Hardware firewall configuration process explanation (1)

Source: Internet
Author: User
Tags functions requires firewall

This article to introduce some practical knowledge, that is how to configure the security policy in fire. However, it should be noted that the specific configuration of the firewall is not uniform, do not say that different brands, is the same brand different models are not exactly the same, so this can only be some general firewall configuration methods for a basic introduction. At the same time, the specific firewall policy configuration will vary greatly depending on the specific application environment. First, introduce some basic configuration principles.

I. Basic configuration principles for firewalls

By default, all firewalls are configured in the following two scenarios:

Reject all traffic, which requires specific types of traffic that can be entered and out in your network.
Allow all traffic, this situation requires you to specifically specify the type of traffic to be rejected. Arguably, most firewalls reject all traffic as security options by default. Once you have installed the firewall, you need to open some necessary ports to enable users within the firewall to access the system after authentication. In other words, if you want your employees to be able to send and receive emails, you must set the rules on the firewall or open the process that allows POP3 and SMTP.

In the firewall configuration, we first have to follow the principle is safe and practical, from this point of view, in the firewall configuration process should adhere to the following three basic principles:

(1). Simple and practical: to the firewall environment design, the first thing is the simpler the better. In fact, this is the basic principle of any thing. The simpler the implementation approach, the easier it is to understand and use. And the simpler the design, the less prone to error, firewall security features easier to ensure that the management is more reliable and simple.

Each product before development will have its main function positioning, such as the original intention of the firewall product is to achieve the security between the network control, intrusion detection products are mainly for illegal internet monitoring. But with the mature and development of technology, these products in the original main function of more or less added some value-added functions, such as the fire wall to increase the killing virus, intrusion detection and other functions, in the intrusion detection increased virus killing function. But these value-added functions are not all the application environment need, in the configuration we can also be configured for the specific application environment, do not have to configure each function in detail, such a will greatly enhance the configuration difficulty, but also because of various aspects of configuration uncoordinated, resulting in new security vulnerabilities, outweigh the gains.

(2). Comprehensive Depth: Single defensive measures are difficult to ensure the security of the system, only the use of comprehensive, multi-level defense strategy system can realize the real security of the system. In the firewall configuration, we do not stay on several surface firewall statements, but should be systematic look at the entire network of security protection system, as far as possible to make all aspects of the configuration to strengthen each other, from the deep-seated protection of the entire system. This can be reflected in two aspects: on the one hand, embodied in the firewall system deployment, multi-level firewall deployment system, that is, the use of the Internet Border firewall, departmental border firewall and host firewall at the level of defense; On the other hand intrusion detection, network encryption, Virus killing, and many other security measures combined with the multi-layer safety system.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.