信息网络安全 ›› 2014, Vol. 14 ›› Issue (9): 161-164.doi: 10.3969/j.issn.1671-1122.2014.09.036
• Orginal Article • Previous Articles Next Articles
WANG Yi-fei
Received:
Online:
Abstract: This article summarizes the reason and damage of unacquainted network edge problem in firewall engineering configuration, proposes three traditional solutions to this problem. Combining project experiences in large network, a demand analysis and log-exploring technical system is put forward as a new solution to configurate unacquainted network edge access rules. Based on many case studies and managerial psychology, demand analysis method is detailed design. Based on database and firewalls log analysis technology, log-exploring method is detailed design. The method in this article has been test and proven to be successful by using the mainstream firewall.
Key words: network access control, firewall, unacquainted network edge, demand analysis, log-exploring
WANG Yi-fei. Study on Configuration Methods of Unacquainted Network Edge Firewall Rules[J]. 信息网络安全, 2014, 14(9): 161-164.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.09.036
http://netinfo-security.org/EN/Y2014/V14/I9/161