The flaw of the distributed firewall to fill the boundary firewall

Source: Internet
Author: User
Tags server hosting firewall

Traditional firewalls are called border firewalls because they are deployed at the network boundary. The boundary firewall constitutes a barrier between the intranet and the external Internet, which is responsible for the network access control. Along with the development of the network security technology, the boundary firewall gradually exposes some weakness, which is embodied in the following aspects.

Limited by network structure

The working mechanism of the boundary firewall relies on the topological structure of the network. As more and more users use the Internet to frame cross-regional enterprise networks, mobile office and server hosting are becoming more and more popular, plus e-commerce requires that business partners can access each other under certain permissions, enterprise intranet and network boundary become the concept of logic, and the application of border firewall is more and more restricted.

It's not safe inside.

The boundary firewall setting security policy is based on the basic assumption that people outside the corporate network are not trustworthy, and that people within the enterprise network are trustworthy. In fact, nearly 80% of attacks and unauthorized access from within the enterprise network, the border firewall for the attack from within the enterprise network is inadequate.

Efficiency is not high and the fault point is many

The boundary firewall concentrates the checking mechanism on the single point of the network boundary, which leads to the bottleneck of network access, and makes the user consider the detection efficiency first when choosing the firewall product, then the security mechanism. Security policy is too complex and further reduces the efficiency of the border firewall. In order to meet the needs of different applications, the boundary firewall has to take a compromise between efficiency and security strategy, so it leaves many security risks. In addition, the border firewall itself has a single point of failure risk, once there is a problem or hackers to conquer, the entire enterprise network will be completely exposed to the attackers.

In view of the flaw of the boundary firewall, the expert proposed the distributed firewall scheme. Distributed firewall has a narrow and broad sense of the point. Blocking the intranet vulnerability is the specialty of a distributed firewall.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.