Página Anterior!

Prompt

No ha iniciado sesión o no esta autorizado!

Página Anterior

Solución de seguridad de egreso de Internet de e-Government

The twelfth-fifth e-Government plan highlights the application and roles of e-Government information management systems to help resolve social issues. These systems must be more comprehensive and diversified as the e-Government extranet bears an increasing number of businesses, business services, and the public is more reliant on the websites that deliver them. This growth in services and the consequent increase in traffic place higher demands for bandwidth and the secure protection of e-Government Internet egresses and data.
To meet these challenges, Huawei offers the e-Government Internet Egress Solution that provides public access to government agency websites and enables authorized users to access government extranets to communicate with office networks and data centers, while ensuring all data, applications, and transmissions are secure at every stage.

Requirements and Challenges

Huawei's e-Government Internet Egress Security Solution has two major functions. One is to enable the public to access government agency websites, while protecting sensitive information inside the government Internet. The second is to enable authorized users to access government agency extranets and communicate with certain office networks and data centers.


An Internet egress functions as a main channel for exchanging government and external information, setting high-level requirements for data and application security. It also requires network bandwidth optimization and network security protection.



Network Bandwidth Optimization

  • Multi-level NAT
  • e-Government extranet layers map government administrative levels. Some regional IP address segments conflict with vertical Virtual Private Network (VPN) addresses, leading to the multi-level Network Address Translation (NAT) issue. e-Government campuses using either private IP addresses or carriers' networks require at least one NAT before accessing the Internet or external resources. Multi-level NAT slows Internet access speed. At present, one efficient way to solve this issue is to improve device NAT forwarding performance.


  • Multi-link load balancing
  • Architecture and device redundancy are also important for keeping up with Internet egress security requirements. Links that connect an e-Government extranet and the Internet transmit diverse, large-volume data. Therefore, to optimize network performance, one device must support multi-link load balancing and dynamically adjust the bandwidth occupation ratio of each link.


  • Internet cache
  • Any vulnerability of network applications may lead to a decrease in user experience satisfaction. In addition to high bandwidth and end-to-end delay performance, governments want to shift the traffic cache from the Internet egress to the intranet. This will sharply ease bandwidth expansion pressure and save bandwidth lease costs on Internet egresses, further enhancing users' experience with government extranets.


Network Security Protection

  • In some cases, data center networks, office networks, and the Internet communicate with each other without any dedicated isolation or prevention approaches. Any security hazards brought by Internet users may affect the security of data center networks.
  • Access from visitors to e-Government extranets may incur security risks.
  • If there are no authentication or control measures to limit the access of internal e-Government users, any internal employee can access e-Government extranets on the PC.
  • Traffic cleaning and security monitoring must be provided to prevent attacks on Internet security.
  • Government agencies provide many services to the public through their official websites, so it is very important to protect those service systems.
  • If real-time event analysis is unavailable, then security events cannot be monitored across the entire network and logs cannot be uniformly analyzed.

Huawei Solution

Huawei offers powerful ICT support for an e-Government Internet Egress Security Solution that helps government agencies optimize network performance and implement comprehensive security protection.


Solution Overview

Figure2-1 Internet egress security solution architecture


Anti-DDoS Solution

Huawei's solution is highly flexible. It provides a rich set of functions, including anti-Distributed Denial of Service (DDoS), intuitive Service Inspection Gateway (SIG) traffic analysis, cache acceleration, intrusion detection/prevention, Web application prevention, unified security monitoring, Internet use management, and unified security auditing. These functions can be combined based on specific requirements for Internet security.


Figure2-2 Anti-DDoS solution


  • Huawei's anti-DDoS solution has the following key features:
  • High-performance hardware platform
  • Bypass detection
  • Self-healing network
  • Automatic response
  • Deep Packet Inspection (DPI) of all traffic on the network
  • Flexible deployment.

Intuitive SIG Traffic Analysis Solution

Huawei's SIG intuitive traffic analysis solution identifies network applications, displays the bandwidth occupied by each application, and supports each services priority configuration and occupied bandwidth ratio. These functions implement intelligent network traffic management to ensure that traffic from an e-Government extranet is transmitted by priority.


Figure2-3 Intuitive SIG traffic analysis solution architecture


Huawei's SIG traffic analysis solution includes the following features:


  • Multi-dimensional traffic and flow direction analysis that help governments learn about the composition of users, traffic, flow directions, and services, and provide statistics for network optimization.
  • Multi-dimensional traffic optimization and bandwidth management utilize government bandwidth resources, avoid network congestion, ensure the quality of operation-critical services, ease network expansion pressure, and improve user experience.
  • Uniform Resource Locator (URL) filtering, network control by time segment, network control by applications, and user access control efficiently manage the Internet use by government agencies' employees.
  • Dynamic filtering of malicious IP addresses adds security to employee Internet use.
  • Information push provides a convenient means for routine information release.

iCache Solution

Huawei's iCache solution has the following features:


  • The iCache platform enables filtering for links and uses bypass deployment methods for traffic mirroring, minimizing impacts on live network services.
  • Bypass deployment enables the system to send upstream packet copies to the iCache Redirection Subsystem (RSS). The RSS redirects user requests to the iCache platform where users can obtain resources.
  • The iCache platform uses a dedicated system to manage all local cache subsystems.
  • The iCache system is fully functional within one network when service and management networks are isolated from each other.

Figure2-4 iCache solution architecture


Intrusion Detection/Prevention Solution

Huawei's intrusion detection/prevention solution has been selected by customers throughout the world because of the following characteristics:


  • Integration of multiple services, including firewall, content filtering, traffic control, and Internet use management
  • Simplified and efficient management of network devices
  • Reduced Total Cost of Ownership (TCO)
  • Dedicated, professional service teams, who ensure quick response to customer requests.

Figure 2-5 Intrusion detection/prevention solution architecture


Web Application Security Solution

Huawei's Web application security solution has helped many customers enhance security. Here are major reasons:


  • Injection attack detection rate of 99 percent-plus leads the industry
  • Zero application interruption resulting from tampering restoration and detection of unknown attacks provides a comprehensive attack defense
  • Cache acceleration, policy self-learning, and full transparent deployment for superb user experience
  • Accurate Structured Query Language (SQL) detection, website anti-tamper system, anti-DDoS protection at the application layer, blacklist and whitelist, and automatic locking against attackers
  • Variety of protection measures for the application layer: real-time Hypertext Transfer Protocol Secure (HTTPS) and Web application defense, application acceleration, and sensitive data loss prevention, to secure websites, accelerate access, and ease operation and maintenance (O&M)
  • Huawei's vulnerability mining and prevention efforts provide support for mainstream security vulnerability library, mainstream Content Management System (CMS) vulnerability library, and mainstream scanner library
  • Zero percent detection loss rate for Web application vulnerabilities and less than 3 percent detection loss rate for CMS vulnerabilities, as tested by authoritative organizations

Figure2-6 Web application security solution


Unified Security Management Solution

Huawei's unified security management solution includes service management, report management, network element management, and operation management.


Figure 2-7 Unified security management solution


Details of this function-rich solution include:


  • Service management
  • Analysis of protocol traffic logs


    Internet use tracking and playback


    Massive log storage and management


    Threat protection and application control management


  • Report management
  • Report task management


    Periodic reports at different measurement periods


    Report customization


    Comprehensive reports


  • Network element management
  • Automatic discovery of devices


    Automatic discovery of topologies


    Performance indicator collection


  • Operation management
  • Defense policy management


    Unified configuration management


    Report display


Internet Use Management Solution

Huawei's Internet use management solution contains the following key features:


  • Dedicated identification libraries for stock and game applications and websites classified as indecent
  • Auditing of Internet access behaviors and content minimizes Internet security risks and complies with laws and regulations

Figure 2-8 Internet use management solution


Unified Security Auditing Solution

Huawei's unified security auditing architecture consists of five important parts:


  • Terminal auditing
  • Audits an array of operations, including operations on office terminals, service terminals, peripherals (such as printers), documents, and network access


    Records regulation-against behaviors and operations


    Generates related alarms


  • Network auditing
  • Audits Internet access behaviors regarding access operations, content, and protocol


    Content and application auditing


    Audits operations on core service systems, servers, office systems, and database systems


    Audits application protocols based on specified key information


  • O&M auditing
  • Audits O&M operations on network devices, security devices, hosts, and application systems


  • Monitoring platform auditing
  • Collects, manages, and queries logs


    Analyzes events, generates alarms, traces faults, and audits reports


    Monitors and manages holistic security policies


Figure 2-9 Unified security auditing solution architecture


Solution Highlights

Here are highlights of Huawei's e-Government Internet Egress Security Solution:


  • Security protection requirements for the Internet access zone
  • Intuitive, panoramic monitoring view and security event collection for the entire network for unified security protection and zero-hour threat elimination
  • Linked prevention, ensuring that one fault detected in one node be shared on the entire network
  • End-to-end event analysis and handling capabilities with the Event Per Second (EPS) exceeding 5000
  • More than 130 predefined monitoring scenarios plus dynamic expansion of scenarios for accurate detection of unknown security threats
  • Industry first dual Main Processing Units (MPUs), switchover between active and standby devices in milliseconds, "Five Nines" reliability, anti-DDoS for over 100 attacks, and response in seconds
  • Seven-layer DDoS traffic learning, combined in-line defense and bypass detection, and ability to identify more than 1,200 applications

Customer Benefits

Huawei's solution provides the following benefits:


  • Intuitive traffic analysis and monitoring enable O&M personnel to easily control and optimize bandwidth utilization and to ensure transmission of government transactions with higher priorities
  • Comprehensive security protection measures free the Internet from diverse attacks
  • Unified auditing of network behaviors and recordings of O&M operations ensure that security threats are traceable
  • Web application security guarantees the secure operation of government portal websites and service systems
  • Refined security monitoring helps identify threats in a timely manner

Technology TopicsMas