Network Firewall settings Skills _ Web surfing

Source: Internet
Author: User
Tags advantage

Now the network firewall has become the Internet users, but there are few people can let his network firewall really play his role?

Many people do not set the function of the network firewall, the rules of the network firewall do not set-so that the role of the network firewall will be greatly weakened ...

The default setting for a network firewall is generally a common setting, which means that the settings are roughly suitable for hundreds of thousands of users. So, this setting will certainly be 100% for you? Certainly not. Next, I will use my own practice experience, to talk about my own views.

Function set Chapter

Feature settings belong to external settings. Why do you say that? This is mainly because these settings do not change the object in the rule that requires interception and release.

For my frequent Internet users, random start is absolutely indispensable. If you are a dial-up user or a user who does not use the Internet frequently, there are two scenarios for starting a firewall:

Program One: Manually open the firewall before the Internet (general user)

Scenario Two: Use a file to start the firewall and network connections (advanced users)

Typically, a network firewall will have a security level option. For this choice, you must not choose. Because, a lot of users because not according to the actual situation of choice, and lead to the use of certain network resources or hackers.

For a fixed IP technical LAN user like me, I think it's set to medium. Because, we do not like some users can change their own IP, so our defense must be higher than the dynamic IP users.

But is the higher the better? No. Some users are unable to use certain network resources, such as live webcast, because they are impractical to set the security level to advanced without setting the corresponding network rules in the rules.

Therefore, I recommend that the average user set the rule to medium low.

As for other alarm settings, I do not want to say more. However, I would like to remind you that the interception must be recorded in the log. So that we can review.

Rule Setup Chapter

ICMP IGMP bombs have made some users feel frightened. Therefore, some users simply prohibit all ICMP and IGMP.

In this way, it is obviously not a good setting. Why, then? Because ICMP IGMP is being used to make bombs, but can not "rather kill the wrong 10,000, can not let go of a" all interception. And let's not say anything else, because the total amount of system resources spent intercepting ICMP IGMP is endless ...

I suggest that it's enough to intercept just the ICMP type 1 (echo Requset). Why, then? Intercepting ICMP 1 is mainly to prevent hackers using ping to query whether you are online, so this type of ICMP must be intercepted.

If you're still worried about ICMP IGMP bombs, you may want to go to Microsoft to make a patch.

One of the main functions of the network firewall is to prevent Trojan and hacker, so it is necessary to set up rules to intercept Trojan and intercept hackers.

You might say that the network firewall does not have the default rules? Yes, there is. However, this is only the most common Trojan and loophole. For the new dangerous Trojans and loopholes, I am afraid the original rules will not be competent for his task.

So how do we set the rules?

First, we must take advantage of the information provided by the anti-virus manufacturer's website. Because, there is a detailed record of many viruses, trojans analysis of the results and vulnerabilities of data. I think even if you have to analyze the Trojan source program and find the ability to identify vulnerabilities, there is no need for anything to pro-Pro, because Trojans and loopholes are too many, all the code analysis of their own, it is impractical.

Then, set up your own firewall. Because of different manufacturers network firewall settings rules are different, so this article can not be explained in detail.

Of course, this requires a certain degree of expertise. For the average user, I'm afraid it's a bit difficult. What to do? Not afraid, can borrow other people's results. For example, go to the forum to consult a master or directly send an email inquiry master can be solved.

Should also remind everyone is the firewall rules do not repeat, not to contradict. Repetitive rules waste system resources; Contradictory rules let the firewall dilemma, finally let others take advantage ...

Network firewall settings is a never finished learning, interested in you can also go to research.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.