高手帮忙翻译一下这篇文章(汉译英),急!谢了。

Internet的发展给政府结构、企事业单位带来了革命性的改革和开放。他们正努力通过利用Internet来提高办事效率和市场反应速度,以便更具竞争力。通过Internet,企业可以从异地取回重要数据,同时又要面对Internet开放带来的数据安全的新挑战和新危险:即客户、销售商、移动用户、异地员工和内部员工的安全访问;以及保护企业的机密信息不受黑客和工业间谍的入侵。因此企业必须加筑安全的"战壕",而这个"战壕"就是防火墙。
防火墙技术是建立在现代通信网络技术和信息安全技术基础上的应用性安全技术,越来越多地应用于专用网络与公用网络的互联环境之中,尤其以接入Internet网络为最甚。
1.什么是防火墙?
防火墙是指设置在不同网络(如可信任的企业内部网和不可信的公共网)或网络安全域之间的一系列部件的组合。它是不同网络或网络安全域之间信息的唯一出入口,能根据企业的安全政策控制(允许、拒绝、监测)出入网络的信息流,且本身具有较强的抗攻击能力。它是提供信息安全服务,实现网络和信息安全的基础设施。
在逻辑上,防火墙是一个分离器,一个限制器,也是一个分析器,有效地监控了内部网和Internet之间的任何活动,保证了内部网络的安全。
2.防火墙能做什么?
防火墙是网络安全的屏障:
一个防火墙(作为阻塞点、控制点)能极大地提高一个内部网络的安全性,并通过过滤不安全的服务而降低风险。由于只有经过精心选择的应用协议才能通过防火墙,所以网络环境变得更安全。如防火墙可以禁止诸如众所周知的不安全的NFS协议进出受保护网络,这样外部的攻击者就不可能利用这些脆弱的协议来攻击内部网络。防火墙同时可以保护网络免受基于路由的攻击,如IP选项中的源路由攻击和ICMP重定向中的重定向路径。防火墙应该可以拒绝所有以上类型攻击的报文并通知防火墙管理员。
防火墙可以强化网络安全策略:
通过以防火墙为中心的安全方案配置,能将所有安全软件(如口令、加密、身份认证、审计等)配置在防火墙上。与将网络安全问题分散到各个主机上相比,防火墙的集中安全管理更经济。例如在网络访问时,一次一密口令系统和其它的身份认证系统完全可以不必分散在各个主机上,而集中在防火墙一身上。
对网络存取和访问进行监控审计:
如果所有的访问都经过防火墙,那么,防火墙就能记录下这些访问并作出日志记录,同时也能提供网络使用情况的统计数据。当发生可疑动作时,防火墙能进行适当的报警,并提供网络是否受到监测和攻击的详细信息。另外,收集一个网络的使用和误用情况也是非常重要的。首先的理由是可以清楚防火墙是否能够抵挡攻击者的探测和攻击,并且清楚防火墙的控制是否充足。而网络使用统计对网络需求分析和威胁分析等而言也是非常重要的。

The Internet development for the government the structure, the Enterprises and institutions has brought the revolutionary reform and the opening. They through are raising the working efficiency and the market reaction rate diligently using Internet, with the aim of having the competitive power. Through Internet, the enterprise may from different bring back the important data, simultaneously must face the data security new challenge which and the new danger the Internet opening brings: Namely customer, seller, mobile subscriber, different staff and internal staff's safe visit; As well as protection enterprise's secret information not hacker and industrial spy's invasion. Therefore the enterprise must add builds " the trench safely ", but this " the trench " is a firewall.
The firewall technology is the establishment in the Communications Today networking and in the information security technology base utility safety work, more and more applies in the private network and in the public network interconnection environment, especially take turns on the Internet network as most really.
1. what is a firewall?
The firewall is refers to establishes, in the different network (for example may trust enterprise intranet and incredible public net) or between network peaceful closed region a series of part's combination. It is the different network or between the network peaceful closed region the information only access, can according to enterprise's security policy control (permission, rejection, monitor) come in and go out the network the information flow, and itself has the strong anti-attack capability. It provides the information security service, realizes the network and the information security infrastructure.
In logic, the firewall is a separator, a killer, is also an analyzer, has monitored between the intranet and Internet any activity effectively, has assured the internal network security.
2. what can the firewall make?
The firewall is the network security barrier:
A firewall (as chokepoint, control point) can enhance an internal network enormously the security, and through filters the unsafe service to reduce the risk. Because only then undergoes the careful choice the application agreement to be able through the firewall, therefore the network environment becomes safer. If the firewall may forbid such as the well known unsafe NFS agreement to pass in and out is protected the network, like the exterior aggressor is impossible to use these frail agreements to attack the internal network. At the same time the firewall may protect the network to be exempt from based on route's attack, like in IP option source route attack and ICMP heavy direction detection heavy directional way. The firewall should be possible to reject all above type attack the text and informs the firewall manager.
The firewall may strengthen the cyber security policy:
Through take the firewall as the central safety program disposition, can possess the security software (for example password, encryption, status authentication, audit and so on) to dispose on the firewall. With disperses the network security problem to each main engine on compares, firewall's centralism safety control is more economical. For example when network visit, a dense password system and other status authentication system definitely may not need to disperse on each main engine, but concentrates on a firewall body.
Carry on the monitoring audit visit to the network access and:
If under all visits after the firewall, that the firewall can record these to visit and to make the diary record, simultaneously can also provide the network service condition the statistical data. When has the suspicious movement, the firewall can carry on the suitable warning, and provides the network whether to receive the monitor and the attack detailed information. Moreover, collects a network the use and misuses the situation is also very important. The first reason is may the clear firewall whether can resist aggressor's survey and the attack, and clear firewall's control to be whether sufficient. But the network use statistics and so on speaking of the network demand analysis and the threat analysis are also very important.
温馨提示:答案为网友推荐,仅供参考
第1个回答  2008-06-20
Internet to the development of the structure of government, enterprises and institutions brought about a revolutionary reform and opening up. They are efforts through the use of Internet to improve efficiency and market reaction speed, so that more competitive. Through the Internet, enterprises can recover important data from different places, at the same time opening up the face of Internet data security to the new challenges and new dangers: that is, customers, vendors, mobile users, remote and internal staff to ensure the safety and Protection of confidential business information from hackers and industrial espionage invasion. So companies must build security and the "trenches" and the "trenches" is a firewall.
Firewall technology is built on a modern telecommunications network technology and information security technology based on the application of safety technology, more and more used in private network and public network of interconnected environment, in particular, to connect to the Internet network as the most substantial.
1. What is a firewall »
Firewall is set up in different networks (such as the trusted internal network and unreliable public network) or network security domain between the components of a series of combinations. It is different networks or network security domain of information between the only entrance, according to corporate security policy control (allowing, refused, monitoring) network access to the information flow, and itself has strong anti-attack capability. It is to provide information security services, network and information security infrastructure.
Logically, the firewall is a separator, a limiter, is also an analyzer, the effective monitoring of the internal network and the Internet between any of the activities to ensure the safety of the internal network.
2. Firewall can do what »
The firewall is the network security barrier:
A firewall (as a block, control point) can greatly improve a network of internal security and insecurity through the filter of services and reduce risk. As only carefully selected application protocol can be through the firewall, so the network environment has become more secure. If a firewall can be prohibited, such as the well-known unsafe and out of the agreement NFS protected networks, such external attackers can not be used to attack fragile agreement Intranet. Firewall at the same time can protect the network from attack based on routing, such as IP routing options in attack and the source of ICMP redirect redirect path. Firewall should be able to reject all of the above types of attacks reported, and notify the firewall administrator.
Firewall can strengthen network security policy:
Through the firewall as the center of the security plan configuration, can all security software (such as passwords, encryption, authentication, auditing, etc.) on the firewall configuration. And the issue of network security will be distributed to the various host compared to the firewall on the safety management more economical. For example, network access, once a system of passwords and other identity authentication system can not scattered in various host, and was concentrated in a firewall.
Internet access and access to monitor the audit:
If all of the visits have been a firewall, then the firewall will be able to record these visits and make the log records, but also to provide network usage statistics. When a suspicious action, the firewall can carry out the appropriate alarm, and to provide network monitoring and attacks by the details. In addition, a collection of network use and misuse of the situation is also very important. First on the grounds that it is clear whether the firewall to ward off the attack detection and attack, and clearly the adequacy of the control of the firewall. And network usage statistics on the network needs analysis and threat analysis is also very important.