Enterprise network security management method

A security management and enterprise network technology, applied in the field of enterprise network security management, can solve problems such as enterprise network use and enterprise information security risks, lack of system planning and long-term planning, and overall network design is not clear enough to reduce broadcast storms and prevent The effect of illegal device accessing the network and preventing connection

Pending Publication Date: 2021-11-19
YANCHENG INST OF TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In recent years, enterprises have begun to adapt to the information age, and now the daily operations of enterprises rely on the Internet; enterprises all over the world are increasing the intensity of information construction, the development of the network has made network applications more and more extensive, and enterprises have begun to pay attention to Informatization construction, establishment of its own enterprise network, many businesses and management of enterprises rely on the network to operate; the degree of enterprise informati

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise network security management method
  • Enterprise network security management method
  • Enterprise network security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] Embodiment: a kind of enterprise network security management method, comprises constructing DMZ firewall between enterprise network and external network, realizes the function of hiding and access control of real IP, and establishes IPSec VPN between head office and branch office to realize intranet in different areas secure information transmission;

[0034] Among them, the enterprise LAN is connected to the internal trusted port, and port security is configured on the layer 2 switch. The threshold of data packets passing through the port is preset or the MAC address allowed to connect to the switch port is recorded through the MAC address table. At the same time, the PVST spanning tree protocol is adopted. Create a spanning tree for each vlan of the enterprise.

[0035] Such as figure 1 As shown, it is a network topology diagram. Specifically, build a DMZ firewall to realize the function of hiding real IP and access control through address translation and implementin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise network security management method, which comprises the following steps of: constructing a DMZ firewall between an enterprise network and an extranet to realize the functions of real IP hiding and access control, and establishing an IPSecVPN between a head office and a branch company to realize security information transmission of intranets in different regions, so that the risk is reduced, and the security is improved. Port security is configured on a two-layer switch, a data packet threshold value through which the port passes is preset, or MAC addresses allowed to be connected to the switch port are recorded through an MAC address table, a specific number or specific MAC addresses are allowed to use the port for communication, illegal equipment is prevented from accessing a network, MAC address table overflow caused by MAC address flooding can also be prevented, and by dividing vlan, the broadcast storm is reduced, and the pressure of the two-layer switch is fully shared; and in addition, link binding aggregation is used, the transmission bandwidth between the switches is increased, bidirectional authentication is carried out by configuring a PPP protocol and adopting chap, connection of illegal users is prevented, and the safety is further improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an enterprise network security management method. Background technique [0002] In recent years, enterprises have begun to adapt to the information age, and now the daily operations of enterprises rely on the Internet; enterprises all over the world are increasing the intensity of information construction, the development of the network has made network applications more and more extensive, and enterprises have begun to pay attention to Informatization construction, establishment of its own enterprise network, many businesses and management of enterprises rely on the network to operate; the degree of enterprise informatization has become a standard for measuring the strength of an enterprise; due to the initial stage of enterprise network construction, the overall network design is not clear enough and lacks a system Planning and long-term planning, insufficient network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L12/24H04L12/721H04L12/28
CPCH04L63/02H04L63/0272H04L63/0236H04L9/3239H04L41/0836H04L45/14H04L12/2859
Inventor 巩永旺王旭灵周刚宋法根
Owner YANCHENG INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products