logo

您所在位置网站首页 > 海量文档  > 计算机 > 网络信息安全

GA 6862007T 信息安全技术 虚拟专用网安全技术要求.pdf 41页

本文档一共被下载: ,您可全文免费在线阅读后下载本文档。

  • 支付并下载
  • 收藏该文档
  • 百度一下本文档
  • 修改文档简介
全屏预览

下载提示

1.本站不保证该用户上传的文档完整性,不预览、不比对内容而直接下载产生的反悔问题本站不予受理。
2.该文档所得收入(下载+内容+预览三)归上传者、原创者。
3.登录后可充值,立即自动返金币,充值渠道很便利
ICS35.040 A 90 中华人 民共和 国公共安全行业标准 GA/T686一2007 信息安全技术 虚拟专用网安全技术要求 Inofrmationsecuritytechnology一 TechnicalrequirementsofvirtualPrivatenetworksecurity 2007一03一20发布 2007一05一01实施 中华人民共和国公安部 发 布 otherk GA/T686一2007 目 次 前言 ·····························································,···················,,·······························…… V 引言 ··············································································4·····················,·······,·····…… U 1范围 ························································4······················································……1 2规范性引用文件·················4···········································································,··……1 3术语、定义和缩略语·····················4·······························,·······································……1 4 VPN的一般说明···········································4··················4·································……2 概述 ·····················…… 安全环境 ········4································,···············,············································…… 2 :‘; 4.21 安全威胁 ····································,,···············,·············································……2 4.2.2安全应用假设 ·············································,··································……,.·····……3 5安全功能技术要求···························,,···············,···················.. ··……3 5.1标识和鉴别 ···················,···················,················,··········································……3 5.1.1用户标识 ·······················4··············,····,··········,········

发表评论

请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
用户名: 验证码: 点击我更换图片

“原创力文档”前称为“文档投稿赚钱网”,本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有【成交的100%(原创)】。原创力文档是网络服务平台方,若您的权利被侵害,侵权客服QQ:3005833200 电话:19940600175 欢迎举报,上传者QQ群:784321556