No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


HUAWEI Firewall Comprehensive Configuration Examples

This document describes the application scenarios and configuration methods in typical projects of the firewall.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Solution Overview

Solution Overview

A broadcast and television network provides home broadcast and television services. It also leases links from ISPs to provide access services, such broadband Internet access and hosted servers. At the network egress, a firewall is usually deployed as an egress gateway to provide Internet access and security assurance.

Figure 2-1  Application of firewalls at the egress of a broadcast and television network

As shown in Figure 2-1, a firewall is deployed at the network egress to provide the following functions:

  • NAT: The firewall provides a source NAT function to translate the private IP address of a broadband user to a public IP address. It also functions as a NAT server to translate the private IP address of a hosted server to a public IP address for access of external users.
  • Intelligent uplink selection (multi-ISP): The firewall provides multiple uplink selection modes, such as destination IP address-based and application-based, using multiple ISP links to ensure the Internet access quality.
  • Security management: The firewall isolates security zones using security policies and provides security protection using such functions as intrusion prevention and Anti-DDoS.
  • Source tracing and audit: The firewall logs pre-NAT and post-NAT IP addresses and the online and offline activities of IM users for audit and source tracing.
Updated: 2019-01-26

Document ID: EDOC1100062972

Views: 18317

Downloads: 765

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next