Font Size: a A A

Design And Realization Of Security Scheme For Campus Network In Colleges And Universities

Posted on:2015-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:L Y DingFull Text:PDF
GTID:2278330470973136Subject:Software engineering
Abstract/Summary:PDF Full Text Request
This paper takes Chengdu Neusoft University as an example, discusses the design and implementation of campus network security solutions. The school currently has more than 9000 students, each student have a laptop since reach the school, coverage rate reached 100%. In order to meet the needs of students and teachers huge information access requirements, the Institute completed the network infrastructure is relatively complete in the first period, in 2003 the network access point has reached 23000, with the expansion of enrollment, the number of students in college at present from 1900 in 2004 rose to more than 9000 people now, design of campus network has begun to change to tens of thousands of students. With the development of national education departments and the competent administrative department of network safety control is more and more higher, the Chengdu Neusoft University in network information security, network security, network virus prevention and control operation, Internet behavior management, network login log, access authentication request more and more high, in 2011 with the Chengdu Neusoft University from the College Upgraded to undergraduate, campus network network security transformation and upgrade has become a must, the security scheme design and realization are also put on the agenda.In this paper, the network structure of the Chengdu Neusoft University are summarized, A plurality of connection, network topology, user access management, application program, the operating system from a physical vulnerability and operation service system, analyzes the risk system faces, put forward the goal of construction of system safety requirements, On this basis, draw out the network security design, safety design include: physical structure and physical security construction, using physical isolation of the VLAN division based on access control, setting and network behavior management, routing network performance monitoring system for real-time control strategy; Design and application of the security framework: 802.1x Certification System Certification Implementation Based on the domain name system is safe, implementation, implementation of Apex Tekview network management and service management system, network anti-virus system, spam and virus mail filtering system; Data security: upgrade the operating system security, data backup and disaster recovery, network data server virtualization system, traffic monitoring and logging, log audit system construction; Human factors: how norms through institutionalized, systematic, standardized system operators to operate and daily use behavior of network users, to set up the operation system requirements. Finally, according to the steps of the implementation of the program are given.
Keywords/Search Tags:Network topology, VLAN classification, Safety design, Safety code
PDF Full Text Request
Related items