Saturday, January 1, 2011
Weak current College】 【interpretation of distributed firewall - products (1).
<br> <br> <br> Be the first to introduce the current two very representative of distributed firewall system. At present the whole foreign famous network equipment vendors in a distributed firewall skills more advanced, the provided product performance is also relatively high, .the "software + hardware" form. Host firewall to integrate distributed firewall skills of hardware products, and the firewall server software form is used to accommodate more flexible and high intelligence requirements, such as 3COM, CISCO, United States network security system company's embedded firewall .products. But there are many in the form of pure software, such as Ann soft DFW products, Chau Wangjing (NetCop) distributed firewall. The following respectively on soft company DFW software distributed firewall products and 3COM Corporation software + hardware to perform basic distributed firewall .products. First, on soft EverLinkDFW distributed firewall EverLinkDistributedFirewall (hereinafter referred to as EverLinkDFW) is on a soft technology co., Ltd. launched a three-layer filter structure of software firewall products. It uses a variety of sophisticated network security skills, providing .network security services. EverLink distributed firewall relies on packet filtering, Trojan horses, filtering and script filtering of three-layer filter to check that the defence of the personal computer in the normal use of the network from malicious attacks and improve their network security properties; .at the same time, to facilitate the management of all distributed firewall security policy from a unified central policy management server configuration and maintenance, server monitoring by system administrators by hand, thus reducing the use of distributed firewall costs, while improving security assurance. Here, .the security policy including the level of security and safety properties. Its network connection diagram shown in Figure 1. Its main features and other firewall products respectively see table 1, table 2 shows. Table 1 prevent network attacks · packet filtering <br> · State .-based filtering filter Trojan · shield known Trojans (glacier, BackOrifice2000, etc.) <br> · Detection of unknown Trojans, join the shield list <br> · Can prevent Trojans using encrypted tunnel (Tunnel) skills script filtering including JavaScript scripts, .VisualBasic script, ActiveX script, unified security policy management server · supervision by system administrators by hand, raising security guarantee ability, can reduce the cost of using the firewall. <br> · May use policy download-skills policy file into small pieces, piece .-by-download, does not affect the user network bandwidth, and does not affect the user experience of using the network. <br> · Download the security policy, always at the same time and the policy validation on the server, ensure that no .download defect policies undermine security configuration. <br> · Local security policy to encrypt stored, ensure that you cannot make any changes. Intrusion detection finds and prevent common network attacks essentials, such as port scanning, source routing packet attack, attack, NMAP scan .tears, TCPFlood and UDPFlood etc while supporting Ethernet and Modem connection and complete protection against every possible channel dynamic upgrade to the latest policy updates automatically and dynamically loaded into the system by the kernel, the system does not have to restart the live network status monitoring to .real-time view of the network connection status information on the complete logging and alerting features including software installation, upgrade, logging, security policy record, network access and attack records full support MicrosoftWindows platforms including Window98/Me/NT4/2000 table 2 protection features .traditional border firewall traditional software firewall DFW distributed firewall personal firewall virus wall virus √ malicious network control √ √ √ √ network intrusion √ √ √ √ Trojans √ Intranet maintenance √ PC √ √ √ harassment √ √ √ √ information collection-type attacks √ √ √ .√ II, 3COM's distributed firewall system <br> <br> The latest 3Com announced embedded firewall is a hardware-based treatment programmes distributed firewall, they are embedded into the network card, an embedded firewall policy server for centralized management. This embedded firewall skills .to hardware processing programme of resilience and concentrated management software processing flexibility, providing distributed firewall skills, and establish a more comprehensive security infrastructure. <br> 1, 3Com distributed firewall systems <br> 3Com Corporation this distributed firewall system is actually composed of these embedded .firewall card and embedded firewall policy server software. The entire system including product diagram shown in Figure 2. Previously, we have the impression that the firewall as a separate device installed in a separate node on the network, and network switch or router is connected, .and at the network edge, it is generally called "boundary-firewall". And the 3Com Corporation developed a distributed firewall system embedded firewall products are presented in the form of a card in front of you, Figure 3 and Figure 4 shows difference is 3Com .Corporation for desktop and notebook computer developed by the PCI and PC card type firewall product appearance figure. Believe that this kind of firewall products must be the first time I saw you? this firewall product is distributed firewall skills embedded in the card, the realization of .highly integrated, so that a normal card size PCI or PC card is both a network connection and firewall functionality, also known as? embedded firewall?. Such a card embedded firewall provides RJ Ethernet interface, the bandwidth have both 10Mbps and 100Mbps. Firewall for .PCI interface cards can be directly plugged into the computer PCI slot, for notebook PCsTabbed firewall card is available in two sizes, one is directly using a 32-bit CardBus interface and notebook connected to the computer. <br> The largest distributed firewall features are .no longer on the edge of the network is responsible for security protection, but the firewall function into every corner of the network, or even remote access users, not only on the external network to the internal network traffic filtering, but also according to the internal .network communication between the users perform filtering. Its protection concept is in addition to their outside any user's access is "not trusted", are to be filtered. Unlike previous personal firewall software products have similarities, but not exactly the same. First of all they .are very different from management forms, personal firewall security policy applied by the system's own configuration, the goal is to prevent external attacks, but for the desktop using the host firewall security policy from the system administrator to configure the unified arrangement and, in addition to .the desktop machine to defend the action, or on the desktop machine's external access control and security mechanisms is a desktop application is not visible and cannot be changed. Secondly, different from the personal firewall for personal users for desktop use, the host firewall for enterprise .customers, it and other distributed firewall products comprise an enterprise-level scheme, forming a security policy Center unified management, secure checking mechanism decentralized distributed firewall architecture. It and the traditional boundaries of firewall only on the external network users visit protection concept there are fundamental .differences. <br> Using this system, you only need to install the server and work on embedded firewall hardware card in the server-side installation of 3 com company corresponding embedded firewall policy server software, and by the policy server software on the entire network .system embedded firewall configuration and management. 2, 3Com distributed firewall system main features <br> 3Com embedded firewall processing programme allows IT managers to deploy a covering the entire corporate client security mode. This function on the Government, financial, health and education focus on .the security industry, more major. The treatment plan on the client using tamper-resistant security essentials, as well as to manage policy enforcement points, for internal threat preparedness efforts. To this unique form of the firewall hardware and centralized policy management software, will .be blocked by the edge of the network of internal and external on desktop systems, servers, and notebook computers to attack and intrusion, thus achieving "defense in depth" security of the network. 3Com's distributed firewall system mainly has following several aspects: <br .> <br> (1) tamper-proof reliability <br> 3Com firewall PCI card and PC card hardware in embedded firewall functionality, provides the only software product that is difficult to achieve, and hacker protection capacity, 3Com's firewall card work independent of the .host system, which makes them extremely safe. <br> Hardware-based firewall from malicious code or other security programs. On the contrary, personal firewalls and antivirus software can easily "break" or decoding, as they interact with the host operating system. .This host-related sexual make software-based security mechanism is vulnerable to many widely disseminated in the operating system's security vulnerabilities. <br> (2) the firewall protection extends to the outside perimeter <br> The Global Alliance and mobile access requirements that today's .Enterprise LAN has become a strategic partner extranets, broadband Internet connection and mobile workers sign of a complex mixture. This "no walls of the enterprise" challenge is when a user in a traditional IT infrastructure to an external connection to maintain the security of your corporate .LAN. Each remote, shared and open connections are a possible loss to the company millions of potential security risk. <br>.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment