Method for auditing log event of fire wall, and teaching experimental system
An experimental system and firewall technology, applied in the field of network security, to achieve the effect of remarkable effect, low cost and good prospect of popularization and application
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The content of the method of the present invention provides the following implementation examples. The firewall log event audit teaching experiment system realized based on the method of the present invention adopts a browser / server (B / S) structure, utilizes JSP programming technology, integrates the current popular log generation technology, supports multiple users to carry out experiments simultaneously, and specifically implements the content as follows:
[0022] 1. The user logs in to the experimental system page.
[0023] 2. The user selects the type of experiment, that is, chooses a normal packet filtering experiment or an application proxy experiment.
[0024] 4. The user sets the common packet filtering rules or application proxy rules of the firewall experimental system.
[0025] 5. The user performs relevant network access operations to verify the validity of the rules.
[0026] 6. The user chooses to view the logs corresponding to the relevant classificati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 