1. Expose the intranet: With intranet penetration technology, the external network can access the intranet through mapping or penetration, which means that the intranet that was originally shielded by the firewall or router will be exposed to the outside world.
2. Security risks: Because the intranet usually contains a lot of sensitive information, such as databases, servers, passwords, etc. This information is directly exposed to the external network without firewall filtering, which increases the risk of attacks and data leakage.
3. Difficult to monitor and manage: Infiltration behaviors without firewalls may be difficult to monitor and manage, because they may come from various external IP addresses and are difficult to track and identify.
4. Attacked by traffic: If a large amount of traffic flows into the intranet penetration port that does not pass through the firewall, it may lead to server overload or even collapse, resulting in service interruption or data loss.
Therefore, although the peanut shell intranet penetration technology can realize the access from the external network to the internal network, it must be used with caution, especially if it is not filtered by the firewall. If intranet penetration technology must be used, it is suggested to configure firewall or other security equipment before penetration to ensure the security and stability of intranet.