Font Size: a A A

Design And Implementation Of A Remote Firewall Management System

Posted on:2002-11-06Degree:MasterType:Thesis
Country:ChinaCandidate:J L ZhangFull Text:PDF
GTID:2208360032951235Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The motive for designing and implementing this system is to manage several kinds of security technology of distributing firewall system centrally and effectively. In Chapter 1, I make a simple recommendation of the two most primary kinds of firewall technology, which are Packet Filter and Application Proxy, on working principle, criterion of rules drawing, and the contrast between their security performance. I also analyze the present status of firewall architecture in this chapter, thereby explain the reason I came out the idea to implement this remote management system. In the last part of Chapter 1, I introduce several famous security products on firewall management home and abroad.The basic approach of the design of this system is to adopt client/server mode and centrally manage several firewall hosts located in different control nodes by network. For the useful data need to be transported through network, cryptology technology must be used to protect all kinds of management information from vicious attack. At the same time, authentication technology should be used to prevent unauthorized users from running this system and obtaining unlawful benefit. In order to help you understand the content of these two aspects in remote management system's design and implementation. A recapitulative introduction of these two kinds of security technology is given in Chapter 2.The main two tasks of designing and implementing this system is to develop a kind interactive interface for security administrators and to design and implement authentication module and secure data transportation module to ensure the security of management system itself. In Chapter 3, I first give an overall introduction to the logical structure of this system, and then give thorough illustrations for the design and implementation of each function module of this system.In Chapter 4 of this paper, I advance some personal suggestion for further research and development of firewall remote management system, including strengthening the security of management system, examining the consistency of control rules, enlarging the range of managing, configuring rules transparently and so on. I believe that all these suggestions will benefit the further research of firewallremote management system.I give a summary to the whole thesis in Chapter 5.
Keywords/Search Tags:Firewall, Remote Management, Authentication, Cryptology, Kerberos Protocol
PDF Full Text Request
Related items