企业网络信息系统的研发与实施
目录
DEGREE OF MASTER OF ENGINEERING.....................................................................................................................2
HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY............................................................................2
摘要......................................................................................................................................................................................4
ABSTRACT..............................................................................................................................................................................5
第一章 绪论......................................................................................................................................................................8
1.1 课题研究背景...........................................................................................................................................................8
1.2 国内外研究使用现状...............................................................................................................................................9
1.3 本文的主要研究内容.............................................................................................................................................10
第二章 网络安全技术......................................................................................................................................................11
2.1 防火墙技术.............................................................................................................................................................11
2.1.1 防火墙原理
.....................................................................................................................................................11
2.1.2 防火墙规则
.....................................................................................................................................................12
2.1.3 火墙策略
.........................................................................................................................................................13
2.2VPN 技术...................................................................................................................................................................17
2.2.1 VPN 技术概述
.................................................................................................................................................17
3.2.2 VPN 的应用领域
...........................................................................................................................................18
3.2.3 VPN 技术及在 TCP/IP 协议层的实现
...........................................................................................................18
2.3 802.1X 访问控制技术...........................................................................................................................................19
2.3.1 IEEE802.1X 认证技术起源
...........................................................................................................................19
2.3.2 802.1X体系结构
...........................................................................................................................................20
2.3.3 802.1X应用环境特点
...................................................................................................................................21
2.4 入侵检测系统.........................................................................................................................................................22
第 3 章 企业网络系统安全体系的设计........................................................................................................................24
3 1 网络信息系统安全体系的部署.............................................................................................................................24
3.2 网络安全目标........................................................................................................................................................25
3.3 安全定级.................................................................................................................................................................25