2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc
《2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc》由会员分享,可在线阅读,更多相关《2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc(25页珍藏版)》请在三一办公上搜索。
1、西 南 交 通 大 学毕业设计(英文翻译)Firewall and Proxy Server HOWTO防火墙和代理服务器指南年 级: 学 号: 姓 名: 专 业: 计算机科学与技术指导老师: 二零零八年六Firewall and Proxy Server HOWTOMark Grennan, mark v0.80, Feb. 26, 20002. Understanding FirewallsA firewall is a structure intended to keep a fire from spreading. Building have firewalls made of bri
2、ck walls completely dividing sections of the building. In a car a firewall is the metal wall separating the engine and passenger compartments.Internet firewalls are intended to keep the flames of Internet hell out of your private LAN. Or, to keep the members of your LAN pure and chaste by denying th
3、em access the all the evil Internet temptations. ;)The first computer firewall was a nonrouting Unix host with connections to two different networks. One network card connected to the Internet and the other to the private LAN. To reach the Internet from the private network, you had to logon to the f
4、irewall (Unix) server. You then used the resources of the system to access the Internet. For example, you could use Xwindows to run Netscapes browser on the firewall system and have the display on your work station. With the browser running on the firewall it has access to both networks.This sort of
5、 dual homed system (a system with two network connections) is great if you can TRUST ALL of your users. You can simple setup a Linux system and give an account accounts on it to everyone needing Internet access. With this setup, the only computer on your private network that knows anything about the
6、 outside world is the firewall. No one can download to their personal workstations. They must first download a file to the firewall and then download the file from the firewall to their orkstation.BIG NOTE: 99% of all breakins start with gaining account level access on the system being attacked.Beca
7、use of this I dont recommend this type of firewall. It is also very limiting.2.1 Firewall PoliticsYou shouldnt believe a firewall machine is all you need. Set policies first.Firewalls are used for two purposes.1. to keep people (worms / crackers) out.2. to keep people (employees / children) in.When
8、I started working on firewalls I was surprised to learn the company I worked for were more interested in spying on their employees than keeping crackers out of their networks.At least in my state (Oklahoma) employers have the right to monitor phone calls and Internet activity as long as they inform
9、the employees they are doing it.Big Brother is not government. Big Brother = Big Business.Dont get me wrong. People should work, not play at work. And I feel the work ethic has been eroding.However, I have also observed that management types are the biggest abusers of the rules they set. I have seen
10、 hourly workers reprimanded for using the Internet to looking for bus routesto get to work while the same manager used hours of work time looking for fine restaurants and nightclubs to take prospective customers.My fix for this type of abuse is to publish the firewall logs on a Web page for everyone
11、 to see.The security business can be scary. If you are the firewall manager, watch your back.How it create a security policyI have seen some realy high folutin documentation on how to create a security policy. After many years of experence I know now say, dont believe a word of them. Create a securi
12、ty policy is simple.1. describe what you need to service2. describe the group of people you need to service3. describe which service each group needs access to4. for each service group describe how the service should be keep secure5. write a statment making all other forms of access a vialationYour
13、policy will become more complicated with time but dont try to cover to much ground now. Make it simple and clear.2.2 Types of FirewallsThere are two types of firewalls.1. Filtering Firewalls that block selected network packets.2. Proxy Servers (sometimes called firewalls) that make network connectio
14、ns for you.Packet Filtering Firewalls Packet Filtering is the type of firewall built into the Linux kernel.A filtering firewall works at the network level. Data is only allowed to leave the system if the firewall rules allow it. As packets arrive they are filtered by their type, source address, dest
15、ination address, and port information contained in each packet.Many network routers have the ability to perform some firewall services. Filtering firewalls can be thought of as a type of router. Because of this you need a deep understanding of IP packet structure to work with one.Because very little
16、 data is analyzed and logged, filtering firewalls take less CPU and create less latency in your network.Filtering firewalls do not provide for password controls. User can not identify themselves. The only identity a user has is the IP number assigned to their workstation. This can be a problem if yo
17、u are going to use DHCP (Dynamic IP assignments). This is because rules are based on IP numbers you will have to adjust the rules as new IP numbers are assigned. I dont know how to automate this process.Filtering firewalls are more transparent to the user. The user does not have to setup rules in th
18、eir applications to use the Internet. With most proxy servers this is not true.Proxy ServersProxies are mostly used to control, or monitor, outbound traffic. Some application proxies cache the requested data. This lowers bandwidth requirements and decreases the access the same data for the next user
19、.It also gives unquestionable evidence of what was transferred.There are two types of proxy servers.1. Application Proxies that do the work for you.2. SOCKS Proxies that cross wire ports.Application ProxyThe best example is a person telneting to another computer and then telneting from there to the
20、outside world.With a application proxy server the process is automated. As you telnet to the outside world the client send you to the proxy first. The proxy then connects to the server you requested (the outside world) and returns the data to you.Because proxy servers are handling all the communicat
21、ions, they can log everything they (you) do. For HTTP (web) proxies this includes very URL they you see. For FTP proxies this includes every file you download.They can even filter out inappropriate words from the sites you visit or scan for viruses.Application proxy servers can authenticate users. B
22、efore a connection to the outside is made, the server can ask the user to login first. To a web user this would make every site look like it required a login.SOCKS ProxyA SOCKS server is a lot like an old switch board. It simply cross wires your connection through the system to another outside conne
23、ction.Most SOCKS server only work with TCP type connections. And like filtering firewalls they dont provide for user authentication. They can however record where each user connected to.3. Firewall ArchitectureThere are lots of ways to structure your network to protect your systems using a firewall.
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2774.B LINUX防火墙设计与实现 毕业设计英文翻译 2774. LINUX 防火墙 设计 实现 毕业设计 英文翻译
链接地址:https://www.31ppt.com/p-2387938.html