On the Effective Internet Communication Filtering

Article Preview

Abstract:

This paper deals with mechanisms designed to security of computer networks and their use in practice. In the first part of the work we reflect on the necessity of the operation of these mechanisms. The second part follows with theoretical description of the technology used according to various criteria. The final part of the work deals with the design of the security system and an example configuration of active network element.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

478-481

Citation:

Online since:

February 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Richard A. Deal: Cisco Router Firewall Security, Cisco Press, Aug 2004, Pages: 912, ISBN 1-58705-175-3.

Google Scholar

[2] Mitch Tulloch: Microsoft Encyclopedia of Security, Microsoft Press, Jul 2003, Pages: 444, ISBN 978-0-7356-1877-1.

Google Scholar

[3] Configuring Cisco IOS Intrusion Prevention System (IPS), Cisco press, May 2005, updatedMar (2011).

Google Scholar