Font Size: a A A

Design And Implementation Of Session Count Limit Firewall System Based On Access Control List

Posted on:2013-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:S H KeFull Text:PDF
GTID:2248330392957246Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The internet from birth to now, has gone through numerous changes. Every changegave endless changes in people’s lives. It promoted the exchange of information, greatlyimproving the work efficiency, and enriched people’s spiritual life, have brought greatconvenience to people living and working. At the same time, the Internet in the developmentprocess to bring a new problem-network security. Network security issues have becomeincreasingly prominent placed in front of the wide variety of users, network security hasbecome one of the most popular on the Internet focus, it relates to the further developmentand popularization of the Internet, or even related to the survival of the Internet.A hot topic of network security is how to ensure legal access and control unauthorizedaccess at the same time. Firewall as the earliest and the largest use of network securityproducts, welcomed by users and many R&D institutions. The firewall can protect thenetwork system, by monitoring the information flowing through its network in order toachieve security. In this paper, an effective solution to deal with the hot topic of the above-tobuild a session restricted firewall system based on access control list. Establish a layer ofpacket filtering firewall between the communicating parties, by analyzing the data packetheader information and then decide that the packet is forwarded or discarded.Session count limit system allows the users configured some of the commands on therouter equipment in advance, these commands is called a session count limit policy, thenthese policies determine whether the packet through the router equipment. The routerequipment compared the header information of forward packets and user-configuredpolicies. If the information is consistent with this policy, forward the packet, otherwisediscard the packet, and then do other actions. Just so you can effectively control thenumber of users access the network and effective solution to network security issues raisedabove.
Keywords/Search Tags:Network security, Firewall, Access control List, Session count limit
PDF Full Text Request
Related items