| With the fast development of computer network,many companies have set up their local network and connected to Internet.Under the condition,the problems of network security have attracts more and more attention.In the first chapter, the thesis introduces the background and the method to research .In the chapter 2,the thesis introduces the principles of firewall and analyses the virtue and shortcoming of some firewalls.In the chapter 3,the thesis introduces the characters and content of SOCKS V5,analyses the process of negotiation mechanism ,finally introduces the user/password authentication.In the chapter 4,the thesis introduces the kerberos protocol,Especially emphasizes the authentication process of the kerberos protocol.In the chapter 5,the thesis introduces the Microsoft security support provider interface(SSPI),especially how to implement the Kerberosk.In the chapter 6,the thesis tells the system realization and the result of test the system.In the last chapter,the thesis analyses the virtue and disadvantage of the system.Through the research of this thesis,we can apply a strong mechanism of authentication to the firewall which are command weak in authentications there is some utilitarian value. |