• DocumentCode
    523399
  • Title

    The research and implementation of UTM

  • Author

    Chao, Yin ; Bingyao, Cao ; Jiaying, Ding ; Wei, Gu

  • Author_Institution
    Shanghai University, Room 1212, Xing Jian Building, No.149 Yan Chang Road, Shanghai, China, 200072
  • fYear
    2009
  • fDate
    7-9 Dec. 2009
  • Firstpage
    389
  • Lastpage
    392
  • Abstract
    UTM (Unified Threat Management) is rapidly becoming a most important network security device in many enterprises, particularly in small-sized and mid-sized offices. In this paper, the author introduces the concept, background, central function and the typical technologies of UTM; then the UTM system model based on NP structure is achieved.
  • Keywords
    DPI; PME; QoS; TLU; UTM;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Wireless Mobile and Computing (CCWMC 2009), IET International Communication Conference on
  • Conference_Location
    Shanghai, China
  • Type

    conf

  • Filename
    5521994