No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


HUAWEI Firewall Comprehensive Configuration Examples

This document describes the application scenarios and configuration methods in typical projects of the firewall.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Conclusion and Suggestions

Conclusion and Suggestions

This case has important reference value. You can deploy only required functions during actual firewall deployment. This solution can be conclued as follows:

  • This case demonstrates multiple classical features of the firewall, including security policies, NAT, ASPF, attack defense, IPS and bandwidth management (application-based bandwidth limiting and per-IP/per-user bandwidth limiting).

  • This case shows the capabilities of the firewall that acts as an egress gateway. Uplink selection is one of the most important features of the gateway. In this case, the PBR, intelligent uplink selection, DNS transparent proxy, smart DNS, and server load balancing provided by the firewall can meet the increasing complex link selection, improving the bandwidth utilization and user experience. Compared with a router that acts a gateway, the firewall that acts as a gateway has more powerful NAT and security defense capabilities.

  • This case also shows the NAT tracing function of the firewall. The firewall that has an audit policy configured sends session logs to the NMS. The administrator can view pre-NAT and post-NAT IP addresses on the NMS. NAT tracing helps audit user online behavior.

Updated: 2019-01-26

Document ID: EDOC1100062972

Views: 16536

Downloads: 710

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next