• 3.2.3. Proxy firewalls
  • Research on firewall technology and its application in computer network security strategy Peihong Wang




    Download 234,35 Kb.
    Pdf ko'rish
    bet6/13
    Sana28.01.2024
    Hajmi234,35 Kb.
    #147542
    1   2   3   4   5   6   7   8   9   ...   13
    Bog'liq
    Research on firewall technology and its applicatio
    1-mavzu, public key print, 649 20.10.2020, UZLIKSIZ TA\'L.PEDAGOGIKASI UMKA, Информ.письмо по конференции ЮФ 23 дек 2022 (полное) (1), Микропроцессор КР580, ABTADV 5та Amaliyot MK bo\'yicha, 6-амал маш.угит сол, 2mavzu qurlish texnoligiyasidan, 1 Ma\'ruza Sanoat robotlari va mexatronika faniga kirish , 15-маъруза (3), kurs loyixa ЭРТМ, bakayeva, в конце они оба умрут, FAOLIYAT VA KIRITIVLIK QOBILIYATLARINI RIVOJLANISHI
    3.2.2. Stateful Inspection Firewall 
    The stateful inspection firewall, also known as the dynamic 
    packet filtering firewall, has a stateful inspection module that 
    creates a stateful inspection table consisting of two parts: a 
    filtering rules table and a connection status table. If a packet 
    enters, the stateful inspection firewall first analyzes it 
    according to the filter rule table to decide whether to allow it 
    to pass. According to the relevant information in the filtering 
    rule table, if it is allowed to pass, the stateful firewall lets it 
    pass and analyzes the relevant information of the packet to 
    establish a connection in the connection status table for that 
    communication process. After that, when subsequent packets 
    in the same communication process enter the firewall, the 
    stateful firewall will no longer detect them, but match them 
    directly through the stateful connection table, and since 
    subsequent packets have the same status as those already 
    Since the subsequent packets have the same connection 
    information as the packets already allowed through the 
    firewall, they will be allowed to pass directly. As you can see, 


    44 
    this type of firewall is very useful for preventing "IP 
    spoofing" attacks. 
    3.2.3. Proxy firewalls 
    Proxy firewalls are proxy servers and application gateways 
    that work at the application layer and are controlled by the 
    application, allowing access to one application and preventing 
    others from passing through. Proxy servers are implemented 
    using hosts with dual NICs, usually running between two 
    networks, and are intermediaries between clients and real 
    servers, isolating direct communication between internal and 
    external networks. Access to external network servers by 
    clients of internal networks becomes access to external 
    network servers by proxy servers, which are then forwarded 
    to internal clients by proxy servers. The proxy server is like a 
    server to the internal client, and it is like a client to the 
    external network server, which successfully achieves the 
    isolation of computer systems inside and outside the firewall, 
    and reduces the possibility of being attacked because the 
    external network cannot directly contact the internal network 
    to be accessed. 
    In addition, adaptive proxy technology is a revolutionary 
    technology implemented in recent years in firewalls for 
    commercial applications, combining the security of proxy 
    firewalls and the high speed of packet filtering firewalls, etc. 
    It can increase performance by at least 10 times without losing 
    security, and has two basic elements: adaptive proxy server 
    and dynamic packet filter. The initial security checks of an 
    adaptive proxy firewall still occur at the application layer, and 
    once the trusted identity is authenticated, a secure channel is 
    established and packets can pass directly and quickly through 
    the network layer. 

    Download 234,35 Kb.
    1   2   3   4   5   6   7   8   9   ...   13




    Download 234,35 Kb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Research on firewall technology and its application in computer network security strategy Peihong Wang

    Download 234,35 Kb.
    Pdf ko'rish