Juniper互联网数据中心(IDC)网络安全解决方案建议书美国Juniper网络公司目录第2页共25页编号:时间:2021年x月x日书山有路勤为径,学海无涯苦作舟页码:第2页共25页第一章综述...................................................................................................................................................31.1前言...................................................................................................................................................31.2Juniper的安全理念..........................................................................................................................31.2.1IPSec/SSLVPN......................................................................................................................41.2.2网络攻击检测........................................................................................................................41.2.3访问控制................................................................................................................................51.2.4入侵预防................................................................................................................................51.2.5管理方式................................................................................................................................61.2.6合作方案................................................................................................................................61.2.7流量控制................................................................................................................................61.3Juniper的数据中心应用加速理念...................................................................................................6第二章总体方案建议...................................................................................................................................72.1设备选型...........................................................................................................................................72.1.1防火墙....................................................................................................................................72.1.2入侵检测和防护....................................................................................................................82.1.3SSLVPN网关.......................................................................................................................82.1.4应用加速..............................................................................................................................102.2应用和管理.....................................................................................................................................102.2.1虚拟防火墙技术在IDC的应用方案..................................................................................102.2.2防火墙的网络地址转换实现方案......................................................................................112.2.3安全策略的实施和应用......................................................................................................142.2.4防火墙防网络层攻击保护..................................................................................................152.2.5防火墙管理.............................................................................................