交换机配置中的安全性(Security in switch configuration).docVIP

  • 9
  • 0
  • 约1.44万字
  • 约 10页
  • 2017-10-06 发布于河南
  • 举报

交换机配置中的安全性(Security in switch configuration).doc

交换机配置中的安全性(Security in switch configuration)

交换机配置中的安全性(Security in switch configuration) In recent years, Chinas information construction has been rapid development, more and more wide bandwidth, network speed doubled several times, E-Mail in the net transfer between flow exponential growth, IP audio and video technology has greatly enriched the network application. However, the Internet is bridging the distance between people, at the same time, viruses and hackers also uninvited. Intelligent virus, varieties, breeding fast, hacking tools fool plus a Flood flood trend, the enterprise information system becomes fragile, always face the danger of being permanently damaged and even paralysis. In this situation, enterprises have to strengthen the security protection of their own information systems, and expect to have a complete, once and for all security protection system. However, security is always relative, security measures are always passive, and no enterprise security system can get a real 100% security guarantee. Study on the principle and development of virus intrusion defense technology analysis shows that single anti-virus software often makes the security of the network is not perfect, the network security can no longer rely on a single device, single technology has become the industry consensus. In the soft and hard combination, internal and external and so on, the industry has recently been widely promoted security strategy, switches as network backbone equipment, naturally shoulder the responsibility of building network security line. The switch itself is more secure The switch is actually a packet forwarding optimization computer, but the computer may be attacked, such as illegal access control switch in network, on the other hand will be attacked by DoS, such as the above mentioned several worms. In addition, the switch can generate power maintenance, maintenance, ARP routing protocol, routing table construction, maintenance of the routing protocol, ICMP message processing, to monitor the switch,

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档