|
Research on firewall technology and its application in computer network security strategy Peihong Wang Pdf ko'rish
|
bet | 11/13 | Sana | 28.01.2024 | Hajmi | 234,35 Kb. | | #147542 |
Bog'liq Research on firewall technology and its applicatio4.3. Proxy server application
Through the proxy server to provide network proxy for the
computer, so that the real network address is not discovered,
and smoothly complete the information interaction. The
leakage of computer IP information often occurs during the
dialogue between the internal network and the external
network, and once the IP address is resolved and tracked by
network hackers, the computer's data information can be
easily stolen. By using a proxy server, network hackers can
only resolve virtual IPs and will not obtain any real
information, thus protecting the data security of the internal
network. The proxy server plays a transit role in controlling
the interaction process of internal and external network
information, and also has obvious advantages in account
management and information verification. In addition, SSL
access information from internal network users to external
network is first transferred to the internal proxy server for
analysis and confirmation of security before forwarding
outward, and the encrypted packets are audited and analyzed
internally, which can prevent hackers from using SSL
encryption to take away internal data while satisfying users'
access needs.
4.4. Packet Filtering Technology Application
Packet filtering technology is a firewall with information
selection qualities. After the computer obtains the
transmission information and the destination IP, it has to parse
the destination IP data first, compare the packet with the user
security registry, identify whether the data contains threat
information, and confirm the security before transmitting the
packet to the computer. Transmission from inside to outside
restricts dangerous information from being transmitted;
transmission from outside to inside restricts illegal
information flow into the computer and internal network. In
practice, packet filtering is usually installed on routers and
used in conjunction with devices such as bastion hosts to
provide security by examining the IP header, TCP header, or
UDP header of packets.
|
| |