You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
Firewall test: From basic to familiarity (chart)
  Add date: 12/02/2008   Publishing date: 12/02/2008   Hits: 20
Total 4 pages, Current page:1, Jump to page:
 
Although the recent years has started integrated and so on unification threat management safety equipment, but the firewall was still one of many unit's basic safety equipment, that your firewall to be whether impregnable? This article author will introduce that the audit or tests firewall's concept.
  First, we need to define the firewall. The firewall is one can act according to set of rules to control between two networks the data flow application procedure, the equipment, the system, also possibly has this kind of function group of systems, it may the protective system be exempt from exterior and the internal threat, separates the private network's sensitive part with not too sensitive region, may to transmit the sensitive data internal network or the exterior network implementation encryption (when serves as a VPN vertex), or hides the interior network address from the exterior network (network address transformation). The firewall obtains the correspondence which the boundary router allows to pass, and carries on corresponds thoroughly the filtration. The firewall has the different type, including static data packet filter (e.g., north electricity Accelar router), official firewall (e.g., Cisco's PIX) and proxy firewall and so on.
  Is similar with the router, the firewall use many kinds of filtration technologies or the method ensure the security. These methods including data packet filtration, condition examination, proxy or application procedure gateway, depth data detection. The firewall can use one method, or it may combine the different method forms the appropriate strong disposition.
  Tests firewall's one very good method is from firewall's owner there collection information. These people may be the audit team, the system manager, the network administrator, the strategy team, in the information security personnel's member. In which main point is must collect, compare each person the function understanding which must have about the firewall, as well as how can the firewall dispose can satisfy the network and system's request. Must gain any extant firewall documents material and the network graph, with confirms from is interviewed the information which person there obtains. In the ideal situation, the firewall is one kind is reflected by the establishment the strategy the control mechanism. This means before disposing the firewall, must first establish the related strategy. What is pitiful, very little has the unit to do this.
  After having collected the above information, the auditors may further understand that firewall's construction, and decided whether the firewall has carried on the disposition correctly, can carry on correctly to the network partitions and implements the message protection. Next step appraises operating system's disposition. This is firewall own disposition, all firewalls have an operating system. A some manufacturer declaration firewall just equipment. Actually, in the firewall typical situation just is one operating system which strengthens. In fact, this equipment may move on a simplification Unix system, or is the movement, in is had custom-made by the factory on operating system, like Cisco's ASA. The firewall and the router are the software actuate, its does the work is causes the code difficulty with to see.

 
Other pages: : 1 * 2 * 3 * 4 * Next>>
Prev:Resists hacker's invasion to further know the firewall technology Next:Hackers use top news stories from Google Trends Labs to increase their fake blogs rankings

Comment:

Category: Home > firewall