网站大量收购独家精品文档,联系QQ:2885784924

linux防火墙基本知识(Basic knowledge of Linux Firewall).doc

linux防火墙基本知识(Basic knowledge of Linux Firewall).doc

  1. 1、本文档共18页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
linux防火墙基本知识(Basic knowledge of Linux Firewall)

linux防火墙基本知识(Basic knowledge of Linux Firewall) Firewall classification (1) packet filtering firewalls. Packet filtering (packet Filtering) technology is to select data packets at the network layer, the choice is based on the filter logic set in the system, known as access control table (access, control, lable, ACL). By checking the source address and destination address of each packet in the data stream, the factors such as the port number and protocol status, or their combination, to determine whether the packet is allowed to pass. The advantage of the packet filter firewall is that it is transparent to users, fast processing and easy to maintain. The disadvantage is that illegal access once the attack can break the firewall software and configuration vulnerabilities on the host; the port number of the packet source address, destination address and IP in packet head, can be easily forged. IP address spoofing is one of the most commonly used attacks against this type of firewall. (two) proxy service firewall Proxy service (proxy service) is also called link level gateway or TCP channel. It is in view of the existing packet filter and application gateway technology and the introduction of the shortcomings of the firewall technology, which is characterized by the network communication links all across the firewall is divided into two sections. When the proxy server receives the users access request for a site, it checks that the request conforms to the control rule. If the rules allow the user to access the site, the proxy server will go to the site for users to retrieve the required information, and then forwarded to the user, inside and outside the network user access is achieved through a proxy server on the link, which is isolated inside and outside the firewall computer system function. In addition, the proxy service is also analyzed and the registration of past data packets, and the formation of the report, at the same time when there are signs of the attack wi

文档评论(0)

f8r9t5c + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

版权声明书
用户编号:8000054077000003

1亿VIP精品文档

相关文档