Font Size: a A A

Design And Implementation Of Enterprise Network Security Based On Firewall

Posted on:2016-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:J L LiuFull Text:PDF
GTID:2298330467495576Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Computer network information come when you least expect them to slowly seepinto our work and study, became an integral part of, but no matter how good thesystem will get sick, so network security is also need our attention. As one of thewidely used network security, firewall, solved many security hidden danger for us. Itcan be seen as a protective barrier to shield the outside world brought in illegalinformation data or interfere with the software, to ensure that the final into user islegal in the network information security. It is made up of hardware and softwarefacilities with a protective task, the outside world into needs through a firewallfiltering, through the protective barrier after security information is allowed.This article through to the domestic and foreign current situation of research, themethods of comparing typical case analysis, based on use of enterprise networksecurity firewall system design are analyzed and the research, a simple overview ofthe existence of firewall technology background and the advantages anddisadvantages, as well as the current research status at home and abroad; Firewalltechnology for the main overview, including the definition and the connotation,technical means, action principle and development trend, and an example is analyzedto assess, closely focusing on the safety and functional discussion; Correspondingdesign design process through the analysis of the module and use the new type offirewall technology, layer3switches and technology security strategy research;Designed based on the enterprise security the network architecture of firewalltechnology, and according to the user’s actual needs, designed and implemented a client software, the software can undertake safety regulation of enterprise network,including intercept blacklist management, system Settings, LAN monitoring threecore function module, to the enterprise internal network real-time intelligent securitymonitoring. After completing the system design, by building the simulation platformto test its safety, including qualitative and quantitative testing, under the specificdivided into security and performance, to verify that the system can realize and ensurethe performance.
Keywords/Search Tags:Firewall, Firewall technology, Network information security
PDF Full Text Request
Related items