2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc

上传人:土8路 文档编号:11067907 上传时间:2021-06-25 格式:DOC 页数:25 大小:148.50KB
返回 下载 相关 举报
2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc_第1页
第1页 / 共25页
2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc_第2页
第2页 / 共25页
2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc_第3页
第3页 / 共25页
2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc_第4页
第4页 / 共25页
2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc_第5页
第5页 / 共25页
点击查看更多>>
资源描述

《2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc》由会员分享,可在线阅读,更多相关《2774.B LINUX防火墙设计与实现 毕业设计英文翻译.doc(25页珍藏版)》请在三一文库上搜索。

1、西 南 交 通 大 学毕业设计(英文翻译)Firewall and Proxy Server HOWTO防火墙和代理服务器指南年 级: 学 号: 姓 名: 专 业: 计算机科学与技术指导老师: 二零零八年六Firewall and Proxy Server HOWTOMark Grennan, v0.80, Feb. 26, 20002. Understanding FirewallsA firewall is a structure intended to keep a fire from spreading. Building have firewalls made of brick w

2、alls completely dividing sections of the building. In a car a firewall is the metal wall separating the engine and passenger compartments.Internet firewalls are intended to keep the flames of Internet hell out of your private LAN. Or, to keep the members of your LAN pure and chaste by denying them a

3、ccess the all the evil Internet temptations. ;)The first computer firewall was a nonrouting Unix host with connections to two different networks. One network card connected to the Internet and the other to the private LAN. To reach the Internet from the private network, you had to logon to the firew

4、all (Unix) server. You then used the resources of the system to access the Internet. For example, you could use Xwindows to run Netscapes browser on the firewall system and have the display on your work station. With the browser running on the firewall it has access to both networks.This sort of dua

5、l homed system (a system with two network connections) is great if you can TRUST ALL of your users. You can simple setup a Linux system and give an account accounts on it to everyone needing Internet access. With this setup, the only computer on your private network that knows anything about the out

6、side world is the firewall. No one can download to their personal workstations. They must first download a file to the firewall and then download the file from the firewall to their orkstation.BIG NOTE: 99% of all breakins start with gaining account level access on the system being attacked.Because

7、of this I dont recommend this type of firewall. It is also very limiting.2.1 Firewall PoliticsYou shouldnt believe a firewall machine is all you need. Set policies first.Firewalls are used for two purposes.1. to keep people (worms / crackers) out.2. to keep people (employees / children) in.When I st

8、arted working on firewalls I was surprised to learn the company I worked for were more interested in spying on their employees than keeping crackers out of their networks.At least in my state (Oklahoma) employers have the right to monitor phone calls and Internet activity as long as they inform the

9、employees they are doing it.Big Brother is not government. Big Brother = Big Business.Dont get me wrong. People should work, not play at work. And I feel the work ethic has been eroding.However, I have also observed that management types are the biggest abusers of the rules they set. I have seen hou

10、rly workers reprimanded for using the Internet to looking for bus routesto get to work while the same manager used hours of work time looking for fine restaurants and nightclubs to take prospective customers.My fix for this type of abuse is to publish the firewall logs on a Web page for everyone to

11、see.The security business can be scary. If you are the firewall manager, watch your back.How it create a security policyI have seen some realy high folutin documentation on how to create a security policy. After many years of experence I know now say, dont believe a word of them. Create a security p

12、olicy is simple.1. describe what you need to service2. describe the group of people you need to service3. describe which service each group needs access to4. for each service group describe how the service should be keep secure5. write a statment making all other forms of access a vialationYour poli

13、cy will become more complicated with time but dont try to cover to much ground now. Make it simple and clear.2.2 Types of FirewallsThere are two types of firewalls.1. Filtering Firewalls that block selected network packets.2. Proxy Servers (sometimes called firewalls) that make network connections f

14、or you.Packet Filtering Firewalls Packet Filtering is the type of firewall built into the Linux kernel.A filtering firewall works at the network level. Data is only allowed to leave the system if the firewall rules allow it. As packets arrive they are filtered by their type, source address, destinat

15、ion address, and port information contained in each packet.Many network routers have the ability to perform some firewall services. Filtering firewalls can be thought of as a type of router. Because of this you need a deep understanding of IP packet structure to work with one.Because very little dat

16、a is analyzed and logged, filtering firewalls take less CPU and create less latency in your network.Filtering firewalls do not provide for password controls. User can not identify themselves. The only identity a user has is the IP number assigned to their workstation. This can be a problem if you ar

17、e going to use DHCP (Dynamic IP assignments). This is because rules are based on IP numbers you will have to adjust the rules as new IP numbers are assigned. I dont know how to automate this process.Filtering firewalls are more transparent to the user. The user does not have to setup rules in their

18、applications to use the Internet. With most proxy servers this is not true.Proxy ServersProxies are mostly used to control, or monitor, outbound traffic. Some application proxies cache the requested data. This lowers bandwidth requirements and decreases the access the same data for the next user.It

19、also gives unquestionable evidence of what was transferred.There are two types of proxy servers.1. Application Proxies that do the work for you.2. SOCKS Proxies that cross wire ports.Application ProxyThe best example is a person telneting to another computer and then telneting from there to the outs

20、ide world.With a application proxy server the process is automated. As you telnet to the outside world the client send you to the proxy first. The proxy then connects to the server you requested (the outside world) and returns the data to you.Because proxy servers are handling all the communications

21、, they can log everything they (you) do. For HTTP (web) proxies this includes very URL they you see. For FTP proxies this includes every file you download.They can even filter out inappropriate words from the sites you visit or scan for viruses.Application proxy servers can authenticate users. Befor

22、e a connection to the outside is made, the server can ask the user to login first. To a web user this would make every site look like it required a login.SOCKS ProxyA SOCKS server is a lot like an old switch board. It simply cross wires your connection through the system to another outside connectio

23、n.Most SOCKS server only work with TCP type connections. And like filtering firewalls they dont provide for user authentication. They can however record where each user connected to.3. Firewall ArchitectureThere are lots of ways to structure your network to protect your systems using a firewall.If y

24、ou have a dedicated connections to the Internet through a router, you could plug the router directly into your firewall system. Or, you could go through a hub to provide for full access servers outside your firewall.3.1 Dialup ArchitectureYou may be using a dialup service like an ISDN line. In this

25、case you might use a third network card to provide provide a filtered DMZ. This gives you full control over your Internet services and still separates them from your regular network.3.2 Single Router ArchitectureIf there is a router or cable modem between you and the Internet. If you own the router

26、you could setup some hard filter rules in the router. If this router is owned by your ISP so you may not the have the needed controls.You can ask your ISP to put in filters.3.3 Firewall with Proxy ServerIf you need to monitor where users of your network are going and your network is small, you can i

27、ntergrate a proxy server into your firewall. ISPs some times do this to create interest list of their users to resell to marketing agencies.You can put the proxy server on your LAN as will. In this case the firewall should have rules to only allow the proxy server to connect to the Internet for the

28、services it is providing. This way the users can get to the Internet only through the proxy.3.4 Redundent Internet ConfigurationIf you are going to run a service like YAHOO or maybe SlashDot you may want to make your system by using redundant routers and firewalls. (Check out the High Availability H

29、owTo.)By using a roundrobin DNS techniques to provide access to multipule web servers from one URL and multiple ISPs, routers and firewalls using High Avaibility technics you can create a 100% uptime service.It is easy to let your network get out of hand. Keep control of every connection. It only ta

30、kes a user with a modem to compromise your LAN.4. Setting up the Linux Filtering Firewall4.1 Hardware requirementsFiltering firewalls dont require fancy hardware. They are little more then simple routers.All you need is:1. a 486DX66 with 32 meg of memory2. a 250m hard disk (500 recommended)3. networ

31、k connections (LAN Cards, Serial Ports, Wireless?)4. monitor and keyboardWith some systems by using a serial port console, you can even eliminate the monitor and keyboard.If you need a proxy server that will handle lots of traffic, you should get the largest system you can afford.This is because for

32、 every user that connects to the system it will be creating another process. If you will have 50 or more concurrent users Im guessing you will need:1. a Pentium II with 64meg of memory2. a two gig hard disk to store all the logs3. two network connections4. monitor and keyboardThe network connections

33、 can be any type (NIC cards, ISDN, even modems).5. Software requirements5.1 Selecting a KernelTo create a filtering firewall, you dont need any special software. Linux will do. At the time of this writing Im using RedHat 6.1.The bilt in Linux firewall have changed several times. If you are using an

34、old Linux kernel (1.0.x or older) geta new copy. These older used ipfwadm from http:/www.xos.nl/linux/ipfwadm/ and is no longer supported.If you are using 2.2.13 or newer you will be using ipchaining as developed byhttp:/.au/rustcorp/ipfwchains/ipfwchains.htmlIf you are using the newer 2.4 kernal th

35、ere is a new firewall utility with more feachers. I will write about this soon.5.2 Selecting a proxy serverIf you want to setup a proxy server you will need one of these packages.1. Squid2. The TIS Firewall Toolkit (FWTK)3. SOCKSSquid is a great package and works with Linuxs Transparent Proxy featur

36、e. I will be describing how to setup this server.AT the time of this writing, Network Associates and Trusted Information Systems (TIS) , have merged. So keep watching their web sites for more information about changes. Mean while, the Tool Kit can still be had at. http:/ Information System put out a

37、 collection of programs designed to facilitate firewalling. With this toolkit, you set up one daemon for each service (WWW, telnet ect.) you will be using.6. Preparing the Linux systemInstall as little of the Linux system as you can. My installation started with a server configuration and then I tur

38、n off ever unneeded service in /etc/inetd.conf. For more security you should uninstall the unneeded service.Because most distributions dont dome with a kernel usefull to your perpose. You will need to compile your own kernal. It is best if you do this on a computer other then the firewall. If you do

39、 install a C compiler and utilities on your firewall, remove them after you have completed comfiguring your kernel.6.1 Compiling the KernelStart with a clean minimal installation of your Linux distribution. The less software you have loaded the less holes, backdoors and/or bugs there will be to intr

40、oduce security problems in your server.Pick a stable kernel. I am using kernel 2.2.13 kernel for my system. So this documentation is based on its settings.You well need to recompile the Linux kernel with the appropriate options. If you havent recompiled yourkernel before you should read the Kernel H

41、OWTO, the Ethernet HOWTO, and the NET2 HOWTO.Here are the network related setting I know work. I have marked some with a ?. If you will be using this feature, turn it on as well.I use make menuconfig to edit my kernel settings. Packet socket Kernel/User netlink socket* Network firewalls Socket Filte

42、ring Unix domain sockets* TCP/IP networking IP: multicasting* IP: advanced router IP: kernel level autoconfiguration* IP: firewalling? IP: always defragment (required for masquerading)? IP: transparent proxy support? IP: masquerading Protocolspecific masquerading support will be built as modules.? I

43、P: ICMP masquerading Protocolspecific masquerading support will be built as modules. IP: masquerading special modules support* IP: optimize as router not host IP: tunneling IP: GRE tunnels over IP? IP: aliasing support* IP: TCP syncookie support (not enabled per default) (it is safe to leave these u

44、ntouched) IP: Reverse ARP* IP: Allow large windows (not recommended if 16Mb of memory) The IPv6 protocol (EXPERIMENTAL) The IPX protocol Appletalk DDP CCITT X.25 Packet Layer (EXPERIMENTAL) LAPB Data Link Driver (EXPERIMENTAL) Bridging (EXPERIMENTAL) 802.2 LLC (EXPERIMENTAL) Acorn Econet/AUN protoco

45、ls (EXPERIMENTAL) WAN router Fast switching (read help!) Forwarding between high speed interfaces PU is too slow to handle full bandwidthQoS and/or fair queueing After making all the setting you need you should recompile, reinstall the kernel and reboot.I use the command:make dep;make clean;make bzl

46、ilo;make modules;make modules_install;init 6 to accomplish all of this in one step.6.2 Configuring two network cardsIf you have two network cards in your computer, you may need to add an append statement to your /etc/lilo.conf file to describe the IRQ and address of both cards. My lilo append statem

47、ent looks like this:append=ether=12,0x300,eth0 ether=15,0x340,eth16.3 Configuring the Network AddressesNow we arrive at the fun part of our setup. Im not going to go deep into how to setup a LAN. Read the NetworkingHOWTO to solve your problems here.Your goal is to provide two network connection to your filtering firewall system. One on the Internet (unsecured side) and one on the LAN (secure side).Anyway, you have a few decisions to make.1. Will you use Real IP number or Make some up for your LAN.2. Will your ISP assign the number or wil

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 社会民生


经营许可证编号:宁ICP备18001539号-1