Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GA/T 686-2018 English PDF

US$329.00 ยท In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GA/T 686-2018: Information security technology--Security technical requirements for virtual private network products
Status: Valid

GA/T 686: Historical versions

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GA/T 686-2018329 Add to Cart 3 days Information security technology--Security technical requirements for virtual private network products Valid
GA/T 686-2007RFQ ASK 7 days Information security technology--Technical requirements of virtual private network security Obsolete

Similar standards

GB/T 37230   GB 13954   GA/T 671   GA/T 543.24   GA/T 543.23   GA/T 681   

Basic data

Standard ID: GA/T 686-2018 (GA/T686-2018)
Description (Translated English): Information security technology--Security technical requirements for virtual private network products
Sector / Industry: Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard: A90
Classification of International Standard: 35.240
Word Count Estimation: 14,197
Date of Issue: 2018-01-26
Date of Implementation: 2018-01-26
Issuing agency(ies): Ministry of Public Security

GA/T 686-2018: Information security technology--Security technical requirements for virtual private network products


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Security technical requirements for virtual private network products ICS 35.240 A90 People's Republic of China Public Safety Industry Standard Replacing GA/T 686-2007 Information security technology Virtual private network product security technical requirements Published on.2018-01-26 2018-01-26 implementation Ministry of Public Security

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard replaces GA/T 686-2007 "Information Security Technology Virtual Private Network Security Technical Requirements", and GA/T 686-2007 The main changes are as follows. --- Removed the requirement for marking (see 5.4 of the.2007 edition); --- Removed the requirement for residual information protection (see 5.10 of the.2007 edition); --- Removed the requirements for covert channel analysis (see 5.11 of the.2007 edition); --- Removed the requirement for a trusted path (see 5.12 of the.2007 version); ---Modified standard name; ---Modified the definition of virtual private network (see 3.1, 3.1.1 of.2007 edition); ---Modified security requirements (see Chapter 8, Chapter 6 of the.2007 edition); --- Increased access control requirements (see 7.3); --- Increased tunnel establishment requirements (see 7.5); --- Increased NAT traversal requirements (see 7.6); --- Increased the adaptability requirements of the IPv6 environment (see 7.8); --- Increased user definition (see 3.4); --- Revised the leveling requirements, the level is divided into two levels. basic level and enhanced level (see 9.2, 9.3,.2007 version of A.2). This standard was proposed by the Network Security Bureau of the Ministry of Public Security. This standard is under the jurisdiction of the Information System Security Standardization Technical Committee of the Ministry of Public Security. This standard was drafted. Ministry of Public Security Computer Information System Security Product Quality Supervision and Inspection Center, the Third Institute of the Ministry of Public Security. The main drafters of this standard. Hu Weina, Li Yi, Zhao Ting, Gu Yu, Shen Liang, Wu Qicong. The previous versions of the standards replaced by this standard are. ---GA/T 686-2007. Information security technology Virtual private network product security technical requirements

1 Scope

This standard specifies the security functional requirements, security requirements and classification requirements for virtual private network products. This standard applies to the design, development and testing of virtual private network products.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 18336.3-2015 Information technology security technology information technology security assessment criteria GB/T 25069-2010 Information Security Technology Terminology

3 Terms and definitions

The following terms and definitions as defined in GB/T 18336.3-2015 and GB/T 25069-2010 apply to this document. 3.1 Virtual private network virtualprivatenetwork A technique for establishing a private network on a public network. VPN is established between devices on a public, untrusted communication infrastructure A secure communication channel to protect the security of data transmitted between two communicating entities. Secure communication channel by using encryption, digital signature, and reference Security mechanisms such as authentication, authentication, and access control are established. 3.2 Tunnel tunnel Encapsulation for the transport protocol, embedding the original information to be transmitted at the beginning of the tunnel into the packet of the target protocol after encapsulation processing Internally, thus transmitting normally in a network that supports the target protocol. At the end of the tunnel, extract the original information from the encapsulated packet and complete Normal communication at both ends of the tunnel. 3.3 Internet protocol security internetprotocolsecurity A set of standards proposed by the IETF's IPSec working group to introduce security mechanisms into TCP/IP networks is a set of open networks. A general term for security protocols. IPSec provides security services such as integrity, authentication, and confidentiality. There are two main ways of working. tunnel mode and Transfer mode.

4 Abbreviations

The following abbreviations apply to this document. IETF. Internet Engineering Task Force (InternetEngineeringTaskForce) IPSec. Internet Protocol Security (InternetProtocolSecurity) IPv6. Internet Protocol Version 6 (InternetProtocolVersion6)
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GA/T 686-2018_English be delivered?

Answer: Upon your order, we will start to translate GA/T 686-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GA/T 686-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GA/T 686-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GA/T 686-2018?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GA/T 686-2018 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.