首页 | 本学科首页   官方微博 | 高级检索  
     

基于区域分割的防火墙部署与配置
引用本文:刘化君.基于区域分割的防火墙部署与配置[J].网络安全技术与应用,2010(2):28-29,33.
作者姓名:刘化君
作者单位:南京工程学院通信工程学院,江苏,211167
基金项目:江苏省高校自然科学基础项目"短波环境下透明语言伪装通信技术的研究" 
摘    要:防火墙技术作为内部网络与外部网络之间的第一道安全屏障,是受到人们重视的网络安全技术之一。本文为提高网络安全的健壮性,从实施网络安全策略的角度,提出了一种以区域分割的三角方式部署防火墙系统的方案,说明了基于Cisco FIX525防火墙配置方法,以及访问控制列表与防火墙包过滤规则的联合应用方法。实用检验说明,这种方案能够较好地实现网络安全访问控制,有效地提高网络安全性。

关 键 词:网络安全  防火墙技术  区域分剖  部署原则  防火墙配置

Region-based Segmentation of Firewall Deployment and Configuration
Liu Huajun.Region-based Segmentation of Firewall Deployment and Configuration[J].Net Security Technologies and Application,2010(2):28-29,33.
Authors:Liu Huajun
Affiliation:Liu Huajun (Nanjing Institute of Communications Engineering,Jiangsu,211167,China)
Abstract:The firewall technology as the internal network and external network security barrier between the first,is subject to people's attention to network security technologies. To improve the robustness of network security, network security policy from the implementation point of view,presents a triangular region segmentation method to deploy a firewall system,program.describes the firewall configuration based on Cisco FIX 525 methods,and access control lists and firewall packet filtering The joint rules should be applied.Practical tests show that such programs can achieve better network security access control,effectively improve the network security.
Keywords:network security  firewall technology  region segmentation  the deployment of principle  firewall configuration  
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号