Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing experimental system of firewall under multiple user's remote concurrency control in large scale

A technology of remote user and experimental system, applied in the field of firewall experimental system

Active Publication Date: 2009-06-03
SHANGHAI JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to address the shortcomings of the existing multi-user concurrent control firewall technology, and provide a method for realizing a remote large-scale multi-user concurrent control firewall experiment system, so that it adopts the WEB interface and overcomes the existing firewall experiment teaching The system can only support multi-user operations in the LAN, and cannot simultaneously provide practical restrictions to multiple remote users anywhere on the Internet, which significantly improves the efficiency of using a single firewall device in information security practice training, and effectively reduces information security. Cost of practical training

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following embodiments are provided in combination with the principles and methods of the present invention described above. The remote large-scale multi-user concurrent control firewall experimental system realized based on the present invention adopts B / S architecture and realizes by using JSP, JavaBean and Linux C programming technology, and supports multiple remote users at any position on the Internet to log in to the same firewall through a browser The system implements firewall technology. The specific implementation content is as follows:

[0052] 1. The server side of the system includes at least two hosts, one used as a firewall host, and one used as a virtual host server.

[0053] The firewall host uses an X86 architecture computer with three network cards installed. The internal network card is configured with an IP address of 192.168.1.254 / 16, the external network card is configured with a public network IP, and the DMZ network card is configured with an IP ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When user logs on system to start experiment, the method assigns the user an ID according to user ID allocation algorithm. When user starts up and shuts down own remote corresponding virtual machine, the method manages virtual machine system relevant to user's ID remotely according to virtual machine management algorithm. After user configures firewall rules, network command operation console embedded to WEB validates validity of firewall rules. Through network command proxy service program for remote user on firewall system, the network command operation console is connected to real network command operation terminal of virtual host to send out user's network command in real time, and display received result to user. The invention makes firewall system in multiple users provide experimentation for users so as to be applicable to practicing, training and popularizing technique of firewall.

Description

Technical field [0001] The invention relates to a method in the technical field of information security, in particular to an implementation method of a firewall experimental system for remote large-scale multi-user concurrent control. Background technique [0002] The research of information security practice technology is an important research direction in the current information security field. The rapid development and wide application of computer network technology has made the Internet an important part of people's daily life, and it has also brought about various network security problems. Although network protection technology has been studied in depth, especially firewall technology, which has developed very maturely, the system that can provide people with information security practice training is still in the initial stage of research. [0003] After searching the literature of the prior art, it was found that the Chinese patent number: CN200410016710.X, and the title o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/00H04L29/06
Inventor 李建华马进李铎锋杨树堂陆松年
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products