Cart (Loading....) | Create Account
Close category search window
 

A Case Study on Access Control Rules Design and Implementation of Firewall

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)

with the rapid development of firewall technology, access control rules design has become one of the most important tasks for firewall technologies. In this paper, the TopSec's network guardian is adopted to design access control lists, and a configuration case for a typical enterprise network environment based on source and destination IP address is given.

Published in:

Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on

Date of Conference:

21-23 Sept. 2012

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.