Luigi La Mattina
Optimized Configuration of Network Security Policies.
Rel. Riccardo Sisto, Guido Marchetto, Fulvio Valenza, Daniele Bringhenti. Politecnico di Torino, Master of science program in Computer Engineering, 2021
|
Preview |
PDF (Tesi_di_laurea)
- Thesis
Licence: Creative Commons Attribution Non-commercial No Derivatives. Download (2MB) | Preview |
Abstract
In recent years, the emergence of new networking technologies, Network Functions Virtualization (NFV) and Software Defined Network (SDN) has brought significant improvements and greater flexibility in building the functions that make up a Service Function Chain. Thanks to these improvements, each specific function such as NAT or proxy server is no longer constituted by an ad hoc hardware device, but is implemented on a standard server that can host multiple network functions at the same time. This allows you to make the most of the resources of the system and of the device itself, in fact to add a new device it is no longer necessary to purchase a new physical box but to implement it directly on the server, which will use the device resources by sharing them with other devices installed inside it.
Having assimilated the new technologies, a not negligible problem that arises in the creation of a Service Function Chain is given by the manual configuration of the network devices and especially of the network safety devices, since an incorrect configuration can lead to very serious errors such as violating security or accepting unwanted traffic
Relators
Publication type
URI
![]() |
Modify record (reserved for operators) |
