• 4.1. Composite technology applications
  • 4.2. Monitoring log application
  • Application of firewall technology in




    Download 234,35 Kb.
    Pdf ko'rish
    bet10/13
    Sana28.01.2024
    Hajmi234,35 Kb.
    #147542
    1   ...   5   6   7   8   9   10   11   12   13
    Bog'liq
    Research on firewall technology and its applicatio

    4. Application of firewall technology in 
    computer network security policy 
    Network security policy refers to the sum of a series of 
    preventive measures taken in a specific environment to 
    protect the network from hazards. In addition to strict 
    management, legal constraints and security education, 
    advanced technologies like firewalls are relied upon to ensure 
    system security, mainly including two aspects of technical 
    means and management measures. Firewall can achieve 
    access permission, denial, monitoring, by filtering insecure 
    services, allowing or denying access to certain hosts in the 
    network, providing access logs, monitoring access, and 
    achieving centralized security management for the internal 
    network without the need to set up separate security policies 
    on each computer, and its application mainly has the 
    following six points. 
    4.1. Composite technology applications 
    Composite technology combines the advantages of both 
    proxy and packet filtering firewalls, incorporating a number 
    of security technologies such as IDS and log monitoring, 
    combined with the actual situation of network security 
    operations, to ensure that the computer network can respond 
    quickly when attacked, provide defense services, effectively 
    stop external attacks, and proactively monitor internal 
    network information security. Its defense mechanism is the 
    network security in the form of authentication, using dynamic 
    filtering to achieve the security of information exchange. 
    4.2. Monitoring log application 
    In the process of defending against external network 
    attacks, the firewall opens full logs and obtains relevant threat 
    information, categorizes various viruses and Trojans that may 
    threaten the security of computer networks, and stores them 
    in the database. Through configuration log, management log, 
    connection log and view log, analyze the error interception 
    information in the monitoring log, set default log options, 
    reset and upgrade the firewall, and intelligently enhance the 
    interception behavior of the firewall to further improve the 
    security performance of the computer network. 

    Download 234,35 Kb.
    1   ...   5   6   7   8   9   10   11   12   13




    Download 234,35 Kb.
    Pdf ko'rish