- 1、本文档共27页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
防火墙技术指南——index(Firewall technology guide - index)
防火墙技术指南——index(Firewall technology guide - index)
Translator Preface
Preface
Part 1 TCP/IP and its security requirements: Firewall
The first chapter is the overview of network interconnection protocol and standard 1
1.1 internet protocol 3
1.1.1 IP addressing 3
1.1.2 IP security risk 4
1.2 user datagram protocol 7
1.2.1 attack user datagram protocol service: SATAN easy
Answer 7
1.2.2 is used on the Internet on UNIX and Windows NT
Safety system 7
1.3 transmission control protocol 9
1.4 extend IP address 11 through CIDR
1.4.1 TCP/IP security risk and Countermeasures 11
1.4.2 IPSEC - IETF proposed IP security countermeasures 15
1.4.3 IPSO - - (DoD) DOD IP security policy 15
1.5 routing information protocol 15
1.6 MBONE - multicast backbone 16
1.7 Internet control message protocol 18
1.8 Internet Group Management Protocol 18
1.9 open shortest path first 19
1.10 border gateway protocol version 4 (BGP-4) 20
1.11 address translation protocol 20
1.11.1 reverse address translation protocol 20
1.11.2 delivers security for IP datagrams through routers
Risk 20
1.12 simple network management protocol 21
1.13 monitor ISP connection 21
1.14 next generation IP protocol IPv6 21
1.14.1 address extension 22
Automatic configuration of 1.14.2 network devices 22
1.14.3 security 22
1.14.4 real time performance 22
1.14.5 multicast 23
1.14.6 IPv6 security 23
1.15 network time protocol 23
1.16 Dynamic Host Configuration Protocol 23
1.17 Windows socket (Winsock) standard 24
1.18 domain name system 24
1.19 firewall concept 24
1.19.1 firewall defects 27
1.19.2 ceasefire zone 27
1.19.3 certification issues 28
1.19.4 peripheral trust 28
1.19.5 intranet 28
The second chapter basic connection 30
2.1 about TTY 31
2.2, UNIX, to, UNIX, Copy, 33
2.3 SLIP and PPP 34
2.4 Rlogin 34
2.5 virtual terminal protocol 35
2.5.1, of Columbia University, Kermit: a security
Reliable Telnet server 35
Security considerations for 2.5.2 Telnet services 40
2.5.3 network security system administrator 40
2.5.4 Telnet sessi
您可能关注的文档
- 论文排版技巧(Typesetting skills).doc
- 论文排版超有用的word小技巧(Word useful tips for composing articles).doc
- 论文范文地热资源的开发与运用(Development and application of geothermal resources).doc
- 论日本的室内环境设计(On interior environment design in Japan).doc
- 论歌唱机能的训炼对演唱水平提高(The training of singing function improves the singing level).doc
- 论民族唱法、民歌唱法和原生态唱法(On folk singing, folk singing and original ecological singing).doc
- 论精神病人的离婚诉权保障(On the protection of mental patients' right to sue for divorce).doc
- 论和亲政策与民族关系(On the policy of peace and marriage and national relations).doc
- 论自然辩证法学术体制的建构(On the construction of the academic system of natural dialectics).doc
- 论茅盾塑造人物形象的艺术特色(On the artistic features of Mao Dun's characterization of characters).doc
文档评论(0)