Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual network isolation system established on virtual machine and implementation method thereof

A virtual network and isolation system technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as software VPN server configuration troubles, hardware VPN equipment costs are high, data security cannot be verified, and achieve low cost , security improvement, the effect of improving security

Inactive Publication Date: 2010-03-10
广州爱迅信息技术有限公司
View PDF0 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution saves costs, facilitates management, and ensures the security of client data transmission. However, there are the following disadvantages: 1. Due to the bridging mode between the VM virtual network card in the virtual machine and the real network card of the physical machine, each virtual machine Can access each other, even physical machines; this may cause data leakage between virtual machines in different departments
2. Although the client uses VPN access for identity verification to ensure the security of client data transmission, the security of the data itself cannot be verified; if the client passes in a file with a virus, the virtual machine and its connected The network will be infected, and this security risk will even affect the physical server
3. The cost of hardware VPN equipment is high, and the configuration of software VPN server is troublesome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual network isolation system established on virtual machine and implementation method thereof
  • Virtual network isolation system established on virtual machine and implementation method thereof
  • Virtual network isolation system established on virtual machine and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] A virtual network isolation system built on a virtual machine, such as figure 2 As shown, it includes a router\firewall, a physical server, and a plurality of clients. The physical server includes a plurality of virtual machines, and each virtual machine serves some clients. The virtual machine is provided with a VM virtual network card, so The physical server is also provided with

[0046] Located between virtual machines, it is used to isolate virtual machines and prevent information between virtual machines from being sent and received by each other;

[0047] The client is connected to the virtual machine through the router / firewall, specifically to the virtual machine to which it belongs in the physical server.

[0048] Preferably, the virtual network isolation system established on the virtual machine further includes a port communication restriction module, and the port communication restriction module is used to restrict port communication between each client m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual network isolation system established on a virtual machine, which comprises a router / a firewall, a physical server and a plurality of clients, wherein the physical server comprises a plurality of virtual machines and is also provided with an isolation wall, and the virtual machine is internally provided with a port communication limitation module. The invention further discloses a virtual network isolation method established on the virtual machine, which comprises the following steps: (1) establishing the isolation wall between virtual machines firstly; (2) arranging a virtual hub and a Tunnel virtual network card in the virtual machine, accessing the Tunnel virtual card of the virtual machine into the virtual hub, and establishing port communication limitation; (3) setting port mapping corresponding to the virtual machine; and (4) arranging the Tunnel virtual network card on each client, configuring Internet IP address and accessing to the virtual hub.The invention provides a safe, low-cost, rapid and conveniently-maintained network environment.

Description

technical field [0001] The invention relates to the technical field of virtual network security access, in particular to a virtual network isolation system built on a virtual machine and an implementation method thereof. Background technique [0002] At present, in order to save costs and facilitate management, enterprises have begun to use virtual machine (Virtual Machine) technology to build virtual machine network systems, such as figure 1 As shown, this technology simulates multiple complete computer systems with complete hardware system functions on a physical machine through software, and these virtual machines work exactly like real computers. The VM (Virtual Machine, virtual machine) virtual network card in the virtual machine and the real network card of the physical machine adopt bridging (Bridging) mode, the IP address of the virtual system and the IP address of the real system belong to the same network segment, and the virtual system is equivalent to An indepen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/00
Inventor 陈博东曾祥俊倪晓玲
Owner 广州爱迅信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products