目录(CONTENTS)1.概述...................................................31.1.常见攻击手法...............................................................32.现有的防护技术..........................................62.1.传统网络防火墙....................................................62.2.入/侵查看系统(IDS)........................................73.WEB安全需求.....................................................83.1.WEB使用防火墙................................84.安恒WAF的特色............................................105.安恒WAF的功能.............................................125.1.深度防护.................................125.2.WEB站点躲藏.......................................135.3.页面篡改监测..............................135.4.WEB使用加快......................................................145.5.安全策略...................................................145.6.人性化运维管理..........................................155.7.查看和阻断模式..............................................155.8.硬件旁路模式...................................165.9.HTTPS/SSL的完全支持.......................................165.10.日志和报表..........................................................165.11.高可操作性...........................................................166.定论........17
(CONTENTS 1. OVERVIEW ................................................ ........31.1. Common Attacks ................................................ .................................32. Existing protective technology ................................ ................................62.1. Traditional Network Firewall ................................. .................................62.2. Intrusion/Intrusion Viewing System (IDS) ................................ .................................73.WEB security requirements ................................ .................................83.1.WEB uses firewall..... .................................84. Features of Anheng WAF ................................. .................................105. Functions of Anheng WAF ................................. ................................125.1. Defense in Depth ................................. ................125.2. WEB SITE Hiding ................................................ .........135.3. Monitoring of page tampering................................135.4. WEB usage speed up. ...................................................... ...145.5. Security Policy ................................................ ........145.6. Humanized operation and maintenance management ................................ ......155.7. View and Block Modes ................................. ..........155.8. Hardware Bypass Mode ................................. .165.9. HTTPS/SSL full support ................. ................................165.10. Logs and Reports ............................................... ................................. 165.11. High operability ................................ ............................................... 166. Conclusion ........17)
[下载]12482634950.rar
|