|
US$699.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1177-2014: Information security technology. Security technique requirements for the second generation firewall products
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 1177-2014 | English | 699 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology. Security technique requirements for the second generation firewall products
| |
GA/T 1177-2014
|
PDF similar to GA/T 1177-2014
Basic data | Standard ID | GA/T 1177-2014 (GA/T1177-2014) | | Description (Translated English) | Information security technology. Security technique requirements for the second generation firewall products | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.040 | | Word Count Estimation | 20,290 | | Date of Issue | 2014-07-24 | | Date of Implementation | 2014-09-01 | | Quoted Standard | GB 17859-1999; GB/T 18336.3-2008; GB/T 20281-2006; GB/T 25069-2010 | | Regulation (derived from) | Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184) | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the security functional requirements, security assurance requirements, environmental adaptability requirements, performance requirements and safety classifications of the second generation firewall products. This standard applies t |
GA/T 1177-2014: Information security technology. Security technique requirements for the second generation firewall products ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technique requirements for the second generation firewall products
ICS 35.040
A90
People's Republic of China Public Security Industry Standards
Information Security Technology
The second-generation firewall security technical requirements
Issued on. 2014-07-24
2014-09-01 implementation
People's Republic of China Ministry of Public Security
Table of Contents
Introduction Ⅲ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 2
5 2 - Safety requirements
5.1 General Description 2
5.2 Security functional requirements 5
5.3 Security assurance requirements 10
5.4 Environmental Adaptability claim 15
5.5 Performance Requirements 16
Foreword
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
This standard was proposed by the Ministry of Public Security Network Security Protection Agency.
This standard is proposed and managed by the Ministry of Public Security Information System Standardization Technical Committee.
This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, Shenzhen Electronic Technology Co. convinced
The company, net of God Information Technology (Beijing) Co., Ltd., Beijing China Information Security Technology Co., Ltd. Green League, net Royal nebula INFORMATION TECHNOLOGY
Limited surgery, Venus Information Technology Co., Ltd.
The main drafters of this standard. Zouchun Ming, Yu excellent, good song, Lu Zhen, Gu Jian, Lihuan Bo, Wang Fan, Wang Gang, Duan Jiping, Feng Tao, Tao.
Information Security Technology
The second-generation firewall security technical requirements
1 Scope
This standard specifies the safety function of the second-generation firewall product requirements, security assurance requirements, environmental adaptability requirements, performance and safety requirements
Full classification.
This standard applies to the second-generation firewall product design, development and testing.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB 17859-1999 computer information system security protection division criteria
GB/T 18336.3-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3. Security assurance requirements
GB/T 20281-2006 Information security technology firewall technology requirements and testing and evaluation approaches
GB/T 25069-2010 Information security technology terms
3 Terms and Definitions
GB 17859-1999, GB/T 20281-2006 and GB/T 25069-2010 define the following terms and definitions apply
This document.
3.1
The first generation of firewall firewal
One or a group or between networks of different security domains of security policy implementation of access control systems, with packet filtering, network address translation
(NAT), stateful inspection and other security features.
3.2
Second Generation Firewall thesecondgenerationfirewal
In addition to having a first-generation firewall basic functions, but also has application traffic identification, the application layer access control, application layer security protection, user
Control system control, deep content inspection, high-performance features.
3.3
Deep content inspection deepcontentinspection
Depth analysis of application protocol, the protocol identified in the various elements (such as, for http protocol, such as specific analysis to cookie,
Get parameters, Post forms, etc.) and protocol carrying business content (eg, business system interaction data contained in the agreement or document
Content), and these data quickly resolve to restore the message to its original communication. According to the original information parsed, which detect whether
Threats and contain sensitive content.
3.4
SQL injection SQLinjection
The SQL commands inserted into a web form to submit arguments or page request to fool the server to execute malicious SQL commands
the goal of.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1177-2014_English be delivered?Answer: Upon your order, we will start to translate GA/T 1177-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1177-2014_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1177-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|