HOME   Cart(4)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GA/T 1177-2014 English PDF

US$699.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GA/T 1177-2014: Information security technology. Security technique requirements for the second generation firewall products
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GA/T 1177-2014English699 Add to Cart 4 days [Need to translate] Information security technology. Security technique requirements for the second generation firewall products GA/T 1177-2014

PDF similar to GA/T 1177-2014


Standard similar to GA/T 1177-2014

GB/T 37230   GA/T 1255   GB 13954   GA/T 1180   GA/T 1183   GA/T 1168   

Basic data

Standard ID GA/T 1177-2014 (GA/T1177-2014)
Description (Translated English) Information security technology. Security technique requirements for the second generation firewall products
Sector / Industry Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard A90
Classification of International Standard 35.040
Word Count Estimation 20,290
Date of Issue 2014-07-24
Date of Implementation 2014-09-01
Quoted Standard GB 17859-1999; GB/T 18336.3-2008; GB/T 20281-2006; GB/T 25069-2010
Regulation (derived from) Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184)
Issuing agency(ies) Ministry of Public Security
Summary This standard specifies the security functional requirements, security assurance requirements, environmental adaptability requirements, performance requirements and safety classifications of the second generation firewall products. This standard applies t

GA/T 1177-2014: Information security technology. Security technique requirements for the second generation firewall products


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technique requirements for the second generation firewall products ICS 35.040 A90 People's Republic of China Public Security Industry Standards Information Security Technology The second-generation firewall security technical requirements Issued on. 2014-07-24 2014-09-01 implementation People's Republic of China Ministry of Public Security

Table of Contents

Introduction Ⅲ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Abbreviations 2 5 2 - Safety requirements 5.1 General Description 2 5.2 Security functional requirements 5 5.3 Security assurance requirements 10 5.4 Environmental Adaptability claim 15 5.5 Performance Requirements 16

Foreword

This standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard was proposed by the Ministry of Public Security Network Security Protection Agency. This standard is proposed and managed by the Ministry of Public Security Information System Standardization Technical Committee. This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, Shenzhen Electronic Technology Co. convinced The company, net of God Information Technology (Beijing) Co., Ltd., Beijing China Information Security Technology Co., Ltd. Green League, net Royal nebula INFORMATION TECHNOLOGY Limited surgery, Venus Information Technology Co., Ltd. The main drafters of this standard. Zouchun Ming, Yu excellent, good song, Lu Zhen, Gu Jian, Lihuan Bo, Wang Fan, Wang Gang, Duan Jiping, Feng Tao, Tao. Information Security Technology The second-generation firewall security technical requirements

1 Scope

This standard specifies the safety function of the second-generation firewall product requirements, security assurance requirements, environmental adaptability requirements, performance and safety requirements Full classification. This standard applies to the second-generation firewall product design, development and testing.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB 17859-1999 computer information system security protection division criteria GB/T 18336.3-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3. Security assurance requirements GB/T 20281-2006 Information security technology firewall technology requirements and testing and evaluation approaches GB/T 25069-2010 Information security technology terms

3 Terms and Definitions

GB 17859-1999, GB/T 20281-2006 and GB/T 25069-2010 define the following terms and definitions apply This document. 3.1 The first generation of firewall firewal One or a group or between networks of different security domains of security policy implementation of access control systems, with packet filtering, network address translation (NAT), stateful inspection and other security features. 3.2 Second Generation Firewall thesecondgenerationfirewal In addition to having a first-generation firewall basic functions, but also has application traffic identification, the application layer access control, application layer security protection, user Control system control, deep content inspection, high-performance features. 3.3 Deep content inspection deepcontentinspection Depth analysis of application protocol, the protocol identified in the various elements (such as, for http protocol, such as specific analysis to cookie, Get parameters, Post forms, etc.) and protocol carrying business content (eg, business system interaction data contained in the agreement or document Content), and these data quickly resolve to restore the message to its original communication. According to the original information parsed, which detect whether Threats and contain sensitive content. 3.4 SQL injection SQLinjection The SQL commands inserted into a web form to submit arguments or page request to fool the server to execute malicious SQL commands the goal of.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GA/T 1177-2014_English be delivered?

Answer: Upon your order, we will start to translate GA/T 1177-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GA/T 1177-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GA/T 1177-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.