Font Size: a A A

Design And Implementation Of Access And Control Gateway’s Configure System

Posted on:2013-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:Z YuanFull Text:PDF
GTID:2248330371966557Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous development of network technology, The links between people and Interactive information has been more closely. Network bring people to facilitate, it is more and more threatened by a variety of reasons. Network security has been more attention. People use the network is secure, has become a major concern. Network access control technology is currently in the latest network informationsecurity field direction. This article describes the access controller is the application of this technology. It is used to protect the user’s local area network in which to attack from outsiders. It also plays on the internal control personnel to prevent the external network tointemal staff deliberately leaked the secret. Based on the above introduction, this paper completed the following aspects of work:1. This paper showed the actual environment in which the access controller, and an impact mechanism. It is in the internal network and external networks which is different from the firewall, it can be seen as a bridge2. The system was introduced under the winlogon and GINA, and then describes the relationship between winlogon and GINA. To in-depth introduction to the windows system registry principle, the log in the windows system bootauthentication implementations, discusses the key technologies used by them, that usbkey technology. Analysis of the benefits of using the MingWah ekey, the main parameters are given ekey indicators.3. The paper discussed the access controller’s core technology, the raw socket under linux-based capture technology, protocol analysis and data to do a detailed study ofrecombinant technology. In order to have an intuitive impression, get this paperfrom the MAC frame to the analysis of the top protocol access controller set to show the actual process.4. Design and Implementation of the access control security policy configuration interface. Traditional B/S structure which is the "thin client, fat server" can no longer meet the user’s request. Users can achieve asynchronous AJAX requests, reducing the burden on the network data transmission. EXTJS is AJAX-based RIA, by using the page components to complete the construction.Efsframe is then encapsulated EXTJS framework to enable users to use more convenient. Lightweight interface to back-end application framework struts, lowerdevelopment costs increase development efficiency. The Access Controller use https, This can make secure authentication server.
Keywords/Search Tags:Access Controller, raw socket, usbkey, Configuration interface
PDF Full Text Request
Related items