Today, we are in the information age, but also can be said to be the virus and hackers in the era, it is indeed a bit pessimistic but today's network indeed, from the Internet to the intranet, from the PC to the Internet mobile phone platform, no place is safe. Every time the network virus attack, will let the home user, the Enterprise user, 800 hotline even is the operator Tourian.
After another viral crisis, people have begun to think about the safety of the network. Now any enterprise to build a network will take into account the purchase of firewalls, and more and more home users on their own computers and even the broadband access to the firewall, I believe that in the near future, we can see the phone will also appear on the firewall. But firewalls are not a barrier to psychological comfort, and only firewalls can really keep the threat out of the door. For many SMEs, the configuration of firewalls often does not reflect
Business needs of the enterprise. If the protection of the firewall implementation settings are not combined with the needs of the enterprise in a serious and fully defined, the security filtering rules added to the firewall may allow unsafe services and communication through, thereby causing the enterprise network unnecessary danger and trouble. Firewall can be compared to do a filter network of data, if the prior formulation of a reasonable filtering rules, it will intercept the irregular data packets, thus playing a role in filtering. On the contrary, if the rules are not correct, it will backfire.
What functions should the SME firewall have
How to implement the firewall configuration properly? First, let's take a look at what the small business firewalls typically should have:
1. Dynamic packet filtering technology, dynamic maintenance of all communication through the firewall status (connection), based on the connection of filtering;
2. It can be used as a location for deploying NAT (Network address translation), using NAT technology to correspond the limited IP address dynamically or statically with the internal IP address, to alleviate the problem of address space shortage;
3. You can set the policy for data access between the trusting domain and the untrusted domain;
4. You can define a rule plan so that the system can automatically enable and close the policy at some point;