Method for realizing strengthening of demilitarized zone (DMZ) of network

An isolated area and network technology, applied in the field of network communication data security, can solve the problem that NAPT performance cannot satisfy users, etc.

Inactive Publication Date: 2012-04-11
SHENZHEN GONGJIN ELECTRONICS CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, the performance of NAPT cannot meet the requirements of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing strengthening of demilitarized zone (DMZ) of network
  • Method for realizing strengthening of demilitarized zone (DMZ) of network
  • Method for realizing strengthening of demilitarized zone (DMZ) of network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Example 1, such as image 3 As shown, the present embodiment is the flowchart of the uplink data packet and the downlink data packet of the DMZ host, because the IP address of the DMZ host is set to the IP address of the WAN side with the communication terminal with routing function, the DMZ host sends The uplink data of the DMZ is directly sent to the WAN, and the data packet reception (downlink data packet) and transmission (uplink data packet) of the entire DMZ include the following steps:

[0036] The following steps are included when receiving downlink data packets:

[0037] Step A, after the downlink data packet enters the communication terminal, compare the destination MAC address of the downlink data packet, if the destination MAC address is the same as the MAC address of the WAN interface of the communication terminal, receive the data packet;

[0038] Step B, if the receiving terminal of this data packet is the port of the open service on the DMZ host, then c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing the strengthening of a DMZ of a network. A host computer in the DMZ is connected with a wide area network (WAN) through a communication terminal having a routing function, and an internet protocol (IP) address of a DMZ host computer is set to be identical to that of a WAN interface of the communication terminal. Since the IP address of the DMZ host computer is set to be identical to that of the WAN interface of the communication terminal, a data packet passing in and out of the DMZ host computer can be rapidly completed.

Description

technical field [0001] The invention relates to the field of network communication data security, in particular to a method for enhancing the security performance of a network isolated area. Background technique [0002] In actual network applications, some hosts need to provide external services (such as the Internet), such as Web services and E-mail services. In order to better provide external services and effectively protect the security of the internal network, it is necessary to separate these hosts that need to provide external services from many internal network devices. [0003] like figure 1 Shown is a schematic diagram of a typical network structure. In this structure, there are two types of terminals, which are ordinary hosts and DMZ hosts. DMZ is the abbreviation of Demilitarized Zone, commonly known as the demilitarized zone, also known as isolation Zone, corresponding to the military zone and the trust zone, its function is to connect WEB, e-mail, and other ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 欧军和王志波汪澜朱余浩
Owner SHENZHEN GONGJIN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products