2目录摘要······························································································3前言······························································································4一、课程设计目的意义·······································································6二、需求分析····················································································61、虚拟网···················································································62、管理与维护·············································································63、网络安全················································································71、防火墙技术·······································································72、建立网络入侵侦测系统························································73、反病毒防御·······································································7三、方案设计····················································································81、设计原则················································································82、安全策略················································································83、安全服务················································································94、拓扑结构图·············································································9四、方案的实施················································································101、在管理方面············································································102、在技术方面············································································103、定期做好备份工作···································································104、定期做好网络杀毒工作·······································...