01-Fundamentals Configuration Guide

HomeSupportResource CenterRoutersH3C SR6600-X Router SeriesH3C SR6600-X Router SeriesTechnical DocumentsConfigure & DeployConfiguration GuidesH3C SR6602-X Routers Configuration Guides-R7607-6W10001-Fundamentals Configuration Guide
Table of Contents
Related Documents
12-Security zone configuration
Title Size Download
12-Security zone configuration 89.39 KB

Configuring security zones

Overview

You can configure security zones to implement security zone-based security management.

Basic concepts

The security zone feature includes the following basic concepts:

·     Security zone—A security zone is a collection of interfaces that have the same security requirements.

·     System-defined security zones—The device provides the following system-defined security zones: Local, Trust, DMZ, Management, Untrust, library, and office. These security zones are created automatically by the system when one of following events occurs:

¡     The first command for creating a security zone is executed.

¡     The first command for creating a zone pair is executed.

System-defined security zones cannot be deleted.

·     DMZ—A demilitarized zone is a network that is separate from the internal network and the external network both logically and physically. Typically, a DMZ contains devices for the public to access, such as the FTP servers.

Security zone-based security management

To implement security zone-based security management, assign interfaces with the same security requirements to the same security zone.

For example, your enterprise has four network segments for the R&D department and two network segments for the servers. You can perform the following tasks to control traffic between the security zones:

·     Create two security zones: Zone_RND and Zone_DMZ.

·     Assign the four firewall interfaces that are connected to the R&D department to Zone_RND.

·     Assign the two firewall interfaces that are connected to the servers to Zone_DMZ.

·     Deploy security policies between the two security zones, including ACLs, ASPF policies, and object policies.

If the network topology changes, you only need to change interface assignments. You do not need to modify the security policies. For more information about packet filtering policies, see ACL and QoS Configuration Guide. For more information about ASPF and object policies, see Security Configuration Guide.

Figure 1 Security zones

 

The following table describes how the device handles packets when security zone-based security management is configured:

 

Packets

Action

Packets between an interface that is in a security zone and an interface that is not in any security zone

Discard.

Packets between two interfaces that are in the same security zone

Discard by default.

Packets between two interfaces that belong to different security zones

Forward or discard, depending on the matching object policy. If the object policy does not exist or does not take effect, the packets are discarded. For more information, see "Creating a zone pair."

Packets between two interfaces that are not in any security zone

Forward.

Packets originated from or destined for the device itself

Forward or discard, depending on the matching object policy. By default, these packets are discarded.

 

Application scenarios

As a best practice, use security zone-based security management when the firewall is connected to multiple network segments or the network topology might change.

The traditional security management technology is based on interfaces. To filter packets, you must apply security policies on the inbound and outbound interfaces of a firewall. When the firewall is connected to multiple network segments, deploying security policies is time consuming and complicated. If the network topology changes, you might have to reconfigure security policies.

Security zone configuration task list

Tasks at a glance

(Required.) Creating a security zone

(Required.) Adding members to a security zone

(Optional.) Creating a zone pair

(Optional.) Specifying the default action for packets between interfaces in the same security zone

 

Configuring a security zone

Creating a security zone

A security zone created on the default MDC belongs to the default MDC. To create a security zone for a non-default MDC, you must create the MDC and enter the MDC's system view.

To create a security zone:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     (Optional.) Log in to the MDC.

switchto mdc mdc-name

This command is required only if you want to create a security zone for a non-default MDC.

3.     (Optional.) Enter the system view of the MDC.

system-view

This command is required only if you want to create a security zone for a non-default MDC.

4.     Create a security zone and enter security zone view.

security-zone name zone-name

By default, no security zone exists.

 

Adding members to a security zone

A security zone can include member types listed in Table 1.

Table 1 Security zone members and objects that the members identify

Security zone member

Objects that each member identifies

Layer 3 interface:

·     Layer 3 Ethernet interface

·     Layer 3 logical interface, such as a Layer 3 subinterface

All packets received or sent on the interface

Layer 2 interface-VLAN combination

All packets received or sent on the interface that carry the specified VLAN tag

 

If a security zone has multiple types of members, a packet is matched in the following order: service chain, subnet, interface, and VLAN. The match operation stops when the first matching member is found.

To add members to a security zone:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     (Optional.) Log in to the MDC.

switchto mdc mdc-name

This command is required only if you want to create a security zone for a non-default MDC.

3.     (Optional.) Enter the system view of the MDC.

system-view

This command is required only if you want to create a security zone for a non-default MDC.

4.     Enter security zone view.

security-zone name zone-name

N/A

5.     Add members to the security zone.

·     Add a Layer 3 Ethernet interface:
import interface
layer3-interface-type layer3-interface-number

·     Add Layer 2 interface-VLAN combinations:
import interface
layer2-interface-type layer2-interface-number vlan vlan-list

By default, a security zone does not have any members.

You can perform this step multiple times to add multiple members.

 

Creating a zone pair

A zone pair has a source security zone and a destination security zone. The device examines received first data packets and uses zone pairs to identify data flows.

You can use the zone-pair security source any destination any command to define the any-to-any zone pair. This zone pair matches all packets from one security zone to another security zone.

After you apply security policies to zone pairs, the device processes data flows based on security policies.

·     If a packet matches a zone pair between specific security zones, the device processes the packet by using the security policies applied to the zone pair.

·     If a packet does not match any zone pair between specific security zones, the device identifies whether the packet is between the Management and Local zones.

¡     If the packet is between the Management and Local zones, the device discards the packet.

¡     If the packet is not between the Management and Local zones, the device searches for the any-to-any zone pair.

-     If the zone pair exists, the device processes the packet by using the security policies applied to the zone pair.

-     If the zone pair does not exist, the device discards the packet.

If you apply an object policy and a packet filtering policy to a zone pair, the object policy takes precedence.

To create a zone pair:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     (Optional.) Log in to the MDC.

switchto mdc mdc-name

This command is required only if you want to create a security zone for a non-default MDC.

3.     (Optional.) Enter the system view of the MDC.

system-view

This command is required only if you want to create a security zone for a non-default MDC.

4.     Create a zone pair and enter zone pair view.

zone-pair security source { source-zone-name | any } destination { destination-zone-name | any }

By default, no zone pair exists

 

Specifying the default action for packets between interfaces in the same security zone

By default, packets exchanged between interfaces in the same security zone are dropped if no zone pair is configured from a security zone to the security zone itself. You can use this feature to change the processing policy for the packets.

To specify the default action for packets exchanged between interfaces in the same security zone:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     (Optional.) Log in to the MDC.

switchto mdc mdc-name

This command is required only if you want to create a security zone for a non-default MDC.

3.     (Optional.) Enter the system view of the MDC.

system-view

This command is required only if you want to create a security zone for a non-default MDC.

4.     Specify the default action for packets exchanged between interfaces in the same security zone.

·     Set the default action to permit:
security-zone intra-zone default permit

·     Set the default action to deny:
undo security-zone intra-zone default permit

By default, the default action is deny for packets exchanged between interfaces in the same security zone.

 

Displaying security zones

Execute display commands in any view.

 

Task

Command

Display security zone information.

display security-zone [ name zone-name ]

Display zone pair information.

display zone-pair security

 

Security zone configuration example

Network requirements

As shown in Figure 2, a firewall (Device) connects the corporate network to the Internet. The corporate network needs to provide FTP services for external users.

To ensure corporate network security, configure the firewall as follows:

·     Assign the interfaces used to connect the internal network, the servers, and the Internet to security zones Trust, DMZ, and Untrust, respectively.

·     Configure zone pairs and apply object policies to control access as follows:

¡     Allow internal users to access the FTP server and the Internet.

¡     Allow external users to access the FTP server.

¡     Allow the FTP server to access the Internet.

¡     Deny external users and the FTP server access to the internal network.

Figure 2 Network diagram

 

Configuration procedure

# Add interface GigabitEthernet 1/1/1 to security zone Trust.

<Device> system-view

[Device] security-zone name trust

[Device-security-zone-Trust] import interface gigabitethernet 1/1/1

[Device-security-zone-Trust] quit

# Add interface GigabitEthernet 1/1/2 to security zone DMZ.

[Device] security-zone name dmz

[Device-security-zone-DMZ] import interface gigabitethernet 1/1/2

[Device-security-zone-DMZ] quit

# Add interface GigabitEthernet 1/1/3 to security zone Untrust.

[Device] security-zone name untrust

[Device-security-zone-Untrust] import interface gigabitethernet 1/1/3

[Device-security-zone-Untrust] quit

# Configure ACL 3500 to permit IP traffic.

[Device] acl advanced 3500

[Device-acl-ipv4-3500] rule permit ip

[Device-acl-ipv4-3500] quit

# Configure ASPF policy 1 to detect FTP traffic. To detect other types of traffic, use the detect command to add the protocols.

[Device] aspf policy 1

[Device-aspf-policy-1] detect ftp

[Device-aspf-policy-1] quit

# Create a zone pair with the source security zone Trust and destination security zone Untrust.

[Device] zone-pair security source trust destination untrust

# Apply ASPF policy 1 and ACL 3500 to the zone pair.

[Device-zone-pair-security-Trust-Untrust] aspf apply policy 1

[Device-zone-pair-security-Trust-Untrust] packet-filter 3500

[Device-zone-pair-security-Trust-Untrust] quit

# Create a zone pair with the source security zone Trust and destination security zone DMZ.

[Device] zone-pair security source trust destination dmz

# Apply ASPF policy 1 and ACL 3500 to the zone pair.

[Device-zone-pair-security-Trust-DMZ] aspf apply policy 1

[Device-zone-pair-security-Trust-DMZ] packet-filter 3500

[Device-zone-pair-security-Trust-DMZ] quit

Verifying the configuration

# Verify that internal hosts can access resources on the Internet and the FTP resources in the DMZ zone. (Details not shown.)

# Verify that access requests initiated from the Internet or the DMZ zone are denied. (Details not shown.)

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网