In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces the skills of using the firewall, which has a certain reference value, interested friends can refer to, I hope you can learn a lot after reading this article, let the editor take you to understand it.
1. The firewall implements your security policy.
The firewall strengthens some security policies. If you don't make a security policy before placing a firewall, now is the time to do so. It may not be written, but it can also be used as a security policy. If you are not clear about what the security policy should do, installing a firewall is the best thing you can do to protect your site, and it is not easy to maintain it at all times. To have a good firewall, you need a good security policy to be written and accepted.
2. Firewalls are not readily available products.
Choosing a firewall is more like buying a house than choosing where to spend your vacation. A firewall is very similar to a house. You have to stay with it every day, and you use it for more than a week or two. All need to be maintained or they will collapse. Building a firewall requires careful selection and configuration of a solution to meet your needs, and then constantly maintain it. A lot of decisions need to be made, and a solution that is right for one site is often wrong for another site.
3. A firewall is not a single device in many cases.
Except in particularly simple cases, firewalls are rarely a single device, but a group of devices. Even if you buy a commercial "all-in-one" firewall application, you still have to configure other machines (such as your web server) to run with it. These other machines are considered part of the firewall, which includes how these machines are configured and managed, what they trust, what treats them as trusted, and so on. You can't simply choose a device called a "firewall" and expect it to take full security responsibility.
4. Use the default policy.
Under normal circumstances, your means is to deny any service other than services that you know are necessary and secure. But new loopholes appear every day, and shutting down insecure services means an ongoing war. Us server
Firewalls won't solve all your problems.
Don't expect the firewall to give you security on its own. Firewalls protect you from a class of attacks, and people try to attack the inside directly from the outside. But it doesn't prevent attacks from within LAN, and it doesn't even protect you from all the attacks it can detect.
6. Compromise with conditions, not easily.
People like to do unsafe things. If you allow all requests, your network will be very insecure. If you refuse all requests, your network is also insecure, and you don't know where unsafe things are hidden. Those who can't work with you will be at a disadvantage. You need to find ways to meet the needs of your users, although these ways bring a certain amount of risk.
7. Install only what you need.
Firewall machines cannot install all the software distributions provided by the manufacturer like ordinary computers. Machines that are part of the firewall must be kept to a minimum. Even if you think something is safe, don't install it when you don't need it.
8. Use stratification means.
And a single device from one location. Use multiple security layers to prevent a mistake from infringing on your concerns.
9. Use all available resources.
Do not build firewalls based on information from a single source, especially if the resource is not from a vendor. There are many resources available: such as vendor information, books we have written, mail groups, and websites.
Believe only what you can be sure of.
Don't trust the manual and dialog boxes of the graphical interface or the vendor's statement about how something works, and check to make sure that connections that should be rejected are rejected. Check to determine that all connections that should be allowed are allowed.
Thank you for reading this article carefully. I hope the article "what are the skills of using firewalls" shared by the editor will be helpful to everyone. At the same time, I also hope that you will support and pay attention to the industry information channel. More related knowledge is waiting for you to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.