With the increasing demand of network security of Government, enterprise and personal host, the firewall technology emerges. The traditional border firewall is a barrier between the internal network and the external network, but it can't control the internal network access, nor do the intrusion detection and blocking function of the hacker's behavior. Enterprises desperately need a real solution to the internal and external network, firewalls and hacker-proof security solutions, and based on C/s architecture of the distributed firewall to meet this demand well: it is by the security Policy Management Server [Server] and client firewall [clients] composed, Comprehensive use of a variety of advanced network security technology, to provide customers with reliable network security services.
A. Distributed Firewall system architecture
A distributed firewall consists of the security Policy Management Server [Server] and the client firewall [clients]. The client firewall works from the server, workstation, personal computer, according to the content of security policy file, rely on packet filter, Trojan Horse filter and script filter three layer filter check, protect the computer in normal use network without malicious attack, improve network security. The security Policy Management Server is responsible for security policy, user, log, audit and other management. The server is a centralized management control center, unified development and distribution of security policy, responsible for the management of the system log, the unified management of multiple hosts, so that end users "0" burden.
Figure 1 shows a distributed firewall application solution in Government/enterprise. The solution is a pure software firewall that can help government/enterprise to block attacks from internal and external networks without changing any hardware devices and network architectures.
Fig. 1 Application solution of Distributed firewall in government/enterprise
Two. Distributed firewall function analysis
In the distributed firewall solution shown in Figure 1 above, on the left for the government/Enterprise Internal network (intranet) application topology map, in the middle of the Internet public Network, we call the external network (extranet), the right for the government/corporate office and business Extension part of the external network environment. In the internal finance, President Office, Personnel, archives, network management and other host, as well as database server, file server storage of Government/enterprise important information, such information once leaked or stored information of the host is damaged, will bring bad consequences to the government/business. If you do not take the appropriate measures, the network is vulnerable to hackers from the extranet and the online hacker attacks. If you use a border firewall, the attack of the extranet will be blocked, but from the data statistics, there are most of the network attacks/damage from the internal network hackers or employees of the careless application, then the common firewall can not do. The Government/enterprise mobile office staff, agents, partners, remote branch offices in the external network is vulnerable to external hackers attack. Therefore, it is very good to block internal and external network attacks is the government/enterprise Internal network security important task.