Traditional Culture Encyclopedia - Traditional culture - Single point of failure of traditional firewall
Single point of failure of traditional firewall
1, the firewall can strengthen the security policy.
2. Firewall can effectively record the activities on the Internet. As the only access point, the firewall can record between the protected network and the external network.
3. Firewalls limit the exposure of user points, and can prevent problems affecting a certain network segment from spreading to the whole network.
4. Firewall is a checkpoint of security policy, which prevents suspicious access.
Second, the shortcomings:
1, the firewall can block the attack, but it cannot destroy the attack source.
2. The firewall can't resist the latest attack vulnerabilities without setting policies.
3. Limiting the number of concurrent connections in the firewall can easily lead to congestion or overflow.
4. Most firewall attacks on the legally opened ports of the server cannot be stopped.
5. In general, the firewall can't stop the attack of internal active connection.
6. The firewall itself will have problems and be attacked, and there are still loopholes and bugs.
7. The firewall does not handle viruses.
Third, the function:
1. The most basic function of the firewall is to control the data flow transmitted between different trust areas in the computer network.
2. The firewall has a good protection function: the intruder must cross the security line of the firewall before contacting the target computer; Firewall can be configured into many different protection levels; A high level of protection may prohibit certain services, such as video streaming.
Internet firewall can prevent the dangers on the Internet (virus, resource theft) from spreading to the inside of the network.
3. Security policies can be strengthened: all security software (such as passwords, encryption, identity authentication, auditing, etc. ) can be configured on the firewall through the firewall-centric security scheme configuration.
4, can effectively record online activities.
5. It can limit the exposure of users and prevent the disclosure of internal information: by dividing the internal network with a firewall, the key network segments of the internal network can be isolated, thus limiting the impact of local key or sensitive network security issues on the global network.
6. This is a checkpoint of security policy.
- Previous article:Experience after traveling in the ancient town
- Next article:Which book does the wonderful combination of Chinese medicine come from?
- Related articles
- Classic Prose About Chinese New Year
- What are the characteristics of the peasant class in China?
- There are four fans in Weibo who have exceeded 100 million. Who's next? Do you know that?/You know what?
- How to make homemade spicy hot pot Steps
- What is a flower buckle?
- I would like to ask the experienced person: How much is the salary of Zoomlion's engineers (who do both management and a little technology)? Please see the conditional answer, thank you!
- Old yeast is used when making steamed bread. How to make your own old yeast?
- What font should adults practice?
- What's the experience of studying at Cornell University?
- A Brief History of Sizhou Opera