Method for penetrating through LINUX fire walls to build communication
A technology for establishing communication and firewalls, applied in electrical components, transmission systems, etc., to solve problems such as failures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] Embodiment 1: see attached figure 1 , A and B are two computers belonging to different intranets, C is a server on the public network that both A and B can access, A's intranet address is 192.168.1.2, and the name is net1-A, B's intranet The address is 10.1.1.2, the name is net2-B, the intranets where computers A and B are located are equipped with firewalls, the public addresses of the two intranets are 1.1.1.1 and 2.2.2.2, and the address of server C is 3.3.3.3 , A and B are running under LINUX, and A, B, C are loaded with dedicated communication modules. When A and B need to communicate, the communication module performs the following steps, and in the following steps, A sends a message using (192.168.1.2:3000) as the source address and port number, and B sends a message using (10.1.1.2:3000 ) as the source address and port number, C sends the message using (3.3.3.3:2000) as the source address and port number.
[0047] Computer A sends a UDP packet with its compute...
Embodiment 2
[0049] Embodiment 2: In actual application, only large-scale companies or complex networks have multiple firewalls. In most cases, we can assume that computers A and B have only one layer of firewalls outside. Therefore, in step ⑤, computer A receives the server C's After the information, (192.168.1.2:3000) is the source address and port, (2.2.2.2:5000) is the destination address and port, and 2 is the lifetime of the IP message to send the UDP message, which can ensure the message wear Through the firewall outside A, it cannot reach the firewall outside B, and it can save time.
Embodiment 3
[0050] Example 3: When C receives B's request, C only notifies A to prepare for B's communication, and does not send A's address information to B at this time. After A completes the communication preparation, it notifies C, and then C sends A notifies B of the address information of A. The advantage of this is that when B receives the address information about A sent by C, A has already prepared for B to communicate.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 