DocumentCode
523399
Title
The research and implementation of UTM
Author
Chao, Yin ; Bingyao, Cao ; Jiaying, Ding ; Wei, Gu
Author_Institution
Shanghai University, Room 1212, Xing Jian Building, No.149 Yan Chang Road, Shanghai, China, 200072
fYear
2009
fDate
7-9 Dec. 2009
Firstpage
389
Lastpage
392
Abstract
UTM (Unified Threat Management) is rapidly becoming a most important network security device in many enterprises, particularly in small-sized and mid-sized offices. In this paper, the author introduces the concept, background, central function and the typical technologies of UTM; then the UTM system model based on NP structure is achieved.
Keywords
DPI; PME; QoS; TLU; UTM;
fLanguage
English
Publisher
iet
Conference_Titel
Wireless Mobile and Computing (CCWMC 2009), IET International Communication Conference on
Conference_Location
Shanghai, China
Type
conf
Filename
5521994
Link To Document