Virtual machine security group configuration method and device

A configuration method and security group technology, applied in the field of communication, can solve problems such as lack, complicated process of creating security groups, inconvenient rapid creation of security groups, etc., and achieve the effect of convenient configuration

Inactive Publication Date: 2014-08-27
ZTE CORP
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The current virtualization platform provides the security group function for the virtual machine group applied by the user, but the current virtualization platform requires the user to configure the security group first, and then bind it to the security group when creating a virtual machine, and in the entire virtual machine The relationship between the virtual machine and the security group cannot be modified during the lifetime; moreover, the current security group can generally support a maximum of hundreds of rules. If the user creates a similar security group, he needs to enter the security group rules one by one, which is obviously inconvenient The rapid creation of security groups, the reason for these problems is that the currently configured security groups have weak functions, for example, the lack of the following functions: (1) the binding and unbinding functions of the security group and the virtual machine; (2) the security group and the virtual machine Virtual machine update function; (3) security group import and export functions, etc. At the same time, these reasons also make the current virtualization platform unable to provide users with flexible security group operations, resulting in users being unable to flexibly configure virtual machine and security group to handle accordingly
[0026] In the related technologies, the process of creating security groups for users is relatively complicated, the relationship between virtual machines and security groups cannot be modified, and users cannot flexibly process virtual machines and security groups according to the needs of application services. At present, no effective solutions have been proposed. Program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine security group configuration method and device
  • Virtual machine security group configuration method and device
  • Virtual machine security group configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0071] Figure 6 is a flowchart of a method for configuring a virtual machine security group according to an embodiment of the present invention, such as Figure 6 As shown, the method mainly includes the following steps (step S602-step S604):

[0072] Step S602, when receiving an operation request to bind, update or unbind the created virtual machine and the security group, the virtualization platform binds, updates or unbinds the virtual machine and the security group;

[0073] Step S604, when receiving an operation request for importing and exporting a designated security group, the virtualization platform imports and exports the designated security group.

[0074] In this embodiment, binding t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a method and a device for configuring a virtual machine and a security group. The method comprises: upon receiving an operation request for binding, updating, or unbinding a virtual machine and a security group, a virtual platform binding, updating, or unbinding the virtual machine and the security group; upon receiving an operation request for importing and exporting a designated security group, the virtual platform importing and exporting the designated security group. Through the present invention, the user can conveniently and flexibly configure the virtual machine and the security group according to the requirements of an application service.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for configuring a virtual machine security group. Background technique [0002] Virtualization technology is the foundation of cloud service platform construction. Virtualization technology means that on a physical server, physical resources are divided into multiple logical partitions through the virtualization management software Hypervisor. Each logical partition is isolated from each other and becomes an independent virtual machine. For operating systems and applications, virtual machines are no different from physical servers, and they can share the resources of the same physical server. [0003] A security group is an access control rule used to control data flow in and out of a group of virtual machines, and also refers to a group of virtual machines that meet these rules. That is, in the virtualization platform, in order to meet the needs of the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F9/445
CPCH04L29/06G06F21/6218
Inventor 楚俊生顾忠禹陶源
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products