H3C S9500 Series Routing Switches SecBlade FW VPN Cards Operation Manual(V1.03)

HomeSupportSwitchesH3C S9500 Series SwitchesConfigure & DeployConfiguration GuidesH3C S9500 Series Routing Switches SecBlade FW VPN Cards Operation Manual(V1.03)
01-Overview Operation
Title Size Download
01-Overview Operation 86 KB

Chapter 1  SecBlade Overview

1.1  SecBlade Firewall Cards

SecBlade firewall cards are designed to address the requirements on the security of enterprise or campus networks. By integrating the forwarding function of the switch and services processing, it enables the switch to handle security services as required for security defense and monitoring while forwarding data high efficiently.

SecBlade firewall cards are security-specific cards that combine the VLAN switching technology of the switch and the network security technology. Furthermore, it inherits the feature of wire speed-based high capacity forwarding of the switch, and integrates the secureVlan technology into the VLAN technology for security purpose. SecBlade firewall cards can protect network borders as well as multiple demilitarized zones (DMZs) and VLANs crossing areas in the Intranet.

Table 1-1 SecBlade FW card functions

Attribute

Description

Network security

Authentication, authorization and accounting (AAA)

RADIUS

HWTACACS

CHAP authentication

PAP authentication

Domain authentication

Firewall

Packet filtering

Access control list on the basis of interface

Access control list on the basis of time period

ASPF status firewall

Anti-attack features:

Land, Smurf, Fraggle, WinNuke, Ping of Death, Tear Drop, IP Spoofing, SYN Flood, ICMP Flood, UDP Flood, ARP spoofing attack defending

Initiative and reverse ARP query

Illegal flag bit attack defending of TCP packets

Super ICMP packet attack defending

Address/port scanning defending

DoS/DDoS attack defending

ICMP redirection and unreachable packets controlling

Tracert packets controlling

IP packets with route record controlling

Static and dynamic blacklist

MAC and IP addresses binding

Worm virus defending

Transparent firewall

Reverse path forwarding

Mail/network page filtering

Mail filtering:

SMTP mail addresses

SMTP mail titles

SMTP mail contents

SMTP mail attachments

Network page filtering:

HTTP URLs

HTTP contents

Security management

Real time attack log

Blacklist log

Address binding log

Traffic alarm log

Session log

Binary format log function

Traffic statistics and analysis function

Monitoring rate globally or on the basis of security domain

Monitoring the percentage of protocol packets globally or on the basis of security domain

Security event statistics

Real time E-Mail alarm

Periodical E-Mail transmission

NAT

Address transmission in address pool mode

Address transmission by ACL

Easy IP

NAT Server

Valid time for address transmission

Multiple ALGs, including FTP, H323, DNS, and SIP

VPN

L2TP VPN

Initiating a connection to the specified LNS according to the full user name and domain name of the VPN user

Assigning addresses for VPN users

LCP re-negotiation and CHAP re-authentication

L2TP multi-instance

GRE VPN

Using the tunnel technology to encapsulate and decapsulate data packets at both sides of the tunnel

Network interconnection

LAN protocol

Ethernet_II

Ethernet_SNAP

VLAN

Data link layer protocol

PPP

PPPoE

Network protocol

IP service

ARP

Static domain name resolution

IP address borrowing

DHCP relay

DHCP server

DHCP client

IP routing

Static route management

RIP-1/RIP-2

OSPF

BGP

Routing policy

Policy routing

Network reliability

Supporting virtual router redundancy protocol to implement backup

Configuration management

Command line interface

Local configuration through the Console interface

Remote configuration through the AUX interface

Local or remote configuration through Telnet or SSH

Configuration through switch

Hierarchical protection for configuration commands to make sure illegal users cannot configure the device

Prompts and help information in Chinese Detailed debugging information for diagnosing network failures

Test tools such as Tracert and Ping commands for network diagnosis

Telnet for directly logging into and managing other network devices

FTP Server/Client

TFTP

Logging

File system management

User interface configuration to provide multiple authentication and authorization functions for login users

SNMPv3 and SNMPv2C- and SNMPv1-compatible

NTP synchronization

 

1.2  SecBlade VPN Cards

SecBlade VPN cards support various VPN services such as L2TP VPN, IPSec VPN, GRE VPN and dynamic VPN. With SecBlade VPN cards, integrating access to LANs and WANs can implement flatted network aggregation for easing maintenance and reducing costs. In addition, integrating the Internet, Intranet and Extranet can provide for safe access.

Table 1-2 SecBlade VPN card functions

Attribute

Description

Network security

Authentication, authorization and accounting (AAA)

RADIUS

HWTACACS

CHAP authentication

PAP authentication

Domain authentication

Firewall

Packet filtering

Access control list on the basis of interface

Access control list on the basis of time period

VPN

L2TP VPN

Initiating a connection to the specified LNS according to the full user name and domain name of the VPN user

Assigning addresses for VPN users

LCP re-negotiation and CHAP re-authentication

IPSec/IKE

AH and ESP protocols

Establishing security association manually or through IKE negotiation automatically

DES, 3DES and AES (only for ESP)

MD5 and SHA-1

IKE main mode and aggressive mode

NAT traversing

GRE VPN

Using the tunnel technology to encapsulate and decapsulate data packets at both sides of the tunnel

DVPN

Automatic tunnel establishment

Tunnel establishment in UDP mode

Client access authentication and inter-node encryption and authentication

VPN building through dynamical IP addresses

Supporting a node in multiple VPN areas

Multiple VPN areas

NAT traversing

IPSec encryption.

Server bandwidth saving through dynamic tunnel establishment

Network interconnection

LAN protocol

Ethernet_II

Ethernet_SNAP

VLAN

Link layer protocol

PPP

PPPoE

Network protocol

IP service

ARP

Static domain name resolution

IP address borrowing

DHCP relay

DHCP server

DHCP client

IP routing

Static route management

RIP-1/RIP-2

OSPF

BGP

Routing policy

Policy routing

Network reliability

Supporting virtual router redundancy protocol to implement backup

Configuration management

Command line interface

Local configuration through the Console interface

Remote configuration through the AUX interface

Local or remote configuration through Telnet or SSH

Configuration through switch

Hierarchical protection for configuration commands to make sure illegal users cannot configure the device

Detailed debugging information for diagnosing network failures

Test tools such as Tracert and Ping commands for network diagnosis

Telnet for directly logging into and managing other network devices

FTP Server/Client

TFTP

Logging

File system management

User interface configuration to provide multiple authentication and authorization functions for login users

SNMPv3 and SNMPv2C- and SNMPv1-compatible

NTP synchronization

 


Chapter 2  SecBlade Configuration

2.1  SecBlade Configuration

To make switch and SecBlade work together, perform the following SecBlade configurations on the switch:

l           Configuring Interface Aggregation for the SecBlade Card

l           Creating a SecBlade Module

l           Specifying the Layer 3 Interface Connecting the Switch and the SecBlade Card

l           Specifying the VLANs Protected by the SecBlade Card

l           Mapping the SecBlade Module to the SecBlade Card

l           Logging into the SecBlade Card

l           Configuring Default Login User Function (Optional)

2.1.1  Configuring Interface Aggregation for the SecBlade Card

Two internal GE interfaces are used to connect the SecBlade card to the switch. You can aggregate these two interfaces into a logical interface for higher bandwidth.

Perform the following configuration in system view of the switch.

Table 2-1 Configure interface aggregation for the SecBlade card

Operation

Command

Configure two GE interfaces for aggregation

secblade aggregation slot slot-number

Remove the configuration

undo secblade aggregation slot slot-number

 

By default, no interface aggregation is configured and only one GE interface is available.

 

  Caution:

When you use the secblade aggregation slot command to configure interface aggregation for the SecBlade card, the SecBlade card will occupy the resources used by other aggregation groups if its resources for interface aggregation are not enough.

 

2.1.2  Creating a SecBlade Module

To make the SecBlade card and the switch work together, you first need to create a SecBlade module to enter SecBlade module view.

Perform the following configuration in system view of the switch.

Table 2-2 Create the SecBlade module

Operation

Command

Create a SecBlade module

secblade module sec-mod-name

Remove the SecBlade module

undo secblade module sec-mod-name

 

By default, no SecBlade module is created.

2.1.3  Specifying the Layer 3 Interface Connecting the Switch and the SecBlade Card

To make the SecBlade card and the switch communicate at Layer 3, you must specify the Layer 3 interface connecting the switch and the SecBlade card.

Perform the following configuration in SecBlade module view of the switch.

Table 2-3 Specify the Layer 3 interface connecting the switch and the SecBlade card

Operation

Command

Specify the Layer 3 interface connecting the switch and the SecBlade card

secblade-interface vlan-interface

Remove the configuration

undo secblade-interface vlan-interface interface-number

 

By default, the Layer 3 interface connecting the switch and the SecBlade card is not configured.

2.1.4  Specifying the VLANs Protected by the SecBlade Card

To make the SecBlade card protect data streams of the specified VLANs, you need to specify the VLANs to be protected.

Perform the following configuration in SecBlade module view of the switch.

Table 2-4 Specify the VLANs to be protected

Operation

Command

Specify the VLAN to be protected

security-vlan vlan-range

Cancel the VLAN protection

undo security-vlan vlan-range

 

By default, no VLAN is protected.

2.1.5  Mapping the SecBlade Module to the SecBlade Card

After implementing the above configuration on the SecBlade module, you need to map this module to the SecBlade card to apply the configuration.

Perform the following configuration in SecBlade module view of the switch.

Table 2-5 Map the SecBlade module to the SecBlade card

Operation

Command

Map the SecBlade module to the SecBlade card

map to slot slot-number

Remove the configuration

undo map to slot slot-number

 

By default, the SecBlade module is not mapped to the SecBlade card.

2.1.6  Logging into the SecBlade Card

You can directly log in to the SecBlade card through the switch for configuration and management.

Perform the following configuration in user view of the switch.

Table 2-6 Log in to the SecBlade card

Operation

Command

Log into the SecBlade

secblade slot slot-number

 

2.1.7  Configuring Default Login User Function

For login convenience, a user whose name and password are both SecBlade is created in the SecBlade card. You can use this user name and password to log in to the SecBlade card.

Perform the following configuration in system view of the SecBlade card.

Table 2-7 Configure default login user function

Operation

Command

Enable default login user function

default-login-user

Disable default login user function

undo default-login-user

 

By default, the default login user function is enabled. You are allowed to use the internally created user to log in to the SecBlade card.

2.2  Displaying Information about the SecBlade Module

After the above configuration, you can execute the following command in any view to display information about the SecBlade module to verify the configuration.

Table 2-8 Display information about the SecBlade module

Operation

Command

Display information about the SecBlade module

display secblade module [sec-mod-name ]

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网