Zone configuration example, Network requirements – H3C Technologies H3C SecPath F1000-E User Manual
Page 129

5
Item Description
Preference
Sets the preference of the specified zone
By default, packets from a high priority zone to a low priority zone are allowed
to pass.
Share
Sets whether the specified zone can be referenced by other virtual devices.
Virtual Device
Displays the virtual device to which the zone belongs.
Interface
Sets the interfaces to be added to the zone.
The interfaces that have been added to a zone are in the selected status, and the
interfaces that can be added but have not been added to a zone are in the
non-selected status.
Interface
VLAN
If the interfaces added to the zone are Layer 2 Ethernet interfaces, you must
specify the range of the VLANs to be added to the zone. The VLANs must belong
to the virtual device to which the zone belongs and have not been added to
other zones.
.
Zone Configuration Example
Network requirements
•
A company uses Device as the network border firewall device to connect the internal network and
the Internet and to provide WWW and FTP services to the external network. You need to perform
some basic configurations for the zones of the firewall to prepare for the configurations of the
security policies.
•
The internal network is a trust network and can access the server and the external network. You
can deploy the internal network in the Trust zone with a higher priority and connect the interface
GigabitEthernet 0/0 on Device to the external network.
•
The external network is an untrusted network, and you need to use strict security rules to control
access from the external network to the internal network and the server. You can deploy the
external network in the Untrust zone with a lower priority and connect the interface
GigabitEthernet 0/2 on Device to the external network.
•
If you deploy the WWW server and the FTP server on the external network, security cannot be
ensured; if you deploy them on the internal network, the external illegal users may use the security
holes to attack the internal network. Therefore, you can deploy the servers in the DMZ zone with a
priority between Trust and Untrust, and connect the Ethernet interface GigabitEthernet 0/1 on
Device to the servers. In this way, the server in the DMZ zone can access the external network in
the Untrust zone with a lower priority, but when it accesses the internal network in the Trust
zone with a higher priority, its access is controlled by the security rules.