GB/T 25068.5-2010
Information technology.Security techniques.IT network security.Part 5:Securing communications across networks using virtual private networks (English Version)

Standard No.
GB/T 25068.5-2010
Language
Chinese, Available in English version
Release Date
2010
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Status
 2021-10
Replace By
GB/T 25068.5-2021
Latest
GB/T 25068.5-2021
Scope
This part of GB/T 25068 specifies the security guidelines for using a virtual private network (VPN) to connect to the Internet and to connect remote users to the network. It is built according to the network management guidelines in ISO/IEC 18028-1. This section applies to those responsible for selecting and implementing the technical controls necessary to provide network security when using a VPN, and to network monitoring personnel responsible for subsequent VPN security. This section provides an overview of VPNs, presents VPN security objectives, and outlines VPN security requirements. It gives guidelines for secure VPN selection, implementation, and network monitoring for VPN security. It also provides information on typical technologies and protocols used by VPNs.

GB/T 25068.5-2010 Referenced Document

  • GB/T 17901.1-1999 Information technology-Security techniques-Key management-Part 1: Framework
  • GB/T 19715.1 Information technology-Guidelines for the management of IT Security-Part 1:Concepts and models of IT Security
  • GB/T 25068.3 Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios*2022-10-14 Update
  • GB/T 25068.4 Information technology—Security techniques—Network security—Part 4: Securing communications between networks using security gateways*2022-10-14 Update
  • GB/T 9387.1 Information technology--Open Systems Interconnection--Basic Reference Model--Part 1: The Basic Model
  • GB/T 9387.2 Information processing systems--Open Systems Interconnection--Basic Reference Model--Part 2: Security architecture
  • GB/T 9387.3 Information technology.Open Systems Interconnection.Basic Reference Model.Part3:Naming and addressing
  • GB/T 9387.4 Information processing systems--Open Systems Interconnection--Basic Reference Model--Part 4: Management framework
  • ISO/IEC 18028-1:2006 Information technology - Security techniques - IT network security - Part 1: Network security management
  • ISO/IEC 18028-2:2006 Information technology - Security techniques - IT network security - Part 2: Network security architecture

GB/T 25068.5-2010 history

  • 2021 GB/T 25068.5-2021 Information technology—Security techniques—Network security—Part 5: Securing communications across networks using virtual private networks
  • 2010 GB/T 25068.5-2010 Information technology.Security techniques.IT network security.Part 5:Securing communications across networks using virtual private networks
Information technology.Security techniques.IT network security.Part 5:Securing communications across networks using virtual private networks

GB/T 25068.5-2010 -All Parts




Copyright ©2024 All Rights Reserved