Method and device for detecting firewall rule conflict
A firewall and rule technology, applied in the field of network security, can solve problems such as difficulties and high efficiency, and achieve the effect of improving efficiency and reducing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The specific implementation process of the present invention will be described below in conjunction with each accompanying drawing.
[0027] see figure 1 , this figure is a flow chart of the implementation principle of the method for detecting firewall rule conflicts according to the present invention, which mainly includes the following steps:
[0028] Step 10, performing linear transformation on the attribute information of each rule in the firewall rule set;
[0029] The attribute information is one or more of source address, destination address, protocol, source port and destination port.
[0030] Step 11, using the priority number of each rule as an index, and storing the linearization interval corresponding to the attribute information of each rule obtained after conversion in the form of a linearized linked list;
[0031] The linearization intervals corresponding to any item of attribute information of the rule are arranged in ascending order in the linearizati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 