Research on Enterprise Network Router Security Strategy

Article Preview

Abstract:

Along with the enterprise economic powers strengthen continuously, for satisfying the applied demand of business, the enterprise has already built up gradually with each other the network infrastructure of the mutual communication of Internet. Security issues in open platform will explosive increase accompany with open requirements growing. Research and design security mechanism on router will be good for Internet security, as well as the developer to provide a powerful help. Router is a critical element in any security deployment. Routers are definite targets for network attackers. If an attacker can compromise and access a router, it can be a potential aid to them. Technique of router security is the technical importance of the network security to constitute the part, a scheme of router security operation of the enterprise network has been described.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

1783-1786

Citation:

Online since:

January 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhang Jian-biao, Research on campus network secure architecture, Computer Engineering and Design , vol.28 , No.20 , 0Ct.(2007).

Google Scholar

[2] SHI Guang , Summarization on network security technology, Transducer and Micro system Technologies, Vol. 26, (2007).

Google Scholar

[3] ZHOU Xing, WANG Guo-an, ZHANG Zhen , The Application of Access Control List in Network Layer, Journal of Henan University , vol. 34, No. 3.

Google Scholar

[4] GU Guofei,SHEN Jianli,WANG Peng,ZHANG Shiyong,A Campus Network Security Solution Based on Six-layer Security Architecture ,Computer Engineering,Vol. 28 Supplementary Issue.

Google Scholar

[5] ZENG Kuang-Yi, YANG Jia-Hai,Towards the Optimization of Access Control List,Journal of Software,Vol. 18, No. 4, April 2007 pp.978-980.

Google Scholar

[6] LIU Xin-hong, GUO Futian, XU Deli, ZHANG Xin, Application of access control technology in Intranet, Journal of DAQING Petroleum Institute,Vol. 30 No. 6 Dec. (2006).

Google Scholar

[7] WANG Fang, HAN Guodong, LI Xin,Access controllist of router and research of realization, Computer Engineering and Design, VO1.28 NO.23, Dec.2007, pp.5638-5639.

Google Scholar

[8] TANG Ning, ZHU Zhenmin, LI Ying, Implementation of ACL in NFS Server, Computer Engineering, Vol. 31 No. 8, April 2005 pp.115-116.

Google Scholar

[9] CAI Zhaoquan, Application of policy routing and dynamic DNS in campus, Computer Engineering and Design, VO. 26 NO. 23, pp.1396-1398.

Google Scholar

[10] HaririS,QuGuangzhi,DharmagaddaT,etal. lmPaetanalysisof faultsandattaeksinlarge一sealenetworks[J]. Seeurityprivate Magazine,IEEE,2003,11(1): pp. 49一54.

Google Scholar

[11] Huston G. Anatomy: A look inside network address translators [J]. The Internet Protocol Journal, 2004, 7(3): pp.1-15.

Google Scholar