Font Size: a A A

Network Security Architecture Based On The Campus Network Research And Design,

Posted on:2008-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2208360245979006Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Following the abroad application of computer internet technology, the security of internet is more important, as an opening system facing the people, computer internet is facing with the threaten and attack from different areas. So, building up the security system is a very important problem. The security of university's campus network is a huge system engineering, need keeping a lookout omni-directionally. It is not only passive to take precautions against, it only in this way, could obtain the initiative to go on voluntarily even more, make the network avoid the attack consciously or unconsciously.Based on the need of campus security system, aimed at the need of campus construction for Huaihai Institute of Technology, this paper provided the solving method for campus internet security, including virtual LANs technology and ACL to control and guarantee the operating system of the internet; firewalls technology as the basic security system of the campus internet; identification system as the users' identification, authorization and charge. Data collection, real-time control and the implementation of various internet charge strategies can guarantee the security of the system and standardize the internet conduction.The result of the actualization of this kind of system in Huaihai Institute of Technology digital campus indicates that firewalls could realize the security insulation between campus internet system and the outside, protect the campus essential information assets and internet groupware without affecting the system working efficiency. The building up of the internet conduction management system through identification system can standardize the users' behavior. The attack that is often suffered to campus network has tested the performance of the security system, and has analyzed the realization of the system.Finally, look forward to the online security of the computer on the basis of summarizing the full text.
Keywords/Search Tags:network security, threats and attacks, intrusion detection, firewall, virtual network, security management
PDF Full Text Request
Related items