Understanding why firewall is better than none

Source: Internet
Author: User

See why even a simple firewall is better than nothing
Understand Why firewall is better than none

Endurer Note: 1. Better than nothing

By Jonathan yarden
Author: Jonathan yarden
Translation: endurer

Keywords:Firewils | Security Applications/tools | Internet | Security Management

Keywords:Firewall | Security Applications/tools | Internet | Security Management
Http://techrepublic.com.com/5100-1009-6036812.html? Tag = NL. e044

Takeaway:
Deciding which type of firewall to use depends on what you're re trying to protect. in this edition of Internet Security Focus, Jonathan yarden breaks down the differences between software and hardware firewals, And he discusses situations in which advanced firewall features are necessary.
Overview:
Deciding which firewall to use depends on what you want to protect. In this phase of Internet Security Focus, Jonathan yarden breaks down the differences between software firewalls and hardware firewalls, and discusses which advanced firewall features are necessary.

Endurer Note: 1. Break down destroy, uniform, overwhelm, pause, collapse, stop, collapse, break down, break down (relieve, collapse, complete failure, spirit don't support, stop, break down)
2. Discuss a situation

As a systems administrator for an ISP, my primary function is to support several thousand customers by ensuring that equipment and services are operating correctly. depending on the customer, this job can include maintaining on-site routing and firewall equipment, which can vary depending on the specific needs of the customer.

As a system administrator of an ISP (Internet Service Provider), my primary role is to ensure that devices and services run properly and support thousands of customers. These operations depend on the user, which may include maintaining the local routing and firewall devices, which may vary depending on the customer's special needs.
Endurer Note: 1. Primary function: Main responsibilities; base function, original function
2. On-site; Local

When it comes to supplying Internet access, ISPs provision a single IP address or a subnet for their MERs. either way, I always suggest that anyone accessing the internet protect systems with either a hardware or software firewall.

An ISP provides a single IP address or subnet for Internet access. In short, I always recommend that anyone access the Internet protection system under the hardware or software firewall.
Endurer Note: 1. Either way in either case

Of course, IT pros know that a firewall is anything that protects a computer or network from the ravages of the Internet. but when talking to end users, I try to describe the level of questionable activity on the Internet in terms of worldwide accessibility.

Of course, IT experts know that firewalls protect computers or networks from Internet damages. But for end users, I try my best to describe suspicious behaviors on the Internet in a world-class term.
Endurer Note: 1. Talk to speak to someone; blame

Because public Internet addresses are readily accessible from anywhere in the world, even a simple dial-up Internet connection with a public IP address exposes your computer to the rest of the world while you're connected. this means anyone on the internet can identify your computer runner nd perhaps scan it to see whether it's running vulnerable software or services. that's why you need to implement a firewall to try to protect it.

Because public Internet addresses can be easily accessed from anywhere in the world, even if a simple dial-up connection using a public IP address is connected to the Internet, expose computers to other people in the world. This means that anyone on the internet can determine the computer -- and possibly scan it to see if it is running defective software or services. That's why you need to implement a firewall to protect it.

Hardware vs. Software firewils

As I tell my customers, deciding which type of firewall to use depends on what you're re trying to protect. if you're just worried about a single computer system with Internet access, ZoneAlarm software works well enough for most people.

I told the customer that deciding which firewall to use depends on what you want to protect. If you are only worried about accessing a single computer system on the Internet, ZoneAlarm can work well for most people.
Endurer Note: 1. Worry about worries

ZoneAlarm not only alerts you when someone tries to access your computer, but it alerts you when a program on your computer attempts unauthorized access to the Internet. if the access is valid, You can instruct ZoneAlarm to remember the program and allow access in the future without alerts. although it's not an antivirus program, ZoneAlarm can also detect Trojan Horse and spyware programs.

ZoneAlarm not only alerts you when someone tries to access your computer, but also when your computer programs attempt to access the Internet without verification. If the access is justified, you can instruct ZoneAlarm to remember the program and allow future access without warning. Although ZoneAlarm is not an anti-virus program, it can also detect trojans and spyware.

However, sometimes a software firewall just won't cut it. I suggest using a hardware firewall in these situations:

However, sometimes a software firewall cannot cope with it. I recommend that you use the hardware firewall in these scenarios:

  • A customer needs Internet access on more than one computer.
    More than one computer needs Internet access.
  • A customer needs a secure connection to a main office.
    Secure connection from customer to Company
    Endurer Note: 1. Main Office of the General Assembly (Social Security, industry, bureau, store, etc.)
  • The client is a branch office.
    The client is a branch.
    Endurer Note: 1. Branch Office N. Branch; Branch
  • A company needs to host E-mail and web servers.
    Company needs e-mail and web server host

Even though it's possible to share an Internet connection and firewall software using one computer as the router, I think it's a bad idea to use a workstation in this manner. everyone on the network becomes dependent on the reliability of someone else's computer.

Even if it is feasible to share Internet connections and firewall software on a computer as a router, it is a bad idea to use workstation like this. Computers on the network become mutually dependent.
Endurer Note: 1. Even if
2. In this manner, take this action.

If a computer locks up or reboots, it cuts off internet access. Then people call the ISP to complain, even when it's not the source of the problem.

If a computer is locked or restarted, Internet access is cut off, and people call ISP to explain it, even if this is not the root cause of the problem.
Endurer Note: 1. Lock up lock, block, imprisonment, and confinement
2. Cut off

Hardware firewils don't have to be expensive. For instance, Netgear and Linksys models sport sufficient features for a reasonable cost.

Hardware firewalls are not expensive. For example, the Netgear and Linksys modules are worth the money.
Endurer Note: 1. NetGear and Linksys are both outstanding brands in small and medium-sized enterprises and products.
2. Sports Model

Do you need advanced firewall features?

If clients telecommute or are setting up a branch office of a larger corporation, they probably need to use virtual private networking (VPN) features. clients may also need Network Address Translation (NAT) when there are multiple internal computers and only one public IP address.

If the customer works remotely or sets up a branch of a large company, they may need to use the virtual private network (VPN) feature. When there are multiple internal computers and a public IP address, the client may also need Network Address Translation (NAT ).
Endurer Note: 1. Telecommute (Working remotely at home using a computer terminal connected to a work unit)
2. Set up, erect, set up, raise, assemble, create (record), propose, open

If MERs need a subnet to support public Internet servers, I recommend using port forwarding and "hiding" the real service behind the firewall. no matter which advanced features your clients need, they shocould choose a hardware firewall that supports these advanced features.

If the customer needs a subnet to provide public Internet servers, we recommend using port forwarding and hiding the real service behind the firewall. No matter which advanced features your client needs, they need to select a hardware firewall that supports these advanced features.
Endurer Note: 1. No matter no matter...

Another thing to keep in mind when dealing with telecommuters or branch offices is to always check with the company's IT department before buying anything. I can't tell you how many times I 've ve needed to replace equipment and fix VPN settings because branch offices and telecommuters didn't check with their IT department before buying equipment.

When dealing with long-distance workers or segments, another thing to remember is to negotiate with the company's IT department before purchasing the product. I cannot tell you, because the branch and remote workers did not negotiate with their IT department to buy the device. I need to replace the device and fix the number of VPN settings.
Endurer Note: 1. Deal with research (discussion, processing, involved)
2. Check with is in line with...; negotiate with...

Regardless of your clients 'specific needs, using a firewall does improve security. Anything they can do to "hide" their computer systems and services from the public Internet reduces risk.

Use the firewall to enhance security regardless of the special needs of the client. They can hide computer systems and services on the Internet to reduce risks.

Endurer Note: 1. Regardless, don't hesitate
My personal preference is to always use hardware firewils, but software programs such as ZoneAlarm are better than nothing at all. however, firewallcan't prevent a virus or worm from taking over your computer-that's typically the job of antivirus software.

I personally prefer to keep using the hardware firewall, but software programs such as ZoneAlarm are always better than none. However, firewalls cannot prevent viruses or worms from taking over your computer-a typical task of anti-virus software.

Endurer Note: 1. Take over, take over

That's why it's important to remember that valid Internet security involves several layers. Consider a firewall system to be the first layer of your clients 'security needs.

This is why it is important to remember that valid Internet security includes several layers. Consider the firewall system as the first layer of your customer's security needs.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.