| With the rapid development of Internet, the network information dissemination on people’s way of living and thinking to change more and more profound. Network in greatly improving the information transmission efficiency at the same time, also makes people make decisions.Such as trends in process, more dependent on the information related to the arrangement, collection and acquisition.In order to be able to make a correct judgment. Therefore, how to in open network environment guarantee the communication security, and how to use an unreliable network to ensure the transmission of confidential information integrity and reliability and a series of problems of information security is more and more outstanding can not be ignored. To ensure that the information can be efficientã€safeã€rapid completion of the exchange, has become the field of network security is one of the main aims of development.This paper expounds the present commonly used techniques based on, combined with the actual problems met in application——in order to prevent hacking and network viruses and other malicious attacks—more and more network host firewall.The firewall can be divided into two kinds:packet filtering and application proxy. In order to protect the information security also got VoIP, P2P and network video conferencing communication has a certain limitation, so we urgently need a special communication technology to complete the network port restricted under the premise of the communication needs. The paper puts forward using HTTP tunnel technology to achieve secure communication conception, and tries to improve it makes the communication more efficient. In this paper, the HTTP protocol and related techniques are introduced. The HTTP protocol communication way and important terms.Then the paper discusses the HTTP protocol message structure, and combining with the characteristic of the firewall, the other protocol encapsulated in HTTP protocol message entity.In order to achieve secure communication objective feasibility. The packet filter firewall, application proxy firewall and stateful inspection firewall principle description, expounds the feasibility of HTTP tunnel. Subsequently, on HTTP tunnel overall module design, a detailed description of the function of each module and the module of the data exchange between the process. And through in a laboratory environment to test the feasibility, verification system. Finally, the system proposes improvement ideas. |