典型中小企业网络边界安全解决方案意见征询稿HillstoneNetworksInc.2010年9月29日目录1前言..............................................................................................................................................................41.1方案目的......................................................................................................................................41.2方案概述......................................................................................................................................42安全需求分析..............................................................................................................................................62.1典型中小企业网络现状分析.....................................................................................................62.2典型中小企业网络安全威胁.....................................................................................................82.3典型中小企业网络安全需求..................................................................................................102.3.1需要进行有效的访问控制..............................................................................................102.3.2深度应用识别的需求......................................................................................................112.3.3需要有效防范病毒..........................................................................................................112.3.4需要实现实名制管理......................................................................................................112.3.5需要实现全面URL过滤.................................................................................................122.3.6需要实现IPSECVPN.....................................................................................................122.3.7需要实现集中化的管理..................................................................................................123安全技术选择...........................................................................................................................................133.1技术选型的思路和要点..........................................................................................................133.1.1首要保障可管理性..........................................................................................................133.1.2其次提供可认证性..........................................................................................................133.1.3再次保障链路畅通性......................................................................................................143.1.4最后是稳定性...................................................................................................................143.2选择山石安全网关的原因......................................................................................................143.2.1安全可靠的集中化管理..................................................................................................153.2.2基于角色的安全控制与审计..........................................................................................163.2.3基于深度应用识别的访问控制......................................................................................173.2.4深度内容安全(UTMPlus®)....................................................