Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for realizing VPN automatic penetration by utilizing detection mechanism

An automatic and mechanism-based technology, applied in the field of network information security, can solve problems such as IPSecVPN cannot be established, IPSecVPN communication abnormalities, etc.

Inactive Publication Date: 2009-11-18
奇安信网神信息技术(北京)股份有限公司
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. If the communication network between the gateways does not open the standard IPSec VPN service, the standard IPSec VPN cannot be established;
[0005] 2. Even if it is open, once the standard IPSec VPN service in the network is unstable, it will cause abnormal IPSec VPN communication;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing VPN automatic penetration by utilizing detection mechanism
  • Method and device for realizing VPN automatic penetration by utilizing detection mechanism
  • Method and device for realizing VPN automatic penetration by utilizing detection mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] See attached Figure 5 Shown: Establish a virtual private network from Beijing to Tianjin, the network is composed of Beijing security gateway equipment and Tianjin security gateway equipment, the IP address of Beijing network security equipment is 212.218.85.1, and the IP address of Tianjin network security equipment is 218.202. 2.1. The service ports known to exist in this network are 80, 22, 1273, and 1083 respectively.

[0037] Both the Beijing security gateway equipment and the Tianjin security gateway equipment are computer equipment containing multiple network cards, in which an operating system that supports network forwarding and IPSEC encryption and decryption processes runs. And install the computer program files needed to realize the technical solution of the present invention in the operating system. The flow of the computer program is attached figure 2 as shown,

[0038] In the work of the above-mentioned system, the steps of using the detection mecha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device for realizing VPN automatic penetration by utilizing a detection mechanism. The method comprises the steps of configuration and data package processing respectively, wherein the processes of data package treatment comprise the followings: when an IPSEC data package is sent, whether a tunnel quotes a VPN penetration port is checked, if the tunnel quotes the VPN penetration port, the data package is converted and sent out based on the configurated penetration port; when a VPN gateway system receives the data package, the processing method comprises the following two ways: if the data package is not the IPSEC data package, then normal system flow is carried out without converting the data packet; if the data package is converted IPSEC data package, then the converted IPSEC data package is converted to a normal IPSEC data package. The device used in the method for realizing VPN automatic penetration by utilizing the detection mechanism comprises a receiving module, a sending module, a conversion module, an automatic detection module and a penetration port usability configuration module (5). The invention can establish a VPN tunnel based on a service port opened in the network, and when the port is detected unopened, VPN communication can be carried out by switching to other ports, thus facilitating the establishment of the VPN tunnel to be more flexible, satisfying the requirement for establishing VPN communication under the condition that normal IPSec VPN can not communicate normally, realizing the load balancing of the tunnel.

Description

technical field [0001] The invention relates to a method and a device for realizing VPN automatic penetration by using a detection mechanism, and belongs to the technical field of network information security. Background technique [0002] A router is a computer system with multiple network interfaces. It receives data packets from the network, searches the routing table according to the source and destination of the data packets, and forwards the successfully searched data packets. Now enterprises and governments have large and small branches in different regions, and these branches have their own local area networks. But these networks are decentralized and need to be interconnected. Because the addresses of these LANs are all private addresses and cannot be routed through the Internet, interconnection cannot be achieved by relying on routers. [0003] The IPSec protocol has designed a framework and standards for IP security. IPSec virtual private network (VPN) is a tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/46H04L12/56H04L12/803
Inventor 周永刚陈大钊惠晨犇任献永倪县乐王刚王凯阳刘晓慧
Owner 奇安信网神信息技术(北京)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products