| Nowadays, as the network is used more widely, the network technique becomes more open and the network environment becomes more complicated, important problems have shown, such as how to avoid illegal network invasion, network attack, url data leak and so on. To address the network safety need of medium-sized and small enterprises and gain network protection measures with the minimum price, the Unified Threat Management equipment had been introduced. The Network Security equipment could provide multiple applications on one equipment and greatly reduce the enterprise cost, which is also very easy to use.According to the research results, the biggest proportion lies in the connected users in communication, the system mainly rely on the connection tracking technology of Netfilter open source tools in protocol stack of linux system, for the connected users, it doesn't use the protocol stack process to handle the packet, but provide basis for special application and function of Network Security.Since the prosperity of open source software ,it has become possible to build the system using open source software. The basic operating system of this system used linux operating system, the software build environment is open source system Fedora, the compiler is open source software GCC complier and the edit tool is open source software VIM. There are several advantages of using open source software. First, it lowers the risk, because the customer could control the tools that severely affected their own business. The quality is more reliable than other business software. The quality is ensured because of more effective development mode, more double review of the codes from separate people and the great pride of most the author for their products. The transparency is avoid though some private software has many dark corners and hidden bugs. The source code is very important for checking errors and understanding the operating principles of the product. In big software companies, only few people have access to the source code, but the users usually can't contact these people who know the source code. It is very important to have access to the source code as to fix the security flaw. Good products could also be built based on open source system. |