Академический Документы
Профессиональный Документы
Культура Документы
Firewalls form a fundamental part of current network security practice by providing the demarcation point between networks with differing levels of trust. Owing to cost, a firewall is the only effective security measure in place in smaller networks, and is relied upon to implement the entire security policy for that network. Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
Existing System:
By forcing all network traffic to pass through the firewall, there is a greater chance that the network will. Become congested. In most configurations where firewalls are the only link between networks, if they are not configured correctly or are unavailable, no traffic will be allowed through.
Proposed System:
Firewalls can be configured to re!uire ud"ser authentication. This allows network administrators to control,
track specific user activity $etecting when the source of the network traffic is being %spoofed&, i.e., when an individual attempting to access a blocked service alters the source address in the message so the traffic is allowed.
System Specification
System Requirements: %ardware &e'uirements:
, , , , , , -ystem 2ard $isk 6onitor 6ouse :am * .entium I/ +.0 123. * 04 15. * #7 /1( 8olour. * 9ogitech. * 7#+ 6b.
Software &e'uirements:
, , , Operating system 8oding 9anguage $ata 5ase * ' ;indows <.. * (-..=et with 8>. * -?9 -erver +44(