Security

The Firewall Rule Authentication Method Based on 6to4 Tunnel

Date Added: May 2013
Format: PDF

As the enterprise network security barrier, the firewall plays an important role. However, if the user do not configure the firewall properly, this barrier is useless. Current the study of firewall rules configuration validation are not too much, the IPSec firewall rule authentication method based on the 6to4 tunnel mode proposed in this paper is simple and practical, can be applied to verify that the IPv6 network environment inside and outside end to end communications policy effectiveness, research and experiments can be taken on the method used for other firewall rules based correctness verification in the future.