학술논문

The Firewall Rule Authentication Method Based on 6to4 Tunnel
Document Type
Article
Text
Source
International Journal of Security and Its Applications, 05/30/2013, Vol. 7, Issue 3, p. 133-142
Subject
information leakage
firewall rules
validation
dual protocol
Language
English
ISSN
1738-9976
Abstract
The enterprise internal information security faced with many hidden trouble, and information leakage has been the largest security problem. Firewall is the main technology to solve information leakage, but end-to-end cryptograph tunnel communication can through firewall information filtering detection. In order to prevent the information leakage, it is common to add the block rules in firewall. There is short of a simple and effective verification method for the correctness of firewall blocking rules. We raise a method to verify firewall rules based on dual-protocol. With 64 tunnel technology, virtual an external node, analog communication scene between inside and outside, to verify the effectiveness of firewall rules. The experiments shows that this method is simple to deploy, and can verify rules effectively.