Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fire wall/subnet penetration method based on intranet node forwarding technology

A technology of node forwarding and firewall, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of increasing wrong addressing, application program difficulty, host cannot be identified, etc., to achieve safe service and data transmission, reduce cost effect

Inactive Publication Date: 2008-05-07
NANJING UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, NAT technology itself also has its shortcomings, such as increasing the possibility of wrong addressing; making some applications impossible to implement, at least making it more difficult to run these applications; it hides the information of the host, so that the host cannot Recognized; Compatibility issues with SNMP (Simple Network Management Protocol), DNS (Domain Name System) and many other technologies, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fire wall/subnet penetration method based on intranet node forwarding technology
  • Fire wall/subnet penetration method based on intranet node forwarding technology
  • Fire wall/subnet penetration method based on intranet node forwarding technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] A kind of realization of the firewall / subnet penetration method of the present invention, comprising an embedded computer A as an intranet node data forwarding server, a computer C that opens HTTP (Hypertext Transfer Protocol) service in an intranet , and a user computer B that initiated the request in the external network. The Server module runs on the data forwarding server A, and the Client module and Proxy module run on the user computer B. Among them, the SBC 2410X (hereinafter referred to as ARM platform) embedded computer based on Samsung's ARM9 processor is used as the intranet data forwarding server A. In terms of software, the ARM platform uses the free embedded Arm-Linux operating system announced by Korea MIZI Company.

[0017] In this method, the ARM platform A is in the intranet and is a node that actively initiates communication. The basic process is: A initiates a connection to establish an LC channel with external network user B; A reads the request o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a firewall / subnet penetration method based on intranet node forwarding technology, which includes three modules: Proxy (agent) module, Client (user) module, and Server (server) module. The Proxy module is mainly responsible for collecting user requests and forwarding them to the Client module; the Client module is mainly responsible for establishing a connection with the Server module and forwarding requests from the Proxy module; the Server module is mainly responsible for actively establishing a connection with the Client module, and the processing is performed by The request forwarded by the Client module obtains the corresponding resource and forwards it. The present invention utilizes existing protocols and platforms to effectively reduce the cost of firewall / subnet penetration and can achieve relatively safe service and data transmission.

Description

1. Technical field [0001] The invention relates to a method for penetrating a firewall / subnet. Specifically, an internal network node is used as a data forwarding server to forward requests from the external network and required data, thereby realizing the penetration of the firewall / subnet. 2. Technical background [0002] For the sake of network security and making full use of limited Internet address resources, many companies and organizations need to form subnets of their internal networks and isolate them from external networks, such as the Internet, to monitor the network access between internal networks and external networks. Control, the firewall can effectively achieve this function. At the same time, trusted users on the external network cannot access resources on the internal network unless special measures are taken. In many cases, it is necessary to provide resources of the internal network to trusted users of the external network and allow them to access resou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/06
Inventor 袁杰吴彦君王伟希
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products