Font Size: a A A

Application Of Distributed Firewall In The Digital Campus In Information Security

Posted on:2016-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:K ChenFull Text:PDF
GTID:2308330473454558Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the construction and development of digital campus, network information security has become increasingly prominent, in order to guarantee the security of the network, there are many security protocols and technology has been widely used, the firewall technology is one of the most basic, the most widely used. Because the traditional perimeter firewall, a single point of failure and performance bottleneck disadvantage, topological structure andneed to rely on the network to implement the security policy, the defects of traditional firewall becomes more obvious. Distributed firewall is in the background. We by distributing the firewalls to certain protected host, thenthe distributed firewall can solve the problems of single point failure andperformance bottleneck. This paper presents a distributed firewall based onmodel of proxy server in the analysis of research status of distributed firewall. Through the application of proxy server proxy firewall which wereon different servers to implement the protection. Finally, through the Linux platform, the design and implementation of an instance of the distributed firewall model.1. The traditional digital firewall system is analyzed, and the disadvantages of the traditional digital firewall are summarized.2. The existing distributed firewall system is analyzed, and the model of the whole distributed firewall system is established through the relevant reasoning.3. The distributed firewall system is designed based on PISec principle, and the performance of the system is simulated and it meets the practical requirements.4. According to the need of the system, the design of the distributed proxy firewall and the design of the firewall simulation, found the design of the firewall can be a good implementation;5. The system has been tested and the results are good.
Keywords/Search Tags:policy anomaly detection, SSL protocol proxy firewall, firewall Pisec, KeNyote
PDF Full Text Request
Related items