• 热门标签

当前位置: 主页 > 航空资料 > 国外资料 > ICAO >

时间:2010-07-21 23:20来源:蓝天飞行翻译 作者:admin
曝光台 注意防骗 网曝天猫店富美金盛家居专营店坑蒙拐骗欺诈消费者

cnmiir~rriicario~se~nse ice is pmvirled to its user (i.c. rl~er ipper
(to be developed) 1cij.ers) l'iu the tri~nsporrl ajer sen:ice intetfuce.
3.6.1.1 An ATN end system (ESI shall he capable of
supporting the ATN Internel including the:
3.6 ATK COMMUNICATION SERVICE
REQUIRERZENTS a) trazispott layer; and
Note.- Tile ,473' comn~rrnicntion sen9ir.e i~q~lirl~nicnts h) network laycr.
dcfirze the reqrrirements for layns 3 thmlr,qh 6, as 1i~,11 ns port
of l a y r 7. of the OSI rcfer~nce rizodel. Tl7esc spr-vices rake 3.6.2.2 An ATN intermediate syslern (IS) shall support
ii!fornirrrion prodlrced b?. uile of tl~e itldividr~al A7hf the ATK network layer provisions as appropriate to [he class of
crp~~licationsa nd perfoi-rn the t.1~1-tu-enclc unrn~rri~icurioii ,Am IS under considcration.
Annex 10 - Aeronautical Telecontrnunicalions Volume ZZZ
Note.- A nnmber of diflerent classes uf ATN intermediute 3.9 ATN SECURITY REQUIREMENTS
systents for ivlzich nehvork l r ~ y ~prro files are defined art
cur~tuinedi n Doc 9705, ,.Rzb-~~o/wtKw 3.9.1 Thc sccurity of the ATN shall be achicvcd based on
a combinalion of technical. provisions, local. physical security
measurcs, and procedural securlty measures.
3.7 ATN NAMING AND ADDRESSING Note I.- The technical provisions jor ATN security are
REQUIREMENTS defined in Doc 9705, and the plzysical and proced~rral s c c ~ c r i ~
nrensures art defined in Annex 17 and the Securit! Manrral.
Nore.- The ATN naming and addressing scheme suppmrts
the principles of ~rnambiguolrs identijication of informution Note 2.- Sorpport for the ATN secrcri? sewices technical
0hjec.t~ und global address stanllanlization. prcn.isions nzay be reqllired on u Stare or rc,yional basis.
3.7.1 Thc ATX shall provide provisions for application
entity naming. 3.9.1.1 Recommendatioa- The follo~ingp hysical and
pt-ocedural techniques sholikf be used to prn~liclr securhr for " "
3.7.2 The ATE shall provide provisions for network and ATN end svstems, intermediate systems, network managers,
transport addressing. d i r ~ , c t ose~n versa nd subnetvi:orks:
Note.- The technical provisions for ATN applicalinrz entity
naming are de$tled in Doc 9705. Sub-volume IC: rhe provisions
for network and rrmsport addressirzg crre de$ned in
Sub-volrrrne C: and tlze provisions for registration services arc
drfined in Sub-voh~n~IXe of the same document.
3.8 ATN SYSTEMS hlANAGEMENT
REQUIREMENTS
Norp I.- Tlze ATN systenzr tnanagement (SMJ application
provides the capahrlip for an SM manager to exchange
informatron n.ith atz SM agent and/or- ntzother SM manager
u) r~stricted physical access to ATN end systems.
intermediate systems, SM workstations, d~rectov
servers and subttet~vork swvitches, rletwork nlcmnugprs,
and oth~res senli~zln etwork sub svstems;
b) restricted ZlSEr access to ATN en,d systems, inremediate
sytcrns, direct09 servers and SM ivork,rtations to only
authorized personnel; and
c.) non-rrse, or restricted use. of remote access to ATh'
ground end sysrem, itztermediate systems and SM
it~orkstations.
Note 2.- Support for the ATN S,W senices technical 3.9.2 ATN security policy
provisinn.~m y b e requircd on a Srnte or regional basis.
Note.- Cotilm~rnicariorm~ onitoring and third parry ~rgfic
3.8.1 ~h~ ATN he capable of supporting the analysis do not constitute safety hazards and are not
following syslcms management application functions: considelad seclrrih thrc.ats.for the ATSC. Ho~level;s ome ATS
atldor tzorl-ATS user-T and applications mny have local, or
a) fault rnanagemcnt; or,yuni:ational, policies wherein uommunicarion monitoring
atzd third part), trafic analysis w~otild be considered securiv
b) configuration management; rhrears based on other concerns, such as cconornic
considerations.
c) accounting management;
d) perfonnance managernenl: and
3.9.2.1 ATS messages shall be protected from
masquerade, tnodification and replay.
e) security management. not^ J. - Tlzis rtleans that jor data messages exchanged
amon,? ATN etltilies there will b~ u high level of ass~cran.ceth at
Note.- The tec/rtzicol prolisiorls ,for ATN Sy1ern.s a nztssage comes fro111 lvhere it claitns, hus ?tot been tampered
Mnr~agemenr urc. defined in Doc. 9705, Sirb-volnme k?. wirh, nnd is not u repeat oj-an obsolete message.
3.8.1.1 AT?; end systems and intermediate sys~cms [hat Note 2. - The level of pmtecrion may van. b?. tlze cpe of
suppurt lhc ATN systems management application and Shl secr~riy threat and /?I- the level of ilTN secur-iv service
managcrs sllall support access to managed objects. seiected by the riser mr application process.
Note.- Thlc SM application rnirrlogc~ol bject d~j7nitimn.as nd 3.9.2.2 A request for protection of ATS messages shall be
 
中国航空网 www.aero.cn
航空翻译 www.aviation.cn
本文链接地址:附件10--航空电信an10_v3_1ed_amend_78(3)