• 3.1.2. Control protocols and services
  • 3.1.3. Protection of internal network
  • 3.1.4. Network Address Translation
  • 3.1.5. VPN function
  • Research on firewall technology and its application in computer network security strategy Peihong Wang




    Download 234,35 Kb.
    Pdf ko'rish
    bet4/13
    Sana28.01.2024
    Hajmi234,35 Kb.
    #147542
    1   2   3   4   5   6   7   8   9   ...   13
    Bog'liq
    Research on firewall technology and its applicatio
    1-mavzu, public key print, 649 20.10.2020, UZLIKSIZ TA\'L.PEDAGOGIKASI UMKA, Информ.письмо по конференции ЮФ 23 дек 2022 (полное) (1), Микропроцессор КР580, ABTADV 5та Amaliyot MK bo\'yicha, 6-амал маш.угит сол, 2mavzu qurlish texnoligiyasidan, 1 Ma\'ruza Sanoat robotlari va mexatronika faniga kirish , 15-маъруза (3), kurs loyixa ЭРТМ, bakayeva, в конце они оба умрут, FAOLIYAT VA KIRITIVLIK QOBILIYATLARINI RIVOJLANISHI
    3.1.1. Monitor and restrict access 
    In response to the insecurity of network attacks, the firewall 
    takes control of packets entering and leaving the internal 
    network and external network, monitors the status of packets 
    on the network in real time, and analyzes and processes these 
    states to detect abnormal behavior and take linked preventive 
    measures in a timely manner to ensure the security of the 
    network system. 
    3.1.2. Control protocols and services 
    In response to the insecurity of the network itself, control 
    measures are taken for relevant protocols and services
    allowing authorized protocols and services to pass through the 
    firewall, while unauthorized protocols and services are 
    refused to pass through the firewall, effectively shielding 
    insecure services. 
    3.1.3. Protection of internal network 
    In order to prevent the security impact caused by system 
    vulnerabilities, etc., the firewall adopts its own security 
    system, and also detects system vulnerabilities and network 
    intrusions inside the network in a timely manner through 
    technologies such as vulnerability scanning and intrusion 
    detection, and protects the application service systems in the 
    internal network through restrictions on abnormal access. 
    3.1.4. Network Address Translation 
    In network interconnection, since different addresses are 
    used, it is necessary to implement address conversion on the 
    firewall to convert the own address of the internal network to 
    the public address of the external network. After 
    implementing address translation, the internal structure of the 
    protected network can be hidden and network security can be 
    improved to some extent. 
    3.1.5. VPN function 
    Through VPN (Virtual Private Network), LANs or private 
    subnets distributed in a certain unit can be organically 
    connected into a whole through the Internet, which not only 
    saves dedicated communication costs, but also provides 
    security for information sharing. 

    Download 234,35 Kb.
    1   2   3   4   5   6   7   8   9   ...   13




    Download 234,35 Kb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Research on firewall technology and its application in computer network security strategy Peihong Wang

    Download 234,35 Kb.
    Pdf ko'rish