Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure resource pool realization method and secure resource pool system

A resource pool and security technology, applied in the field of network security, can solve problems such as poor adaptability to network changes and inflexible gateway drainage strategies, and achieve the effect of improving adaptability and flexibility

Active Publication Date: 2018-04-17
SANGFOR TECH INC
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The drainage method of the security resource pool in the existing solution mainly has the following disadvantages: on the side of the security resource pool, because the network connection function and the drainage policy function of the security resource pool service chain are all realized through the security resource pool routing gateway Therefore, the network docking part of the security resource pool drainage method is closely coupled with the security service chain drainage. When the user's network scene changes and the network docking part needs to be changed, the security service chain must be redeployed according to the change of the network docking part. To meet the drainage needs in new scenarios, the adaptability to network changes is poor. Secondly, policy routing is often the destination address routing or source address to configure the drainage strategy in one dimension, and the strategy of gateway drainage is not flexible.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure resource pool realization method and secure resource pool system
  • Secure resource pool realization method and secure resource pool system
  • Secure resource pool realization method and secure resource pool system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Embodiments of the present invention provide a method and system for realizing a security resource pool, which are used to improve the adaptability of the security resource pool to network changes and the flexibility of configuration.

[0059] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0060] The terms "first", "second", "third", "fourth" and the like in the description and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a secure resource pool realization method and a secure resource pool system and is used for improving the adaptability of a secure resource pool for network change and configuration flexibility of the secure resource pool. According to the embodiment of the invention, a network docking device and a first virtual switch which are independent are set in the secure resource pool. The network docking device realizes a function of independently docking with a user side network. The first virtual switch independently realizes a secure service link distribution function. Network docking and a secure resource pool service link distribution policy function are decoupled. The adaptability of the secure resource pool for the network change is improved. Multi-dimensional configuration can be carried out on a distribution policy in a secure service link based on at least two matching domain fields, so the configuration flexibility of the secure resource poolis improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for realizing a security resource pool. Background technique [0002] The security resource pool is a collection of physical or virtual security function components. The functions of the security function components may include firewall, VPN, load balancing, WAN acceleration, Internet behavior control, bastion host, intrusion detection / defense, etc. As the concept of security resource pools is recognized by more and more users, the deployment cases of security resource pools are gradually increasing. During the deployment of security resource pools, the drainage of security resource pools is the key. [0003] At present, the main drainage methods of security resource pools (as shown in the attached figure 1 shown) is to divert traffic through policy routing, wherein, for north-south traffic, the traffic is directed to the security resource pool throu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/721H04L12/741H04L12/751H04L29/06H04L45/02H04L45/74
CPCH04L45/02H04L45/38H04L45/74H04L63/02
Inventor 陈晓帆任勇兵马耀泉古亮
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products