久久免费福利,精品视频在线你懂得,精品视频网站,国产激情综合

Photovoltaic Grid-connected Information - How to Measure and Evaluate Power Monitoring System - Measure and Evaluate Network security Level Protection

Author:杭州領祺科技有限公司 Date:2022-12-23 Reading:

In order to implement the requirements of the Ministry of Public Security and the National Energy Administration on the safety protection of the power monitoring system of power stations, strengthen the safety protection capability of the power monitoring system of photovoltaic power stations, and ensure the safe and stable operation of the power monitoring system. The power monitoring system of new energy power station and photovoltaic power station needs to conduct network security grade protection evaluation and safety protection evaluation, analyze the existing threats and vulnerabilities of the system, improve the protection measures, make the power monitoring system meet the specific requirements of the state on the corresponding level of grade protection, and increase the standardization and effectiveness of the safety management of the power monitoring system. Improve the unit's security awareness, enhance the power monitoring system network anti-attack ability, to ensure the normal operation of the network and information system.

Equal protection is short for grade protection. It refers to the hierarchical security protection of important national information, the proprietary information of legal persons, other organizations and citizens, the open information and the information system storing, transmitting and processing such information, the hierarchical management of information security products used in the information system, and the hierarchical response and disposal of information security incidents occurring in the information system.

Network security level protection provides systematic, targeted and feasible guidance and services for the network security construction and management of graded objects such as information systems, cloud computing, mobile Internet, Internet of Things and industrial control systems, and helps users improve the security protection ability of graded objects. In addition, Article 21 of the Cyber Security Law clearly stipulates that "the state implements a network security level protection system".

In addition to meeting the requirements of relevant national laws and regulations, a good level of protection can also reduce the information security risks of the system and improve the protection ability.

Class protection is a hot topic for businesses and governments. For enterprises, the network security level protection record certificate and evaluation report is not only the recognition of product professionalism, security and compliance, but also an important qualification certificate in the process of business development. Today, Xiaobian will explain why it is important for enterprises to have class protection.

What is waiting insurance?

Isoassurance is information security level protection, refers to the security protection of important national information, legal person, other organizations and citizens' proprietary information and public information when storing, transmitting and processing such information; The information security products used in the information system shall be managed according to the level; Hierarchical response and processing of information security events in the information system.

Network security level protection is the basic system, basic strategy and basic method of national information security. Network security level protection is a job to protect information and information carrier according to importance level. The operation and use units of information systems shall choose the evaluation that meets the requirements of the state and organize the evaluation of information systems on a regular basis according to such technical standards as Basic Requirements for Information Security Technology and Network Security Level Protection.

For most small and medium-sized enterprises and institutions, such as construction is a headache, there are two core pain points:

1. The construction process of equibao is complicated

Small and medium-sized enterprises and public institutions lack full-time personnel responsible for security and even IT, and they are not familiar with peer-to-peer insurance, and deployment, operation and maintenance management becomes a great burden.

2. High investment in equibao construction

Such as insurance construction purchase service and safety equipment investment is high, business and policy changes need to add new investment to meet the requirements of review and compliance.

Due to the complex process and high investment in the construction of the network security, small and medium-sized enterprises and institutions will prefer how to carry out the construction of the network security with "less worry and effort" when considering the network security construction scheme, and how the investment in the network security construction can be sustained, effective and cost-effective.

Therefore, the popularity of the integrated equal-insurance all-in-one program is still the best choice for the construction of small and medium-sized enterprises and institutions.

During network security construction, customers can use the isoassurance all-in-one solution to customize security capabilities based on their own requirements, such as isoassurance Level 2 capability + behavior management capability, isoassurance level 3 capability + remote security access capability, which not only complies with the requirements, but also meets the service requirements. Meanwhile, the equipment room becomes clean and the operation and maintenance management workload is greatly reduced.

Why do we have grade protection?

(1) Requirements stipulated by law

The Cyber Security Law clearly stipulates that the operators and users of information systems shall fulfill their security protection obligations in accordance with the requirements of the cyber security hierarchical protection system. If they refuse to comply, they will be punished accordingly.

(2) Industry requirements

In finance, electricity, radio and television, medical care, education and other industries, the competent units clearly require the information systems of employees to carry out hierarchical protection work.

(3) Enterprise system security requirements

The operation and use of the information system can find the internal security risks and deficiencies of the system, and improve the security protection capability of the system and reduce the risk of attack through security rectification.

Refers to the scope of grade protection

(1) Important websites and office information systems of Party and government organs above the cities of the provincial government;

(2) Public communication networks, radio and television transmission networks and other basic information networks of the telecommunications and radio and television industries, as well as important information systems of operational public Internet information service units, Internet access service units, data centers and other units;

(3) Production, dispatch, management, office and other important information systems of railway, banking, customs, taxation, civil aviation, electric power, securities, insurance, foreign affairs, science and technology, development and reform, national defense science and technology, public security, personnel and labor and social security, finance, auditing, commerce, water conservancy, land and resources, energy, transportation, culture, education, statistics, business administration, postal service and other industries and departments .

After the information security level protection work is carried out, the limited financial resources, material resources and manpower will be put into the security protection of important information system, the security protection measures will be established according to the standard, the security protection system will be established, the security responsibility will be implemented, the supervision and inspection will be strengthened, and the security of important information system will be effectively protected, which can greatly improve the overall level of the security construction of our information system.

Network architecture is the "nerve vein" of data center

If the data center is compared to a "person", then the server and storage device constitute the "organ" of the data center, and the network (switch, router, firewall) is the "nerve vein" of the data center. That section deals with the network architecture and general design of data centers.

01 Network partition and Equal protection

Generally, an enterprise partitions physical devices on a data center network to ensure flexibility, security, and ease of management. Generally, data centers adopt a three-layer network structure of core, aggregation, and access. The core is used for fast forwarding of all traffic, while the aggregation functions as a gateway on each network zone.

Generally, each zone in a data center is assigned different service network segments based on the expected traffic and number of servers. At the same time, security devices such as firewalls will be set up in some areas with high isoassurance requirements to control the flow in and out of this area, as shown in the figure below:

wps36.jpg

Equal protection is short for level protection. When setting the server area of a data center, the level protection for servers of different services varies. For example, background storage, tape libraries, databases, these servers and Web, front-end, APP protection is different. In a data center network, the firewall is used to divide equal guarantees and control the access between different equal guarantees.

Then how to better understand the concept of "equal insurance"?

wps37.jpg

wps39.jpg

wps39.jpg

In the current data center network architecture, traffic control between different equal guarantees should be taken into account, as well as the convenience and speed of routing design. At present, the firewall in the data center is almost always deployed in off-line mode, and then works with the VRF on the aggregation switch to control traffic.

02 Data center network partitioning mode

There are three partition modes. Each partition mode has its own advantages and disadvantages.

A. Partition by server type

For example, x86 server, minicomputer, blade machine, mainframe, virtual machine classification. Completely according to the classification of server models, in practical applications, may be an enterprise minicomputer is used a lot, but the mainframe is almost useless, will lead to the minicomputer network area traffic is huge and the mainframe this area idle. So, in data centers today, it's almost impossible to see such a distribution of areas.

B. Partition by application layer

For example, Web and APP are front-end servers, while database, storage and NFS are back-end servers. Therefore, put front-end servers in one area and back-end servers in one area. In some enterprise data centers, this is indeed the partition. For example, all the Web servers are in the "general Business area" and the databases are in the "production management area" (even the name of the area is "vague," as you can see). The advantage of this partition is easy to manage, because the front-end service area and the back-end service area are not in the same guarantee, the front-end service area directly faces the office, and the back-end area is the front-end service area, as shown in the figure below:

wps40.png

The advantage of this way of setting up the area is that it is easy to separate management, but the disadvantage is that it is too cumbersome to operate and maintain. For example, when a new APP is online at the front end and the corresponding database support is needed at the back end, the system operation and maintenance personnel need to contact the network operation and maintenance personnel and ask them to open the corresponding security policy on the firewall in the back end area. Considering that there are many non-network problems in the connection between the front end and the back end, and there are firewalls between the front end and the back end, so once the front end and the back end communication problems, network operation and maintenance personnel will be easy to "blame".

C. Categorize applications by application type

For example, core service, public service, office area, isolation area, development and testing area are divided. The advantage of this partition is that a "functional business" front-end server and back-end server are in a guarantee, in the front end and back-end docking, network operation and maintenance personnel will not be because of the firewall policy reasons and "back". But this division will appear network planning is a bit "chaotic". For some administrators who do not pay much attention to IP address planning in the early stage, the IP address planning of the front-end server and back-end server may be troublesome. For example, if the IP address segment given to the core server area is 10.114.128.0/21, there are 10.114.128.0/24-- 10.114.135.0/24, 16 C segments. However, for unscrupulous administrators, 10.114.128.0/24 May be used as the front-end IP address and 10.114.129.0/24 as the back-end IP address, so that the front-end and back-end IP address segments "cross".

In an extreme case, when multilevel data centers use MPLS V.P network interconnection to divert traffic from the front-end to the back-end, the front-end and back-end IP address segments cross, and the traffic diversion becomes extremely troublesome.

To sum up, each method of partitioning has its own advantages and disadvantages, so it is necessary to partition according to the actual situation.

03 Common data center network architecture

A. Flat networking

For small data centers with single functions and less than 300 servers, two-layer flat networking is usually adopted. In other words, the aggregation device serves as the gateway, and the access device is a Layer 2 device that can open the layer 2 channel. Flat networking can be designed in two modes: traditional VRRP+MSTP and stack + link bundling.

The first is the structure of VRRP+MSTP, as shown in the following figure:

wps41.png

Compared with the first very traditional MSTP+VRRP architecture, the second "fat tree" architecture is commonly used in the current flat networking of data centers. The idea is that aggregation switches must be stacked, access switches must be stacked on demand, and all redundant links must be bundled to form a "fat tree". Its advantages are that it not only ensures the redundancy of the device, improves bandwidth performance, but also prevents Layer 2 loops. However, in order to realize device stacking, this requires hardware. Therefore, the cost of this "fat tree" networking is much higher than that of the first one.

wps42.png

B. Layer 3 networking architecture

For large data centers, where functions are diverse and functional partitioning is required, a standard three-tier architecture is used.

In this networking mode, the switching core area is the hub of the entire data center network. Two to four large-capacity high-end frame switches are deployed in the core devices. The switches can be deployed independently or in groups by using the stacking technology. Therefore, the core will adopt the mode of independent deployment, that is, there is only interconnection between the core and the convergence, and there is no interconnection between the core)

The aggregation layer and access layer in a zone are stacked to implement layer 2 failure.

The following figure shows a current mainstream three-layer networking diagram of data centers:

wps43.png

In the previous topology, firewalls in large areas are connected in bypass mode. The off-line connection of the firewall also improves scalability and is compatible with dynamic routes. In this structure, if the core - aggregation - access traffic can enter the firewall, it is necessary to use VRF to isolate routes on the aggregation switch. Therefore, the function of VRF in this place is to isolate routes and "turn bypass into series".

The difficulty of this paper is exactly how to draw the logic diagram of the service flow when VRF is used on the aggregation switch. In fact, it took me a while to understand the relationship between the VRF and the bypass firewall when I first took on the project. Now let me briefly explain to you the method of delimiting traffic flow.

The so-called "single equal protection" means that all service network segments under the aggregation can be directly accessed, and traffic does not need to be controlled by the firewall. In this case, only one VRF is needed to separate the traffic between the aggregation-core and the aggregation-firewall.

The physical connection diagram is as follows:

wps44.jpg

Because aggregation and access, including firewalls, are deployed on a two-node cluster or in a stack, you can temporarily draw the aggregation and access as a single device to avoid complex physical structures.

wps45.png

Then, remove the aggregation layer device icon and replace it with a box. Add two small boxes inside the box to represent two virtual devices with independent Layer 3 routes. The global route is connected to the core and the VRF route is connected to the access. Then, draw two lines on the firewall and connect them to the Global Route and VRF boxes respectively. The two lines connecting the firewall and aggregation can be different physical interfaces or sub-interfaces. As shown in the picture below:

wps46.png

Finally, remove the large block of aggregation layer device location, and "plug" the firewall between the small box of "global route" and the small box of "VRF". In this way, a single level of equal protection and flow diagram of bypassing into series is completed.

wps47.jpg

Two equal protection levels. Therefore, traffic of the two equal protection levels must pass through the firewall when the services in the two equal protection levels communicate. Here you have to remember: a wait for insurance


Share:

Hot Tag

Change a Group

Related Suggestion

久久免费福利,精品视频在线你懂得,精品视频网站,国产激情综合
四虎成人av| 老司机精品视频网| 亚洲在线观看| 视频一区日韩精品| 九九久久国产| 久久久久久久久久久妇女 | 99精品美女| 久久亚洲精品伦理| 日韩精品欧美成人高清一区二区| 欧美激情 亚洲a∨综合| 日韩精品免费一区二区三区| 老鸭窝亚洲一区二区三区| 国产精品视频首页| 久久久久.com| 日本综合精品一区| 一区二区精品伦理...| 午夜在线精品| 蜜桃久久久久| 欧美在线亚洲| 久久av超碰| 日韩一区二区久久| 国产精品亚洲欧美一级在线| 蜜臀av免费一区二区三区| 国产精品亚洲片在线播放| 成人va天堂| 日韩av一二三| 久久高清免费| 国产精品白丝av嫩草影院| 黄色在线一区| 精品不卡一区| 亚洲免费观看高清完整版在线观| 国际精品欧美精品| 久久亚洲一区| 久久久精品日韩| 国产高清精品二区| 欧美专区一区二区三区| 日韩大片在线| 国产精品久久久久久久免费软件| 欧美日韩国产高清| 国产精品s色| 一区二区三区国产在线| 亚洲婷婷免费| 国产精品毛片久久| 久久国产生活片100| 99热精品在线| 日韩亚洲一区在线| 国产精品久久| 亚洲综合激情在线| 久久精品国产亚洲夜色av网站| 日韩成人av影视| 亚洲一区二区三区高清不卡| 天堂中文av在线资源库| 欧美aa在线视频| 亚洲免费毛片| 国产在线不卡| 日韩激情一区| 免费一级欧美片在线观看网站| 蜜臀91精品一区二区三区| 久久精品欧美一区| 91欧美国产| 国产精品麻豆成人av电影艾秋| 日韩精品一级二级| 欧美日韩激情| 日韩电影二区| 首页国产精品| 精品入口麻豆88视频| 国产精品久久久久久久久久白浆 | 97精品国产99久久久久久免费| 午夜欧美精品| 天堂资源在线亚洲| 国产精品二区不卡| 久久亚洲精精品中文字幕| 欧美一区自拍| 免费在线观看一区二区三区| 国产精品av久久久久久麻豆网| 88xx成人免费观看视频库| 高清在线一区| 日本一二区不卡| 精品亚洲自拍| 免费在线亚洲欧美| 国产精品久久久久9999高清| 91欧美日韩在线| 欧美日韩一区二区三区不卡视频| 亚洲精品在线国产| 亚洲精品少妇| 丝袜美腿亚洲色图| 丝袜美腿高跟呻吟高潮一区| 久久国产精品久久w女人spa| av不卡在线| 伊人精品视频| 亚洲欧美视频| 免费精品视频在线| 久色成人在线| 美女久久网站| 蜜臀va亚洲va欧美va天堂| 蜜臀av在线播放一区二区三区 | 亚洲深夜福利在线观看| 蜜桃免费网站一区二区三区| 最新国产精品久久久| 日本成人在线视频网站| 欧美一级网址| 久久精品九色| 在线看片福利| 日韩另类视频| 亚洲婷婷免费| 亚洲欧美激情诱惑| 午夜久久av | 日韩欧美二区| 亚洲五月婷婷| 久久福利影视| 日韩福利视频一区| 日本午夜精品视频在线观看| 国产精品蜜月aⅴ在线| 麻豆一区二区在线| 四季av一区二区凹凸精品| 99久久精品费精品国产| 99成人在线| 91精品麻豆| 国产在线观看91一区二区三区 | 九九久久电影| 喷白浆一区二区| 久久国产视频网| 桃色av一区二区| 石原莉奈在线亚洲二区| 欧美日韩亚洲一区三区| 国产美女精品视频免费播放软件| 久久99偷拍| 亚洲网站视频| 日韩激情啪啪| 国产中文欧美日韩在线| 国产韩日影视精品| 日韩在线观看中文字幕| 国产极品一区| 尤物tv在线精品| 日本不卡高清视频| 日本久久黄色| 热久久免费视频| 精品国产美女a久久9999| 激情久久中文字幕| 亚洲影院天堂中文av色| 国产精品网站在线看| 成人精品中文字幕| 日本不卡视频一二三区| 麻豆视频在线看| 亚洲影视一区二区三区| 麻豆国产欧美日韩综合精品二区| 日韩在线观看不卡| 日韩午夜视频在线| 中文在线中文资源| 热久久免费视频| 成人亚洲一区二区| 亚洲精品动态| 欧美成人基地 | 日韩二区三区四区| 色爱综合av| 欧美亚洲一区二区三区| 视频二区不卡| 久久国内精品视频| 欧美日韩免费观看一区=区三区| 欧美片第1页综合| 999久久久亚洲| 国产精品一区高清| 国产精品毛片| 精品国产亚洲一区二区三区在线| 亚洲一区久久| 日韩1区2区| 四虎成人精品一区二区免费网站| 亚洲欧洲高清| 久久精品在线| 国产精品久久国产愉拍| 亚洲一区免费| 成人片免费看| 国产欧美88| 免费在线视频一区| 亚洲成人二区| 久久免费视频66| 日韩高清不卡在线| 好吊一区二区三区| 国产精选在线| 国产伦理久久久久久妇女| 先锋影音国产一区| 九九精品调教| 国产欧美日韩影院| 视频一区二区国产| 久久精品中文| 粉嫩av一区二区三区四区五区 | 国产亚洲欧洲| 欧美少妇精品| 国产精品亚洲欧美日韩一区在线| 性一交一乱一区二区洋洋av| 亚洲啊v在线| 麻豆国产精品视频| 97久久精品| 美女被久久久| 欧美粗暴jizz性欧美20| 日本一区二区高清不卡| 国产精品流白浆在线观看| 日韩精品视频中文字幕| 99精品99| 1024精品一区二区三区|