(On the use of TCP/IP in the field of security, this paper analyzes in detail the problems existing in several important local areas of TCP/IP, studies its security loopholes, and gives some constructive solutions for future Further research laid the groundwork.)