论文部分内容阅读
在这部分:(1)检查传统基于端口防火墙的弱点;(2)审查入侵防御的缺点;(3)寻址设备无序扩张。
In this section: (1) Check the traditional port-based firewall weaknesses; (2) Review the shortcomings of intrusion prevention; (3) Disorderly expansion of addressing devices.