当前位置:网站首页>network security firewall
network security firewall
2022-08-10 05:47:00 【a program circle】
== Some common ports ==
HTTP: port 80
FTP: port 20,21
In the TCP/IP protocol, the link between the transport layer and the application layer is realized by ports.A port is actually a virtual thing.
Not only the process receiving the datagram needs to open its own port, but also the process sending the datagram.
== Port concept == In network technology, port has roughly two meanings: one is a port in the physical sense, such as an interface used by ADSL Modem, hub, switch, and router to link other network devices.The second is the port in the logical sense, which generally refers to the port in the TCP/IP protocol. The port number ranges from 0 to 65535, such as port 80 for browsing web services and port 21 for FTP services.
Port classification
According to the distribution of port numbers:
(1) Well-known ports
Well-known ports are well-known port numbers, ranging from 0 to 1023. These port numbers are generallyAllocated to some services.For example, port 21 is assigned to the FTP service, port 25 is assigned to the SMTP (Simple Mail Transfer Protocol) service, port 80 is assigned to the HTTP service, and port 135 is assigned to the RPC service.
(2) Dynamic ports
The range of dynamic ports is from 1024 to 65535. These port numbers are generally not fixedly assigned to a service, that is, these ports can be used by multiple services.As long as the running program requests the system to access the network, the system can allocate one of these port numbers for the program to use.For example, port 1024 is assigned to the first program that sends an application to the system.After closing the program process, the occupied port number is released.
However, dynamic ports are often used by virus Trojan programs, such as Glacier's default link port is 7626 and so on.
Divided by protocol type:
(1) TCP port
The TCP port, the Transmission Control Protocol port, needs to establish a connection between the client and the server, which can provide reliable data transmission.Common ones include port 21 for FTP service, port 23 for Telnet service, port 25 for SMTP service, and port 80 for HTTP service, etc.
(2) UDP port
UDP port, that is, the user data packet protocol port, does not need to establish a connection between the client and the server, and the security is not guaranteed.It is common to have port 53 of the DNS service and so on.
** Firewall Types **
Firewalls can be divided into software firewalls and hardware firewalls.Software firewalls can be further divided into personal firewalls and gateway firewalls.
== Personal Firewall: == Personal Firewall runs on the PC and is used to monitor the communication information between the PC and the external network.Windows Firewall is integrated into the Windows operating system.
== Gateway Firewall == The function of configuring the firewall on the gateway in the network can carry out policy control on the traffic in the network, which is the gateway firewall.
There are two types of gateway firewalls, one is a software gateway firewall that installs and runs firewall software on Windows, Linux and other operating systems, and the other is a hardware gateway firewall that uses special equipment.
== Personal firewall mainly monitors the communication flow of PC, and gateway firewall monitors the communication flow of all terminals in the network, and carries out policy control at the gateway.==
== What threats does the firewall protect against?==
1, Eavesdropping: Obtain important information such as bank card numbers and passwords by eavesdropping on network data.
2. Tampering: maliciously modify the website homepage, mail and other communication content
3. Destruction: destroying the normal work of the system through computer viruses or Dos attacks
4. Impersonation: pretending to be others to send emails,phishing, scams and other news to the party
5. Information leakage: Disclosure of important information or documents on the computer or server
6. Attack shift: as a springboard for viruses or DoS attacks
7. Spam: mass mailing for profit
** Firewall **
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.All network traffic to and from this computer passes through this firewall.The firewall scans the network traffic flowing through him.This filters out some attacks from being executed on their computer.Firewalls can also close unused ports, block outgoing traffic from specific ports, and block access from specific sites, preventing all communications from unknown intruders.
边栏推荐
猜你喜欢
随机推荐
事务、存储引擎
tinymce富文本编辑器
深度学习模型训练前的必做工作:总览模型信息
One step ahead, don't miss it again, the chain reading APP will be launched soon!
数据库 笔记 创建数据库、表 备份
小程序wx.request简单Promise封装
知识蒸馏论文学习
impdp 导入数据
深度学习中的学习率调整策略(1)
链读好文:Jeff Garzik 推出 Web3 制作公司
pytorch框架学习(5)torchvision模块&训练一个简单的自己的CNN (二)
索引笔记【】【】
win12 修改dns脚本
R中设置图形参数--函数par()详解
来亲自手搭一个ResNet18网络
清览题库--C语言程序设计第五版编程题解析(1)
pytorch框架学习(7) tensorboard使用
PCL点云配准--ICP or keypoints+features
毫米波雷达数据集Scorp使用
el-cascader级联选择器的子菜单双击两次才显示被选中的内容









