Joint Software Government Network firewall solution

Source: Internet
Author: User
Tags access firewall backup

An analysis of the present situation of the network system of a government

The main construction content of the general plan of the Electronic government Affairs project in a city is as follows: A special network (Government Communications network), a platform (e-government infrastructure), a central (security Monitoring and Backup center), seven major databases (economic information database, corporate entity basic Information Database, natural resources and spatial Geographic Information database, Population base, Social Credit database, marine Economic Information database, dynamic information database of government affairs, 12 major systems (Governmental Office service resource system, economic MIS, decision service information system, Social Credit information system, City Pass card information system, multimedia value-added service information system, Integrated Geographic Information System, marine economic Information System, eccentrics Information System, golden Water information system, Golden Shield information System, social Security information system. Mainly include: Government Communication network, E-government basic platform, security monitoring and Backup center, Government Office business resources system, decision-making service information systems, integrated Geographic information system, multimedia value-added service information system.

The design of the network security scheme of a Government center

1. Target of safety system construction

This technical program aims to provide a comprehensive network system security solution for a government network, including security management system strategy formulation, security policy implementation Architecture design, security product selection and deployment implementation, as well as long-term cooperation and technical support services. The goal of the system construction is to realize the overall security management of the network without affecting the current business. The security policy, hardware and software are combined to form a unified defense system, effectively prevent illegal users from entering the network, reduce the security risk of the network, through the deployment of different types of security products, to achieve different levels of network security problems and different categories of protection; Enables network managers to quickly rearrange damaged files or applications. Restores the system to its previous state of destruction. Minimize losses. In particular, this security scheme can achieve full network access control, and can control the important control points of fine-grained access, secondly, for the network through real-time monitoring of traffic, the operation of the important server to monitor the overall situation.

2, the firewall system design plan

Firewall security for the server

The server in the network application, the information is big, the processing ability is strong, often is the main object of attack. In addition, the server provides a variety of services itself may become a "hacker" attack, therefore, in the implementation of the solution to the security of the server a series of protection. If the server does not add any security measures and directly on the public network to provide external services, you will face the "hacker" various ways of attack, the security level is very low. Therefore, when the firewall is installed, all requests for access to the server are examined in detail by the firewall security rules. The internal server can be reached through the firewall only if the request of the access server complies with the firewall security rules. The firewall itself resists most attacks on the server, and the outside world can only access specific services on the firewall, thus preventing most external attacks.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.