Welcome to中国防火墙网
Add to Favorites | Chinese
Hardware firewall
From;    Author:Stand originally

Hardware firewall is to point to a firewall program to accomplish chip inside, execute these functions by hardware, can reduce the burden of CPU, make road by stabler.

Hardware firewall is a when ensure in-house network safety important protective screen. Its safety and stability, matter to the safety of whole and in-house network directly. Accordingly, the examination of daily routine is very important to making sure the safety of hardware firewall is.

The metropolis before a lot of hidden trouble that exist in the system and breakdown are breaking out appears such or in that way symptom, the task that routine checks should discover these safe hidden danger namely, locate the problem as far as possible, the settlement of convenient problem.

Generally speaking, the routine examination of hardware firewall basically is aimed at the following content:

The configuration file of 1. hardware firewall

No matter you are in,the consideration must have how mix in the round close, once hardware firewall is thrown in using an environment actually, the circumstance is in at any time however produce a change. The regulation of hardware firewall always can change ceaselessly and adjusting, configuration parameter also can be changed somewhat constantly. Regard a network as safe administrator, best the safety that can write configuration of a modification firewall and regulation is politic, carry out strictly. Involves hardware firewall is configured, best can arrive in detail similar what discharge is allowed, what service should use a representative such detail.

In safe strategy, should mention expressly the measure that modification hardware firewall configures, if what accredit need is revised, who can undertake such modification, when can just undertake modification, how to record these modification to wait. Safe strategy still should mention expressly of responsibility differentiate, if someone is specific,do revise, another person is in charge of a record, the 3rd person will check and check the setting after revising correct. Detailed safe strategy should make sure the modification work program of hardware firewall configuration is changed, the mistake that because revise configuration,can avoid to cause as far as possible and safe flaw.

The disk of 2. hardware firewall uses a case

If log record is preserved on hardware firewall, so the disk that checks hardware firewall uses a case is a very important thing. If do not preserve log record, so the disk that checks hardware firewall uses a circumstance to become more important. Below the circumstance that preserves log record, the unusual growth that disk holds dosage shows the log is cleared probably process existence problem, this kind of situation is opposite for handle fortunately a few. Below the circumstance that does not preserve a daily record, if disk takes up,estimate unusual growth, explaining hardware firewall is possible is was installed Rootkit tool, already by person breach.
Previous12 Next

Previous:no article
Next:Firewall choose and buy 10 element
About us | Legal Notices | Sitemap | Links | Partner