There are many manifestations in the problem of computer network security. Such as the individual's privacy disclosure, the database file is stolen; the computer system is damaged, etc. To some extent, these conditions make certain losses to people and bring some trouble in life. Some vicious damage and attack can do harm to national security, social stability and economic construction. It also caused an adverse impact on the lives of the lives of people. This paper analyzed the vulnerability of the network through traverse modes. Stable and safe operation of the computer network center is very important. Strengthen the management software is mainly for the prevention of system security vulnerabilities. A series of stages is needed to establish a computer network security protection. Such as specific research, exploitation and design, system analysis, the selection of equipment, software installation, commissioning and acceptance.