2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 20281-2015
GB/T 20281-2015   Information security technology—Security technical requirements and testing and evaluation approaches for firewall (English Version)
Standard No.: GB/T 20281-2015 Status:superseded remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 30000 words Translation Price(USD):140.0 remind me the price change

Email:

Implemented on:2016-1-1 Delivery: via email in 1 business day

→ → →

,2020-11-1,2016-1-1,7736712216522E0E1432542416057
Standard No.: GB/T 20281-2015
English Name: Information security technology—Security technical requirements and testing and evaluation approaches for firewall
Chinese Name: 信息安全技术 防火墙安全技术要求和测试评价方法
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2015-05-15
Implemented on: 2016-1-1
Status: superseded
Superseded by:GB/T 20281-2020 Information security technology—Security technical requirements and testing assessment approaches for firewall
Superseded on:2020-11-1
Superseding:GB/T 20281-2006 Information security technology Technique requirements and testing and evaluation approaches for firewall products
Target Language: English
File Format: PDF
Word Count: 30000 words
Translation Price(USD): 140.0
Delivery: via email in 1 business day
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is drafted in accordance with the rules given in GB/T 1.1-2009. This standard supersedes GB/T 20281-2006 Information Security Technology Technique Requirements and Testing and Evaluation Approaches for Firewall Products. Compared with GB/T 20281-2006, this standard has the main changes as follows: ——The description of firewall is modified; ——Functional classification of firewall is modified; ——Requirements for high performance of firewall are added; ——Requirements for capacity of firewall to control the application layer are strengthened; ——The requirements of next generation Internet Protocol for the support capability are added; ——It is uniformly divided into basic grade and reinforced grade. This standard is proposed by and under the jurisdiction of National Technical Committee on Information Technology Security of Standardization Administration of China (SAC/TC 260). Drafting organizations of this standard: Ministry of Public Security Computer Information System Security Product Quality Supervision Testing Center, Venustech, Huawei Technology Co., Ltd., National Liberation Army Information Security Evaluation and Certification Center, Netpower, Beijing NetentSec, Inc., the Third Research Institute of The Ministry of Public Security Chief drafting staff of this standard: Yu You, Lu Zhen, Zou Chunming, Gu Jian, Shen Liang, Li Yi, Wei Xiang, Wang Guangyu, Lv Yingxuan, Wang Ping. The previous edition of this standard superseded by this standard is: ——GB/T 20281-2006. NATIONAL STANDARD OF THE PEOPLE'S REPUBLIC OF CHINA 中华人民共和国国家标准 GB/T 20281-2015 Information Security Technology - Security Technical Requirements and Testing and Evaluation Approaches for Firewall 信息安全技术 防火墙安全技术要求 和测试评价方法 1 Scope This standard specifies the firewall in terms of security technical requirements, testing and evaluation approaches and security grade division. This standard is applicable to design, development and testing of firewalls. 2 Normative References The following documents for the application of this document are essential. Any dated reference, just dated edition applies to this document. For undated references, the latest edition of the normative document (including any amendments) applies. GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation Criteria For IT Security - Part 3: Security Assurance Requirements GB/T 25069-2010 Information Security Technology - Glossary 3 Terms and Definitions For the purposes of this document, the terms and definitions established in GB/T 25069-2010 and the following ones apply. 3.1 Firewall Security gateway products which are allocated among security domains to control and filter the access to network layer and with the function of application layer protocol analyses, control and contents testing, which are applicable to IPv4 and IPv6. 3.2 Deep packet inspection It is based on flow testing and control technology of application layer and will obtain all the application program contents by reading IP packet loads and reconstructing the information of application layer and then it also deal with the contents depending on the policy of system definition. 3.3 Deep content inspection It is able to make a deep analyses for application protocol, identifies all elements therein (such as HTTP protocol, specifically cookie, Get parameters and Post form) and all the protocol service (such as data contents included in the protocol or documents in the business system interaction) and then analyze quickly the data to restore the original communicating information. It also can test whether threat or sensitive contents are included based on the original information. 3.4 SQL injection Its purpose is to cheat the server into doing malicious SQL command by inserting SQL command into submittal or page request parameters of web form. 3.5 Cross site scripting A type of injection, in which the malicious HTML code is injected into a web page by the malicious attacker. The HTML code will be executed when the user browses the page so as to realize malicious attack to the user. 4 Abbreviated Terms For the purpose of this document, the following abbreviated terms apply. DPI: Deep packet inspection DCI: Deep content inspection SQL: Structured Query Language XSS: Cross Site Scripting 5 Firewall Description The firewall is to establish security control points in security fields, analyze and filter data flow through firewall according to predefined access control policy and security protection policy, and provide controllable visit service request to the protected security field. The firewall protocol suite compatible with the next generation of net atmosphere supports not only IPv4 technology but also IPv6, IPv4/IPv6 transition technology. Firewall protected assets include the network service and resource under the protection of security policy as well as firewall itself and important internal data. The firewall is operated in the route or transparency mode and the network is categorized as security fields, in which the security policy is used for auditing and control of the service and visits. Figure 1 shows a typical operating atmosphere of firewall, which divides the network into intranet, extranet and DMZ. Intranet is a trusted region, extranet is an untrusted region and DMZ server may provide application services to the users in extranet and intranet.
Foreword I 1 Scope 2 Normative References 3 Terms and Definitions 4 Abbreviated Terms 5 Firewall Description 6 Security Technical Requirements 6.1 General 6.1.1 Classification 6.1.2 Security Grade 6.2 Security Requirements for Basic Grade 6.2.1 Security Function Requirements 6.2.2 Security Assurance Requirements 6.3 Security Requirements for Reinforced Grade 6.3.1 Security Function Requirements 6.3.2 Security Assurance Requirements 6.4 Environmental adaptation requirements 6.4.1 Transmission Mode 6.4.2 Next Generation of Internet Support (if any) 6.5 Performance Requirements 6.5.1 Throughput 6.5.2 Delay 6.5.3 Maximum Concurrent Connections 6.5.4 Maximum Connection Rate 7 Testing and Evaluation Approaches 7.1 Testing Environment 7.1.1 Security Function and Environmental Adaptation Testing Environment 7.1.2 Performance Testing Environment 7.2 Base Level Security Requirements Testing 7.2.1 Security Function Testing 7.2.2 Security Assurance Testing 7.3 Security Requirements Testing at Reinforced Grade 7.3.1 Security Function Testing 7.3.2 Security Assurance Testing 7.4 Environmental Adaptation Testing 7.4.1 Transmission Mode 7.4.2 Next Generation of Internet Support 7.5 Performance Testing 7.5.1 Throughput 7.5.2 Delay 7.5.3 Maximum Concurrent Connections 7.5.4 Maximum Connection Rate References
Referred in GB/T 20281-2015:
*GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements
*GB/T 25069-2010 Information security technology—Glossary
*GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
*GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements
*GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security
GB/T 20281-2015 is referred in:
*GB/T 37933-2019 Information security technology—Technical requirements of industrial control system dedicated firewall
Code of China
Standard
GB/T 20281-2015  Information security technology—Security technical requirements and testing and evaluation approaches for firewall (English Version)
Standard No.GB/T 20281-2015
Statussuperseded
LanguageEnglish
File FormatPDF
Word Count30000 words
Price(USD)140.0
Implemented on2016-1-1
Deliveryvia email in 1 business day
Detail of GB/T 20281-2015
Standard No.
GB/T 20281-2015
English Name
Information security technology—Security technical requirements and testing and evaluation approaches for firewall
Chinese Name
信息安全技术 防火墙安全技术要求和测试评价方法
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2015-05-15
Implemented on
2016-1-1
Status
superseded
Superseded by
GB/T 20281-2020 Information security technology—Security technical requirements and testing assessment approaches for firewall
Superseded on
2020-11-1
Abolished on
Superseding
GB/T 20281-2006 Information security technology Technique requirements and testing and evaluation approaches for firewall products
Language
English
File Format
PDF
Word Count
30000 words
Price(USD)
140.0
Keywords
GB/T 20281-2015, GB 20281-2015, GBT 20281-2015, GB/T20281-2015, GB/T 20281, GB/T20281, GB20281-2015, GB 20281, GB20281, GBT20281-2015, GBT 20281, GBT20281
Introduction of GB/T 20281-2015
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is drafted in accordance with the rules given in GB/T 1.1-2009. This standard supersedes GB/T 20281-2006 Information Security Technology Technique Requirements and Testing and Evaluation Approaches for Firewall Products. Compared with GB/T 20281-2006, this standard has the main changes as follows: ——The description of firewall is modified; ——Functional classification of firewall is modified; ——Requirements for high performance of firewall are added; ——Requirements for capacity of firewall to control the application layer are strengthened; ——The requirements of next generation Internet Protocol for the support capability are added; ——It is uniformly divided into basic grade and reinforced grade. This standard is proposed by and under the jurisdiction of National Technical Committee on Information Technology Security of Standardization Administration of China (SAC/TC 260). Drafting organizations of this standard: Ministry of Public Security Computer Information System Security Product Quality Supervision Testing Center, Venustech, Huawei Technology Co., Ltd., National Liberation Army Information Security Evaluation and Certification Center, Netpower, Beijing NetentSec, Inc., the Third Research Institute of The Ministry of Public Security Chief drafting staff of this standard: Yu You, Lu Zhen, Zou Chunming, Gu Jian, Shen Liang, Li Yi, Wei Xiang, Wang Guangyu, Lv Yingxuan, Wang Ping. The previous edition of this standard superseded by this standard is: ——GB/T 20281-2006. NATIONAL STANDARD OF THE PEOPLE'S REPUBLIC OF CHINA 中华人民共和国国家标准 GB/T 20281-2015 Information Security Technology - Security Technical Requirements and Testing and Evaluation Approaches for Firewall 信息安全技术 防火墙安全技术要求 和测试评价方法 1 Scope This standard specifies the firewall in terms of security technical requirements, testing and evaluation approaches and security grade division. This standard is applicable to design, development and testing of firewalls. 2 Normative References The following documents for the application of this document are essential. Any dated reference, just dated edition applies to this document. For undated references, the latest edition of the normative document (including any amendments) applies. GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation Criteria For IT Security - Part 3: Security Assurance Requirements GB/T 25069-2010 Information Security Technology - Glossary 3 Terms and Definitions For the purposes of this document, the terms and definitions established in GB/T 25069-2010 and the following ones apply. 3.1 Firewall Security gateway products which are allocated among security domains to control and filter the access to network layer and with the function of application layer protocol analyses, control and contents testing, which are applicable to IPv4 and IPv6. 3.2 Deep packet inspection It is based on flow testing and control technology of application layer and will obtain all the application program contents by reading IP packet loads and reconstructing the information of application layer and then it also deal with the contents depending on the policy of system definition. 3.3 Deep content inspection It is able to make a deep analyses for application protocol, identifies all elements therein (such as HTTP protocol, specifically cookie, Get parameters and Post form) and all the protocol service (such as data contents included in the protocol or documents in the business system interaction) and then analyze quickly the data to restore the original communicating information. It also can test whether threat or sensitive contents are included based on the original information. 3.4 SQL injection Its purpose is to cheat the server into doing malicious SQL command by inserting SQL command into submittal or page request parameters of web form. 3.5 Cross site scripting A type of injection, in which the malicious HTML code is injected into a web page by the malicious attacker. The HTML code will be executed when the user browses the page so as to realize malicious attack to the user. 4 Abbreviated Terms For the purpose of this document, the following abbreviated terms apply. DPI: Deep packet inspection DCI: Deep content inspection SQL: Structured Query Language XSS: Cross Site Scripting 5 Firewall Description The firewall is to establish security control points in security fields, analyze and filter data flow through firewall according to predefined access control policy and security protection policy, and provide controllable visit service request to the protected security field. The firewall protocol suite compatible with the next generation of net atmosphere supports not only IPv4 technology but also IPv6, IPv4/IPv6 transition technology. Firewall protected assets include the network service and resource under the protection of security policy as well as firewall itself and important internal data. The firewall is operated in the route or transparency mode and the network is categorized as security fields, in which the security policy is used for auditing and control of the service and visits. Figure 1 shows a typical operating atmosphere of firewall, which divides the network into intranet, extranet and DMZ. Intranet is a trusted region, extranet is an untrusted region and DMZ server may provide application services to the users in extranet and intranet.
Contents of GB/T 20281-2015
Foreword I 1 Scope 2 Normative References 3 Terms and Definitions 4 Abbreviated Terms 5 Firewall Description 6 Security Technical Requirements 6.1 General 6.1.1 Classification 6.1.2 Security Grade 6.2 Security Requirements for Basic Grade 6.2.1 Security Function Requirements 6.2.2 Security Assurance Requirements 6.3 Security Requirements for Reinforced Grade 6.3.1 Security Function Requirements 6.3.2 Security Assurance Requirements 6.4 Environmental adaptation requirements 6.4.1 Transmission Mode 6.4.2 Next Generation of Internet Support (if any) 6.5 Performance Requirements 6.5.1 Throughput 6.5.2 Delay 6.5.3 Maximum Concurrent Connections 6.5.4 Maximum Connection Rate 7 Testing and Evaluation Approaches 7.1 Testing Environment 7.1.1 Security Function and Environmental Adaptation Testing Environment 7.1.2 Performance Testing Environment 7.2 Base Level Security Requirements Testing 7.2.1 Security Function Testing 7.2.2 Security Assurance Testing 7.3 Security Requirements Testing at Reinforced Grade 7.3.1 Security Function Testing 7.3.2 Security Assurance Testing 7.4 Environmental Adaptation Testing 7.4.1 Transmission Mode 7.4.2 Next Generation of Internet Support 7.5 Performance Testing 7.5.1 Throughput 7.5.2 Delay 7.5.3 Maximum Concurrent Connections 7.5.4 Maximum Connection Rate References
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 20281-2015, GB 20281-2015, GBT 20281-2015, GB/T20281-2015, GB/T 20281, GB/T20281, GB20281-2015, GB 20281, GB20281, GBT20281-2015, GBT 20281, GBT20281