In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-11 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
What this article shares to everybody is the content that what is the main function of firewall in security of information of concerned computer network. Xiaobian thinks it is quite practical, so share it with everyone for reference. Let's follow Xiaobian and have a look.
Main functions: 1. Provide basic barriers for network security boundary control;2. Strengthen network security policies;3. Strengthen security certification and monitoring audit;4. Prevent internal information leakage. As an important security protection device in network, firewall can provide access control, defense against various attacks, security control, management functions and log and report functions to user network.
relevant
Firewall technology is a kind of technology that helps computer network to construct a relatively isolated protective barrier between its inner and outer networks by organically combining various software and hardware devices used for security management and screening, so as to protect the security of user data and information.
The function of firewall technology is mainly to discover and deal with the security risks and data transmission problems that may exist during the operation of computer network in time, among which the processing measures include isolation and protection, and at the same time, it can record and detect various operations in computer network security to ensure the security of computer network operation, ensure the integrity of user data and information, and provide users with better and safer computer network experience.
firewall function
Firewalls scan network traffic flowing through them, which filters out attacks that could be executed on target computers. Firewalls can also close unused ports. It can also block outgoing traffic to specific ports, blocking Trojans. Finally, it can block access from specific sites, thereby preventing all traffic from unknown intruders.
1. Barriers to network security
A firewall (as a blocking point, control point) can greatly improve the security of an internal network and reduce risk by filtering insecure services. Because only carefully selected application protocols can pass through firewalls, the network environment becomes more secure. Firewalls, for example, can block protocols such as the notoriously insecure NFS from entering or exiting protected networks, making it impossible for external attackers to exploit these vulnerable protocols to attack internal networks. Firewalls can also protect the network from route-based attacks, such as source routing attacks in IP options and redirect paths in ICMP redirects. The firewall should be able to reject all packets from these types of attacks and notify the firewall administrator.
2. Strengthen network security strategy
All security software (such as password, encryption, identity authentication, auditing, etc.) can be configured on the firewall through firewall-centric security scheme configuration. Centralized firewall security management is more economical than decentralizing network security issues to individual hosts. For example, in network access, one-time password system and other identity authentication systems can be completely not scattered on each host, but concentrated on the firewall.
3. Monitoring audit
If all traffic goes through the firewall, the firewall can log and record those traffic and provide statistics on network usage. When suspicious actions occur, firewalls can provide appropriate alerts and provide detailed information about whether the network is being monitored and attacked. It is also important to collect information about the use and misuse of a network. The first reason is to know whether the firewall can withstand the attacker's detection and attack, and whether the firewall's control is sufficient. Network usage statistics are also important for network requirements analysis and threat analysis.
4. Prevent the leakage of internal information
By using firewall to divide internal network, it can realize the isolation of key network segments of internal network, thus limiting the impact of local key or sensitive network security problems on global network. Furthermore, privacy is a major concern for internal networks, and unobtrusive details of an internal network may contain clues about security that interest external attackers and may even expose certain security vulnerabilities in the internal network. Firewall can be used to hide services that reveal internal details such as Finger, DNS, etc. Finger shows the login name, real name, last login time and shell type of all users of the host. However, the information displayed by Finger is very easy for an attacker to learn. An attacker can know how frequently a system is used, whether users of the system are connected to the Internet, whether the system attracts attention when attacked, and so on. Firewalls can also block DNS information about internal networks so that a host's domain name and IP address are not known to outsiders. In addition to security functions, firewalls also support VPN (Virtual Private Network), an enterprise internal network technology system with Internet services.
5. Logging and event notification
All data coming in and out of the network must pass through the firewall, which records it through logs that provide detailed statistics on network usage. When suspicious events occur, the firewall can better alert and notify according to the mechanism, providing information on whether the network is threatened.
Thank you for reading! About "what is the main function of firewall in computer network information security" this article is shared here, I hope the above content can be of some help to everyone, so that everyone can learn more knowledge, if you think the article is good, you can share it to let more people see it!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.