In addition, when these layered information security products form a system, it needs to pay attention to the dependence and complementary relationship. Security of lower layer products needs to support the security of upper layer products. The contradiction and incompatible phenomenon will not be happened.