Fire wall/subnet penetration method based on intranet node forwarding technology

A technology of node forwarding and firewall, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of increasing wrong addressing, application program difficulty, host cannot be identified, etc., to achieve safe service and data transmission, reduce cost effect

Inactive Publication Date: 2008-05-07
NANJING UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, NAT technology itself also has its shortcomings, such as increasing the possibility of wrong addressing; making some applications impossible to implement, at least making it more difficult to run these ap

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fire wall/subnet penetration method based on intranet node forwarding technology
  • Fire wall/subnet penetration method based on intranet node forwarding technology
  • Fire wall/subnet penetration method based on intranet node forwarding technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0016] An implementation of the firewall / subnet penetration method of the present invention includes an embedded computer A as an intranet node data forwarding server, and a computer C that enables HTTP (Hypertext Transfer Protocol) services in the intranet , And a user computer B that initiated the request on the external network. The Server module runs on the data forwarding server A, and the Client module and Proxy module runs on the user computer B. Among them, as the intranet data forwarding server A, an SBC 2410X (hereinafter referred to as ARM platform) embedded computer based on Samsung's ARM9 processor is used. In terms of software, the ARM platform uses the free embedded Arm-Linux operating system announced by South Korea’s MIZI company.

[0017] In this method, the ARM platform A is in the intranet and is a node that actively initiates communication. The basic process is: A initiates a connection with the external network user B to establish an LC channel; A reads the r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a firewall/ subnet penetration method based on the internal network node transmission technology; the present invention comprises three modules of a Proxy module, a Client module and a Server module; the Proxy module is mainly responsible for collecting the requirements of users and transmitting the requirements to the Client module; the Client module is mainly responsible for establishing connection with the Server module and transmitting the requirements from the Proxy module; the Server module is mainly responsible for actively establishing the connection thewith Client module and processing the requirements transmitted by the Client module to obtain and transmit the corresponding resources. The present invention utilizes the present protocol and the platform to effectively reduce the cost for the penetration of firewall/subnet and realize safe service and data transmission.

Description

1. Technical field [0001] The invention relates to a method for penetrating a firewall / subnet. Specifically, an internal network node is used as a data forwarding server to forward requests from the external network and required data, thereby realizing the penetration of the firewall / subnet. 2. Technical background [0002] For the sake of network security and making full use of limited Internet address resources, many companies and organizations need to form subnets of their internal networks and isolate them from external networks, such as the Internet, to monitor the network access between internal networks and external networks. Control, the firewall can effectively achieve this function. At the same time, trusted users on the external network cannot access resources on the internal network unless special measures are taken. In many cases, it is necessary to provide resources of the internal network to trusted users of the external network and allow them to access resou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/06
Inventor 袁杰吴彦君王伟希
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products