Font Size: a A A

The Solution Of Distributed Firewall System's Terminals Host Strategy Document Been Broken

Posted on:2009-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:R Q WangFull Text:PDF
GTID:2178360245986764Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The traditional boundary firewall only provide the protection to the internal network.The boundary firewall only carry on filters and examines to the data of enter the internal local area network,but this kind of firewall certainly cannot guarantee the safe visit between the user of internal network.In the actual network application, The majority attacks and nonlicet visit all comes from inside.The boundary firewall being at a loss when it copes with the threat from internal network.Next,The network is easy to produce the bottleneck and the simple point breakdown hidden danger because the boundary firewall concentrates the inspection mechanism at the entrance.From the network performance angle analysis,the firewall is easy to become the bottleneck of the network.Based on this,Inner Mongolian TV& Radio University has used a kind of new firewall technology - Distributed Firewalls.It may solve the insufficiency of the boundary firewall,the Distributed Firewalls does not installs the firewall to each host,but,Extends the firewall safety system to the network in each host.On the one hand,this technical guarantee user's investment cannot be very high,on the other hand,this technology brings the safe protection which to the network is extremely comprehensive.In the Distributed Firewalls,the strategy server is playing the count for much role, its main function is distributes the strategy document and compiles the diary information.When the strategy server's strategy file updating,the corresponding host will promptly download the new strategy document and carries out the new strategy. But,at some terminal host's strategy document encounters the illegal destruction or has the problem.The strategy server is unable promptly to discover such question.In this period of time,this host has the possibility by other user illegal visits,thus poses the threat to the network security.This topic mainly aims at this question to propose the solution,enhances the network security.Finally,the paper on the development of summary also be the subject of further study and improve aspects of the paper.
Keywords/Search Tags:Distributed, Firewalls, Patrol server, RUP, strategy rule
PDF Full Text Request
Related items