Cloud protection method and device based on tunnel mode

A tunnel mode and tunnel technology, applied in the field of network security, can solve problems such as increased operation and maintenance costs, complicated access, and inability to use high-defense Alibaba Cloud high-defense services for Windows servers outside the cloud, so as to reduce operation and maintenance costs and access way simple effect

Active Publication Date: 2018-05-04
BEIJING QIANXIN TECH
View PDF8 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology of Alibaba Cloud Anti-Defense, if the host outside the cloud wants to use the Anti-Advanced service and obtain the real address of the client, the user must first support Redhat Linux or Centos 6.x, then download and install the kernel, and load the TOA module , this method of access is complicated, and the Windows server outside the cloud cannot use the high-defense Alibaba Cloud high-defense service
In addition, the access of Alibaba Cloud Anti-Defense Pro still needs to configure port mapping. If the user service uses a large number of ports, a large number of port mappings need to be configured, which increases the operation and maintenance cost.
[0004] In the process of implementing the embodiment of the present invention, the inventor found that if the existing method needs to know the real address of the client when using the high-defense service, the access method is complicated, and a large number of port mappings need to be configured, which increases the operation and maintenance cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud protection method and device based on tunnel mode
  • Cloud protection method and device based on tunnel mode
  • Cloud protection method and device based on tunnel mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0040] figure 1 It shows a schematic flowchart of a tunnel mode-based cloud protection method provided in this embodiment, including:

[0041] S101. Receive a first access request sent by a client, parse the first access request, and obtain a first source address and a first destination address of the first access request.

[0042] Wherein, the first access request is a request that the client expects to send to the real server to access data of the real server.

[0043] The first source address is the IP address of the client, and the first destination address is the IP address of the real server.

[0044] Specifically, the cloud protection node receives the first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a cloud protection method and device based on a tunnel mode. The method comprises the steps of analyzing a first access request sent by a client, thereby acquiring a first source address and a first destination address; modifying the source address of the first access request into an IP address of a cloud protection node and modifying the destination address of the first access request to the IP address of a tunnel receiver, thereby acquiring a second access request; adding an expansion field to the second access request and adding the first source address and the first destination address to the expansion field, thereby acquiring a third access request; and sending the third access request to the tunnel receiver, thereby enabling the tunnel receives to forward the third access request to a true server. The expansion field is added to the access request and the first source address and the first destination address, namely the address of the client and the address of the true server, are stored to the expansion field, so the true address of the client can be acquired, an access mode is simple, the configuration of a great deal of port mapping is avoided, and the operation and maintenance cost is greatly reduced.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to a tunnel mode-based cloud protection method and device. Background technique [0002] Anti-DDoS Pro cloud protection service needs to resolve the domain name to Anti-DDoS Pro IP (for web services, the domain name resolution points to Anti-Defense IP, and for non-web services, the business IP is replaced with Anti-Defense IP), and at the same time, forwarding rules are set on Anti-DDoS Pro IP. All public network traffic will first pass through the high-defense cleaning cloud node, and the access traffic will be forwarded to the source station IP through the high-defense IP through port protocol forwarding. Return to the IP of the source site, so as to ensure the protection service of stable access to the IP of the source site. [0003] In the existing technology of Alibaba Cloud Anti-Defense, if the host outside the cloud wants to use the An...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12
CPCH04L61/2592H04L61/4511
Inventor 欧怀古李建华关键王枭卿李洪亮肖磊
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products