期刊文献+

基于NAT跳转与ACL控制技术的安全策略研究 被引量:5

Research on Security Strategy Control Technology Based on Jump NAT and ACL
原文传递
导出
摘要 如今在核心网络中,基于ACL的安全防范技术应用其中。这种技术规定了网络中特定流量的传输,给网络运行带来了一定的安全性,相应的也带来了不便的限制因素。本文基于NAT跳转原理与ACL相结合的安全策略,从而解决了相应问题,提高了网络的安全性。 Now the security technologies based on Access Control List(ACL) are applied in core networks.Such technique requirements the particular transmission in network and has brought a certain degree of security in the network operation,at the same time also brought inconvenient constraints.This paper based on the principle of NAT jump technique combined with the ACL security policy has solved the corresponding problems in practice and improved the network security further.
出处 《煤炭技术》 CAS 北大核心 2010年第8期147-149,共3页 Coal Technology
关键词 NAT跳转 ACL 路由重分发 安全策略 NAT jump Access Control List(ACL) route redistribution security strategy
  • 相关文献

参考文献9

  • 1雷震甲.网络工程师教程[M].北京:清华大学出版社,2007.
  • 2张磊.IP网QoS策略控制系统的研究[J].南京邮电学院学报(自然科学版),2004,24(2):61-65. 被引量:2
  • 3唐成华,胡昌振,崔中杰.基于域的网络安全策略研究[J].计算机工程,2007,33(9):131-133. 被引量:7
  • 4王永彪,徐凯声.用包过滤技术实现个人防火墙[J].计算机安全,2005(5):21-22. 被引量:7
  • 5[美]史蒂文斯(W.Richard Stevens.TCP/IP 详解(卷1:协议)[M].北京:机械工业出版社,2007.
  • 6[美]舒德尔,史密斯.路由器安全策略[M].北京:人民邮电出版社,2008.
  • 7Kevin P Logan.Prognostic Software Agents for MachineHealthMonitoring[A].IEEE AC[C].2003(7):321-322.
  • 8cisco networking academyprogram.思科网络技术学院教程[M].美.cisco system公司.2008.
  • 9R.Nair,B.Rajagopalan and Sandick,A Framework for QoS-based Routing in the Internet,RFC2386,IETF,Aug.1998.

二级参考文献12

  • 1田大新,刘衍珩,李永丽,唐怡.数据包过滤规则的快速匹配算法和冲突检测[J].计算机研究与发展,2005,42(7):1128-1135. 被引量:14
  • 2A Framework for Policy-based Admission Control[EB/OL].http://www.ietf.org/rfc/rfc2753.txt
  • 3WATERS G,WHEELER J.Policy framework architecture[EB/ OL].http:∥ www. ietf. org/html. charters/rap-charter.html
  • 4BOYL E J,COHEN R,DURHAM D,et al. The COPS (Common Open Policy Service) protocol[EB/OL].http:∥ www.ietf.org/ html.charters/ rap-charter.html
  • 53 Com.3Com's Framework for Policy-Based Networking[Z]. 3 Com WhitePaper,November 2000.
  • 6维格斯纳.IP服务质量[M].北京:人民邮电出版社,2001..
  • 7Blaze M,Feigenbaum J.The KeyNote Trust-management System Version2[EB/OL].1999-09.http://www.rfc-archive.org/getrfc.php? rfc=2704.
  • 8Kagal L,Finin T.A Policy Language for a Pervasive Computing Environment[EB/OL].1997.http://www.csee.umbc.edu/-finin/papers /policy03.pdf.
  • 9Jajodia S,Samarati P.A Logical Language for Expressing Authorizations[EB/OL].1997.http://seclab.dti.unimi.it/Papers/oak97-final.ps.
  • 10Al-Shaer E,Hamed H.Conflict Classification and Analysis of Distributed Firewall Policies[EB/OL].2005.http:// www.mnlab.cs.depaul.edu/projects/FPA/files/jsac05.pdf.

共引文献12

同被引文献37

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部