Got it

Learn Firewalls with Dr. WoW! [All of Dr. WoW's technical posts] Highlighted

Latest reply: Oct 11, 2021 04:55:08 25115 24 18 0 10

Hello there,

This post helps you learn Firewalls with Dr. WoW, as part of the list of all of Dr. WoW's technical posts. Please have a look below to learn more on the topic!

Looking back, a little effort goes a long way, and years of hard make the book.

Moving forward, difficult technologies scare no one, and we gear up for the new journey.
Month after month and quarter after quarter, season 2 of Learn Firewalls with Dr.WoW has finally been unveiled. While racing with time, Dr. WoW has accomplished a lot. Dr. WoW has sorted out the posts of season 1, has made some corrections and improvements, and worked with the publishing house to proofread and finalize the book.

Dr. WoW's team has also made a side-by-side comparison between products and recorded video tutorials. Through the experience of the last half-year, Dr. WoW deeply feels that there is always something to learn about firewalls and that the hardship in studying firewall technologies is beyond words. Fortunately, Huawei Firewall Technologies has been successfully published and Dr. WoW is full of joy and energy again.
In the second season, Dr. WoW will introduce content security features, such as antivirus, intrusion prevention, URL filtering, mail filtering, and other functions such as user management, virtual systems, and bandwidth management.

Dr. WoW will describe these features and functions of Huawei's next-generation firewall (NGFW) and the configuration procedures. Dr. WoW hopes that the posts can help readers understand the technical mechanisms and configuration methods of NGFW. Dr. WoW encourages readers to interact and discuss questions online to make progress together.
The best reward of learning is the thrill of discovery. It has nothing to do with fame. For a network engineer, no money, no fame, and no material object can compare to the joy and satisfaction from getting a network up and running or locating a fault. We never forget why we started to accomplish what we want. Digging into technologies is no easy job. However, we embrace the challenges and will continue this road.




Next-Generation Firewall


NGFW Functions


Traffic Permitted, Virus Blocked---Antivirus Mechanism


Traffic Permitted, Virus Blocked---Antivirus Configuration


Network Threats May Be Deceptive, But Not for an NGFW---Intrusion Prevention Mechanism


Network Threats May Be Deceptive, But Not for an NGFW---Intrusion Prevention Configuration


Classification of Massive URLs---URL Filtering Mechanism


Classification of Massive URLs---URL Filtering Configuration


Multiple Approaches to Email Control---Mail Filtering Mechanism


Networks are changing fast, and networking devices have taken the spotlight one after another. You may be quite familiar with routers and switches, but with firewalls, probably not so much. As loyal safeguards of network security, firewalls keep a weather eye on threats and no packet can get through without the permission of firewalls. Now, it's time to get familiar with these heroes. Welcome to the Dr. WoW series of technical posts. Dr. WoW will take you on an adventurous journey to the world of firewalls.
For readers to conveniently read the technical posts in the forum, Dr. WoW sorted out all technical posts, added another four configuration examples for deploying firewalls in typical scenarios, and converted them to PDF files for readers to download. All readers are welcome to download the PDF file collection in the attachments to acquire knowledge, master configuration methods, and become firewall technical experts.




What Are Firewalls? 


Development of Firewalls 


Huawei’s Firewall Products at a Glance 


Security Zones 


Stateful Inspection and Session Mechanism 


Appendix to the Stateful Inspection and Session Mechanism   


Precautions for Configuration and Troubleshooting Guides 


First Experience of Security Policies


Development History of Security Policies   


Security Policies in the Local Zone   




Configuration Precautions and Troubleshooting Guide 


Single-Packet Attack and Defense


SYN Flood Attack and Defense


UDP Flood Attack and Defense


DNS Flood Attack and Defense


HTTP Flood Attack and Defense 


Source NAT-part 1

Source NAT-part 2

Source NAT-part 3


NAT Server


Bidirectional NAT




Function of Blackhole Routes in NAT Scenarios


Introduction to VPN Technology


GRE-part 1

GRE-part 2


The Birth and Evolution of L2TP VPNs


L2TP Client-initiated VPNs-part1

L2TP Client-initiated VPNs-part2


L2TP NAS-initiated VPNs


L2TP LAC-Auto-initiated VPNs


IPSec Overview


Manual IPSec VPNs








Summary of IKE and IPSec   


Template IPSec       


NAT Traversal 


Digital Certificate Authentication 


IPSec VPN Security Policy Configuration Roadmap


VPN Mechanisms-part 1
SSL VPN Mechanisms-part 2


File Sharing


Web Proxy 


Port Forwarding     


Network Extension-part 1
Network Extension-part 2


Configuring Role Authorization


Configuring SSL VPN Security Policies


Integrated Use of the Four Major SSL VPN Functions


Hot Standby Overview


The Story of VRRP and VGMP-part 1


The Story of VRRP and VGMP-part 2


The Story of VRRP and VGMP-part 3 


The Story of VRRP and VGMP-part 4


Explanation of VGMP Techniques-part 1

Explanation of VGMP Techniques-part 2


Explanation of the HRP Protocol


Hot Standby Configuration Guide


Multi-homing Overview 


Shortest Path Routing


Policy-based Routing-part 1


Policy-based Routing-part 2

This article contains more resources

You need to log in to download or view. No account? Register


The post is synchronized to: Routing & SwitchingWLAN

  • x
  • convention:

Created Apr 24, 2015 02:23:47

this is a good material for security engineers,thanks for sharing
View more
  • x
  • convention:

Created Mar 13, 2015 07:43:09

Thank you.
View more
  • x
  • convention:

Created Jul 13, 2015 06:22:16

More info:

View more
  • x
  • convention:

Created Mar 20, 2015 09:03:21

Thank you for sharing.

View more
  • x
  • convention:

Created Mar 31, 2016 06:12:22

dear dr.Wow Man many Thanks

View more
  • x
  • convention:

Created Jul 1, 2015 03:32:46

Thank you for sharing.

View more
  • x
  • convention:

Created Jul 22, 2016 15:32:04

thanks dr wow
View more
  • x
  • convention:

Created Nov 30, 2016 07:50:35

Thanks. These articles very helpful.
View more
  • x
  • convention:

Created Jan 21, 2017 09:10:21

thats great
View more
  • x
  • convention:

Back to list


You need to log in to comment to the post Login | Register

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits


Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Please bind your phone number to obtain invitation bonus.