当前位置:网站首页>Why is access to the external network prohibited for internal services of the company?
Why is access to the external network prohibited for internal services of the company?
2022-07-07 09:01:00 【bboyzqh】
List of articles

In the above figure, network access is divided into two directions :
- Internet( Extranet ) Access the company network www.taobao.com: The request will be forwarded to the company's load balancing server after routing , The load balancing server will check the request 、 Current limiting and other controls , Generally, there is no safety risk .
- Corporate LAN access Internet( Extranet )www.baidu.com: Corporate LAN access Internet( Extranet )www.baidu.com when , It will also be forwarded by route , If... Is set in the router ACL( Access control list ), Can't access , Otherwise, you can access . here ACL It can be configured separately according to the requests of different network segments in the company's LAN , For example, the production network has a high security level and cannot access the external network , And the office network can access the external network ( For example, Alibaba's internal seven network isolation ). This can not only improve network security , And easy to manage .
A brief introduction ACL,ACL( Access control list ) It's an access control technology based on packet filtering , It can filter the data packets on the interface according to the set conditions , Allow it to pass through or discard . Access control lists are widely used in routers and layer 3 switches , With access control lists , Can effectively control the user's access to the network , So as to ensure the network security to the greatest extent . Now let's introduce what is accessing the Internet 、 The risk of accessing the Internet , And what scenarios need to apply for external Internet .
What is access to the Internet ?
Accessing the Internet refers to The application server deployed in the company actively connects to the public network , For example, a server of the production network in the above figure accesses www.baidu.com.
The risk of accessing the Internet
If the internal application server of the company has the ability to actively connect to the public network, there are the following risks :
- Attackers can download malicious backdoors from the public network 、 Mining Trojan horse, etc , Then invade the internal server of the company
- Attackers can obtain internal data of the company , Thus causing data leakage
- Convenient for attackers XXE、SSRF Etc
What business scenarios need to apply for external Internet ?
Connect with external open platforms , Need to use open api Equal demand . Such as visiting Alipay open platform
Reptile demand .
Ants have had security incidents before , An internal application of ant has patrol function , Will visit the domain name provided by the user ( The domain name provided by the user is uncertain , For example, the State Council Government website ), The application has visited a large number of State Council government websites , Because all applications of ant production network share the external network outlet ip, Cause all ants to exit ip Supplement the ban on government websites , It affects the operation of a large number of core businesses of ant , It had a great impact .
…
So , By default, the application baseline does not allow access to the Internet ( Try on the server ping command , Such as ping www.baidu.com To verify ), For the above business scenarios , If you need to open Internet access , After the security assessment, the operation and maintenance department can release the restriction of accessing the external network .
Welcome to reprint , Please indicate the source ! Welcome to WeChat official account. : Fang Chen's blog
边栏推荐
- The longest ascending subsequence model acwing 1017 Strange thief Kidd's glider
- [MySQL] detailed explanation of trigger content of database advanced
- STM32串口寄存器库函数配置方法
- channel. Detailed explanation of queuedeclare parameters
- Panel display technology: LCD and OLED
- Screen automatically generates database documents
- Output all composite numbers between 6 and 1000
- Golang etcdv3 reports an error. The attribute in grpc does not exist
- 数字三角形模型 AcWing 275. 传纸条
- 【ChaosBlade:根据标签删除POD、Pod 域名访问异常场景、Pod 文件系统 I/O 故障场景】
猜你喜欢
Data analysis methodology and previous experience summary 2 [notes dry goods]
平台化,强链补链的一个支点
Greenplum 6.x common statements
端口复用和重映像
2022-06-30 Unity核心8——模型导入
Markdown编辑器Editor.md插件的使用
Hard core sharing: a common toolkit for hardware engineers
Why choose cloud native database
LeetCode 736. Lisp 语法解析
ESP32-ULP协处理器低功耗模式RTC GPIO中断唤醒
随机推荐
Output a spiral matrix C language
NCS Chengdu Xindian interview experience
Problems encountered in the use of go micro
[chaosblade: node CPU load, node network delay, node network packet loss, node domain name access exception]
Routing information protocol rip
H3C vxlan configuration
Simulation volume leetcode [general] 1567 Length of the longest subarray whose product is a positive number
Markdown编辑器Editor.md插件的使用
数字三角形模型 AcWing 275. 传纸条
Newly found yii2 excel processing plug-in
Output all composite numbers between 6 and 1000
Redis fault handling "can't save in background: fork: cannot allocate memory“
Frequently Asked Coding Problems
Common operating commands of Linux
Three updates to build applications for different types of devices | 2022 i/o key review
Screen automatically generates database documents
寄存器地址名映射
【Istio Network CRD VirtualService、Envoyfilter】
Un salaire annuel de 50 W Ali P8 vous montrera comment passer du test
STM32 serial port register library function configuration method