目录摘要...........................................................................................................................................1一、引言.......................................................................................................................................2二、防火墙体系结构...................................................................................................................2(一)传统式防火墙............................................................................................................21.筛选路由器.........................................................................................................................22.多宿主主机.........................................................................................................................23.被屏蔽主机.........................................................................................................................34.被屏蔽子网.........................................................................................................................3(二)分布式防火墙............................................................................................................3三、武警部队内网信息中的防火墙应用研究...........................................................................3(一)武警部队内网信息中防火墙的应用部署................................................................31.安全策略.............................................................................................................................42.防火墙应用模式.................................................................................................................4(二)部队防火墙维护........................................................................................................4(三)武警内网信息VPN技术应用研究..........................................................................5四、IPSecVPN应用研究............................................................................................................5(一)IPSec协议.................................................................................................................6(二)SSLVPN应用研究....................................................................................................61.SSL协议.............................................................................................................................72.SSL记录协议.....................................................................................................................73.改变密码规范协议.............................................................................................................94.握手协议.............................................................................................................................9(三)SSLVPN应用分析..................................................................................................10(四)IPSecVPN与SSLVPN比较...................................................................................10五、实施方案.............................................................................................................................11(一)选择VPN应考虑的因素........................................................................................11(...