Font Size: a A A

Vpn-based Np Hardware Firewall

Posted on:2008-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:J LeiFull Text:PDF
GTID:2208360212475211Subject:Information security
Abstract/Summary:PDF Full Text Request
As the rapid development of internet, the internet bandwidth keeps on growing.Followed by more and more new network techniques, increasing emphasis is paid onthe long development cycle and upgrade difficulty of the earliest technologies such asASIC. A new technology called Network Processor (NP) was presented. To adapt thehigh speed modern networks, the NP is hardware optimized especially for the networkdata processing. Meanwhile, it is programmable and thus can be upgraded quickly toapply new network technologies and applicatoins.VPN means the virtual private network. It is a safe and steady tunnel that goesthrough the jumbled common internet. Through encapsulating and encrypting thenetwork data, building a tempory and safe link in the common network, it can make theprivate data transport safely in the common network. Generally, VPN extends theintranet. It can be used to build a believable safe link between the intranet and thelong-distance user, embranchment office, business partner and so on.VPN which is based on Intel NP hardware firewall is discussed in this paper. It canbe divided into four parts.The background technology of VPN is introduced in the first part (the 2ndchapter), including firewall, NP and the basic knowledge of VPN. Something about thedefinition, development and the usage is given the background knowlogde for thedesign later.The flat of the VPN is introduced in the second part(the 3rd chapter). It describesthe system architecture including hardware structure, firewall structure and the flowchart.What the author did in the project is described in the third part(the 4th and the 5thchapter). The theory of VPN is discussed in the forth chapter, include the problems thatshould be considerate in the design of VPN, the choice of security protocol, encryptchoice of IPSec and the compatibility between VPN and NAT. The implementation ofVPN is discussed in the fifth chapter. The details of VPN based on the firewall isdescribed in this part. The conclusion of the paper is in the fourth part (the 6th chapter). Thecharacteristics and the disadvantages of the VPN is described in this part, and theimprovement suggestions and raised issues which need to be further studied also begiven in this chapter.
Keywords/Search Tags:NP, Firewall, VPN, IPSec
PDF Full Text Request
Related items