【正文】
姓 名: 指導(dǎo)教師 : 湖南 科技職業(yè)學(xué)院電子信息工程與技術(shù)系 二零 一 一 年 十二月 湖南科技職業(yè)學(xué)院 電子信息工程與技術(shù)系 畢業(yè)設(shè)計(jì) 2 畢業(yè) 設(shè)計(jì) 評(píng)語 題目: 專業(yè): 班級(jí): 姓名: 學(xué)號(hào): 畢業(yè)設(shè)計(jì)得分: 答辯得分: 綜合評(píng)定: 指導(dǎo)老師評(píng)語 : 指 導(dǎo) 教 師(簽字): 年 月 日 答辯委員會(huì)(小組)評(píng)語: 答辯委員會(huì)(小組)負(fù)責(zé)人(簽字): 年 月 日 湖南科技職業(yè)學(xué)院 電子信息工程與技術(shù)系 畢業(yè)設(shè)計(jì) 3 目錄 摘要 ................................................................... 5 1 概述 .................................................................. 7 課題意義 ....................................................... 7 網(wǎng)絡(luò)安全技術(shù) ................................................... 8 防火墻介紹 ..................................................... 9 防火墻技術(shù)發(fā)展趨勢(shì) ............................................. 9 防火墻產(chǎn)品發(fā)展趨勢(shì) ............................................. 9 2 需求分析 ............................................................. 10 校園網(wǎng)絡(luò)安全分析 ............................................... 10 校園網(wǎng)防火墻部署思路 ........................................... 11 3 校園網(wǎng)面對(duì)的安全威脅 ................................................. 11 物理安全 ....................................................... 11 自然威脅 ................................................. 11 人為威脅 ................................................ 12 內(nèi)網(wǎng)攻擊分析 .................................................. 13 ARP 攻擊 ................................................. 13 ................................................ 13 .蠕蟲病毒 ............................................... 13 外網(wǎng)攻擊分析 ................................................... 14 DOS 攻擊 ................................................. 14 SYN Attack(SYN 攻擊 ) ..................................... 14 ICMP Flood(UDP 泛濫 ) ..................................... 14 UDP Flood(UDP 泛濫 ) ...................................... 15 Port Scan Attack(端口掃描攻擊 ) .......................... 15 .............................................. 16 高校校園網(wǎng)防火墻網(wǎng)絡(luò)安全策略 ................................... 16 防火墻的基本配置 ............................................... 17 命令行基本信息收集: ..................................... 18 功能問題需收集下列信息: ................................. 18 接口管理設(shè)置 ............................................. 18 用戶帳號(hào)的操作 ........................................... 19 基于內(nèi)網(wǎng)的防火墻功能及配置 ..................................... 19 IP 與 MAC(用戶)綁定功能 ................................ 19 MAP(端口映射)功能 ..................................... 20 湖南科技職業(yè)學(xué)院 電子信息工程與技術(shù)系 畢業(yè)設(shè)計(jì) 4 NAT(地址轉(zhuǎn)換)功能 ..................................... 21 基于外網(wǎng)的防火墻功能及配置 ..................................... 21 DOS 攻擊防范 ............................................. 21 訪問控制功能 ............................................. 22 結(jié)論 .................................................................. 22 致謝 .................................................................. 23 參考文獻(xiàn) .............................................................. 24 湖南科技職業(yè)學(xué)院 電子信息工程與技術(shù)系 畢業(yè)設(shè)計(jì) 5 防火墻技術(shù)在 校園網(wǎng)中的應(yīng)用 摘要 網(wǎng)絡(luò)技術(shù)在近幾年的時(shí)間有了非常大的發(fā)展,經(jīng)歷了從 無到有,從有到快;網(wǎng)上信息資源也是從匱乏到豐富多彩,應(yīng)有盡有。但隨著網(wǎng)絡(luò)速度越來越快,資源越來越豐富,網(wǎng)絡(luò)安全問題卻也越來越嚴(yán)峻,網(wǎng)絡(luò)安全防范對(duì)校園網(wǎng)的正常運(yùn)行來講也就顯得十分重要。防火墻技術(shù)是在安全技術(shù)當(dāng)中又是最簡(jiǎn)單,也是最有效的解決方案。該防火墻在通常的包過濾防火墻基礎(chǔ)之上,又增加了 MAC地址綁定和端口映射等功能,使之具有更完備、更實(shí)用、更穩(wěn)固的特點(diǎn)。 關(guān)鍵詞: 網(wǎng)絡(luò)安全;防火墻;校園網(wǎng) 湖南科技職業(yè)學(xué)院 電子信息工程與技術(shù)系 畢業(yè)設(shè)計(jì) 6 Abstract The work technology has got very great development in recent years, and the online information resources are developing from deficient to rich and colorful too, and fill with everything. But with the development of the inter, the safe of work is being more and more severe. The work safe precaution seems very important for normal running of our campus work too In the work security guard against the firewall is a vital role in technology. the firewall is the safety of technology is the simplest and most effective solution. it is not only from the exploration and scanning services, to attack, we can avoid the has been in information disclosure of the wooden host puter... This thesis put forward a function in detailed analysis firewall working the foundation of the principle more plete function than good, fire wall system of oneself the design project of the too safe fire wall system, and introduces to realizes in a specific way at the same time key in the process step with main method. That firewall is in the usual a percolation firewall foundation on, increased again the MAC address bind to settle the special function in etc., making it have the fresh and clear characteristics. Pass to make fire wall that have the research of the above characteristics and development work, very much a firewall for developing system oneself have efficiently ,safety, prac