Font Size: a A A

Research And Design Of Power Enterprises Information Network Firewall

Posted on:2011-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:J HuFull Text:PDF
GTID:2178330338488605Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Along with the development of the Internet, the network safety became a topic that focuses attention increasingly, resource sharing is a pais of antinomies with the information safety.Power system security is the foundation of stable development of the politics and economics,how to guarantee the safety of electric power information network is an important issue of power system construction.The firewall conduct and actions is a kind of access control technique, establishing obstruction between the network of a certain mrvhsnidm and the network of the insecurity, arrestment to the illegal access of the information resource.The Linux conduct and actions a source code open with the free operating system, the kernel is improving continuously, the function provide also become well.The Linux kernel provided a strong abstraction,universal to turn of used for the function framework that carries out the data packet filtering,the data package, packet transaction,NAT etc., the implementation of that framework a statures of the definition function is the packet filtering subsystem.BE the Netfilter ratio that 2.4.0 above kernels provide particularly before any firewall subsystems of the version Linux kernel all wanted perfect and strong, even can carry out the status detection.In this paper firstly analyzes the network security situation and the electric power information network safety ,according to the demand of electric power enterprise security,giving a design scheme based on the packets filtrationg module in the Linux kernel ,which is fit for the small electric power information network security .After the introduction of Linux firewall's knowledge ,study the Linux and the module of Iptables nucleus of the Linux kernel on the understanding of the theories ,to the understanding that sets up a LINUX firewall to have a root.Complete the general design of the whole firewall finally.At the end of the paper, made an outlook to the work of this paper.
Keywords/Search Tags:network security, power enterprise, information network, firewall, Linux, Iptables
PDF Full Text Request
Related items