下面瘙痒是什么原因| 亮油什么时候涂| 什么水果最好吃| 囡是什么意思| 炖肉放什么容易烂| 丑时是什么时候| 痔疮有什么症状| 注解是什么意思| 梦见自己掉河里了是什么意思| 胎儿肠管扩张是什么原因造成的| 六块钱麻辣烫什么意思| 电解质饮料有什么作用| 鸡枞是什么| 什么山什么水| 孕反什么时候结束| 王是什么生肖| 心脏属于什么系统| 什么什么一什么| 厄瓜多尔说什么语言| 什么分泌胆汁| 3.1415926是什么意思| 2006年是什么年| 贫血吃什么补得快| 苯磺酸氨氯地平片什么时候吃| moncler是什么牌子| 脚趾缝脱皮是什么原因| 淋巴细胞降低说明什么| 母仪天下什么意思| 61年属什么生肖| 椰蓉是什么| 梦见盖新房子是什么意思| 出气不顺畅是什么原因| 什么生木| 口腔疱疹吃什么药| 佩戴沉香有什么好处| 什么吃蚊子| 长痔疮有什么症状| 壅是什么意思| 猪蹄炖什么| 孟姜女姓什么| 身份证带x是什么意思| 3月14号是什么星座| 睡觉盗汗是什么原因| 补血补气吃什么最快最好| 风五行属什么| 脑梗用什么药效果好| 山药对人体有什么好处| 近亲为什么不能结婚| 子宫内膜厚有什么症状| 1977年是什么命| 出生证编号是什么| 蚯蚓吃什么食物| 梦见车翻了是什么预兆| 尼特族是什么意思| 什么是简历| 口腔溃疡看什么科室| 黄鳝吃什么东西长得快| 男的为什么喜欢男的| 10月11日是什么星座| 硬下疳长什么样| 文艺范是什么意思| 什么给我带来快乐| 明年是什么生肖年| xl是什么码| 缺维生素e有什么症状| dyj什么意思| 转氨酶高是什么原因造成的| 总胆固醇高是什么原因| 门槛费是什么意思| 三价铁离子什么颜色| 什么是接触性皮炎| 健身吃什么长肌肉最快| 陈皮不能和什么一起吃| 为什么加油站不能打电话| 什么样的红点是白血病| 腰椎挂什么科室| 反流性食管炎可以吃什么水果| 梦见一坨屎是什么意思| alb医学上是什么意思| 女人梦见老虎是什么预兆| 啤酒酵母是什么| 牙齿上有黄斑是什么原因| 喉咙发炎吃什么药最好| 手足口病是什么| Mo什么元素| 肝气郁结西医叫什么病| 发生火灾时的正确做法是什么| www是什么意思| 红薯是什么季节的| 老年人补什么钙效果最好| 孕妇什么情况下打肝素| o型血阳性是什么意思| 广东有什么市| 9.23号是什么星座| 窈窕是什么意思| 绿豆可以和什么一起煮| 汉字五行属什么| 排卵试纸什么时候测最准| 8月11号是什么星座| pm是什么单位| 越睡越困是什么原因| 吃完榴莲后不能吃什么| 没有什么过不去| 智能手环什么品牌好| 男人射精快吃什么药| 时光荏苒的意思是什么| 7月一日是什么节日| 辣眼睛是什么意思| 鬼针草有什么功效| pbg是什么意思| lpl是什么| 11.20是什么星座| 送百合花代表什么意思| 扁尖是什么| 泥鳅吃什么| 头皮发红是什么原因| 蓝矾对人有什么危害| 突然戒烟对身体有什么影响| 压疮是什么| 憋屎会造成什么后果| 阴平阳秘是什么意思| 黄瓜有什么营养价值| 大便干燥一粒一粒的吃什么药| dob值阳性是什么意思| 红楼梦主要讲了什么| 心肌劳损是什么意思| 胆结石是什么原因造成的| 裸婚什么意思| asd什么意思| db是什么| 王维是诗什么| 肠炎吃什么药效果最好| 什么时候恢复的高考| 茶寿为什么是108岁| 宫颈粘液栓是什么样的| 老花眼视力模糊有什么办法解决吗| 有迹可循什么意思| 症瘕病是什么病| 猫吐了吃什么药| 血细胞分析是查什么的| 胆汁是由什么分泌的| 演唱会安可是什么意思| 老是头晕是什么原因| 怀孕为什么要吃叶酸| 咳嗽有黄痰吃什么药| 胎膜早破是什么原因引起的| 化工厂是干什么的| 车间管理人员工资计入什么科目| 垂线是什么| 排长是什么级别| 为什么耳朵总是嗡嗡响| 什么是张力| 晚饭吃什么英语怎么说| 雄性激素过高是什么原因| gina是什么意思| 坐怀不乱柳下惠什么意思| 白带褐色什么原因| 神是什么| 茯茶是什么茶| 土豆吃多了有什么坏处| 大腿骨叫什么骨| 怀孕什么时候打掉最好| 什么叫幸福| 相对湿度是什么意思| 男性尿道炎是什么原因引起的| 小乌龟吃什么东西| 吃什么排湿气效果好| 小青龙是什么龙虾| 小孩睡觉磨牙是什么原因引起的| 水是由什么构成的| 梦见奶奶死了是什么意思| 什么品牌的帽子好| 为什么会长脂肪粒| 吃什么受孕率又快又高| 安徽有什么好吃的| 虹膜是什么意思| 吃什么囊肿会消失| 缺钾吃什么水果| 小乌龟死了有什么预兆| 撇清关系是什么意思| 血管瘤长什么样子图片| 梅毒是什么症状| 总恶心是什么原因| 男人性功能不行是什么原因| 术后吃什么| 手抖是什么病的症状| 鸡蛋和什么不能一起吃吗| 小孩出汗多是什么原因| 1978年是什么命| 龙利鱼是什么鱼| 腿酸是什么原因引起的| 梦见孩子被蛇咬是什么意思| 五月份是什么季节| 身份证数字分别代表什么| 龟头炎的症状是什么样| 新疆人是什么人种| 薄幸是什么意思| 逍遥丸的功效和作用是什么| 什么是肺炎| 查幽门螺旋杆菌挂什么科| 低压高会引起什么后果| 搭桥香是什么意思| 夏天什么花会开| 芦荟有什么好处| 男人嘴小代表什么意思| 来姨妈能吃什么水果| 继女是什么意思| 尿酸高什么水果不能吃| 河虾吃什么| 胡萝卜和什么榨汁好喝| 公鸡为什么会打鸣| ab面是什么意思| 1988年是什么生肖| 韩束属于什么档次| 降血脂有什么好办法| 梦到拆房子是什么意思| 绿字五行属什么| 外痔疮是什么样子图片| 睡眠不好去医院看什么科| 亲情是什么意思| 余光是什么意思| 不长毛的猫叫什么名字| 脑供血不足吃什么中成药好| 西红柿不能和什么一起吃| 结石能喝什么茶| 右乳导管扩张什么意思| 慢性胆囊炎是什么原因引起的| 什么是脂肪| 8月7号是什么星座| 大势至菩萨代表什么| 正常人为什么传导阻滞| 什么算熬夜| 什么越来越什么什么越来越什么| ys是什么意思| spi是什么意思| 梦见剃光头是什么预兆| 低血压什么症状| 人为什么会变| 红白相间是什么意思| 一什么蘑菇| 神疲乏力吃什么中成药| 血小板比积偏高是什么意思| 邓紫棋和华晨宇什么关系| 肝火旺盛是什么原因引起的| 芳心是什么意思| 飞机联程票是什么意思| 什么像什么什么| 白癜风是什么样子的| 杯弓蛇影告诉我们什么道理| 木克什么| hmo是什么意思| 手掉皮是缺什么维生素| 做小吃什么生意最赚钱| 爆菊花是什么意思| 9月10号是什么星座| 男属鸡的和什么属相最配| 为什么狗不能吃巧克力| 喝什么汤下奶最快最多| 白果有什么功效| 食用酒精是什么做的| 羡慕不来是什么意思| 肌肉一跳一跳什么原因| 吃什么对脾胃有好处| ky是什么意思| 百度

山东大学召开专题会议研究人权学科建设与发展

(Redirected from Firewall (networking))
百度 中国领导人正领导中国在国际舞台上扮演新的角色:中国提出了一带一路等新的倡议。

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on configurable security rules.[1][2] A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet[3] or between several VLANs. Firewalls can be categorized as network-based or host-based.

History

edit

The term firewall originally referred to a wall to confine a fire within a line of adjacent buildings.[4] Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment. The term was applied in the 1980s to network technology[5] that emerged when the Internet was fairly new in terms of its global use and connectivity.[6] The predecessors to firewalls for network security were routers used in the 1980s. Because they already segregated networks, routers could filter packets crossing them.[7]

Before it was used in real-life computing, the term appeared in John Badham's 1983 computer?hacking movie WarGames, spoken by the bearded and bespectacled programmer named Paul Richter, which possibly inspired its later use.[8]

One of the earliest commercially successful firewall and network address translation (NAT) products was the PIX (Private Internet eXchange) Firewall, invented in 1994 by Network Translation Inc., a startup founded and run by John Mayes. The PIX Firewall technology was coded by Brantley Coile as a consultant software developer.[9] Recognizing the emerging IPv4 address depletion problem, they designed the PIX to enable organizations to securely connect private networks to the public internet using a limited number of registered IP addresses. The innovative PIX solution quickly gained industry acclaim, earning the prestigious "Hot Product of the Year" award from Data Communications Magazine in January 1995. Cisco Systems, seeking to expand into the rapidly growing network security market, subsequently acquired Network Translation Inc. in November 1995 to obtain the rights to the PIX technology. The PIX became one of Cisco's flagship firewall product lines before eventually being succeeded by the Adaptive Security Appliance (ASA) platform introduced in 2005.

Types of firewalls

edit

Firewalls are categorized as a network-based or a host-based system. Network-based firewalls are positioned between two or more networks, typically between the local area network (LAN) and wide area network (WAN),[10] their basic function being to control the flow of data between connected networks. They are either a software appliance running on general-purpose hardware, a hardware appliance running on special-purpose hardware, or a virtual appliance running on a virtual host controlled by a hypervisor. Firewall appliances may also offer non-firewall functionality, such as DHCP[11][12] or VPN[13] services. Host-based firewalls are deployed directly on the host itself to control network traffic or other computing resources.[14][15] This can be a daemon or service as a part of the operating system or an agent application for protection.

 
An illustration of a network-based firewall within a network

Packet filter

edit

The first reported type of network firewall is called a packet filter which inspects packets transferred between computers. The firewall maintains an access-control list which dictates what packets will be looked at and what action should be applied, if any, with the default action set to silent discard. Three basic actions regarding the packet consist of a silent discard, discard with Internet Control Message Protocol or TCP reset response to the sender, and forward to the next hop.[16] Packets may be filtered by source and destination IP addresses, protocol, or source and destination ports. The bulk of Internet communication in 20th and early 21st century used either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) in conjunction with well-known ports, enabling firewalls of that era to distinguish between specific types of traffic such as web browsing, remote printing, email transmission, and file transfers.[17][18]

The first paper published on firewall technology was in 1987 when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin continued their research in packet filtering and developed a working model for their own company based on their original first-generation architecture.[19] In 1992, Steven McCanne and Van Jacobson released a paper on BSD Packet Filter (BPF) while at Lawrence Berkeley Laboratory.[20][21]

Connection tracking

edit
 
Flow of network packets through Netfilter, a Linux kernel module

From 1989–1990, three colleagues from AT&T Bell Laboratories, Dave Presotto, Janardan Sharma, and Kshitij Nigam, developed the second generation of firewalls, calling them circuit-level gateways.[22]

Second-generation firewalls perform the work of their first-generation predecessors but also maintain knowledge of specific conversations between endpoints by remembering which port number the two IP addresses are using at layer 4 (transport layer) of the OSI model for their conversation, allowing examination of the overall exchange between the nodes.[23]

Application layer

edit

Marcus Ranum, Wei Xu, and Peter Churchyard released an application firewall known as Firewall Toolkit (FWTK) in October 1993.[24] This became the basis for Gauntlet firewall at Trusted Information Systems.[25][26]

The key benefit of application layer filtering is that it can understand certain applications and protocols such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP). This allows it to identify unwanted applications or services using a non standard port, or detect if an allowed protocol is being abused.[27] It can also provide unified security management including enforced encrypted DNS and virtual private networking.[28][29][30]

As of 2012, the next-generation firewall provides a wider range of inspection at the application layer, extending deep packet inspection functionality to include, but is not limited to:

Endpoint specific

edit

Endpoint-based application firewalls function by determining whether a process should accept any given connection. Application firewalls filter connections by examining the process ID of data packets against a rule set for the local process involved in the data transmission. Application firewalls accomplish their function by hooking into socket calls to filter the connections between the application layer and the lower layers. Application firewalls that hook into socket calls are also referred to as socket filters.[citation needed]

Firewall Policies

edit

At the core of a firewall's operation are the policies that govern its decision-making process. These policies, collectively known as firewall rules, are the specific guidelines that determine the traffic allowed or blocked across a network's boundaries.[32][33]

Firewall rules are based on the evaluation of network packets against predetermined security criteria. A network packet, which carries data across networks, must match certain attributes defined in a rule to be allowed through the firewall. These attributes commonly include:

  • Direction: Inbound or outbound traffic
  • Source: Where the traffic originates (IP address, range, network, or zone)
  • Destination: Where the traffic is headed (IP address, range, network, or zone)
  • Port: Network ports specific to various services (e.g., port 80 for HTTP)
  • Protocol: The type of network protocol (e.g., TCP, UDP, ICMP)
  • Applications: L7 inspection or grouping av services.
  • Action: Whether to allow, deny, drop, or require further inspection for the traffic

Zones

edit

Zones are logical segments within a network that group together devices with similar security requirements. By partitioning a network into zones, such as "Technical", "WAN", "LAN", "Public," "Private," "DMZ", and "Wireless," administrators can enforce policies that control the flow of traffic between them. Each zone has its own level of trust and is governed by specific firewall rules that regulate the ingress and egress of data.

A typical default is to allow all traffic from LAN to WAN, and to drop all traffic from WAN to LAN.

Services

edit

In networking terms, services are specific functions typically identified by a network port and protocol. Common examples include HTTP/HTTPS (web traffic) on ports 80 and 443, FTP (file transfer) on port 21, and SMTP (email) on port 25. Services are the engines behind the applications users depend on. From a security aspect, controlling access to services is crucial because services are common targets for exploitation. Firewalls employ rules that stipulate which services should be accessible, to whom, and in what context. For example, a firewall might be configured to block incoming FTP requests to prevent unauthorized file uploads but allow outgoing HTTPS requests for web browsing.

Applications

edit

Applications refer to the software systems that users interact with while on the network. They can range from web browsers and email clients to complex database systems and cloud-based services. In network security, applications are important because different types of traffic can pose varying security risks. Thus, firewall rules can be crafted to identify and control traffic based on the application generating or receiving it. By using application awareness, firewalls can allow, deny, or limit traffic for specific applications according to organizational policies and compliance requirements, thereby mitigating potential threats from vulnerable or undesired applications.

Application can both be a grouping of services, or a L7 inspection.

USER ID

edit

Implementing firewall rules based on IP addresses alone is often insufficient due to the dynamic nature of user location and device usage.[33][34] User ID will be translate to a IP address.

This is where the concept of "User ID" makes a significant impact. User ID allows firewall rules to be crafted based on individual user identities, rather than just fixed source or destination IP addresses. This enhances security by enabling more granular control over who can access certain network resources, regardless of where they are connecting from or what device they are using.

The User ID technology is typically integrated into firewall systems through the use of directory services such as Active Directory, LDAP, RADIUS or TACACS+. These services link the user's login information to their network activities. By doing this, the firewall can apply rules and policies that correspond to user groups, roles, or individual user accounts instead of purely relying on the network topology.

Example of Using User ID in Firewall Rules

edit

Consider a school that wants to restrict access to a social media server from students. They can create a rule in the firewall that utilises User ID information to enforce this policy.

  1. Directory Service Configuration — First, the firewall must be configured to communicate with the directory service that stores user group memberships. In this case, an Active Directory server.
  2. User Identification — The firewall maps network traffic to specific user IDs by interpreting authentication logs. When a user logs on, the firewall associates that login with the user's IP address.
  3. Define User Groups — Within the firewall's management interface, define user groups based on the directory service. For example, create groups such as "Students".
  4. Create Firewall Rule:
    • Source: User ID (e.g., Students)
    • Destination: list of IP addresses
    • Service/Application: Allowed services (e.g., HTTP, HTTPS)
    • Action: Deny
  5. Implement Default Allow Rule:
    • Source: LAN zone
    • Destination: WAN zone
    • Service/Application: Any
    • Action: Allow

With this setup, only users who authenticate and are identified as members of "Students" are denied to access social media servers. All other traffic, starting from LAN interfaces, will be allowed.

Most common firewall log types

edit

Traffic Logs:

  • Description: Traffic logs record comprehensive details about data traversing the network. This includes source and destination IP addresses, port numbers, protocols used, and the action taken by the firewall (e.g., allow, drop, or reject).
  • Significance: Essential for network administrators to analyze and understand the patterns of communication between devices, aiding in troubleshooting and optimizing network performance.

Threat Prevention Logs:

  • Description: Logs specifically designed to capture information related to security threats. This encompasses alerts from intrusion prevention systems (IPS), antivirus events, anti-bot detections, and other threat-related data.
  • Significance: Vital for identifying and responding to potential security breaches, helping security teams stay proactive in safeguarding the network.

Audit Logs:

  • Description: Logs that record administrative actions and changes made to the firewall configuration. These logs are critical for tracking changes made by administrators for security and compliance purposes.
  • Significance: Supports auditing and compliance efforts by providing a detailed history of administrative activities, aiding in investigations and ensuring adherence to security policies.

Event Logs:

  • Description: General event logs that capture a wide range of events occurring on the firewall, helping administrators monitor and troubleshoot issues.
  • Significance: Provides a holistic view of firewall activities, facilitating the identification and resolution of any anomalies or performance issues within the network infrastructure.

Session Logs:

  • Description: Logs that provide information about established network sessions, including session start and end times, data transfer rates, and associated user or device information.
  • Significance: Useful for monitoring network sessions in real-time, identifying abnormal activities, and optimizing network performance.

DDoS Mitigation Logs:

  • Description: Logs that record events related to Distributed Denial of Service (DDoS) attacks, including mitigation actions taken by the firewall to protect the network.
  • Significance: Critical for identifying and mitigating DDoS attacks promptly, safeguarding network resources and ensuring uninterrupted service availability.

Geo-location Logs:

  • Description: Logs that capture information about the geographic locations of network connections. This can be useful for monitoring and controlling access based on geographical regions.
  • Significance: Aids in enhancing security by detecting and preventing suspicious activities originating from specific geographic locations, contributing to a more robust defense against potential threats.

URL Filtering Logs:

  • Description: Records data related to web traffic and URL filtering. This includes details about blocked and allowed URLs, as well as categories of websites accessed by users.
  • Significance: Enables organizations to manage internet access, enforce acceptable use policies, and enhance overall network security by monitoring and controlling web activity.

User Activity Logs:

  • Description: Logs that capture user-specific information, such as authentication events, user login/logout details, and user-specific traffic patterns.
  • Significance: Aids in tracking user behavior, ensuring accountability, and providing insights into potential security incidents involving specific users.

VPN Logs:

  • Description: Information related to Virtual Private Network (VPN) connections, including events like connection and disconnection, tunnel information, and VPN-specific errors.
  • Significance: Crucial for monitoring the integrity and performance of VPN connections, ensuring secure communication between remote users and the corporate network.

System Logs:

  • Description: Logs that provide information about the overall health, status, and configuration changes of the firewall system. This may include logs related to high availability (HA), software updates, and other system-level events.
  • Significance: Essential for maintaining the firewall infrastructure, diagnosing issues, and ensuring the system operates optimally.

Compliance Logs:

  • Description: Logs specifically focused on recording events relevant to regulatory compliance requirements. This may include activities ensuring compliance with industry standards or legal mandates.
  • Significance: Essential for organizations subject to specific regulations, helping to demonstrate adherence to compliance standards and facilitating audit processes.

Configuration

edit

Setting up a firewall is a complex and error-prone task. A network may face security issues due to configuration errors.[35]

Firewall policy configuration is based on specific network type (e.g., public or private), and can be set up using firewall rules that either block or allow access to prevent potential attacks from hackers or malware.[36]

See also

edit

References

edit
  1. ^ Boudriga, Noureddine (2010). Security of mobile communications. Boca Raton: CRC Press. pp. 32–33. ISBN 978-0849379420.
  2. ^ Macfarlane, Richard; Buchanan, William; Ekonomou, Elias; Uthmani, Omair; Fan, Lu; Lo, Owen (2012). "Formal security policy implementations in network firewalls". Computers & Security. 31 (2): 253–270. doi:10.1016/j.cose.2011.10.003.
  3. ^ Oppliger, Rolf (May 1997). "Internet Security: FIREWALLS and BEYOND". Communications of the ACM. 40 (5): 94. doi:10.1145/253769.253802. S2CID 15271915.
  4. ^ Canavan, John E. (2001). Fundamentals of Network Security (1st ed.). Boston, MA: Artech House. p. 212. ISBN 9781580531764.
  5. ^ Cheswick, William R.; Bellovin, Steven M. (1994). Firewalls and Internet Security: Repelling The Wily Hacker. Addison-Wesley. ISBN 978-0201633573.
  6. ^ Liska, Allan (Dec 10, 2014). Building an Intelligence-Led Security Program. Syngress. p. 3. ISBN 978-0128023709.
  7. ^ Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey of Network Firewalls" (PDF). Archived from the original (PDF) on 2025-08-04. Retrieved 2025-08-04.
  8. ^ Boren, Jacob (2025-08-04). "10 Times '80s Sci-Fi Movies Predicted The Future". ScreenRant. Retrieved 2025-08-04.
  9. ^ Mayes, John (2025-08-04). "NTI - JMA". Wikipedia. Retrieved 2025-08-04.
  10. ^ Naveen, Sharanya. "Firewall". Archived from the original on 21 May 2016. Retrieved 7 June 2016.
  11. ^ "Firewall as a DHCP Server and Client". Palo Alto Networks. Retrieved 2025-08-04.
  12. ^ "DHCP". www.shorewall.net. Retrieved 2025-08-04.
  13. ^ "What is a VPN Firewall? – Definition from Techopedia". Techopedia.com. Retrieved 2025-08-04.
  14. ^ Vacca, John R. (2009). Computer and information security handbook. Amsterdam: Elsevier. p. 355. ISBN 9780080921945.
  15. ^ "What is Firewall?". Retrieved 2025-08-04.
  16. ^ Peltier, Justin; Peltier, Thomas R. (2007). Complete Guide to CISM Certification. Hoboken: CRC Press. p. 210. ISBN 9781420013252.
  17. ^ "TCP vs. UDP : The Difference Between them". www.skullbox.net. Retrieved 2025-08-04.
  18. ^ Cheswick, William R.; Bellovin, Steven M.; Rubin, Aviel D. (2003). Firewalls and Internet Security repelling the wily hacker (2 ed.). Addison-Wesley Professional. ISBN 9780201634662.
  19. ^ Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey of Network Firewalls" (PDF). p. 4. Archived from the original (PDF) on 2025-08-04. Retrieved 2025-08-04.
  20. ^ McCanne, Steven; Jacobson, Van (2025-08-04). "The BSD Packet Filter: A New Architecture for User-level Packet Capture" (PDF). Archived from the original (PDF) on 2025-08-04.
  21. ^ McCanne, Steven; Jacobson, Van (January 1993). "The BSD Packet Filter: A New Architecture for User-level Packet Capture". USENIX.
  22. ^ M. Afshar Alam; Tamanna Siddiqui; K. R. Seeja (2013). Recent Developments in Computing and Its Applications. I. K. International Pvt Ltd. p. 513. ISBN 978-93-80026-78-7.
  23. ^ "Firewalls". MemeBridge. Retrieved 13 June 2014.
  24. ^ "Firewall toolkit V1.0 release". Retrieved 2025-08-04.
  25. ^ John Pescatore (October 2, 2008). "This Week in Network Security History: The Firewall Toolkit". Archived from the original on April 29, 2016. Retrieved 2025-08-04.
  26. ^ Marcus J. Ranum; Frederick Avolio. "FWTK history".
  27. ^ "What is Layer 7? How Layer 7 of the Internet Works". Cloudflare. Retrieved Aug 29, 2020.
  28. ^ "5 Firewall Features you Must-Have". Check Point Software. Retrieved 2025-08-04.
  29. ^ Stanfield, Nathan (2025-08-04). "11 Firewall Features You Can't Live Without". Stanfield IT. Retrieved 2025-08-04.
  30. ^ "Safing Portmaster". safing.io. Retrieved 2025-08-04.
  31. ^ Liang, Junyan; Kim, Yoohwan (2022). Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall. pp. 0752–0759. doi:10.1109/CCWC54503.2022.9720435. ISBN 978-1-6654-8303-2. Retrieved 2025-08-04.
  32. ^ "Policy". docs.paloaltonetworks.com. Retrieved 2025-08-04.
  33. ^ a b "Creating Firewall Policy Rules | Juniper Networks". www.juniper.net. Retrieved 2025-08-04.
  34. ^ "User-ID". docs.paloaltonetworks.com. Retrieved 2025-08-04.
  35. ^ Voronkov, Artem; Iwaya, Leonardo Horn; Martucci, Leonardo A.; Lindskog, Stefan (2025-08-04). "Systematic Literature Review on Usability of Firewall Configuration". ACM Computing Surveys. 50 (6): 1–35. doi:10.1145/3130876. ISSN 0360-0300. S2CID 6570517.
  36. ^ "What is Firewall Configuration and Why is it Important?". Fortinet.
edit
拉大便有血是什么原因 安全期是什么时候 梦见和死人说话是什么意思 呼吸不畅是什么原因 压力大会有什么症状
洗衣机什么牌子最好 社保局是干什么的 切除一侧输卵管对女性有什么影响 什么样的女孩容易招鬼 两小儿辩日告诉我们什么道理
小孩子经常流鼻血是什么原因 骨髓不造血是什么病 晚上睡觉脚抽搐是什么原因 筋膜炎吃什么药 早上五六点是什么时辰
一清二白是什么意思 吃降压药有什么副作用 想吃甜食是身体缺什么 egcg是什么 容易放屁是什么原因
空调睡眠是什么意思hcv9jop1ns3r.cn 什么是高纤维食物wmyky.com 吃的少还胖什么原因hcv8jop7ns0r.cn max是什么意思hcv9jop5ns5r.cn 身体痒是什么原因huizhijixie.com
头脑简单是什么生肖0297y7.com 什么时候需要打破伤风针hcv8jop5ns6r.cn 白果是什么东西hcv9jop3ns8r.cn 泪腺堵塞有什么症状hcv7jop4ns7r.cn 一什么虫子hcv9jop4ns5r.cn
集合是什么hcv8jop4ns5r.cn 女人腰酸背痛是什么病hcv9jop4ns7r.cn 枕神经痛吃什么药hcv8jop9ns9r.cn 517是什么星座hcv9jop1ns7r.cn 万事顺意是什么意思hcv7jop7ns3r.cn
上颚痒是什么原因hcv9jop7ns9r.cn 晚上扫地有什么说法hcv8jop7ns7r.cn 什么情况啊这是hcv8jop9ns7r.cn 什么的向日葵hcv9jop2ns8r.cn 眼睛不能见光是什么病hcv8jop9ns8r.cn
百度