网络安全与防火墙技术外文翻译文献

上传人:桔**** 文档编号:479681643 上传时间:2023-10-07 格式:DOCX 页数:14 大小:44.61KB
返回 下载 相关 举报
网络安全与防火墙技术外文翻译文献_第1页
第1页 / 共14页
网络安全与防火墙技术外文翻译文献_第2页
第2页 / 共14页
网络安全与防火墙技术外文翻译文献_第3页
第3页 / 共14页
网络安全与防火墙技术外文翻译文献_第4页
第4页 / 共14页
网络安全与防火墙技术外文翻译文献_第5页
第5页 / 共14页
点击查看更多>>
资源描述

《网络安全与防火墙技术外文翻译文献》由会员分享,可在线阅读,更多相关《网络安全与防火墙技术外文翻译文献(14页珍藏版)》请在金锄头文库上搜索。

1、网络安全与防火墙技术外文翻译文献网络安全与防火墙技术外文翻译文献 网络安全与防火墙技术外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 原文: Research of Network Security and Firewalls Techniques Abstract: As the key facility that maintains the network security , firewalls take the purpose of establishing an obstacle between trust and trustless network, and put cor

2、responding safety strategy into practice. In this paper , the computer network security and the techniques of firewalls were mainly discussed, the concept and classification of the firewalls were introduced. It also introduced three kinds of basic implement techniques of the firewalls: Packet filter

3、ing , Application Proxy and Monitor model in 网络安全与防火墙技术外文翻译文献 detail. Finally described the trend of development of the firewalls techniques in Internet briefly. Key words: network security, firewalls, Packet filtering, monitor 1. Introduction Now with the computer network and e-commerce used widely

4、, network security has become an important problem that we must consider and resolve. More and more professions. enterprises and individuals surfer from the security problem in different degree. they are looking for the more reliable safety solution . In the defense system adopted by network securit

5、y at present, the firewalls stand the very important position. As the key facility that maintains the network security. firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. All the firewalls have the function

6、 to filter the IP address. This task checks the IP packet, makes the decision whether to release or to abandon it according to the source address and destination address of the IP. Shown in Fig.I, there is a firewall between two network sections, an UNIX computer is on one side of the firewall, and

7、the other side is a PC client. While the PC client asks a telnet request for the UNIX computer, the client procedure of telnet in the PC produces a TCP packet and passes the packet to the local protocol stack to prepare to send. The protocol stack fills it in one IP packet. then, sends it to UNIX co

8、mputer through the path defined by the TCP/IP stack of PC. The IP packet cant reach the UNIX computer until it passes the firewall between the PC and the UNIX computer. 网络安全与防火墙技术外文翻译文献 Fig. I Ip Address Filtering The application firewall is a very efficient means of network security on Internet, it

9、 is installed between the trust and trustless network, can isolate the connection between the trust and trustless network, and doesnt hamper peoples access to the trustless network at the same time. It can isolate the connection between the risk area (namely there may be a certain risk on Internet)

10、and the safe area (LAN), and doesnt hamper peoples access to the risk area at the same time. Firewall can monitor the traffic flowing in and out from the network to finish the task seemingly impossible;it only allows the safe and checked information to enter into, and meanwhile resists on the data t

11、hat may bring about the threat to enterprise. As the fault and defect of the security problem become more and more general, the invasion to the network not only comes from the super attack means, but also may be from the lower-level mistakes or improper password selections on the configuration. So,

12、the function of the firewalls is preventing the communication that not hoped and authorized passes in and out of the network protected. forcing the companies to strengthen their own network security policy. The general firewalls can achieve the following purposes: First, restraining others from ente

13、ring the inside network, filtering the unsafe service and illegal user; Second, preventing the invaders from closing to your defense installation; Third,limiting the user to access the special site; Fourth,providing convenience for monitoring the Internet security. 网络安全与防火墙技术外文翻译文献 2. The classifica

14、tion and implement technology of firewalls An integrated firewalls system usually consists of screening router and proxy server. The screening router is a multi-port IP router. it check the each coming IP packet according to the group regular to judge whether to transmit it. The screening router get

15、s information from the packet. fot example the protocol number. the IP address and port number that receiving and sending massages. the flag of link even some other IP selections. filtering IP packet. The proxy server are server process in the firewall. it can replace the network user to finish the

16、specific TCP/IP function. A proxy server is naturally a gateway of application layer. a gateway of two networks joined specific network application. Users contact with proxy server by one of the TCP/IP application such as Telnet or FTP. the proxy server ask the users for the name of the remote host. which users want to access. After the users have answered and offered the correct users identities and authentication information, the proxy

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 建筑/环境 > 施工组织

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号