Data Center Security Design Training Material
Data Center Security Design Training Material
You can get free E-Learning courses, training materials, product materials, software, cases and so on.
/ en
1、E-Learning Courses: Logon http://learning.huawei.com/en and enter Huawei Training/E-Learning
o m
i .c you will have the
we
Career Certification E-Learning courses: After received any Huawei Career Certification,
privilege to learn all Huawei Career Certification E-Learning courses.
u a
Partner E-Learning Courses: Any Huawei Partner Engineer have the learning
. h privilege
g
i
Free E-Learning Courses: Any website users have the learning privilegen
rn
2、Training Materials:
le a
/
/
Logon http://learning.huawei.com/en and enter Huawei :Training/Classroom Training ,then you can download
t tp
h
training material in the specific training introduction page.
:
Huawei product training material and Huawei
e s career certification training material are accessible without
c
logon.
u r
o
3、 Huawei Online Open Class(LVC):sLive Virtual Class(LVC) are ongoing freely
R e
g
The Huawei career certification training and product training covering all ICT technical domains like R&S,
inand so on, which are conducted by Huawei professional instructors
UC&C, Security, Storage
r n
4、Product Materials e a
L and Software Download: http://support.huawei.com/enterprise
e addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss
5、Community:In
o r
M
technical issues with Huawei experts , share exam experiences with others or be acquainted with Huawei Products
es
R
n g
r ni
e a
e L
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved.
Objectives /e
n
o m
e i .c
Upon completion of this course, you will be able to:
a w
Describe the principle for IDC security design; . hu
i n g
Describe the security plan for IDC design;
arn
/ / le
Describe the ways to protect IDCp:security;
t t
Describe the security plan sfor : h IDC infrastructure;
ce
es
R plan for IDC hosts and applications
n g
Describe the security
r ni
e a
e L
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 1
Contents /e
n
o m
e i .c
1. Security issues for IDC and correspondingaw solutions
. hu
2. Architecture Design for IDC security ing
arn
e
3. Best practice of IDC security solutions
/: /l
t tp
: h
e s
r c
o u
es
R
n g
r ni
e a
e L
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 2
Analysis for security trend /e
n
o m
e i .c
aw
Fire Virus Phishing Service/content
. hu
i ng
Spyware Application layer
arn DPI
Worm
//le
Presentation
p :
layer
t t L2-L7
: h Merge trend
omnidirection
Session layer
e s al protection
r c
ulayer
Transmission
o
BotNet
e s Access control
R Network layer Protocol security
DDoS
n g L2-4 attack
DoS
rni Data link layer prevention
e a Physical layer
e L
rThreat
o trend Network Security
trend
M layer
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 3
Frequent IDC Security Breaches /e
n
o m
e i .c
Amazon cloud
a w service
Terremark: VMware's partner
. hu
Quora crashed
7 hours crash n
Reddit
i g and Hootsuite crashed
n
r…
e a
/: /l
Jan. 2010 Mar. 2010
tp
Mar.2011
t
Apr. 2011 Dec. 2011
: h
e s
r c
o u
Salesforce.com Re
s CSDN.NET
Gmail
68,000 users ng
n i 150,000 users 6 million users
a
I hour crashr
L e
e
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 4
Importance for IDC security design /en
o m
Is data security?
How to isolate
e i .c
aw
resources?
Any
u
g.h management
for privileged
Is business
i n
security?
arn users?
//le
p :
t t
:h
Laws and
e s regulation
rc
Is business compliance
smooth?
o u
es
R
n g
ni
ar
Any resource
Is business
L e
reliable? How to control
abuse?
e
or
the inside
threats?
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 5
Analysis for IDC security & corresponding
/ en
solutions om
i .c
Intranet WAN Extranet
we Internet
a
Intranet WAN access Partner access
. hu Internet
Intranet access threat area threat
WAN access
n g
Partner access threat
i
Internet access threat
: //
access access
t t p
Service area
s :h Maintenance
Service threat
rc e Maintenance threat
ou
Illegal business Illegal business access
access
es Lack of management
for security issues
Hacker intrusion
R Lack of management
n g for security
ni
devices
a r
L e
r e Production Operation Application
o area area
Data Center
servers
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 6
Analysis for IDC security & corresponding
/ en
solutions (Conti’) om
i .c
Security dimension Security requirements Solutionsw
e
and technology
u a
Anti-DDOS attack Anti-DDoS
. h
Isolation, access control
i n
Firewallg
Network security
Security access rn VPN gateway
aIPSec
le SSL VPN gateway
://
Remote users access
t tp
Protect illegal business access Host hardening, Anti-virus
Host and
:
Virtualization security h Isolation for virtualization machine
virtualization
e s
r c
Hacker’s intrusion IPS
o u and
Intrusion detection
e s
protection
IDS、IPS
Application security Web R
g security
n security
iMail
WAF
n
r Prevent data disclosure
Mail gateway
a
e Data encryption DLP
e L
Data protection
VES
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 7 Page7
Contents /e
n
o m
i .c
we
1. Security issues for IDC and corresponding solutions
a
u
2. Architecture Design for IDC security g.h
i n
2.1 Overall architecture for IDC security arn
/ / le
2.2 Security design for IDC p :
t t
: h
3. Best practice of IDC security e s solutions
r c
o u
es
R
n g
r ni
e a
e L
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 8
Overall architecture for IDC security/en
o m
e i .c
aw
. hu
i ng
arn
//le
p :
t t
s:h
rc e
o u
es
R
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 9
Overall architecture for IDC security n
/e
o m
e i .c
Access
aw
Identification Content Respond Audit
trace
authorization
authorization security recovery
. hu
Unified identity
i n g
rn
Access management Policy management SIEM / SOC
Security management
management Unified operation
le a Equipment Unified operation
management
: // management management
Network
t tp
: hVirtual IPS/IDS/AV
security
virtualization
e s
Virtual FW
ar
security DLP/VES
Data security
UMA-DB
Business
L e WAF、mail gateway Cache for internet traffic
security
e
Host security
or Virtualization machine
isolation Host hardening Traffic visualization
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 10
Contents /e
n
o m
i .c
we
1. Security issues for IDC and corresponding solutions
a
u
2. Architecture Design for IDC security g .h
i n
2.1 Overall architecture for IDC security arn
/ / le
2.2 Security design for IDC p :
t t
: h
3. Best practice of IDC security e s solutions
r c
o u
es
R
n g
r ni
e a
e L
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 11
Security design for IDC /e
n
o m
e i .c
Network security
aw
: //
Data protection t t p
s :h
Unified operation securitycemanagement
u r
s o
R e
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 12
Network security: border network n
/ e
security om
i .c
e
Internet user
IDC remote maintainer
a
DDoS managementw
hu
center
hacker
IDC user
g .
i n
arn
le
DDoS
Border network protection
//
protection
t t IDC
:h
• Main function:
s o time
n g on needs
e a based on needs
e L
o r
Web,DNS, FTP, Server/
M
Email, DB server virtualization/operation
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 13
Network security: border network n
/ e
security (Conti’) om
i .c
Internet user
we
IDC remote maintainer
a
hu
DDoS management
.
hacker center
IDC user
i n g
arn
le
DDoS
//
protection
:
t t p
:h
Anti-DDoS protection
es
Deploy Anti-DDOS in bypass
n g
ni
information or modify
L e browser
r e
Web,DNS, FTP, Server/
• send alarms, attack
o
Email, DB server virtualization/operation
information via mail, voice,
M SMS
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 14
Network Security: interior network /esecurity
n
o m
e i .c
• Isolation of management and
a w
business layer
. hu
Computing and management on
i n g
rn •Various value-added security
different VLAN planes
le a
: // services
rc e core switches.
o u
es
R Management traffic flow
n g
ni Service traffic flow
e ar
e L Server traffic flow after IPS inspection
. hu
•Isolation of computation area and
i n g storage area
physical
n
ar
individual storage network
e
/: /l
•Isolation of computation area,
:h
Separate Service area (DMZ) and
es
computation area
r c
o u
s
Re
Computation area
i n g Storage area
r n
e a
e L IP/FC SAN
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 16
Network Security: interior network n
/ e
security om
i .c
e
•Three-layer
w layer
VLAN isolation at
a
application
hu
g.
Web, applications, and
le
://
•Isolated in different service
tp
areas by virtual firewalls or
t
:h
Virtual Switch
o u DB Data Flow
s
Re VS2
i n g VS1
n
VS0
a r
L e
e
or
M Sharing cloud for multi-users
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 17
Network security: VM layer security/en
o m
VM1 VM2 •
e i .c
IP addresses & MAC of VMs are bundled with the memory to
aw
avoid IP address spoofing and ARP address spoofing.
• The vSwitch is an exchange-type switch rather than the
hu
Guest OS
App App sharing-type switch. Packets from different VMs are forwarded
.
to specified virtual ports, and even VMs on the same physical
g
Virtual Machine
a
avoid network resource abuse.
•
// le
The vSwitch supports the division of security groups. VMs can
:
be allocated to different security groups and flexible access
:h
Unified computing
虚拟硬件
es
resource allocation VM VM VM VM
module
r c
u
vcpu1
Hypervisor
vSwitch
o
1 2 1
VM VM VM VM
s
vcpu1
Re
1 1 2
vcpu2
2 2 1
……
i n g VM VM VM VM
r n
a
Le
Security group1
e
HW
o r Security group2
M Security group 3
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 18
Network security: VM layer security/en
o m
Challenges
e i .c
VM
aw
VM VM VM Illegitimate access between VMs at different security levels
hu
Mutual attacks between VMs at different security levels
VM VM VM VM .
VLAN1 Transmission of Trojan horse and viruses on the virtual
g
VLAN2
network
ni n
VM VM VLAN3
ar
VM VM
e
/: /l
Solutions
tp
Independent VLAN attributes can be configured for each VM.
vSwitch t VMs of different customers, departments, or groups can be
V V V
s:h allocated to different VLANs.
L
A
L
A
L
A
rc e The access between VLANs is effectively protected by Huawei
Eudemon security gateway, including the firewall, IPS, and
N N N
o u AV.
1 2 3
es
R
i n g Customer Values
High-performance physical security gateways protect for the
r n Hypervisor network.
e L gateway
features.
or
Security solutions are not required on the Hypervisor network,
which saves server resources.
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 19
Security design for IDC /e
n
o m
e i .c
Network security
aw
: //
Data protection t t p
s :h
Unified operation securitycemanagement
u r
s o
R e
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 20
Host and virtualization security: isolation
/ en
of visualization resources om
i .c
we
a
. hu
i ng
rn
MEM NIC MEM NIC MEM NIC
le a
: //
t t p
s:h
rc e
MEM
o u MEM
es MEM
R
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 21
Host and virtualization security: n
Anti-virus for Host and Server /e
o m
e i .c
aw
. hu
Unified virus
i ng
rn
management center
le a
: //
t t p
s:h
VM system
r c e
VM system
o u
visualization
es platform
visualization
platform R
n g
ni
ar
Server cluster Server cluster
L e Server cluster
e
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 22
Host and virtualization security: n
Host hardening /e
o m
e i .c
aw
System security hardening
. hu
Hardening OS hardening DB hardening
App hardening
i
(Web hardening)ng Patch
management
domain
r n
le a
Hardening Minimized tailoring code security
: //
Security
Security test Integrity
process
t t p
configuration protection
:h
es
Cut Code Comply with
c
Use industry Integrity check
Specific complies
r
unnecessary industry
scanning tools are used
with the
u
configuration
ways components
code hardening standards tools such as to perform
and
s
services. standards.
Re
n g
ni
• Bugs of software bring vulnerabilities. Security hardening for operating systems (including the UVP
r
platform), databases, and applications and patch management can fix the vulnerabilities.
a
L e
r e
o
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 23
Host and virtualization security : IDCn
/ e
resource protection om
i .c
IDC Post-authentication domain e
IDC Pre-authentication
w
domain
u a
.h
ERP server File server Mail server Business server
Management
W
i n g layer
arn
le
Service
: // layer
t t p Isolation domain
:h
Network domain
SACG
e s Antivirus server
Control
layer u rc
802.1X
s o
R e Patch server
n g
rni
e a User
User domain
e L layer
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 24
Host and virtualization security : IDCn
/ e
resource protection om
i .c
Hardware SACG
we
Post-authentication domain
a
. hu Sensitive
i n g resources
arn
le
Public
//
Finance department: No TSM Agent is resources
installed for new employees.
p :
TSM server
t t
:h
es
Pre-authentication domain
Marketing department: Agents are installed.
r c AV server...
Isolation domain
o u
Identity
s Security check
Re
URL redirection Switchover to the
authentication post-authentication domain
Userg
The SACG
Is the antivirus The TSM notifies the SACG of
ea
Internet Explorer,
to download the and database patch Automatic
TSM Agent for
e L
MAC installed?
Is the virus
security repair
r database updated?
installation Upgrade the antivirus software
o
Is any illegitimate
Update the virus database
software installed?
Download patches
M
… automatically …
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 25
Security design for IDC /e
n
o m
e i .c
Network security
aw
: //
Data protection t t p
s :h
Unified operation securitycemanagement
u r
s o
R e
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 26
Intuitive and Granular DPI Operation
/e
n
o m
Core egress
e i .c
aw
. hu
In-line deployment or DPI i ng
off-line splitting
arn
deployment
//le
p :
IDC
t t
:h
egress
e s
rc
Core
layer
o u
es
R
n g
rni
TRILL TRILL TRILL
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 27
Application security deploy /e
n
o m
e i .c
aw
. hu
i ng
rn
Application identify Application identify
device
le a device
//
Web Firewall Web Firewall
IPS Device p : IPS Device
t t Email Security
:h
Email Security
Gateway
Gateway
e s
u rc
s o
R e
n g
rni
e a
eL
IP/FC SAN
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 28
Security design for IDC /e
n
o m
e i .c
Network security
aw
: //
Data protection t t p
s :h
Unified operation securitycemanagement
u r
s o
R e
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 29
DLP: 3 key factors for data leak n
prevention /e
o m
c data
Network monitor: .dynamic
i
e integrate with
• Detect technology based on
w
content recognition monitoring
• Based on keyword, file prints
a Proxy, monitor WEB &
HTTP、SMTP、FTP,
u
Emailh
• Comply with regulations: email, WEB
: //
Data protection t t p
s management :h
c e
Unified operation security
r
o u
es
R
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 31
Unified operation security management:
/ en
deployment om
i .c
External
Maintenance
we
staff
u a Core business
partner
g.h
vendors
i n
arn
le
Travel
Core business
://
staff
t tp
:h
Internal
Maintenance
staff
e s
rc
Core business
o u
es
R
i n g Unified operation security
management
Core business
r n
e a
e L Unified authentication/
or authorization/auditing
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 32
Contents /e
n
o m
i .c
we
1. Security issues for IDC and corresponding solutions
a
u
2. Architecture Design for IDC security g .h
i n
3. Best practice of IDC security solutions arn
e
/: /l
t tp
: h
e s
r c
o u
es
R
n g
r ni
e a
e L
or
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 33
General architecture /e
n
External user partner Travelling
o m
Internet
staff
e i .c
Security zone Service objectives
and Security level
aw
Extranet
ISP1 ISP2 Intranet area Enterprise High
Enterprise
hu
branch
branch
g . WAN area WAN High
WAN
i n area
//
staff high
:h
area user
Management
e s
rc
Internet users are least trusted, which
center WAN area has independent business area.
Core router
o u Partner has middle-level trustiness,
ni
Enterprise branch & travelling staff is
ar
divided with different areas based on
intranet ways of access.
or
WAN/MAN Remote IDC
Service area 1 Service area N DWDM access different business service
areas in IDC
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 34
Internet access area /e
n
o m
Internet Internet user
e i .c
Security risk/needs
aw
ISP1 ISP2 DDoS attack
u Illegal access
DDoS
g .h NAT transfer
detection
i n VPN security gateway
rn
Extranet DDoS management Security solution
DDoS
a
access center
le
cleaning Deploy Anti-DDoS at egress,
//
SSL VPN
LB1
:h
FW1
Block SSL VPN sits besides switch to
e
SSL VPNs Suspicious traffic satisfy remote access needs
Solution value
rc
ou
Normal traffic High-security: through Anti-DDoS
IPS/IDS
& FW policy to make sure the
es security of IDC
R
DMZ Illegal access
High-reliability: redundant
n g LB
equipments for FW and SSL VPN
r ni Web、DNS、FTP、
Flexibility: SSL VPN can meet the
e a Email、DB server
remote security access needs
e L FW2
intranet
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 35
Business service area /e
n
o m
e i .c
Core Normal traffic Security
a wrisk/needs
hu
layer Illegal access
Illegal access
g . Hacker attack
i n
arn Security solution
le
Block
By-pass deployment of FW
//
Convergence
layer
p :FW IPS on core router to prevent
t t LB1
app-layer attack
:h Solution value
VLAN/ACL
rc es Block
High-security: FW makes
sure legal access from various
Access
o u IPS/IDS service areas, IPS prevents
layer
es hacker attack
e L
…
o r App DB
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 36
Intranet access area /e
n
o m
Core switch i .c
Security risk/needs
e
aw
Illegal access
Security solution
hu
Park/Campu
s core
g . By-pass or inline deployment
of FW, recommended for inline
switch
i n deployment
k
阻止 阻止
//le Solution value
Convergence
t t policy to make sure the
interconnection between user
switch
s:h and IDC
WA r c e High-reliability: redundant
Flexible access: FW as VPN can
es e park of branches
R IPSec VPN
branch n g
i branch
r n IPSec VPN after being peeled off
e a
e L Normal traffic
or
M Illegal access
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 37
Partner access area /e
n
o m
Extranet partner Security risk/needsi.c
ISP1 ISP2
w e
VPN access
u a
Illegal access
. hsolution
Security
rn
Interco layer
nnecti
le a Outer FW 1 has V{N function, can
//
on isolate illegal traffic from partner to
Block FW1
p : front-line computer
:h
SSL VPN between internal service areas and
e s front-line computer
rc
IPS/IDS Solution value
ou
High-security: through dual FW to
DMZ
es SSL VPN
make sure the security of partner’s
access to internal business area of IDC,
R LB
outer FW has VPN function
Web, DNS, FTP,
n g SSL VPN after being High-reliability: redundant
ni
Email, DB server
r
peeled off equipments
e a Block
Normal traffic High-effective: inline deployment FW
eL
FW2 increases forwarding efficiency
or
intranet Illegal access
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 38
Network maintenance area /e
n
o m
Security risk/needs i.c
Management
area
Normal traffic
w
Illegal accesse
u a
Sharing accounts issue
Illegal access
. h
i n g
Security equipments management issue,
security problem dealing issue
e Security solution
trend analysis
/: /l
t t p Block Inline deployment of FW, only permit bastion
host, network maintenance and SOC system
Bastionh
:
KVM to access outside area. Through bastion host,
Maintenance Equipment
e s
host
Management providing only egress. Deploy SOC for
system management
area r c isolation complete security trend analysis
o u Solution value
n g KVM
ni
Unified security operation: output security
r
trend report through SOC and bastion host
IDC
r
o business and administrator
Mequipments
Maintenance
area
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 39
Summary /e
n
o m
e i .c
aw
Security area Risk & Needs Risk level Deployment Value
hu
Solve the illegal access from intranet,
Intranet access area Illegal access Low/mid Firewall
g .
remote access, remote branch
Low/mid Firewall
i n
rn
WAN access area Illegal access Solve illegal access of branch
le a
//
DDoS attack
Illegal access
p :
Anti-DDoS
Solve DDOS attack, illegal business
Internet access area
NAT
High
t t
Firewall
access, remote user access
:h
SSL VPN
VPN access
e s
rc
VPN access Dual Firewall Solve illegal access, VPN access of
Partner access area Middle
u
Illegal access partner
n g
ni
Illegal access
Firewall
ar
Lack of security issue
iSoC Solve illegal access, security issues
management
Maintenance area
L e
Lack of security
low Security equipments
management system
correlation, security equipments
management and auditing
e
or
equipment management
Bastion host
Lack of security auditing
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 40
Summary /e
n
o m
Principle for IDC security design; e i .c
aw
Security plan for IDC design;
. hu
The ways to protect IDC security; i ng
rn
le a
Security plan for IDC infrastructure;
: //
Security plan for IDC network layer; t t p
:h
e
Security plan for IDC hosts andcapplications
s
u r
s o
R e
n g
rni
e a
e L
o r
M
Copyright © 2013 Huaw ei Technologies Co., Ltd. All rights reserved. Page 41
n
/e
o m
e i .c
aw
. hu
i ng
arn
Thank://you le
www.huawei.com t tp
: h
e s
r c
o u
es
R
n g
rni
e a
e L
o r
M
Resource support on Learning website
You can get free E-Learning courses, training materials, product materials, software, cases and so on.
/ en
1、E-Learning Courses: Logon http://learning.huawei.com/en and enter Huawei Training/E-Learning
o m
i .c you will have the
we
Career Certification E-Learning courses: After received any Huawei Career Certification,
privilege to learn all Huawei Career Certification E-Learning courses.
u a
Partner E-Learning Courses: Any Huawei Partner Engineer have the learning
. h privilege
g
i
Free E-Learning Courses: Any website users have the learning privilegen
rn
2、Training Materials:
le a
/
/
Logon http://learning.huawei.com/en and enter Huawei :Training/Classroom Training ,then you can download
t tp
h
training material in the specific training introduction page.
:
Huawei product training material and Huawei
e s career certification training material are accessible without
c
logon.
u r
o
3、 Huawei Online Open Class(LVC):sLive Virtual Class(LVC) are ongoing freely
R e
g
The Huawei career certification training and product training covering all ICT technical domains like R&S,
inand so on, which are conducted by Huawei professional instructors
UC&C, Security, Storage
r n
4、Product Materials e a
L and Software Download: http://support.huawei.com/enterprise
e addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss
5、Community:In
o r
M
technical issues with Huawei experts , share exam experiences with others or be acquainted with Huawei Products