Data security, Managing public keys, Firewall and connection control – H3C Technologies H3C SecBlade LB Cards User Manual
Page 13: Acl based packet-filter
2
•
Authorization—Grants user rights and controls user access to resources and services. For example,
a user who has successfully logged in to the device can be granted read and print permissions to
the files on the device.
•
Accounting—Records all network service usage information, including service type, start time, and
traffic. The accounting function provides information required for charging, and allows for network
security surveillance.
AAA can be implemented through multiple protocols, such as RADIUS and HWTACACS, among which
RADIUS is most often used.
PKI
Public Key Infrastructure (PKI) uses a general security infrastructure to provide information security through
public key technologies. PKI employs the digital certificate mechanism to manage the public keys. The
digital certificate mechanism binds public keys to their owners, helping distribute public keys in large
networks securely. With digital certificates, the PKI system provides network communication, e-commerce
and e-Government with security services.
H3C's PKI system provides digital certificate management for SSL.
Data security
Managing public keys
Public key configuration enables you to manage the local asymmetric key pairs (such as creating and
destroying a local asymmetric key pair, displaying or exporting the local host public key), and configure
the peer host public keys on the local device.
SSL
SSL is a security protocol that provides secure connection services for TCP-based application layer
protocols such as HTTPS by using the public key mechanism and digital certificates. SSL is independent
of the application layer, so the connection at the application layer is safe, and unknown to SSL.
SSH
SSH is a network security protocol implementing remote login and file transfer securely over an insecure
network. Using encryption and authentication, SSH protects devices against attacks such as IP spoofing
and plaintext password interception.
Firewall and connection control
ACL based packet-filter
An ACL packet-filter implements IP packet specific filtering.
Before forwarding an IP packet, the device obtains the following header information:
•
Number of the upper layer protocol carried by the IP layer
•
Source address
•
Destination address
•
Source port number
•
Destination port number