Font Size: a A A

Access Control Of The Security Data On The LAN

Posted on:2009-08-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y JiFull Text:PDF
GTID:2178360272957445Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, ISP provides Internet service daily consummate, therefore, many enterprises provide Internet entrance for different requirement, such as Email, OA, File transfer, Video NetMeeting and so on. Majority of enterprise's network manager has realized the INTERNET existence security problem when maintenance network, they will consider the purchase firewall, boundary protection invasion examination products, also will deploy the related product to internal viral and the terminal loophole when design enterprise's network. But diathesis difference of the network manager's and caused the attack often to come from internal. But the LAN of enterprise could not and need not like the encrypt network.In view of this problem, we have designed the terminal management system. Besides the current popular distributional firewall technology, we have profited from the HoneyWall technology, examines the terminal connection situation. Redirected the nonstandard connect requirement to the fort host and analyze these data packages. For to a terminal better management, the system has also provided the function of application procedure monitoring, the homepage monitoring and the document monitoring. It provides basis for analyzed the terminal the unusual situation.This article first introduces TCP/IP agreement as well as the threat from itself, and the network commonly used security technology, analyzes the enterprise local area network characteristic and the commonly used safe solution. It also refers to the terminal safety control system model which is based on internal problems. And bring forward the design details of each module. About the truncation package technology, has used SPI HOOK and NDIS the HOOK combinative technology, it can gain current terminal connection data packet effectively. Finally, this article mentions the layout model and the work to be completed.
Keywords/Search Tags:Connection Redirect, Terminal Security
PDF Full Text Request
Related items