(In the early Internet era, when enterprises needed to provide Internet services for users, in order to save management resources and speed up/speed up Internet users' access, many enterprises placed their servers in the operator's data core (IDC, Internet Data Center), and the operator represented them. Managed, and directly provides Internet access, this model is also known as the operator's hosting business. With the rapid development of the Internet, the operator's data core business has become the core business of its surplus. At the same time, the security requirements are becoming more and more strict, and access control needs to be carried out among the large-scale deployment of multi-enterprise user servers, such as controlled access between related business enterprises and absolute isolation between unrelated enterprises. Therefore, for operators' data core managers, how to flexibly and conveniently realize the distinction between the security areas of each enterprise and the controlled mutual access between security areas has become a very important issue. This also places higher demands on firewall devices that provide security zone blocking capabilities.
The use of virtual firewall technology in the data core.docx)