Font Size: a A A

Security Technology Applications And, In The Router

Posted on:2002-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:W M LiFull Text:PDF
GTID:2208360032953710Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the fast development of Internet technology, there is a large raise of the products of connecling network such as repeater and routers. With wide use of network technology, there are more hackers in all over the world. Their inbreaking ways are more advanced. The people care about security of network because the network is attacked more and more. A router is a product of connecting network. It is between lntranet and Internet It is a necessity of path about message stream in/out It is the first station of security. Security has become the most key question about design of router. The thesis first introduces the software and hardware environment of router and uses three securities technology in router. They are information flftenng, safe authentication and data secret. The emphasis is information fll~ring. Now, it analyzes the theory of access-list, configure policy and implementation of four access-lists (standard access list, extend access list, second layer access list and reverse access list) and the paper analyses the theory of DHCP proxy and implementation. The last, it introduces how to test them.
Keywords/Search Tags:router\access-list\DHCP proxy
PDF Full Text Request
Related items