Home > Common Problem > Firewalls cannot prevent attacks that exploit vulnerabilities in server systems and network protocols, right?

Firewalls cannot prevent attacks that exploit vulnerabilities in server systems and network protocols, right?

王林
Release: 2021-02-01 17:24:27
Original
3873 people have browsed it

Firewalls cannot prevent attacks that exploit vulnerabilities in server systems and network protocols, yes. The main function of firewall technology is to promptly discover and deal with possible security risks, data transmission and other problems when the computer network is running.

Firewalls cannot prevent attacks that exploit vulnerabilities in server systems and network protocols, right?

The operating environment of this article: Windows 7 system, Dell G3 computer.

Firewalls cannot prevent attacks that exploit vulnerabilities in server systems and network protocols, yes.

Firewall introduction:

Firewall technology helps computer networks to be built between internal and external networks by organically combining various software and hardware devices for security management and screening. A relatively isolated protective barrier to protect the security of user data and information.

The main function of firewall technology is to promptly discover and deal with security risks, data transmission and other issues that may exist when computer networks are running. The treatment measures include isolation and protection, and can also control various operations in computer network security. Implement recording and testing to ensure the security of computer network operations, protect the integrity of user data and information, and provide users with a better and safer computer network experience.

Firewall type:

(1) Filtering firewall

Filtering firewall is in the network layer and transport layer, and can be based on the address of the data source and the protocol type and other signs Characteristics are analyzed to determine whether it can pass. Information can only be transmitted if it meets the standards specified by the firewall and meets the security performance and type. Some unsafe factors will be filtered and blocked by the firewall.

(2) Application proxy type firewall

The main working scope of the application proxy firewall is at the highest layer of OSI, located above the application layer. Its main feature is that it can completely isolate the network communication flow, and can realize the supervision and control of the application layer through a specific agent program. These two firewalls are more commonly used firewalls, and other firewalls are also more effective. In actual applications, the type of firewall must be reasonably selected based on specific needs and conditions, so that problems such as external intrusion of the firewall can be effectively avoided. 's appearance.

(3) Composite type

The most widely used firewall technology at present is composite firewall technology, which combines the advantages of packet filtering firewall technology and application proxy firewall technology, such as the security of incoming packets. If the policy is a packet filtering policy, access control can be performed on the header part of the message; if the security policy is a proxy policy, access control can be performed on the content data of the message. Therefore, composite firewall technology combines the advantages of its components. At the same time, the original shortcomings of the two firewalls are abandoned, greatly improving the flexibility and security of firewall technology in application practice.

Recommended tutorial: macos

The above is the detailed content of Firewalls cannot prevent attacks that exploit vulnerabilities in server systems and network protocols, right?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template