网络教育学院 本 科 生 毕 业 论 文(设 计)
需要完整版请点击屏幕右上的“文档贡献者”
题 目:防火墙技术的分析与研究 防火墙技术的分析与研究
I 内容摘要
针对目前面临的网络安全问题,对网络安全和防火墙的基本概念进行了概括。防火墙是一种访问控制技术,它通过在某个机构的网络和不安全的网络之间设置障碍,阻止信息资源的非法访问。又系统地阐述了主机网络防火墙的工作原理和关键技术。分析了防火墙技术在Internet安全上的重要作用,并提出其不足之处和解决方案,阐述了防火墙发展趋势。本文通过对防火墙历史的发展和定义的描述,着重讲防火墙技术上可分为四种基本类型(包过滤型、网络地址转换—NAT、代理型和监测型),以及防火墙应用的重要性。
关键词:防火墙;防火墙技术;防火墙技术分析;防火墙技术应用防火墙技术的分析与研究
II 目 录
内容摘要 ····························································································· I 引 言 ······························································································· 1 1 概述 ······························································································· 2 1.1 背景 ······················································································· 2 1.2 本文的主要内容及组织结构 ························································· 2 2 防火墙技术的优缺点 ········································································· 3 2.1 防火墙技术 ·············································································· 3 2.1.1 防火墙的定义 ··································································· 3 2.1.2 防火墙的功能 ··································································· 3 2.2 防火墙的优缺点 ········································································ 3 3 防火墙的基本类型及发展 ··································································· 5 3.1 防火墙类型 ·············································································· 5 3.1.1 包过滤型 ········································································· 5 3.1.2 网络地址转化一NAT ·························································· 5 3.1.3 代理型 ············································································ 5 3.1.4 监测型 ············································································ 6 3.2 防火墙的发展 ··········································································· 6 4 防火墙在网络安全中的应用 ································································ 7 4.1 防火墙在校园网络中的应用 ························································· 7 4.1.1 校园网络安全分析 ····························································· 7 4.1.2 校园网防火墙网络安全策略 ················································· 7 4.2 防火墙在企业网络中的应用 ························································· 8 4.2.1 企业介绍 ········································································· 8 4.2.2 企业网络安全分析 ····························································· 8 4.2.3 企业网防火墙网络安全策略 ················································· 9 5 结论 ····························································································· 11 参考文献 ··························································································· 11 防火墙技术的分析与研究 1 引 言
随着网络经济和网络社会时代的到来,网络将会进入一个无所不在的境地。经济、文化、军事和社会活动将会强烈地依赖网络,作为国家重要基础设施的网络的安全和可靠将成为世界各国共同关注的焦点。针对目前的网络情况,如何解决网络的稳定运行问题刻不容缓,在考虑了多种防护手段后,应该来说防火墙是最简单也是最有效的解决方案。但是防火墙是死的,影响网络安全的问题却是在不断的变化的,如何能够用防火墙真正合理的解决网络问题,不是一个产品的简单选择问题,更为重要的是如何把产品的功能发挥出来,以适应不断变化的网络安全问题。本文阐述了防火墙技术以及黑客常用攻击手段和工具,对防火墙在网络安全中的应用进行了分析。防火墙技术的分析与研究
2 1 概述 1.1 背景 1.2 本文的主要内容及组织结构
本文主要对防火墙技术相关理论及应用进行探讨。 本文的组织结构: 全文共分五章。 第一章,主要是介绍防火墙的背景及文章的组织结构。 第二章,介绍防火墙的技术的概念及防火墙的优缺点。 第三章,介绍防火墙的基本类型及防火墙的发展趋势。 第四章,介绍防火墙在网络安全中的应用。 第五章,对论文进行总结概述。防火墙技术的分析与研究
3 2 防火墙技术的优缺点 2.1 防火墙技术
2.1.1 防火墙的定义
图2.1 防火墙示例 2.1.2 防火墙的功能 防火墙应该具有以下5大基本功能: (1)过滤进、出网络的数据。 (2)管理进、出网络的访问行为。 (3)封堵某些禁止行为。 (4)记录通过防火墙的信息内容和活动。 (5)对网络攻击进行检测和告警。 2.2 防火墙的优缺点 (一)防火墙的优点。 (1)防火墙能强化安全策略。因为Internet上每天都有上百万人在那里收集信息、交换信息,不可避免地会出现个别品德不良的人,或违反规则的人,防火墙是为了防止不良现象发生的“交通警察”,它执行站点的安全策略,仅仅容许“认可的”和符合规则的请求通过。 (2)防火墙能有效地记录Internet上的活动。因为所有进出信息都必须通过防火墙,所以防火墙非常适用收集关于系统和网络使用和误用的信息。作为访防火墙技术的分析与研究 4 问的唯一点,防火墙能在被保护的网络和外部网络之间进行记录。 (3)防火墙限制暴露用户点。防火墙能够用来隔开网络中一个网段与另一个网段。这样,能够防止影响一个网段的问题通过整个网络传播。 (4)防火墙是一个安全策略的检查站。所有进出的信息都必须通过防火墙, 防火墙便成为安全问题的检查点,使可疑的访问被拒绝于门外。 (5)防火墙能有效的防止内部信息的外泄。通过利用防火墙对内部网络的划分,可实现内部网重点网段的隔离,从而限制了局部重点或敏感网络安全问题对全局网络造成的影响。再者,隐私是内部网络非常关心的问题,一个内部网络中不引人注意的细节可能包含了有关安全的线索而引起外部攻击者的兴趣,甚至因此而暴漏了内部网络的某些安全漏洞。使用防火墙就可以隐蔽那些透漏内部细节。了安全作用,防火墙还支持具有Internet服务特性的企业内部网络技术体系VPN(虚拟专用网)。 (二)防火墙的不足之处。 (1)不能防范恶意的知情者。 (2)不能防范不通过它的连接。 (3)不能防备全部的威胁。