Got it

Learn Firewalls with Dr. WoW! [All of Dr. WoW's technical posts] Highlighted

Latest reply: Oct 11, 2021 04:55:08 25115 24 18 0 10

Hello there,

This post helps you learn Firewalls with Dr. WoW, as part of the list of all of Dr. WoW's technical posts. Please have a look below to learn more on the topic!


Looking back, a little effort goes a long way, and years of hard make the book.

Moving forward, difficult technologies scare no one, and we gear up for the new journey.
Month after month and quarter after quarter, season 2 of Learn Firewalls with Dr.WoW has finally been unveiled. While racing with time, Dr. WoW has accomplished a lot. Dr. WoW has sorted out the posts of season 1, has made some corrections and improvements, and worked with the publishing house to proofread and finalize the book.


Dr. WoW's team has also made a side-by-side comparison between products and recorded video tutorials. Through the experience of the last half-year, Dr. WoW deeply feels that there is always something to learn about firewalls and that the hardship in studying firewall technologies is beyond words. Fortunately, Huawei Firewall Technologies has been successfully published and Dr. WoW is full of joy and energy again.
In the second season, Dr. WoW will introduce content security features, such as antivirus, intrusion prevention, URL filtering, mail filtering, and other functions such as user management, virtual systems, and bandwidth management.


Dr. WoW will describe these features and functions of Huawei's next-generation firewall (NGFW) and the configuration procedures. Dr. WoW hopes that the posts can help readers understand the technical mechanisms and configuration methods of NGFW. Dr. WoW encourages readers to interact and discuss questions online to make progress together.
The best reward of learning is the thrill of discovery. It has nothing to do with fame. For a network engineer, no money, no fame, and no material object can compare to the joy and satisfaction from getting a network up and running or locating a fault. We never forget why we started to accomplish what we want. Digging into technologies is no easy job. However, we embrace the challenges and will continue this road.

No.

Title

1

Next-Generation Firewall

2

NGFW Functions

3

Traffic Permitted, Virus Blocked---Antivirus Mechanism

4

Traffic Permitted, Virus Blocked---Antivirus Configuration

5

Network Threats May Be Deceptive, But Not for an NGFW---Intrusion Prevention Mechanism

6

Network Threats May Be Deceptive, But Not for an NGFW---Intrusion Prevention Configuration

7

Classification of Massive URLs---URL Filtering Mechanism

8

Classification of Massive URLs---URL Filtering Configuration

9

Multiple Approaches to Email Control---Mail Filtering Mechanism

                   

Networks are changing fast, and networking devices have taken the spotlight one after another. You may be quite familiar with routers and switches, but with firewalls, probably not so much. As loyal safeguards of network security, firewalls keep a weather eye on threats and no packet can get through without the permission of firewalls. Now, it's time to get familiar with these heroes. Welcome to the Dr. WoW series of technical posts. Dr. WoW will take you on an adventurous journey to the world of firewalls.
 
For readers to conveniently read the technical posts in the forum, Dr. WoW sorted out all technical posts, added another four configuration examples for deploying firewalls in typical scenarios, and converted them to PDF files for readers to download. All readers are welcome to download the PDF file collection in the attachments to acquire knowledge, master configuration methods, and become firewall technical experts.


 No.

 Title

 1

What Are Firewalls? 

 2

Development of Firewalls 

 3

Huawei’s Firewall Products at a Glance 

 4

Security Zones 

 5

Stateful Inspection and Session Mechanism 

 6

Appendix to the Stateful Inspection and Session Mechanism   

 7

Precautions for Configuration and Troubleshooting Guides 

 8

First Experience of Security Policies

 9

Development History of Security Policies   

 10

Security Policies in the Local Zone   

 11

ASPF 

 12

Configuration Precautions and Troubleshooting Guide 

 13

Single-Packet Attack and Defense

 14

SYN Flood Attack and Defense

 15

UDP Flood Attack and Defense

 16

DNS Flood Attack and Defense

 17

HTTP Flood Attack and Defense 

 18

Source NAT-part 1

Source NAT-part 2

Source NAT-part 3

 19

NAT Server

 20

Bidirectional NAT

 21

NAT ALG

 22

Function of Blackhole Routes in NAT Scenarios

 23

Introduction to VPN Technology

 24

GRE-part 1

GRE-part 2

 25

The Birth and Evolution of L2TP VPNs

 26

L2TP Client-initiated VPNs-part1

L2TP Client-initiated VPNs-part2

 27

L2TP NAS-initiated VPNs

 28

L2TP LAC-Auto-initiated VPNs

 29

IPSec Overview

 30

Manual IPSec VPNs

 31

IKE and ISAKMP

 32

IKEv1 

 33

IKEv2

 34

Summary of IKE and IPSec   

 35

Template IPSec       

 36

NAT Traversal 

 37

Digital Certificate Authentication 

 38

IPSec VPN Security Policy Configuration Roadmap

 39

VPN Mechanisms-part 1
SSL VPN Mechanisms-part 2

 40

File Sharing

 41

Web Proxy 

 42

Port Forwarding     

 43

Network Extension-part 1
Network Extension-part 2

 44

Configuring Role Authorization

 45

Configuring SSL VPN Security Policies

 46

Integrated Use of the Four Major SSL VPN Functions

 47

Hot Standby Overview

 48

The Story of VRRP and VGMP-part 1

49

The Story of VRRP and VGMP-part 2

 50

The Story of VRRP and VGMP-part 3 

 51

The Story of VRRP and VGMP-part 4

 52

Explanation of VGMP Techniques-part 1

Explanation of VGMP Techniques-part 2

 53

Explanation of the HRP Protocol

 54

Hot Standby Configuration Guide

 55

Multi-homing Overview 

 56

Shortest Path Routing

 57

Policy-based Routing-part 1

 58

Policy-based Routing-part 2


This article contains more resources

You need to log in to download or view. No account? Register

x

The post is synchronized to: Routing & SwitchingWLAN

  • x
  • convention:

Wayne
Created Apr 24, 2015 02:23:47

this is a good material for security engineers,thanks for sharing
View more
  • x
  • convention:

user_2790689
Created Mar 13, 2015 07:43:09

Thank you.
View more
  • x
  • convention:

kudo8
Created Jul 13, 2015 06:22:16

More info:
http://adf.ly/1HHwe7


View more
  • x
  • convention:

agus.priyadi
Created Mar 20, 2015 09:03:21

Thank you for sharing.

View more
  • x
  • convention:

BAZO
Created Mar 31, 2016 06:12:22

dear dr.Wow Man many Thanks

View more
  • x
  • convention:

nameless2
Created Jul 1, 2015 03:32:46

Thank you for sharing.

View more
  • x
  • convention:

o84028316
Created Jul 22, 2016 15:32:04

thanks dr wow
View more
  • x
  • convention:

S.Hrom
Created Nov 30, 2016 07:50:35

Thanks. These articles very helpful.
View more
  • x
  • convention:

MPLSTE
Created Jan 21, 2017 09:10:21

thats great
View more
  • x
  • convention:

123
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.