Safety access method and system based on fire wall policy

A firewall policy and security access technology, applied in the security access method and system field based on firewall policy, can solve problems such as reducing the effect of firewall restrictions, confusion of firewall policies, and affecting the operation of existing network services, so as to avoid configuration problems and dangers , reduce human operations, and protect against cyber threats

Active Publication Date: 2014-02-05
ULTRAPOWER SOFTWARE
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a complex access control policy makes it difficult for firewall administrators to even dare to delete and optimize the policy. Changes to the policy may affect the operation of live network services
In this case, firewall policies accumulate more and more, regardless of whether the access requirements change, the firewall is always open, which greatly reduces the effect of the firewall on restricting access
In addition, due to the implementation principle of the firewall, too many policies put a lot of pressure on the performance of the firewall
[0005] It is required to be able to access the target device through the service protocol of the firewall. Since the firewall policy cannot effectively control the closure of the firewall service protocol in a timely manner, after accessing the target device, the firewall service protocol is in the open state, which poses an immeasurable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety access method and system based on fire wall policy
  • Safety access method and system based on fire wall policy
  • Safety access method and system based on fire wall policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0047] The embodiments of the present invention aim at the method and the system generated when the target device cannot meet the effective access requirement. When there is a new access requirement, the configuration template of the firewall policy will be used to match the network addresses of all device firewalls. After the match is successful, the device can be accessed and operated, while the firewalls of other devices are still in the service configuration outside the security policy. state (closed state), when the target device is accessed, the firewall of other devices is in a denial of service state so that it will not be affected in any way and prevent the invasion of other threats. After the required access is completed, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety access method and system based on a fire wall policy, and relates to the technical field of computer information security. According to the safety access method and system, configuration problems and dangerousness of the fire wall policy because of habits or unexpected errors of managers can be avoided through the dynamic open configuration according to needs. Furthermore, after equipment is accessed according to needs, a fire wall can close service access states according to fire wall poly instructions, and therefore the equipment can be effectively protected against external accesses and invasions which do not accord with service protocols. Through the dynamic starting-stopping configuration of the fire wall policy, the service protocols of the fire wall are started and stopped, manual operation of the managers is reduced, and therefore losses caused by operation errors can be avoided. A one-to-one safe configuration method between the fire wall safety policy and the equipment is achieved according to network safety check each time, access needs can form an access period, a safe closed ring from access needs to access to access stop is formed, and therefore the target equipment can be effectively protected against network threats in real time.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a security access method and system based on firewall policies. Background technique [0002] With the development of information technology, more and more attention has been paid to network information security issues. Based on this, firewalls are used in the prior art to implement secure access. A firewall policy is a series of specific rules. Any required access must be matched with the policy. Only after the matching is successful can the device be accessed safely through the firewall. Therefore, the formulation of policies is very important for the function of the firewall. [0003] The management of the existing firewall policy is to configure the firewall security policy according to the access requirements by the firewall administrator. After the policy is configured, it exists for a long time. Regardless of whether the access requirements change or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
Inventor 闫冬枫刘立华周国强张建军苏砫
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products