Please wait a minute...
New Technology of Library and Information Service  2005, Vol. 21 Issue (4): 34-36    DOI: 10.11925/infotech.1003-3513.2005.04.09
Current Issue | Archive | Adv Search |
Creation for Firewall of the Library Network Using Iptables
Hu Zhizhou
(Jiaying University Library, Meizhou 514015, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper is on the basis of analyzing network security demand for the automated system of the library, then introduce the method of using iptables tool to create the firewall under the environment of Linux.

Key wordsIptables Netfilter      Automatic system of the library      Network security     
Received: 30 December 2004      Published: 25 April 2005
: 

G250.7

 
Corresponding Authors: Hu Zhizhou     E-mail: hlde@tom.com
About author:: Hu Zhizhou

Cite this article:

Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables. New Technology of Library and Information Service, 2005, 21(4): 34-36.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2005.04.09     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2005/V21/I4/34

1健智. Linux网络实际操作经典. 北京:科学出版社,2002.7
2博嘉科技. Linux 防火墙技术探秘. 北京:国防工业出版社,2002.10
3吴阿亭译.  Linux2.4内核中的iptables新增功能指南. September,2,2002.    http://www.chinalinuxpub.com/read.htm?id=1179.(Accessed  Aug.10,2004)

[1] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[2] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[3] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[4] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[5] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[6] Jiang Chuanju. The Function of Log Analysis in Network Security[J]. 现代图书情报技术, 2004, 20(12): 58-60.
[7] Zhou Huai. The Analysis and Advices of Security Holes in ASP Web Sites[J]. 现代图书情报技术, 2004, 20(11): 90-92.
[8] Liu Xing. NT服务器的安全维护与故障排除[J]. 现代图书情报技术, 2003, 19(6): 85-87.
[9] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[10] Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002, 18(2): 92-93.
[11] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
[12] Wang Huawei. The NAT Solution of Computer Network of Library[J]. 现代图书情报技术, 2001, 17(5): 27-28.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
[14] Wang Yong,Ni Bo,Yuan Qinjian, Zhu Weiyong,Liang Wei. Advances of Computer Network Technology in 20 Century[J]. 现代图书情报技术, 2000, 16(6): 14-17.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn