Reasonable configuration of firewall is the key to ensure network security

Source: Internet
Author: User
Tags key domain access firewall

Today, we are in the information age, but also can be said to be the virus and hackers in the era, it is indeed a bit pessimistic but today's network indeed, from the Internet to the intranet, from the PC to the Internet mobile phone platform, no place is safe. Every time the network virus attack, will let the home user, the Enterprise user, 800 hotline even is the operator Tourian.

After another viral crisis, people have begun to think about the safety of the network. Now any enterprise to build a network will take into account the purchase of firewalls, and more and more home users on their own computers and even the broadband access to the firewall, I believe that in the near future, we can see the phone will also appear on the firewall. But firewalls are not a barrier to psychological comfort, and only firewalls can really keep the threat out of the door. For many SMEs, the configuration of firewalls often does not reflect

Business needs of the enterprise. If the protection of the firewall implementation settings are not combined with the needs of the enterprise in a serious and fully defined, the security filtering rules added to the firewall may allow unsafe services and communication through, thereby causing the enterprise network unnecessary danger and trouble. Firewall can be compared to do a filter network of data, if the prior formulation of a reasonable filtering rules, it will intercept the irregular data packets, thus playing a role in filtering. On the contrary, if the rules are not correct, it will backfire.

What functions should the SME firewall have

How to implement the firewall configuration properly? First, let's take a look at what the small business firewalls typically should have:

1. Dynamic packet filtering technology, dynamic maintenance of all communication through the firewall status (connection), based on the connection of filtering;

2. It can be used as a location for deploying NAT (Network address translation), using NAT technology to correspond the limited IP address dynamically or statically with the internal IP address, to alleviate the problem of address space shortage;

3. You can set the policy for data access between the trusting domain and the untrusted domain;

4. You can define a rule plan so that the system can automatically enable and close the policy at some point;



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.