Prev

Next

What are the wireless connection technologies of the... Internet of things (iot) applications have been deeply rooted in our lives. The E-Lins H685 industrial-grade router is a small industrial-grade wireless router with single or double LAN ports. TDD/ fdd-lte, 4G, 3G, GPRS network optional. Besides, what are the wireless connectivity technologies for the Internet of things?   1....

更多文章

The use of industrial wireless routers Industrial-grade wireless router adopts high performance 32-bit industrial-grade ARM9 communication processor, which is widely used in finance, electric power, postal, water conservancy, environmental protection, meteorology and other industries.   Industrial router is mainly used in intelligent transportation,...

更多文章

Cascade and stack of industrial-grade 4G routers The most basic star Ethernet architecture, the actual star enterprise network may be much more complex than this. This renaturation is not only reflected in how high-end network equipment, how complex configuration, more importantly, the performance of network switching level is more complex. Industrial routers and firewalls...

更多文章

The difference between 4G router and 4G DTU 4G industrial wireless router and 4G DTU are also used for wireless network data transmission of industrial equipment. But there are also significant differences between the two, and the differences between the two are mainly from the appearance of the interface, the use of methods and the application environment.   1....

更多文章

Characteristics and differences between RS485 and RS232 RS232 and RS485 have always been the weak current common interface, but there are a lot of people do not understand the difference between them is not very thorough.   I. overview of RS485   RS-485 serial bus is widely used when the communication distance is tens of meters to thousands of meters. RS-485...

更多文章

twitter

介绍边界路由器如何保护内网安全的具体设置方法

文章目录 : 技术相关

春节即将来临,本公司网站会正常运转,谢谢你光临本站,我们公司提供以下产品与服务:
工业路由器
lte路由器
4g路由器
3g路由器
有需要这联系我们的在线客服或者致电我们,我们将全心全意为您服务。
介绍边界路由器如何保护内网安全的具体设置方法
很多人对边界路由器还没有足够的了解,大多数网络将通过使用按拒绝请求实施过滤的方案享受可以接受的安全水平。本文将主要介绍边界路由器如何保护内网安全的具体设置方法。
一、花时间审阅安全记录
一般来说,边界路由器位于你的网络的边缘,并且允许你看到进出你的网络全部通信的状况。用心的安全管理员在病毒传播者作出反应之前能够查出红色代码和Nimda病毒的攻击。
通过其内置的防火墙功能,审阅你的边界路由器记录是查出安全事件的最有效的方法,无论是查出正在实施的攻击还是未来攻击的征候都非常有效。利用出网的记录,你还能够查出试图建立外部连接的特洛伊木马程序和间谍软件程序。
二、建立准许进入和外出的地址过滤政策
在你的边界路由器上建立政策以便根据IP地址过滤进出网络的违反安全规定的行为。除了特殊的不同寻常的案例之外,所有试图从你的网络内部访问互联网的IP地址都应该有一个分配给你的局域网的地址。
封锁入网的192.168.X.X、172.16.X.X和10.X.X.X等地址,拥有源地址的通信或者保留的和无法路由的目标地址的所有的通信都应该允许通过这台边界路由器。这包括回送地址127.0.0.1或者E类(class E)地址段240.0.0.0-254.255.255.255。
三、保持边界路由器的物理安全
边界路由器根据IP地址智能化地路由数据包,而集线器相所有的节点播出数据,从网络嗅探的角度看,边界路由器比集线器更安全。
如果连接到那台集线器的一个系统将其网络适配器置于混乱的模式,它们就能够接收和看到所有的广播,包括口令、POP3通信和Web通信。然后,重要的是确保物理访问你的网络设备是安全的,以防止未经允许的笔记本电脑等嗅探设备放在你的本地子网中。
上述的相关内容就是对边界路由器如何保护内网安全的描述,在此方面希望会给你带来一些帮助。

发表评论

You must be logged in to post a comment.