Hello, welcome HongTelecom
Huawei USG9000 Security Zone Specifications

As a world leading Huawei networking products supplier, Hong Telecom Equipment Service LTD(HongTelecom) keeps regular stock of Huawei router and switch and all cards at very good price, also HongTelecom ship to worldwide with very fast delivery.

For related articles, visit the HongTelecom Blog and HongTelecom WordPress.

For real pictures of related product, visit the HongTelecom Gallery.

To buy related product, visit the HongTelecom Online Shop.

Introduction to the USG9000

At present, the USG9000 can work in three modes: routed mode, transparent mode, and composite mode.

  • routing mode In routing mode, the USG9000 uses the layer 3 for external connections, and all interfaces must be assigned with IP addresses. When the USG9000 is located between the internal network and the external network, you need to configure the interfaces, through which the USG9000 is connected with the internal network and the external network, with IP addresses on different network segments and re-plan the network topology. In this case, the USG9000 serves as a router. As shown in Figure 2-1, the USG9000 is connected with the internal network through an interface in the Trust zone, while it is connected with the external network through an interface in the Untrust zone. Note that the interface in Trust zone and the interface in Untrust zone reside in different two subnets.
    Figure 2-1  Networking in routing mode

    When working in routing mode, the USG9000 can complete ACL packet filtering. However, network topology needs to be changed. For example, internal network users need to change their gateways and routers' routing configurations need to be changed.

  • transparent mode In transparent mode, the USG9000 uses the layer 2 for external connections, and none of the interfaces can be assigned with IP addresses. In this case, the USG9000 is transparent to users in subnets and routers. That is, users do not feel the existence of the USG9000. As shown in Figure 2-2, the USG9000 is connected with the internal network through interfaces in the Trust zone, while it is connected with the external network through interfaces in the Untrust zone. Note that the internal network and the external network must reside in the same subnet.
    Figure 2-2  Networking in transparent mode

    If the USG9000 works in transparent mode, you do not need to change network topology. In transparent mode, you only need to place the USG9000 in the network like placing a bridge without need of modifying any existing configuration. Similar to the routing mode, IP packets also need to be filtered and checked in transparent mode, and internal users can be protected by the USG9000.

  • composite mode If there are both interfaces working in routing mode (such interfaces have IP addresses) and interfaces working in transparent mode (such interfaces have no IP address) in the USG9000, the USG9000 is working in composite mode. Composite mode is applied in the case of dual-system hot backup with transparent mode. The interface on which VRRP is enabled needs to be configured with an IP address, and other interfaces do not. Figure 2-3 shows a typical networking in composite mode.
    Figure 2-3  Networking in composite mode

    Master and backup USG9000s are connected with the internal network through interfaces in the Trust zone, while they are connected with the external network through interfaces in the Untrust zone. In addition, master and backup USG9000s connect each other and perform hot standby through VRRP. Note that the internal network and the external network must reside in the same subnet.

    Introduction to Security Zone

    Zone is a concept introduced in USG9000, which is one of main features distinguishing the USG9000 from the router.

    For the router, the network security check is performed on interfaces because the networks connected with each interface are equal in security. That is, there is no obvious difference between internal networks and external networks for the router. In this way, when a data stream unidirectionally passes through a router, it may be checked twice on both the inbound interface and the outbound interface to meet the separate security definitions on each interface.

    However, the USG9000's situation is different, where internal networks and external networks are clearly defined. The USG9000 protects internal networks from illegal intrusion of external networks. When a data stream passes through a USG9000device, the security operation triggered varies with data stream direction. At this time, it is not suitable to check the security policy on the interface of the USG9000. Therefore, the USG9000 introduces the concept of security zone.

    A security zone is composed of one or more interfaces with the same security level.

    The features of the security zones are as follows:

    • The security level is denoted by an integer in the range of 1 to 100. The greater the number is, the higher the level is.
    • There are no two zones with the same security level.
Close Menu
×
×

Cart