Using security policy of three-layer exchange to protect against network virus

Source: Internet
Author: User
Tags header port number

At present, the threat of computer network can be divided into two kinds: one is the threat to the information in the network and the other is the threat to the equipment in the network. There are many factors affecting computer network, mainly the vulnerabilities and "backdoor" of Internet software, these vulnerabilities and flaws are the first choice of the hacker to attack.

Some hackers hacked into the interior of the network, most of which were the result of imperfect security measures. Software "Backdoor" is the software company's design programmers for their convenience and set, once the "back door" open, the consequences will be disastrous. In fact, the three-tier switch security policy also has the ability to prevent viruses. Here's a detailed description of how to use the three-tier switch's security policy to prevent viruses.

The security strategy of computer network is divided into physical security policy and access control strategy.

1. Physical Security Strategy

The purpose of physical security policy is to protect computer systems, network servers, printers and other hardware entities and communication links from natural disasters, man-made damage and line attacks, verify the identity and use of users, prevent unauthorized operation of users, and ensure that the computer system has a good electromagnetic compatibility working environment.

2. Access Control Strategy

Access control is the main strategy of network security Prevention and protection, its main task is to ensure that network resources are not illegally used and very access. It is also an important means to maintain network system security and protect network resources. Security policy is divided into Access control, network control, directory level security control, attribute security control, network server security control, network monitoring and locking control, network port and node security control. It is necessary to cooperate with each other in order to really protect the security policy, but access control is one of the most important core strategies to ensure network security.

The main source of virus intrusion is through the "backdoor" of software. Packet filter set in the network layer, first should establish a certain number of information filtering table, information filter table is based on the data received from the packet header. The information header contains the data packet source IP address, destination IP address, transmission protocol type (TCP, UDP, ICMP, etc.), protocol source port number, protocol destination port number, connection request direction, ICMP message type, etc. When a packet satisfies a rule in the filtered table, the packet is allowed to pass, otherwise it is prohibited. Such firewalls can be used to prohibit internal access by outside illegal users or to prevent access to certain service types. However, packet filtering technology can not recognize the dangerous packets, can not implement the application-level protocol processing, and can not handle UDP, RPC or dynamic protocols.

According to the anti-virus requirements of each local area network, the anti-virus control system of LAN is established, and the targeted anti-virus strategy is set up respectively.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.