• 4.4. Packet Filtering Technology Application
  • Research on firewall technology and its application in computer network security strategy Peihong Wang




    Download 234,35 Kb.
    Pdf ko'rish
    bet11/13
    Sana28.01.2024
    Hajmi234,35 Kb.
    #147542
    1   ...   5   6   7   8   9   10   11   12   13
    Bog'liq
    Research on firewall technology and its applicatio

    4.3. Proxy server application 
    Through the proxy server to provide network proxy for the 
    computer, so that the real network address is not discovered, 
    and smoothly complete the information interaction. The 
    leakage of computer IP information often occurs during the 
    dialogue between the internal network and the external 
    network, and once the IP address is resolved and tracked by 
    network hackers, the computer's data information can be 
    easily stolen. By using a proxy server, network hackers can 
    only resolve virtual IPs and will not obtain any real 
    information, thus protecting the data security of the internal 
    network. The proxy server plays a transit role in controlling 
    the interaction process of internal and external network 
    information, and also has obvious advantages in account 
    management and information verification. In addition, SSL 
    access information from internal network users to external 
    network is first transferred to the internal proxy server for 
    analysis and confirmation of security before forwarding 
    outward, and the encrypted packets are audited and analyzed 
    internally, which can prevent hackers from using SSL 
    encryption to take away internal data while satisfying users' 
    access needs. 
    4.4. Packet Filtering Technology Application 
    Packet filtering technology is a firewall with information 
    selection qualities. After the computer obtains the 
    transmission information and the destination IP, it has to parse 
    the destination IP data first, compare the packet with the user 
    security registry, identify whether the data contains threat 
    information, and confirm the security before transmitting the 
    packet to the computer. Transmission from inside to outside 
    restricts dangerous information from being transmitted
    transmission from outside to inside restricts illegal 
    information flow into the computer and internal network. In 
    practice, packet filtering is usually installed on routers and 
    used in conjunction with devices such as bastion hosts to 
    provide security by examining the IP header, TCP header, or 
    UDP header of packets. 

    Download 234,35 Kb.
    1   ...   5   6   7   8   9   10   11   12   13




    Download 234,35 Kb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Research on firewall technology and its application in computer network security strategy Peihong Wang

    Download 234,35 Kb.
    Pdf ko'rish