Đang chuẩn bị liên kết để tải về tài liệu:
Network Security HaNdbook for Service Providers

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

When a transmission violating your enforced security policies is detected by a Sensor, the Sensor compiles information about the offending transmission and sends this “attack” data to the Manager in the form of an alert. Alert details include transmission data such as, source and destination IP addresses in the packet, as well as security analysis information (performed by the Sensor) such as attack type and severity. Alerts are backed up to the database and archived in order of occurrence. Alerts generated in the Sensors are aggregated and displayed in the Threat Analyzer of the Central Manager. . | IM Juniper NETWORKS I NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS IKMuniper 1N ETWOR K r NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS 1 EXECUTIVE SUMMARY.2 2 THE IMPORTANCE OF NETWORK SECURITY.4 ANATOMY OF NETWORK THREATS.8 Overview of Security Threats.8 Distributed Denial of Service DDoS .8 Bots and Botnets.9 Worms.10 Zero Day Attacks.10 Vulnerable Network Components.11 3 BEST PRACTICES FOR sErVICE provider security.11 GENERAL BEST PRACTICES AND TOOLS FOR SERVICE PROVIDER NETWORK SECURITY . 11 Routers.12 MPLVS VPN.12 Network Address Translation NAT . 12 Access Control Lists.13 Network Firewall.13 Intrusion Protection System IPS .13 Application Servers.14 Identity and Policy Management.14 BEST PRACTICES FOR SECURING VOIP NETWORKS.15 Securing the IP Edge of the VOIP Network.17 Securing VOIP Elements in the Data Center.17 Securing Internet Peering Points for VoIP . 17 BEST PRACTICES FOR SECURING TV AND MULTIMEDIA SERVICES.18 Securing External Network Peering Points.19 Securing the Video Super Head-end.19 Securing the Video Hub Serving Office.19 BEST practices for securing 3rd generation mobile data networks . . .20 BEST PRACTICES FOR SECURING SERVICE PROVIDER DATA CENTERS . . . . 22 4 JUNIPER NETWORKS SECURITY PRODUCT PORTFOLIO.24 Routers.24 Firewalls and IDP.25 Firewalls.26 Intrusion Detection and Prevention.26 Session Border Controller.26 Identity and Policy Management.27 5 CONCLUSION . . . . .27 TABLE OF CONTENTS NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS Juniper NETWORKir Jointly published by Juniper Networks and Network Strategy Partners LLC S Junipef E NETWORKS I Juniper Networks high-performance network infrastructure helps businesses accelerate the deployment of services and applications to take advantage of opportunities to innovate grow and strengthen their business. With Juniper businesses can answer the challenge of complicated legacy networks with high-performance open and flexible solutions. Network Strategy Partners LLC NSP Management .

TÀI LIỆU LIÊN QUAN