MailScan2023018_2056.pdf下载

weixin_39820835 2023-01-24 08:30:31
...全文
6 回复 打赏 收藏 转发到动态 举报
AI 作业
写回复
用AI写文章
回复
切换为时间正序
请发表友善的回复…
发表回复
Firewall technology has matured to the extent that today’s firewalls can coordinate security with other firewalls and intrusion detection systems. They can scan for viruses and mali-cious code in electronic mail and web pages. Firewalls are now standard equipment for Internet connections. Home users who connect to commercial Internet service providers via dial-up or via cable/DSL are also using personal firewalls and firewall appliances to secure their connections. Firewalls protect sites from exploitation of inherent vulnerabilities in the TCP/IP protocol suite. Additionally, they help mitigate security problems associated with insecure systems and the problems inherent in providing robust system security for large numbers of com-puters. There are several types of firewalls, ranging from boundary routers that can provide access control on Internet Protocol packets, to more powerful firewalls that can close more vulnerabilities in the TCP/IP protocol suite, to even more powerful firewalls that can filter on the content of the traffic. The type of firewall to use depends on several factors, including the size of the site, the amount of traffic, the sensitivity of systems and data, and the applications required by the organization. The choice of firewall should largely be driven by its feature set, rather than the type of firewall, however. A standard firewall configuration involves using a router with access control capability at the boundary of the organization’s network, and then using a more powerful firewall located behind the router. Firewall environments are made up of firewall devices and associated systems and applica-tions designed to work together. For example, one site may use a firewall environment composed of a boundary router, a main firewall, and intrusion detection systems connected to the protected network and the network between the router and main firewall. To provide secure remote access, the firewall may incorporate a virtual private network (VPN) server to encrypt traffic between the firewall and telecommuters or between the firewall and other sites on the Internet. The firewall environment may incorporate specialized networks for locating externally accessible servers such as for websites and email. The configuration of the firewall environment must be done carefully so as to minimize complexity and man-agement, but at the same time provide adequate protection for the organization’s networks. As always, a policy is essential. Firewalls are vulnerable themselves to misconfigurations and failures to apply needed patches or other security enhancements. Accordingly, firewall configuration and administra-tion must be performed carefully and organizations should also stay current on new vulner-abilities and incidents. While a firewall is an organization’s first line of defense, organiza-tions should practice a defense in depth strategy, in which layers of firewalls and other secu-rity systems are used throughout the network. Most importantly, organizations should strive to maintain all systems in a secure manner and not depend solely on the firewall to stop se-curity threats. Organizations need backup plans in case the firewall fails. This document contains numerous recommendations for choosing, configuring, and main-taining firewalls. These recommendations are summarized in Appendix C.

13,656

社区成员

发帖
与我相关
我的任务
社区描述
CSDN 下载资源悬赏专区
其他 技术论坛(原bbs)
社区管理员
  • 下载资源悬赏专区社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧