Cisco believes that the advent of cloud firewalls means the emergence of the fifth generation of firewalls (the first four generations are: software firewalls, hardware firewalls, ASIC firewalls, UTM). Cloud Firewall 4 features include: Anti-Zombie network/Trojan, to prevent the network internal host infection, cloud detection-Global IPS linkage, cloud access-sslvpn, cloud monitoring-the only support NetFlow firewall, the NOC and SOC two integration.
Firewall technology refers to the isolation between the local network and the external network of a defense system collectively. On the Internet firewall is a very effective network security model, through which can isolate the risk area and the security zone connection, without hindering people's access to the risk areas.
Firewalls can monitor traffic to and from the network, allowing only secure, approved information to enter, while resisting data that poses a threat to the enterprise. At present, the firewall mainly has 3 kinds of hardware firewall, firewall system and software firewall, and has been widely used in computer network.
As security issues and flaws are becoming more common, intrusion into the network comes not only from superb attack methods, but also from low-level errors or inappropriate password choices in configuration. The requirements of the firewall is also more and more high, particularly enterprise-class and Baidu PPC site, small installation software (such as: 360 security guards, rising firewall) has been completely unable to meet its requirements;
and hardware firewall is not hundreds of thousands of of the investment also let the enterprise, therefore, the firewall system has become irreplaceable products, but for this emerging products how to choose it! It is said that the first domestic use of 0 Department of Cloud computing Technology one-stop solution to a variety of security problems is the Lake Union Technology Lake Alliance Cloud Firewall. The Lake Alliance Cloud Firewall can achieve the following purposes:
One, can provide a one-stop security solution for the site, so that the site in the "0 department", "0 maintenance" situation, to prevent such as XSS, SQL injection, Trojan, 0 attacks, botnets and other Web site security issues.
Second, the integrated use of trans-operator intelligent scheduling, page optimization, page caching and other technologies, can further enhance the Web site access speed, reduce the failure rate, so as to enhance the overall site user experience.