Font Size: a A A

The Research And Realization Of Embedded Firewall Based On Arm Technology

Posted on:2011-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:X B HeFull Text:PDF
GTID:2198330332474065Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularization of computer applications and the rapid development of network, the network security is becoming more and more important. At the same time,network firewok as one of the network security technologies has been developed greatly too. But the traditional boundary network firework only works on the network boundary, which can not protect the communication in the inside network, and the whole inside netwok will be exposed once the traditional boundary network firework fails.Network security policy of Embedded Firewall does not depend on network topology, which overcomes the disadvantage of the traditional boundary network firework relying on the network topology and the disadvantage of impacting on network performance greatly. Each host does not trust any other host, and all of the data stream will be filtered and protected, which overcomes the problems those the traditional boundary network firework can not protect against internal attacks and the single point of failure.Firstly, the research background of the network firewall is introduced in this paper; secondly, propose the overall design of the embedded firewall which based on ARM processor; thirdly, the hardware and software of the embedded firewall which based on ARM have been designed and been implemented respectively. The firewall system use S3C44B0X as the central processor,transplante U-Boot,μClinux operating system, Romfs file system, Freeswan and iptables,and programme a driver of the network interface controller. We also programme firewall configurator running on the windows operating system and build a log servers. And then, test the function of the embedded firewall based on ARM. The test results show that:Embedded Firewall work very well on network traffic filtering and protection. Finally, summarize this paper and propose some issues wothy of studies based on this article.
Keywords/Search Tags:Embedded Firewall, ARM, Packet filtering
PDF Full Text Request
Related items