Method and device for realizing software bypass in firewall

A firewall and software technology, applied in the computer field, can solve problems such as heavy traffic, network freezes, device packet loss, etc., and achieve the effect of reducing system resources

Pending Publication Date: 2017-04-26
OPZOON TECH
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the above-mentioned technical problems, the present invention provides a method and device for implementing software bypass in a firewall, which can solve the problem that the current network traffic in the prior art is relatively large or burst traffic occurs during peak hours, and the current network traffic reaches The problem of network freeze or disconnection caused by device packet loss at the maximum performance limit of the security business processing of the firewall

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing software bypass in firewall
  • Method and device for realizing software bypass in firewall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0039] figure 1 A schematic flowchart of a method for implementing software bypass in a firewall provided by an embodiment of the present invention is shown, such as figure 1 As shown, the method for implementing software bypass in the firewall of this embodiment is as follows.

[0040] 101. Determine whether the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for realizing software bypass in a firewall. The method comprises a step of judging whether a current network traffic flow is larger than or equal to a preset flow threshold, a step of calling a pre-packaged software bypass operation interface in a message receiving end function or an important safety service processing function if the current network traffic flow is larger than or equal to a preset flow threshold such that the software bypass operation interface obtains a current CPU use rate and a current network port receiving rate through calling a pre-packaged calculation interface and the software bypass is carried out between preset paired software bypass network ports according to a preset rule when the current CPU use rate and the current network port receiving rate are larger than a current hardware equipment platform safety service processing packet loss threshold value. According to the method and the device, the problem of network jam or disconnection caused by equipment packet loss when current network flow is large or the sudden traffic of a peak time appears and the current network flow reaches the maximum performance upper limit of the safety service processing of a firewall in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for implementing software bypass in a firewall. Background technique [0002] At present, network security devices are generally applied between two or more networks, such as between an internal network and an external network. The application program in the network security device will process the business through his network packets. Then the packets are forwarded according to certain routing rules, and if the network security device fails, such as after power failure or crash, all network segments connected to the device will lose contact with each other. Each network also needs to be connected to each other, so the hardware bypass must come forward. [0003] Hardware bypass is the bypass function, which can make the two networks not pass through the system of the network security device through a specific trigger state (power failure or crash), ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/801H04L29/06
CPCH04L47/10H04L47/29H04L63/02
Inventor 高福亮
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products