###
DOI:
电力大数据:2023,26(2):-
←前一篇   |   后一篇→
本文二维码信息
基于局域网私设NAT场景发现与管控系统的研究
肖红谊, 张勐, 王振东
(大丰区供电公司)
Research on the Discovery and Control System of Private NAT Scenarios Based on Local Area Networks
xiaohongyi, zhangmeng, wangzhendong
(da feng qu gong dian gong si)
摘要
图/表
参考文献
相似文献
本文已被:浏览 184次   下载 867
投稿时间:2023-04-12    修订日期:2023-05-22
中文摘要: 近年来,运检数字化大规模推广,随之带来的网络资源需求不断增长,网络安全防护要求也不断提高。为适应不断扩展的数字化业务,改善变电站数字化网络质量,解决现有Ⅳ区IP地址资源匮乏的阶段性客观难题,各种技术手段层出不穷,各有优劣,其中NAT技术最为常见,使用范围最广;为提升网络安全性能水平,确保变电站网络资源的安全高效利用,通过对变电站(供电所)私设NAT场景进行研究,设计变电站(供电所)局域网私设NAT场景发现与管控系统,将变电站及供电所相关IP地址规划导入系统,系统通过数据流截取方式分析网络中所有的NAT场景,最终实现网络管理员对网络私设NAT场景分类管理。通过技术手段有效掌握网络中的私有NAT数量及私有IP地址使用情况,提高网络的安全性,在发生安全事故时,准确地进行溯源工作。
Abstract:In recent years, the large-scale promotion of digitalization in transportation inspections has brought about an increasing demand for network resources and increasing requirements for network security protection. In order to adapt to the ever-expanding digital business, improve the quality of substation digital network, and solve the staged objective problem of the lack of IP address resources in the existing IV area, various technical means emerge in endlessly, each with its own advantages and disadvantages, among which NAT technology is the most common and widely used ;In order to improve the network security performance level and ensure the safe and efficient use of substation network resources, through the research of substation (power supply station) private NAT scenario, design the private NAT scene discovery and control system of substation (power supply station) LAN, substation and The relevant IP address planning of the power supply station is imported into the system, and the system analyzes all NAT scenarios in the network through data flow interception, and finally realizes the classified management of network private NAT scenarios by network administrators. Effectively grasp the number of private NATs in the network and the usage of private IP addresses through technical means, improve the security of the network, and accurately trace the source when a security incident occurs.
文章编号:     中图分类号:    文献标志码:
基金项目:
引用文本: