted connections oncertain categories for privacy• Web filtering profile override: allows administratorto temporarily assign different profiles to user/group/IP• Web filter local categories and category ratingoverridenetwork security. Among them, Web protection function can meet the deep security protection requirements of Web server; Botnet filtering function can protect internal hosts from infection.The X10800 data center firewall supports URL filtering for tens of millions of URL signature library. It can help admin-istrators easily implement web browsing access control and avoid threat infiltration of malicious URLs. It also provides Anti-virus feature that can effectively detect and block mal-wares with low latency.The intelligent bandwidth management of X10800 data center firewall is based on deep application identification and user identification. Combined with service application priorities, the X10800 data center firewall can implement fine-grained, two-layer, eight-level traffic control based on policies and provide elastic QoS functions. Used with functions such as session restrictions, policies, routing, link load balancing, and server load balancing, it can provide users with more flexible traffic management solutions.Strong Network AdaptabilityThe X10800 data center firewall fully supports next-genera-tion Internet deployment technologies (including dual-stack, tunnel, DNS64/NAT64 and other transitional technologies). It also has mature NAT444 capabilities to support static mapping of fixed-port block of external network addresses to intranet addresses. It can generate logs based on session and user for easy traceability. Enhanced NAT functions (Full-cone NAT, port multiplexing, etc.) can fully meet the require-ments of current ISP networks and reduce the cost of user network construction.The X10800 data center firewall provides full compliance with standard IPSec VPN capabilities and integrates third-gen-eration SSL VPN to provide users with high-performance, high-capacity, and full-scale VPN solution. At the same time, its unique plug-and-play VPN greatly simplifies configuration and maintenance challenges and provides users with convenient and remote secure access services.IP Reputation• Identify and filter traffic from risky IPs such as botnet hosts, spammers, Tor nodes, breached hosts, and brute force attacks• Logging, dropping packets, or blocking for different types of risky IP traffic• Regular IP reputation signature database upgrade Endpoint Identification and Control• Support to identify endpoint IP, endpoint quantity, on-line time, off-line time, and on-line duration • Support 10 operation systems, including Windows, iOS, Android, etc.• Support query based on IP, endpoint quantity, control policy and status etc.• Support the identification of accessed endpoints quantity across layer 3, logging and interference on overrun IP• Redirect page display after custom interference operation• Supports blocking operations on overrun IP Application Control• Over 3,000 applications that can be filtered by name, category, subcategory, technology and risk • Each application contains a description, risk factors, dependencies, typical ports used, and URLs for additional reference• Actions: block, reset session, monitor, traffic shaping• Identify and control cloud applications in the cloud • Provide multi-dimensional monitoring and statistics for cloud applications, including risk category and characteristicsQuality of Service (QoS)• Max/guaranteed bandwidth tunnels or IP/user basis• Tunnel allocation based on security domain, interface, address, user/user group, server/server group, application/app group, TOS, VLAN• Bandwidth allocated by time, priority, or equal bandwidth sharing• Type of Service (TOS) and Differentiated Services (DiffServ) support• Prioritized allocation of remaining bandwidth • Maximum concurrent connections per IP• Bandwidth allocation based on URL category • Bandwidth limit by delaying access for user or IP • Automatic expiration cleanup and manual cleanup of user used trafficServer Load Balancing• Weighted hashing, weighted least-connection, and weighted round-robin• Session protection, session persistence and session status monitoring• Server health check, session monitoring and session protectionLink Load Balancing• Bi-directional link load balancing• Outbound link load balancing includes policy based routing, ECMP and weighted, embeddedISP routing and dynamic detection• Inbound link load balancing supports SmartDNSand dynamic detection• Automatic link switching based on bandwidth,latency, jitter, connectivity, application etc.• Link health inspection with ARP, PING, and DNSVPN• IPSec VPN- IPSEC Phase 1 mode: aggressive and main IDprotection mode- Peer acceptance options: any ID, specific ID, ID indialup user group- Supports IKEv1 and IKEv2 (RFC 4306)- Authentication method: certificate andpre-shared key- IKE mode configuration support (as server orclient)- DHCP over IPSEC- Configurable IKE encryption key expiry, NATtraversal keep alive frequency- Phase 1/Phase 2 Proposal encryption: DES,3DES, AES128, AES192, AES256- Phase 1/Phase 2 Proposal authentication:MD5, SHA1, SHA256, SHA384,SHA512- Phase 1/Phase 2 Diffie-Hellman support: 1,2,5- XAuth as server mode and for dialup users- Dead peer detection- Replay detection- Autokey keep-alive for Phase 2 SA• IPSEC VPN realm support: allows multiple customSSL VPN logins associated with user groups (URLpaths, design)• IPSEC VPN configuration options: route-based orpolicy based• IPSEC VPN deployment modes: gateway-to-gateway, full mesh, hub-and-spoke, redundanttunnel, VPN termination in transparent mode• One time login prevents concurrent logins with thesame username• SSL portal concurrent users limiting• SSL VPN port forwarding module encrypts clientdata and sends the data to the application server• Supports clients that run iOS, Android, andWindows XP/Vista including 64-bit Windows OS• Host integrity checking and OS checking prior toSSL tunnel connections• MAC host check per portal• Cache cleaning option prior to ending SSL VPNsession• L2TP client and server mode, L2TP over IPSEC,and GRE over IPSEC• View and manage IPSEC and SSL VPN connec-tions• PnPVPNIPv6• Management over IPv6, IPv6 logging and HA• IPv6 tunneling, DNS64/NAT64 etc• IPv6 routing protocols, including static routing,policy routing, ISIS, RIPng, OSPFv3 and BGP4+• IPS, Application identification, URL filtering,Access control, ND attack defense, iQoS• Track address detectionVSYS• System resource allocation to each VSYS• CPU virtualization• Non-root VSYS support firewall, IPSec VPN, SSLVPN, IPS, URL filtering• VSYS monitoring and statisticHigh Availability• Redundant heartbeat interfaces• Active/Active and Active/Passive mode• Standalone session synchronization• HA reserved management interface• Failover:- Port, local & remote link monitoring- Stateful failover- Sub-second failover- Failure notification• Deployment options:- HA with link aggregation- Full mesh HA- Geographically dispersed HATwin-mode HA• High availability mode among multiple devices• Multiple HA deployment modes• Configuration and session synchronization amongmultiple devicesUser and Device Identity• Local user database• Remote user authentication: TACACS+, LDAP,Radius, Active• Single-sign-on: Windows AD• 2-factor authentication: 3rd party support,integrated token server with physical and SMS• User and device-based policies• User group synchronization based on AD andLDAP• Support for 802.1X, SSO Proxy• WebAuth page customization• Interface based Authentication• Agentless ADSSO (AD Polling)• Use authentication synchronization based onSSO-monitor• Support MAC-based user authenticationAdministration• Management access: HTTP/HTTPS, SSH, telnet,console• Central Management: Hillstone Security Manager(HSM), web service APIs• System Integration: SNMP, syslog, alliancepartnerships• Rapid deployment: USB auto-install, local andremote script execution• Dynamic real-time dashboard status and drill-inmonitoring widgets• Language support: EnglishFW Throughput (Maximum) (1)IPSec Throughput (Maximum) (2)IMIX Throughput(3)NGFW Throughput (4)Threat Protection Throughput (5)Concurrent Sessions (Maximum)New Sessions/s(6)IPS Throughput (Maximum) (7)Virtual Systems (Default/Max)I/O ModuleMaximum InterfacesMaximum Power Consumption Power SupplyManagement Interfaces Network Interfaces Expansion Module Slot Dimension (W × D × H)WeightCompliance and CertificateSpecificationsSG-6000-X10800Logs & Reporting• Logging facilities: local memory and storage (if available), multiple syslog servers and multiple Hillstone Security Audit (HSA) platforms • Encrypted logging and log integrity with HSA scheduled batch log uploading• Reliable logging using TCP option (RFC 3195) • Detailed traffic logs: forwarded, violated sessions, local traffic, invalid packets, URL etc.• Comprehensive event logs: system and adminis -trative activity audits, routing & networking, VPN, user authentications, WiFi related events• IP and service port name resolution option • Brief traffic log format option• Three predefined reports: Security, Flow and network reports• User defined reporting• Reports can be exported in PDF , Wordl and HTML via Email and FTPStatistics and Monitoring• Application, URL, threat events statistic and monitoring• Real-time traffic statistic and analytics• System information such as concurrent session, CPU, Memory and temperature• iQOS traffic statistic and monitoring, link status monitoring• Support traffic information collection and forwarding via Netflow (v9.0)Module OptionsDescriptionmodule 100GE, 10GE interface moduleQoS service module Security control moduleNetwork Interface4 QSFP28 100GEinterfaces, 8 SFP+ 10Gbinterfaces, transceiver notincluded N/AN/ASlot expansion slot Occupies 1 universal expansion slot expansion slot Occupies 1 universal expansion slot expansion slot Occupies 1 universal expansion slot Weight12.67 lb (5.75 kg)12.56 lb (5.70 kg)7.6 lb (3.45 kg)NOTES:(1) FW Throughput data is obtained under single-stack UDP traffic with 1518-byte packet size;(2) IPSec throughput data is obtained under Preshare Key AES256+SHA-1 configuration and 1400-byte packet size packet; (3) IMIX throughput data is obtained under UDP traffic mix (68 byte : 512 byte : 1518 byte =5:7:1);(4) NGFW throughput data is obtained under 64 Kbytes HTTP traffic with application control and IPS enabled;(5) Threat protection throughput data is obtained under 64 Kbytes HTTP traffic with application control, IPS, AV and URL filtering enabled; (6) New Sessions/s is obtained under TCP traffic;(7) IPS throughput data is obtained under bi-direction HTTP traffic detection with all IPS rules being turned on;(8) At least 3 AC power modules are required for full load operation with AC power, and at least 4 DC power modules are required for full load operation with DC power.Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R7. Results may vary based on StoneOS ® version and deployment.IOM-P100-300IOM-P40-300SWM-300QSM-300SSM-300SCM-300。

H3C SecPath虚拟防火墙技术白皮书(V1.00)

H3C SecPath虚拟防火墙技术白皮书(V1.00)

H3C SecPath虚拟防火墙技术白皮书(V1.00)SecPath虚拟防火墙技术白皮书关键词:虚拟防火墙MPLS VPN摘要:本文介绍了H3C公司虚拟防火墙技术和其应用背景。

描述了虚拟防火墙的功能特色,并介绍了H3C公司具备虚拟防火墙功能的独立防火墙和防火墙插板产品的组网环境应用。

缩略语清单:1 概述1.1 新业务模型产生新需求1.2 新业务模型下的防火墙部署1.2.1 传统防火墙的部署缺陷1.2.2 虚拟防火墙应运而生2 虚拟防火墙技术2.1 技术特点2.2 相关术语2.3 设备处理流程2.3.1 根据入接口数据流2.3.2 根据Vlan ID数据流2.3.3 根据目的地址数据流3 典型组网部署方案3.1 虚拟防火墙在行业专网中的应用3.1.1 MPLS VPN组网的园区中的虚拟防火墙部署一3.1.2 MPLS VPN组网的园区中的虚拟防火墙部署二3.1.3 虚拟防火墙提供对VPE的安全保护3.2 企业园区网应用4 总结1.1 新业务模型产生新需求目前,跨地域的全国性超大企业集团和机构的业务规模和管理复杂度都在急剧的增加,传统的管理运营模式已经不能适应其业务的发展。

企业信息化成为解决目前业务发展的关键,得到了各企业和机构的相当重视。

现今,国内一些超大企业在信息化建设中投入不断增加,部分已经建立了跨地域的企业专网。

有的企业已经达到甚至超过了IT-CMM3的级别,开始向IT-CMM4迈进。

另一方面,随着企业业务规模的不断增大,各业务部门的职能和权责划分也越来越清晰。

各业务部门也初步形成了的相应不同安全级别的安全区域,比如,OA和数据中心等。

由于SOX等法案或行政规定的颁布应用,各企业或机构对网络安全的重视程度也在不断增加。

对企业重点安全区域的防护要求越来越迫切。

因此,对企业信息管理人员来说,如何灵活方便的实现企业各业务部门的安全区域划分和安全区域之间有控制的互访成为其非常关注的问题。

这也对安全区域隔离“利器”――防火墙提出了更高的要求。

深信服下一代防火墙NGAF方案白皮书

深信服下一代防火墙NGAF方案白皮书

深信服科技NGAF 下一代防火墙方案白皮书1.概述 (4)2.深信服下一代防火墙核心价值 (5)2.1.全程保护 (5)2.2.全程可视 (7)3.主要功能介绍 (8)3.1.系统架构设计 (8)3.2.基础防火墙特性 (11)3.3.事前风险预知 (13)3.4.事中安全防护 (18)3.5.事后检测及响应 (31)4.部署模式 (33)4.1.网关模式 (33)4.2.网桥模式 (34)4.3.旁路模式 (36)4.4.双机模式 (37)5.市场表现 (39)5.1.高速增长,年复合增长超70% (39)5.2.众多权威机构一致认可 (40)5.3.为客户需求而持续创新 (40)6.关于深信服 (40)1.概述近几年来,随着互联网+、业务数字化转型的深入推进,各行各业都在加速往互联网化、数字化转型。

业务越来越多的向公众、合作伙伴,第三方机构等开放,在数字化业务带给我们高效和便捷的同时,信息暴露面的增加,网络边界的模糊化以及黑客攻击的产业化使得网络安全事件相较以往成指数级的增加,面对应对层出不穷的新型安全事件如网站被篡改,被挂黑链,0 day 漏洞利用,数据窃取,僵尸网络,勒索病毒等等,传统安全建设模式已经捉襟见肘,面临着巨大的挑战。

问题一:传统信息安全建设,以事中防御为主。

缺乏事前的风险预知,事后的持续检测及响应能力传统意义上的安全建设无论采用的是多安全产品叠加方案还是采用 UTM/NGFW+WAF 的整合类产品解决方案,关注的重点都在于如何防护资产在被攻击过程中不被黑客入侵成功,但是并不具备对于资产的事前风险预知和事后检测响应的能力,从业务风险的生命周期来看,仅仅具备事中的防护是不完整的,如果能在事前做好预防措施以及在时候提高检测和响应的能力,安全事件发生产生的不良影响会大幅度降低,所以未来,融合安全将是安全建设发展的趋势。

问题二:传统安全建设是拼凑的事中防御,缺乏有效的联动分析和防御机制传统安全建设方案,搜集到的都是不同产品碎片化的攻击日志信息,只能简单的统计报表展示,并不能结合业务形成有效的资产安全状态分析。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

图1 使用虚拟防火墙进行业务灵活扩展
在传统数据中心方案中,业务服务器与防火墙基本上是一对一配比。

因此,当业务增加时,用户需要购置新的防火墙;而当业务减少时,对应的防火墙就闲置下来,导致投资浪费。

虚拟防火墙技术以其灵活可扩展的特性帮助用户保护投资,用户可以随时根据业务增减相应的虚拟防火墙。

同时,通过使用虚拟防火墙的CPU资源虚拟化技术,数据中心还可以为客户定量出租虚拟防火墙,例如,可以向某些客户出租10M吞吐量的虚拟防火墙,而向另一些客户出租100M吞吐量的虚拟防火墙。

Hillstone 的虚拟防火墙功能简称为VSYS ,能够将一台物理防火墙在逻辑上划分成多个虚拟防火墙,每个虚拟防火墙系统都可以被看成是一台完全独立的防火墙设备,拥有独立的系统资源,且能够实现防火墙的大部分功能。

每个虚拟防火墙系统之间相互独立,不可直接相互通信。

不同型号的Hillstone 物理防火墙设备支持的最大VSYS 个数不同,支持License 控制的VSYS 个数的扩展。

数据中心业务类型多种多样,需要使用的防火墙策略也不同。

例如,DNS 服务器需要进行DNS Query Flood 攻击防护,而HTTP 服务器则需要进行HTTP Get Flood 攻击防护。

虚拟防火墙的划分能够实现不同业务的专属防护策略配置。

同时,CPU 资源虚拟化可隔离虚拟防火墙之间的故障,当单个虚拟防火墙受到攻击或资源耗尽时,其它虚拟防火墙不会受到影响,这样就大大提升了各业务的综合可用性。

图2
使用虚拟防火墙进行业务隔离
Hillstone 虚拟防火墙功能包含以下特性:
■ 每个VSYS 拥有独立的管理员
■ 每个VSYS 拥有独立的安全域、地址簿、服务簿等■ 每个VSYS 可以拥有独立的物理接口或者逻辑接口■ 每个VSYS 拥有独立的安全策略■
每个VSYS 拥有独立的日志
1.2 业务隔离,互不影响
3.2 专有对象与共享对象
系统在没有配置任何虚拟防火墙时,只有一个逻辑的防火墙系统,称为根虚拟系统(根VSYS ),所有的系统资源都被根VSYS 所使用(不只是硬件资源)。

从根VSYS 中划分出来的逻辑防火墙,称为非根VSYS 。

非根VSYS 根据事先配置的虚拟防火墙资源配额配置,从根VSYS 中划分系统资源。

虚拟防火墙系统资源分配原则将在3.3
节进
行详细讲解。

图4 专有对象与共享对象原理
图3 根VSYS 与非根VSYS 的关系
上图为Hillstone 虚拟防火墙系统资源虚拟化计算原则,各项中的参数max-num1和max-num2都需要按照图中表格下方公式单独计算,公式中的capacity 参数为系统当前各项指标支持的最大规格,max-vsys-num 参数为系统当前支持VSYS 的最大个数(License 控制)。

针对CPU 资源虚拟化技术,Hillstone 提出了HSCS (HS CPU Score )的概念,即CPU 能够处理1M 小包的能力。

例如,某款产品CPU 处理能力为100M 的小包,那么该款产品CPU 的处理能力是100HSCS 。

虚拟防火墙系统资源配额配置举例,假设Hillstone 某型号防火墙当前系统各项指标大规格(Capacity )如下表所示,且系统当前支持的最大VSYS 数为5:
3.3 虚拟防火墙系统资源虚拟化计算原则
VSYS 中的安全域和接口对象具有专有和共享属性。

具有专有属性的对象称为专有对象;将具有共享属性的对象经过相关配置后即成为共享对象。

专有对象和共享对象有如下特征:

专有对象:
专有对象专属于某个VSYS ,不可以被其它VSYS 引用。

根VSYS 和非根VSYS 中均可包含专有对象。


共享对象:
共享对象可被多个VSYS 共享。

共享对象只能属于根VSYS ,并且只能在根VSYS 中配置;非根VSYS 只能引用共享对象,不能对其进行配置。

共享对象的名称必须全局唯一,任何一个VSYS 中的对象都不可以与同类共享对象重名。

图5 虚拟防火墙系统资源虚拟化计算原则
4.1 内外网物理接口都专有。

Hillstone 虚拟防火墙典型组网场景
图6 内外网物理接口都专有的组网场景
图7 内网物理接口专有、外网物理接口共享的组网场景
传统数据中心业务服务器与防火墙采用一对一的配比,这种方案通常使用内外网物理接口都专有的组网方案进行过渡,即使用支持虚拟防火墙的高性能单台设备替换原有多台分散的物理防火墙设备。

互联网出口较少或者单一时,比较适合使用的是内网物理接口专有、外网物理接口共享的组网方案,各非根VSYS 专有自己的内网物理接口,防火墙在部署过程中不影响交换机的原有配置。

4.2 内外物理接口专有、外网物理接口共享
图8 内外网物理接口都共享的组网场景
内网接口和互联网出口都单一的组网也是一些用户可能遇到的场景。

虽然防火墙在部署过程中内外网物理接口都公用,但实际上只有外网接口及其所属的安全域是共享对象。

内网接口需要先配置子接口,再将各子接口划分给各非根VSYS 专有。

由于防火墙子接口只能处理带VLAN 标记的报文,这就需要更改交换机与防火墙相连的接口为Trunk 口,同时更改交换机与各服务器相连的接口为Access 口。

这样就相当于通过VLAN 将各业务系统进行隔离,各业务系统又都拥有自己独立的虚拟防火墙系统。

4.3
内外网物理接口都共享。

相关文档
最新文档