|
Research on firewall technology and its application in computer network security strategy Peihong WangBog'liq Research on firewall technology and its applicatio3.1.1. Monitor and restrict access
In response to the insecurity of network attacks, the firewall
takes control of packets entering and leaving the internal
network and external network, monitors the status of packets
on the network in real time, and analyzes and processes these
states to detect abnormal behavior and take linked preventive
measures in a timely manner to ensure the security of the
network system.
3.1.2. Control protocols and services
In response to the insecurity of the network itself, control
measures are taken for relevant protocols and services,
allowing authorized protocols and services to pass through the
firewall, while unauthorized protocols and services are
refused to pass through the firewall, effectively shielding
insecure services.
3.1.3. Protection of internal network
In order to prevent the security impact caused by system
vulnerabilities, etc., the firewall adopts its own security
system, and also detects system vulnerabilities and network
intrusions inside the network in a timely manner through
technologies such as vulnerability scanning and intrusion
detection, and protects the application service systems in the
internal network through restrictions on abnormal access.
3.1.4. Network Address Translation
In network interconnection, since different addresses are
used, it is necessary to implement address conversion on the
firewall to convert the own address of the internal network to
the public address of the external network. After
implementing address translation, the internal structure of the
protected network can be hidden and network security can be
improved to some extent.
3.1.5. VPN function
Through VPN (Virtual Private Network), LANs or private
subnets distributed in a certain unit can be organically
connected into a whole through the Internet, which not only
saves dedicated communication costs, but also provides
security for information sharing.
|
| |