TABLE OF CONTENTS
Sr. No Content Page No
1 Chapter 1: Introduction 01
2 Chapter 2: Literature Survey 03
3
Chapter 3: Existing System
3.1 Policies
3.2 Pull Technique
3.3 Push Technique
3.4 Component Of Distributed Firewalls
3.4.1 Central Management System
3.4.2 Policy Distribution
3.4.3 User-End Implementation
05
4
Chapter 4: Proposed System
4.1 Data Security
4.2 A Distributed Firewall Design
4.2.1 Architecture of Distributed Firewalls
4.2.2 The Management Center
4.2.3 Policy Actuator
4.2.4 Remote Endpoint Connectors
07
5
Chapter 5: Advantages & Disadvantages
5.1 Advantages of distributed firewalls
5.2 Disadvantages of distributed firewalls
10
6 Chapter 6: Application 12
7 Conclusion & Future Work 13
8 References
LIST OF FIGURES
Fig. No Figure Name Page No
4.2 Distributed firewall 8
Acronym Meaning
CMS Central Management System
EUI End User Implementation

2 (data security in local network using)

  • 1.
    TABLE OF CONTENTS Sr.No Content Page No 1 Chapter 1: Introduction 01 2 Chapter 2: Literature Survey 03 3 Chapter 3: Existing System 3.1 Policies 3.2 Pull Technique 3.3 Push Technique 3.4 Component Of Distributed Firewalls 3.4.1 Central Management System 3.4.2 Policy Distribution 3.4.3 User-End Implementation 05 4 Chapter 4: Proposed System 4.1 Data Security 4.2 A Distributed Firewall Design 4.2.1 Architecture of Distributed Firewalls 4.2.2 The Management Center 4.2.3 Policy Actuator 4.2.4 Remote Endpoint Connectors 07 5 Chapter 5: Advantages & Disadvantages 5.1 Advantages of distributed firewalls 5.2 Disadvantages of distributed firewalls 10 6 Chapter 6: Application 12 7 Conclusion & Future Work 13 8 References
  • 2.
    LIST OF FIGURES Fig.No Figure Name Page No 4.2 Distributed firewall 8 Acronym Meaning CMS Central Management System EUI End User Implementation