硬件防火墙性能差异鉴别及硬件防火墙选择指导(Hardware firewall performance differential identification and hardware firewall selection guidance).doc
文本预览下载声明
硬件防火墙性能差异鉴别及硬件防火墙选择指导(Hardware firewall performance differential identification and hardware firewall selection guidance)
This article is contributed by neo_hello
Pdf documents may experience poor browsing on the WAP side. It is recommended that you first select TXT, or download the source file to the local view.
This paper sorted by the Linux server /fuwuqi/linux/ server security /fuwuqi/anquan/ Windows server /fuwuqi/windows/ /mailpacket.html America space
Hardware firewall performance differential identification and hardware firewall selection guidance
First, hardware firewall performance differential authentication two, hardware firewall selection guidance
First, hardware firewall performance differential identification
There are some problems often confusing: the firewall function of products, each manufacturers description is very similar, some well-known brand the bright younger generation and very similar. In this situation, how to identify? Describe very similar products, even with a function in the implementation, the availability and ease of use, the individual differences are very obvious.
First, the network layer access control, all firewalls must have this function, otherwise you can not call it a firewall. Of course, most routers can also achieve this function through their own ACL
This paper sorted by the Linux server /fuwuqi/linux/ server security /fuwuqi/anquan/ Windows server /fuwuqi/windows/ /mailpacket.html America space
1. rules for editing of network layer access control mainly in firewall rule editing, we must examine whether the access control on network layer can be reflected by the rules? Access control is fine enough? The same rules, whether to provide a control means and the time? Rule configuration is provided the friendly interface? Whether can easily reflect the will of the security management? 2.IP/MAC address is the same IP/MAC address binding function, there are some details to be investigated, such as automatic collecting firewall
显示全部