本文主要讲防火墙，对于考虑使用SaaS提供服务的msp，必须考虑在部署和管理方面有利可图的安全解决方案。寻找这样的防火墙是至关重要的，它不需要更多的手动配置，以及管理，这很容易消耗劳动力资源，并推动费用更高(Jadhav et al. 753-756)。此外，还需要研究一种解决方案，为所有客户提供集中式管理，帮助他们控制成本，同时提高利润。本篇assignment代写文章由英国论文时Essay Times教育网整理，供大家参考阅读。
For MSPs looking at an offering using SaaS, it is essential to look at a solution for security which is profitable in terms of deployment and management. Looking for such firewalls is crucial which would not need more configuration of manual nature as well as management which easily eats up the resources of labor and drives the expenses higher (Jadhav et al. 753-756). It is wanted furthermore to look at a solution which can offer management of centralized nature to all the customers for helping them control the costs and enhance the profits simultaneously.
The firewalls with packet filtering operate on the basis of rules that involve headers of TCP or UDP or IP. These do not attempt at establishing a check of correlation between distinct sessions. Deep packet inspection is carried out through intrusion detection or prevention system. Gateways of applications do view at the contents of packet but these remain for particular applications itself (Chen and Don 282-94). They do not view any packet based suspicious data. These systems furthermore look for suspicious information consisted within packets. It makes attempts at examining a correlation between several packets for identifying attacks such as scanning the port, mapping the network and service denial. The IDS or identification systems are of two types inclusive of signature based IDS and IDS based on anomaly. Signature based IDS are such that it requires a database of acknowledged attacks consisting of clear signatures. Signature is defined through its types and packets order characterizing a specific attack. Limitation of such type of IDS is that only the attacks which are known can be identified. A false alarm can be thrown by IDS (Wu and Shan 39). False alarms can happen when normal stream of packet matches with attacks signature. Snort is a powerful example of IDS.
Another type is anomaly type which helps in creating a normal network operation traffic pattern. During the mode of IDS, it views the patterns of traffic which is unusually statistical. Examples of these are inclusive of an unusual load of ICMP and port scans exponential growth. The key challenge faced by this type of deployment is the issue of differentiating general traffic and traffic of unusual nature.