Operation Manual - Getting Started
H3C SecPath F1800-A Firewall
Chapter 1 Firewall Overview
1.1 Overview of Network Security
As the rapid development of the Internet, more and more enterprises turn to network
services to speed up their development. How to protect confidential data, resources
and reputation in an open network environment has become a focus of attention.
Therefore, network security is a very critical task in network construction.
1.1.1 Security Threats
At present, common security threats on the Internet are shown in
Table 1-1 Common security threats on the Internet
Unauthorized use
Denial of Service (DoS)
Information theft
Data juggle
Type
Resources are used by an
unauthorized
called illegal user) or in
unauthorized mode.
The server denies legal
access request from the
legal user.
-
-
Description
user
(also
1-1
Chapter 1 Firewall Overview
Table
1-1.
Example
An intruder can guess
a combination of user
name and password to
enter
a
computer
system
and
use
resources illegally.
An intruder sends a
large number of data
packets or defective
packets to the server
within a short time, so
that the server cannot
process the legal task
due to overload.
An intruder does not
intrude a destination
system directly, but
intercepts
significant
data or information on
the network.
An
intruder
intentionally destroys
the
consistency
data
through
modifying,
deleting,
delaying,
reordering
the system data or
message stream, or
inserting
fraud
messages.
of
Need help?
Do you have a question about the H3C SecPath F1800-A and is the answer not in the manual?
Questions and answers