Font Size: a A A

The Technical Research And Realization Of Mobile IP Traversing Firewall

Posted on:2007-04-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y X WangFull Text:PDF
GTID:2178360185450093Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the mobile communication technology and the Internet technology unceasing development, two kind of technologies mutually fused produce moved the IP technology. Moves IP although has the very widespread prospects for development, but does not have fully to obtain the application, the very important reason was moves in the IP application to meet the question. One of them was moves IP when passed through the firewall the firewall to block moved the IP tunnel, this not only for moved IP to bring the difficult problem, also gave the network the security to pose the very big threat. In order to realize moves IP to pass through the firewall at the same time to guarantee the network the security, this article proposed moves IP using the IPSEC technology protection to pass through the firewall the plan. This article analyzes moved IP to pass through the firewall the question and at present solution insufficiency, analyzed IPSEC to apply to moving IP the superiority, according to moved IP to pass through the firewall three kind of different situations to carry on the detailed design to this plan, finally simulated on Linux realizes moved IP to pass through the firewall the plan.First introduced moves IP the technology and its principle mechanism, as well as moves IP the characteristic and the entity, then produced moved the IP with difficulty large-scale application the reason;After that is carrying on the definition to the firewall concept, then the introduction moves IP to pass through the firewall the question, introduced the reverse tunnel passes through the firewall the method, when this method simultaneously exists moves IP passes through the security problem, then produced SKIP to pass through the firewall the plan and analyzes the SKIP plan the good and bad points, has produced the present paper based on the IPSEC thought;Applies based on this thought thorough research the IPSEC technology to moves IP to pass through the firewall plan, analyzes the IPSEC technology the concrete detail, the research moves IP to pass through the firewall the security problem, pointed out applies theIPSEC technology the superiority, has designed the IPSEC technology and moves the IP technology the union plan, unified the IPSEC technology and the firewall technology passes through for the realization has designed a safe platform.Then, based on applies IPSEC the thought, in detail designed moved IP to pass through the firewall the plan. The analysis moves IP to pass through the firewall the environment, with according to the motion pitch point in the non- foreign agent, the motion pitch point use identical security system foreign agent and the motion pitch point use separately did not design in the identical security system foreign agent's three kind of different situations moved IP to pass through the firewall the method. Finally produced moved IP to pass through the firewall plan the merit and the insufficiency, as well as waited for the solution question oFinally, simulates the motion pitch point on Linux to pass through the firewall the plan. First analyzes technology base Netfilter which the Linux firewall realizes the HOOK mechanism. Has produced the IPSEC firewall on Linux realization, through realized the IPSEC data packet to the firewall rule static state revision to pass through the IPSEC firewall. Then simulated the motion pitch point use identical security system foreign agent under the laboratory condition to correspond in the situation registration process with the hometown agent, and has realized the firewall rule tendency revision in this process. Realized in this foundation had IPSEC the protection motion IP to pass through the firewall the process. Finally to had IPSEC the protection the motion D? data packet transmission efficiency to carry on the test and the analysis.
Keywords/Search Tags:Mobile IP, Firewall, IPSEC
PDF Full Text Request
Related items