Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GA/T 696-2007 | English | 219 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology - Security functional requirements for products for protecting stand-alone computer from intrusion
| Obsolete |
GA/T 696-2007
|
PDF similar to GA/T 696-2007
Basic data Standard ID | GA/T 696-2007 (GA/T696-2007) | Description (Translated English) | Information security technology - Security functional requirements for products for protecting stand-alone computer from intrusion | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | Classification of Chinese Standard | A90 | Classification of International Standard | 35.240 | Word Count Estimation | 5,543 | Date of Issue | 2007-05-14 | Date of Implementation | 2007-07-01 | Quoted Standard | GB/T 18336.3-2001 | Issuing agency(ies) | Ministry of Public Security | Summary | This standard specifies the security function requirements and guarantee requirements of the information security technology single-entry intrusion products. This standard applies to information security technology, single-machine anti-intrusion products, production and testing. |
GA/T 696-2007: Information security technology - Security functional requirements for products for protecting stand-alone computer from intrusion ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Security functional requirements for products for protecting stand-alone computer from intrusion
ICS 35.240
A90
People's Republic of China Public Security Industry Standards
Information Security Technology
Stand-alone intrusion prevention product safety functional requirements
Posted 2007-05-14
2007-07-01 implementation
People's Republic of China Ministry of Public Security
Foreword
This standard was proposed by the Ministry of Public Security Public Information Network Security Supervision Bureau.
This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee.
This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center.
The main drafters of this standard. Lu Zhen, Zhang Yi, Gu Wei, Shen Liang, Zhao Ting, Zhang Lan, Gu Jian.
Information Security Technology
Stand-alone intrusion prevention product safety functional requirements
1 Scope
This standard specifies the security function information security technology stand-alone intrusion prevention product requirements and assurance requirements.
This standard applies to the production and testing of information security technology stand-alone anti-intrusion products.
2 Normative references
The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent
Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research
Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard.
GB/T 18336.3-2001 Information technology - Security techniques - Evaluation criteria for IT security - Part 3. Security assurance to
Seek (idt ISO /IEC 15408-3.1999)
3 Terms and Definitions
The following terms and definitions apply to this standard.
3.1
A software running on a single machine. It can be single intercept the inbound and outbound TCP/IP network connection attempts, and use
Pre-defined rules to enable and disable its connection.
Security features 4 stand-alone intrusion prevention product requirements
4.1 IP packet filtering
Depending on the data format conventions TCP/IP protocol network packets, each matching rule shall be composed of the following elements.
a) Packet direction (connection initiator/recipient).
b) Remote IP address (any IP address/IP address specified/specified range of IP addresses).
c) match protocol, specific agreements shall include at least.
1) ICMP packet filtering
When the network is set according to ICMP packet type and code fields, and when matched to the same type code field
Press the corresponding rules of packet processing mode for processing;
2) UDP packet filtering
Based on UDP network packet local port [including single port and (or) port range] and (or) remote port [package
Including single port and (or) port range] match is performed;
3) TCP packet filtering
According to TCP network packets local port [including single port and (or) port range] and (or) remote port [package
Including single port and (or) port range], and a flag TCP packets match is filtered.
4.2 filtering action
Stand-alone anti-intrusion products should have the ability to filter packets following actions.
a) interception;
|