A saying goes like this: The network construction without service deployment is just like a pile of metal. This is true. CIOs are busy with how to deploy services and the network administrators also put efforts into this. Problems of the network infrastructures are exposed gradually. Even more frightening is that the problems even affect the services developed successfully by CIOs.

For example, the economic construction in China is carried out heatedly and people are enjoying the resulting life changes. Similarly, users can happily enjoy the convenience brought by the services deployed by CIOs. However, the security incidents that occurred one after another shadowed people’s lives. The bus arson in Chengdu and violence incidents took place all of a sudden. For administrators, the core switch down caused by widespread ARP fraud and flooding not only seriously affect service deployment but also make network convenience nonsense. To quote a message of an advertisement: No service can be deployed without network.

In deed, network security has become as important as application development. Network construction and network security protection need to progress at the same time. This is the precondition for network services to bring values in real sense. However, network security is a systematic issue. How to ensure network security?

Network security events fall into two types: intranet events and extranet events, where, intranet security events are about 70% and have the greatest impact. Take China as an example, China has taken a lot of measures to ensure internal security, which can be classified into four types as network construction:

Type 1 is ID identification. For example, passport, ID and household register are used to solve this problem. This is the primary problem to be solved. Identification is also needed for network construction. The most common means is authentication. The user name needed for authentication is similar to ID, the password is similar to the anti-counterfeit technology used on the ID.

Type 2 is the control of fraud activities. Various types of fraud activities serious affect people’s life, for instance, money loss or more seriously endangering life. For network construction, fraud packets result in failure of service deployment, information theft and even money loss.

Type 3 is the control of violent attacks. For example, riots and violent attacks are the focus of the police. A typical behavior is flooding attack in a network, making gateways or core equipments break down and the entire network paralyze, and finally influencing the normal operation of the network.

Type 4 is restriction of illegal access. Not everyone can enter the political center of a nation. Similarly, there are restricted areas in the network (for example the private server area) that it is necessary to restrict the right of access.

Therefore, there are still a lot of problems to be solved for the network infrastructure construction. The most important one is network security. There is another saying that goes like this: The service without network infrastructure construction is like a castle in the air.