Got it

Learn Firewalls with Dr. WoW! [All of Dr. WoW's technical posts]

Latest reply: Sep 24, 2020 20:20:02 22172 22 13 0 9

Hello there, dear Community!

This post helps you learn Firewalls with Dr. WoW, as part of the list of all of Dr. WoW's technical posts. Please have a look below to learn more on the topic!

Looking back, a little effort goes a long way and years of hard makes the book.

Moving forward, difficult technologies scare no one, and we gear up for the new journey.
Month after month and quarter after quarter, season 2 of Learn Firewalls with Dr.WoW has finally been unveiled. While racing with time, Dr. WoW has accomplished a lot. Dr. WoW has sorted out the posts of season 1, has made some corrections and improvements and worked with the publishing house to proofread and finalize the book.

Dr. WoW's team has also made a side-by-side comparison between products and recorded video tutorials. Through the experience of the last half year, Dr. WoW deeply feels that there is always something to learn about firewalls and that the hardship in studying firewall technologies is beyond words. Fortunately, Huawei Firewall Technologies has been successfully published and Dr. WoW is full of joy and energy again.
In the second season, Dr. WoW will introduce content security features, such as antivirus, intrusion prevention, URL filtering, mail filtering and other functions such as user management, virtual systems, and bandwidth management.

Dr. WoW will describe these features and functions of Huawei next-generation firewall (NGFW) and the configuration procedures. Dr. WoW hopes that the posts can help readers understand the technical mechanisms and configuration methods of NGFW. Dr. WoW encourages readers to interact and discuss questions online to make progress together.
Thebest reward of learning is the thrill of discovery. It has nothing to do withfame. For a network engineer, no money, no fame and no material object can compare to the joy and satisfaction from getting a network up and running orlocating a fault. We never forget why we started to accomplish what we want. Digging into technologies is no easy job. However, we embrace the challenges and will continue this road.

1Next-Generation Firewall
2NGFW Functions
3Traffic Permitted, Virus Blocked---Antivirus Mechanism
4Traffic Permitted, Virus Blocked---Antivirus Configuration
5Network Threats May Be Deceptive, But Not for an NGFW---Intrusion Prevention Mechanism
6Network Threats May Be Deceptive, But Not for an NGFW---Intrusion Prevention Configuration
7Classification of Massive URLs---URL Filtering Mechanism
8Classification of Massive URLs---URL Filtering Configuration
9Multiple Approaches to Email Control---Mail Filtering Mechanism

Networks are changing fast, and networking devices have taken the spotlight one after another. You may be quite familiar with routers and switches, but with firewalls, probably not so much. As loyal safeguards of network security, firewalls keep a weather eye on threats and no packet can get through without the permission of firewalls. Now, it's time to get familiar with these heroes. Welcome to the Dr. WoW series technical posts. Dr. WoW will take you on an adventurous journey to the world of firewalls.
For readers to conveniently read the technical posts in the forum, Dr. WoW sorted out all technical posts, added another four configuration examples for deploying firewalls in typical scenarios and converted them to PDF files for readers to download. All readers are welcome to download the PDF file collection in the attachments to acquire knowledge, master configuration methods and become firewall technical experts.

 No. Title
 1What Are Firewalls? 
 2Development of Firewalls 
 3Huawei’s Firewall Products at a Glance 
 4Security Zones 
 5Stateful Inspection and Session Mechanism 
 6Appendix to the Stateful Inspection and Session Mechanism   
 7Precautions for Configuration and Troubleshooting Guides 
 8First Experience of Security Policies
 9Development History of Security Policies   
 10Security Policies in the Local Zone   
 12Configuration Precautions and Troubleshooting Guide 
 13Single-Packet Attack and Defense
 14SYN Flood Attack and Defense
 15UDP Flood Attack and Defense
 16DNS Flood Attack and Defense
 17HTTP Flood Attack and Defense 

Source NAT-part 1

Source NAT-part 2

Source NAT-part 3

 19NAT Server
 20Bidirectional NAT
 22Function of Blackhole Routes in NAT Scenarios
 23Introduction to VPN Technology

GRE-part 1

GRE-part 2

 25The Birth and Evolution of L2TP VPNs

L2TP Client-initiated VPNs-part1

L2TP Client-initiated VPNs-part2

 27 L2TP NAS-initiated VPNs
 28 L2TP LAC-Auto-initiated VPNs
 29 IPSec Overview
 30 Manual IPSec VPNs
 33 IKEv2
 34Summary of IKE and IPSec   
 35Template IPSec       
 36 NAT Traversal 
 37 Digital Certificate Authentication 
 38IPSec VPN Security Policy Configuration Roadmap
 39VPN Mechanisms-part 1
SSL VPN Mechanisms-part 2
 40File Sharing
 41 Web Proxy 
 42Port Forwarding     
 43Network Extension-part 1
Network Extension-part 2
 44Configuring Role Authorization
 45Configuring SSL VPN Security Policies
 46Integrated Use of the Four Major SSL VPN Functions
 47Hot Standby Overview

The Story of VRRP and VGMP-part 1

49The Story of VRRP and VGMP-part 2

The Story of VRRP and VGMP-part 3 

 51The Story of VRRP and VGMP-part 4

Explanation of VGMP Techniques-part 1

Explanation of VGMP Techniques-part 2

 53Explanation of the HRP Protocol
 54Hot Standby Configuration Guide
 55Multi-homing Overview 
 56Shortest Path Routing
 57Policy-based Routing-part 1
 58Policy-based Routing-part 2


This article contains more resources

You need to log in to download or view. No account? Register

  • x
  • convention:

Created Apr 24, 2015 02:23:47

this is a good material for security engineers,thanks for sharing
View more
  • x
  • convention:

Created Mar 13, 2015 07:43:09

Thank you.
View more
  • x
  • convention:

Created Jul 13, 2015 06:22:16

More info:

View more
  • x
  • convention:

Created Mar 20, 2015 09:03:21

Thank you for sharing.

View more
  • x
  • convention:

Created Mar 31, 2016 06:12:22

dear dr.Wow Man many Thanks

View more
  • x
  • convention:

Created Jul 1, 2015 03:32:46

Thank you for sharing.

View more
  • x
  • convention:

Created Jul 22, 2016 15:32:04

thanks dr wow
View more
  • x
  • convention:

Created Nov 30, 2016 07:50:35

Thanks. These articles very helpful.
View more
  • x
  • convention:

Created Jan 21, 2017 09:10:21

thats great
View more
  • x
  • convention:

Back to list


You need to log in to comment to the post Login | Register

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " Privacy."

My Followers

Login and enjoy all the member benefits


Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Please bind your phone number to obtain invitation bonus.