Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the functions of firewall

2025-01-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

This article mainly introduces what functions the firewall has, which is very detailed and has certain reference value. Friends who are interested must finish reading it.

The five basic functions of the firewall are: (1) the barrier of network security; (2) strengthening the network security strategy; (3) monitoring and auditing; (4) preventing the leakage of internal information; and (5) logging and event notification. Firewall technology can help computer networks to build a relatively isolated protection barrier between their internal and external networks.

Firewall technology is a technology that helps computer networks build a relatively isolated protection barrier between their internal and external networks by organically combining all kinds of software and hardware equipment used for security management and screening, in order to protect the security of user data and information.

There are five functions of the firewall:

1. The barrier of network security

A firewall (as a blocking point, control point) can greatly improve the security of an internal network and reduce risk by filtering insecure services. Because only carefully selected application protocols can pass through the firewall, the network environment becomes more secure.

For example, firewalls can prohibit notoriously insecure NFS protocols from entering and leaving the protected network, so that it is impossible for external attackers to use these fragile protocols to attack the internal network. Firewalls also protect the network from routing-based attacks, such as source routing attacks in IP options and redirect paths in ICMP redirects. The firewall should be able to reject all of the above types of attacks and notify the firewall administrator.

2. Strengthen the network security strategy.

Through the firewall-centered security scheme configuration, all security software (such as password, encryption, identity authentication, audit, etc.) can be configured on the firewall. Compared with distributing the network security problems to each host, the centralized security management of the firewall is more economical. For example, in network access, one password system at a time and other identity authentication systems do not have to be scattered on each host, but focus on the firewall.

3. Monitoring and auditing

If all visits go through the firewall, the firewall can record these visits and log them, as well as provide statistics on network usage. When suspicious actions occur, the firewall can give an appropriate alarm and provide detailed information about whether the network is being monitored and attacked.

In addition, it is also important to collect the use and misuse of a network. The first reason is that it is clear whether the firewall can withstand the detection and attacks of attackers, and whether the control of the firewall is adequate. Network usage statistics are also very important for network demand analysis and threat analysis.

4. Prevent the leakage of internal information

Through the division of the internal network by the firewall, the isolation of the key network segments of the intranet can be realized, thus limiting the impact of local key or sensitive network security problems on the global network. In addition, privacy is a great concern of the internal network, an inconspicuous detail in an internal network may contain clues about security and arouse the interest of external attackers, and even expose some security vulnerabilities of the internal network.

Using firewalls can hide services such as Finger,DNS that disclose internal details. Finger shows the registered name, real name, last login time and shell type of all users of the host. But the information displayed by Finger is very easy for attackers to learn. Attackers can know how frequently a system is used, whether users of the system are connected to the Internet, whether the system attracts attention when it is attacked, and so on.

Firewalls can also block DNS information about the internal network, so that the domain name and IP address of a host are not known to the outside world. In addition to the security function, the firewall also supports the enterprise internal network technology system VPN (Virtual Private Network) with Internet service.

5. Logging and event notification

All the data entering and leaving the network must go through the firewall, and the firewall records it through logs, which can provide detailed statistical information about the use of the network. When suspicious events occur, the firewall is better able to alarm and notify according to the mechanism, and provide information about whether the network is threatened.

These are all the contents of this article entitled "what are the functions of firewalls?" Thank you for reading! Hope to share the content to help you, more related knowledge, welcome to follow the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report