目录1 绪论.................................................................11.1 计算机网络安全现状..............................................11.2 常见的几种网络入侵方法..........................................21.3 现代企业面临的网络安全威胁......................................41.4 本课题选题的意义................................................62 网络安全技术........................................................72.1 防火墙技术......................................................72.2 入侵检测技术....................................................82.3 数据库服务器安全技术............................................92.4 VPN 技术.......................................................102.4.1VPN 功能..................................................112.4.2VPN 的实现技术............................................123 新能通信公司网络安全分析...........................................143.1 新能通信公司网络应用现状.......................................143.2 新能通信公司网络安全漏洞分析...................................163.3 新能通信公司网络安全对策.......................................194 新能通信公司网络安全解决方案.......................................234.1 物理安全.......................................................234.2 数据库控制.....................................................234.3 用户访问控制...................................................244.4 防火墙部署.....................................................254.5 VPN 配置.......................................................264.5.1 PPTP(Point-to-Point Tunneling Protocol).................264.5.2 L2TP(Layer 2 Tunneling Protocol)........................274.5.3 路由器同时作为 PPTP Server 与 L2TP Server..................28总结..................................................................32致谢..................................................................33参考文献..............................................................341 绪论1.1 计算机网络安...