Method for implementing information backup, fire wall and network system
A technology of information backup and firewall, applied in the field of network communication, it can solve the problems that the business cannot be carried out normally, the session information cannot be completely consistent in real time, and the session business cannot be carried out normally, so as to achieve the effect of ensuring the session information.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] see figure 2 , is a flow chart of a method for realizing information backup in Embodiment 1 of the present invention, and is described by taking the first firewall and the second firewall as examples, including steps:
[0034] Step 201, the first firewall receives the message;
[0035] The first firewall receives packets of various protocol types, which may be ICMP (Internet Control Message Protocol, Internet Control Message Protocol) packets, or UDP (User Datagram Protocol, User Datagram Protocol) packets, or TCP (Transmission Control Protocol, Transmission Control Protocol) message.
[0036] Step 202. When the first firewall detects that the recorded session information has changed due to the received packet, back up the changed session information to the second firewall.
[0037] When detecting that the received message changes the recorded session information, the first firewall immediately backs up the changed session information to the second firewall.
[0038...
Embodiment 2
[0042] see image 3 , is a flowchart of a method for implementing information backup in Embodiment 2 of the present invention. Embodiment 2 mainly describes the processing flow when the firewall receives an ICMP or UDP message, and uses the first firewall and the second firewall as examples for illustration. Sessions based on UDP or ICMP are generally connectionless sessions, there is no changing state of the session, and the processing process is relatively simple. image 3 The specific steps are as follows:
[0043] Step 301, the first firewall receives ICMP or UDP message;
[0044] Step 302, the first firewall searches for the session corresponding to the received message in the session information recorded by itself;
[0045]The first firewall records session information related to the session, and the session information may be stored in a special memory. When receiving the message, the first firewall searches for the relevant session corresponding to the message in t...
Embodiment 3
[0056] see Figure 4 , is a flowchart of a method for implementing information backup in Embodiment 3 of the present invention. Embodiment 3 mainly describes the processing flow when the firewall receives a TCP packet, and uses the first firewall and the second firewall as examples for illustration. Because there are various states in the TCP-based session, the processing process is relatively complicated, but the session information is mainly backed up to another firewall when a change in the recorded session information is detected. The change of the recorded session information mentioned here includes: new session information is added when a new session is established, and session information is updated (such as session information modification or deletion) due to a change in the session status after the original session has been established.
[0057] Figure 4 The specific steps are as follows:
[0058] Step 401, the first firewall receives the TCP message;
[0059] St...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 