首页 | 本学科首页   官方微博 | 高级检索  
     检索      

IPsec安全策略应用
引用本文:赵金龙,丁健,黄星,隆辉.IPsec安全策略应用[J].信息安全与通信保密,2012(10):102-104.
作者姓名:赵金龙  丁健  黄星  隆辉
作者单位:新疆油田公司石西油田作业区,新疆克拉玛依,834000
摘    要:IPSec是由IETF组织定义的标准框架,包括有数据格式协议、密钥交换和加密算法等,为IP网络通信提供透明的安全服务。IPSec不仅能为企业局域网与拨号用户、域、网站、远程站点等之间的通信提供强有力且灵活的保护,而且还能用来筛选特定数据流。通过应用IPSec安全策略来筛选特定的IP或端口,并给出配置过程,提供了安全、高效和透明的网络保护,提高了安全保障性能,从而限制常见病毒、木马、黑客的攻击。

关 键 词:IPSec  筛选器  规则  策略

Application of IPsec Security Strategy
ZHAO Jin-long,DING Jian,HUANG Xing,LONG Hui.Application of IPsec Security Strategy[J].China Information Security,2012(10):102-104.
Authors:ZHAO Jin-long  DING Jian  HUANG Xing  LONG Hui
Institution:(Shixi Field Operational Zone, Xinjiang Oil Field Company Karamay Xinjiang 834000, China)
Abstract:IPSec is a standard framework organized and defined by IETF, including data format protocol, key exchange and encryption algorithm, and provides IP network communication with transparent security service. 1PSec can not only provide communications among between the enterprise's LAN dial-up user, website, domain and remote with strong and flexible protection, but also the screening of specific data stream. With the application of IPSec security, strategy to screening the specific IP or port and to giving the configuration process, a safe, efficient and transparent network protection is achieved, and the security assurance performance enhanced, thus limiting the threats of common virus, Trojan horse, hacker attack.
Keywords:IPSec  filter  rules  strategy
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号