Using secure zones
  • PDF

Using secure zones

  • PDF

Available in Classic

Before use

What is the purpose of Secure Zone?

  • Secure Zone provides various solutions for your servers, networks and security, in order to keep important resources, such as personal information, secure and safe. Secure Zone helps you respond to the relevant laws, including the Personal Information Projection Act.

How do I use Secure Zone?

  • Secure Zone requires you to use SSL-VPN and Secure Zone Firewall.

    security-14-101_en

    1. Request Secure Zone: First, you need to request Secure Zone (you will not be charged for just requesting Secure Zone).
    2. Request Secure Zone Firewall: To use servers in Secure Zone, you need to request Secure Zone Firewall.
      You will be charged for the service from the moment you click Application for use,
    3. Create/set a server in Secure Zone: After request Secure Zone, you can create a server in Secure Zone. You should enter firewall information when configuring a server.
    4. Set Secure Zone Firewall: Set a firewall based on the server configuration information.
    5. Other: You can use DB access control solutions and DB encryption solutions depending on circumstances. (You can use your own solutions or a third party’s.)

Which services do I need to add to enhance the security of Secure Zone?

  • SSL VPN with two-factor authentication (2FA) provides secure access to servers created in Secure Zone.
  • Secure Zone Firewall is needed for network access control of servers created in Secure Zone.
  • DB security solutions are needed to keep important resources in Secure Zone more safe.
  • For access control, Secure Zone adopts the multi-border protection model, which strictly controls access to servers in Secure Zone twice: once in the Network Gateway level through Secure Zone Firewall and ACG, and once again in the Server Gateway level.

Request Secure Zone

  1. Go to Secure Zone > Subscription and click [Application for use].

    security-14-102_en

  2. Go to Secure Zone > Secure Zone Firewall > Policy and click [Application for use].

    security-14-103_en

  3. Go to Server > Create server > Set server and select Create server in Secure Zone.

    security-14-104_en

  4. A public IP address or port forwarding cannot be used to access the server created in Secure Zone. You should use SSL VPN.

    security-14-105_en

  5. Go to Secure Zone > Secure Zone Firewall > Policy and add firewall rules.

    security-14-106_en

  6. For access control, Secure Zone adopts the multi-border protection model, which strictly controls access to servers in Secure Zone twice: once in the Network Gateway level through Secure Zone Firewall and ACG, and once again in the Server Gateway level.

    After setting the Secure Zone Firewall rules, you should edit ACG rules of the server in Secure Zone.


Was this article helpful?