信息网络安全 ›› 2014, Vol. 14 ›› Issue (9): 161-164.doi: 10.3969/j.issn.1671-1122.2014.09.036

• Orginal Article • Previous Articles     Next Articles

Study on Configuration Methods of Unacquainted Network Edge Firewall Rules

WANG Yi-fei   

  1. China Life Ecommerce Company Ltd., Beijing 100033, China
  • Received:2014-08-06 Online:2014-09-01

Abstract: This article summarizes the reason and damage of unacquainted network edge problem in firewall engineering configuration, proposes three traditional solutions to this problem. Combining project experiences in large network, a demand analysis and log-exploring technical system is put forward as a new solution to configurate unacquainted network edge access rules. Based on many case studies and managerial psychology, demand analysis method is detailed design. Based on database and firewalls log analysis technology, log-exploring method is detailed design. The method in this article has been test and proven to be successful by using the mainstream firewall.

Key words: network access control, firewall, unacquainted network edge, demand analysis, log-exploring