Huawei USG9000 Application Scenarios Datasheet

As a world leading Huawei networking products supplier, Hong Telecom Equipment Service LTD(HongTelecom) keeps regular stock of Huawei router and switch and all cards at very good price, also HongTelecom ship to worldwide with very fast delivery.

For related articles, visit the HongTelecom Blog and HongTelecom WordPress.

For real pictures of related product, visit the HongTelecom Gallery.

To buy related product, visit the HongTelecom Online Shop.

Introduction to the USG9000

At present, the USG9000 can work in three modes: routed mode, transparent mode, and composite mode.

  • routing mode In routing mode, the USG9000 uses the layer 3 for external connections, and all interfaces must be assigned with IP addresses. When the USG9000 is located between the internal network and the external network, you need to configure the interfaces, through which the USG9000 is connected with the internal network and the external network, with IP addresses on different network segments and re-plan the network topology. In this case, the USG9000 serves as a router. As shown in Figure 2-1, the USG9000 is connected with the internal network through an interface in the Trust zone, while it is connected with the external network through an interface in the Untrust zone. Note that the interface in Trust zone and the interface in Untrust zone reside in different two subnets.
    Figure 2-1  Networking in routing mode

    When working in routing mode, the USG9000 can complete ACL packet filtering. However, network topology needs to be changed. For example, internal network users need to change their gateways and routers' routing configurations need to be changed.

  • transparent mode In transparent mode, the USG9000 uses the layer 2 for external connections, and none of the interfaces can be assigned with IP addresses. In this case, the USG9000 is transparent to users in subnets and routers. That is, users do not feel the existence of the USG9000. As shown in Figure 2-2, the USG9000 is connected with the internal network through interfaces in the Trust zone, while it is connected with the external network through interfaces in the Untrust zone. Note that the internal network and the external network must reside in the same subnet.
    Figure 2-2  Networking in transparent mode

    If the USG9000 works in transparent mode, you do not need to change network topology. In transparent mode, you only need to place the USG9000 in the network like placing a bridge without need of modifying any existing configuration. Similar to the routing mode, IP packets also need to be filtered and checked in transparent mode, and internal users can be protected by the USG9000.

  • composite mode If there are both interfaces working in routing mode (such interfaces have IP addresses) and interfaces working in transparent mode (such interfaces have no IP address) in the USG9000, the USG9000 is working in composite mode. Composite mode is applied in the case of dual-system hot backup with transparent mode. The interface on which VRRP is enabled needs to be configured with an IP address, and other interfaces do not. Figure 2-3 shows a typical networking in composite mode.
    Figure 2-3  Networking in composite mode

    Master and backup USG9000s are connected with the internal network through interfaces in the Trust zone, while they are connected with the external network through interfaces in the Untrust zone. In addition, master and backup USG9000s connect each other and perform hot standby through VRRP. Note that the internal network and the external network must reside in the same subnet.

    Overview

    With multiple SPUs, the USG9000 supports various security services and presents different product forms. Therefore, it can be deployed in various scenarios.

    The USG9000 supports the following SPUs:

    • Firewall SPUs support VPN, NAT (NAT 44 and NAT 64), security policies, SA and IPv6.
    • Anti-DDoS cleaning SPUs.
    • IPS SPUs for IPS services processing.

    Table 1 Relationship between SPUs and product forms of the USG9000

    Product Forma

    Firewall SPU

    Anti-DDoS SPU(Cleaning SPU)

    IPS SPU

    Firewallb

    Yes

    No

    No

    IPS security gatewayc

    Yes

    No

    Yes

    Firewall+DDoS cleaningd

    Yes

    Yes

    No

    IPS security gateway+DDoS cleaninge

    Yes

    Yes

    Yes

    a: The previous table displays all the SPU combinations for the USG9000.

    b: To provide all of the VPN, NAT, security policies, and IPv6 services (firewall services for short), the USG9000 should house at least a firewall SPU.

    c: To provide IPS services, the USG9000 should house at least a firewall SPU and an IPS SPU.

    d: To provide firewall and anti-DDoS cleaning services at the same time, the USG9000 should house at least a firewall SPU and a cleaning anti-DDoS SPU.

    e: To provide IPS and anti-DDoS cleaning services at the same time, the USG9000 should house at least a firewall SPU, an IPS SPU, and a cleaning anti-DDoS SPU.

    The number of SPUs configured on the USG9000 depends on the user's network conditions. Because the USG9000 is a distributed device, the performance of the integrated device is the total performance of all SPUs.