Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for penetrating through LINUX fire walls to build communication

A technology for establishing communication and firewalls, applied in electrical components, transmission systems, etc., to solve problems such as failures

Active Publication Date: 2015-02-25
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of creating mapping records based on the direction of the first packet makes the traditional hole-based mechanism invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for penetrating through LINUX fire walls to build communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Embodiment 1: see attached figure 1 , A and B are two computers belonging to different intranets, C is a server on the public network that both A and B can access, A's intranet address is 192.168.1.2, and the name is net1-A, B's intranet The address is 10.1.1.2, the name is net2-B, the intranets where computers A and B are located are equipped with firewalls, the public addresses of the two intranets are 1.1.1.1 and 2.2.2.2, and the address of server C is 3.3.3.3 , A and B are running under LINUX, and A, B, C are loaded with dedicated communication modules. When A and B need to communicate, the communication module performs the following steps, and in the following steps, A sends a message using (192.168.1.2:3000) as the source address and port number, and B sends a message using (10.1.1.2:3000 ) as the source address and port number, C sends the message using (3.3.3.3:2000) as the source address and port number.

[0047] Computer A sends a UDP packet with its compute...

Embodiment 2

[0049] Embodiment 2: In actual application, only large-scale companies or complex networks have multiple firewalls. In most cases, we can assume that computers A and B have only one layer of firewalls outside. Therefore, in step ⑤, computer A receives the server C's After the information, (192.168.1.2:3000) is the source address and port, (2.2.2.2:5000) is the destination address and port, and 2 is the lifetime of the IP message to send the UDP message, which can ensure the message wear Through the firewall outside A, it cannot reach the firewall outside B, and it can save time.

Embodiment 3

[0050] Example 3: When C receives B's request, C only notifies A to prepare for B's communication, and does not send A's address information to B at this time. After A completes the communication preparation, it notifies C, and then C sends A notifies B of the address information of A. The advantage of this is that when B receives the address information about A sent by C, A has already prepared for B to communicate.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for penetrating through LINUX fire walls to build communication relates to the field of computer network communication, in particular to communication between two computer intranets configured with the LINUX fire walls. The method depends on two computers A and B belonging to different intranets and depends on a server C, and the server C does not belong to the intranets which the A and the B are in and can be accessed by the A and the B. The intranets are provided with the LINUX fire walls, in a process of building communication, a life cycle of a message is set, the fire walls are prevented from forming symmetrical network address translation (NAT), and accordingly a communication channel between the A and the B is built.

Description

technical field [0001] The invention relates to the field of computer network communication, in particular to the communication between two computer intranets equipped with LINUX firewalls. Background technique [0002] The full English name of NAT is "Network Address Translation", which means "Network Address Translation" in Chinese. It allows an entire organization to appear on the Internet with a public IP address. Network IP address technology. When the internal node wants to communicate with the external network, NAT replaces the internal address with a public address, so that it can be used normally on the external public network (internet). NAT can make multiple computers share the Internet connection. This function solves the problem very well. The shortage of public IP addresses. Through this method, only one legal IP address is applied for, and the computers in the entire LAN are connected to the Internet. At this time, NAT shields the internal network, all inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 程朝辉陈立人
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD