Unlock instant, AI-driven research and patent intelligence for your innovation.

Implementation method and system of general security resource pool service chain

An implementation method and service chain technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as complex policy management, inability to use policy routing to divert traffic, and easy conflicts, so as to simplify forwarding entries and simplify management The effect of automation and

Active Publication Date: 2018-06-22
SANGFOR TECH INC
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. If the customer's original physical security equipment is deployed in a transparent manner, the security resource pool is required to replace the original physical equipment, and the security resource pool needs to be deployed in a transparent manner, and policy routing cannot be used to divert traffic;
[0010] 2. On the side of the security resource pool, because policy routing generally implements policy drainage based on the router port where the data packet arrives and the source / destination IP address in the data packet, and because the number of ports of the router is limited, and it is necessary to Query the routing table. Therefore, when policy routing implements security service chain drainage, the matching domain is limited, policy management is complicated, and conflicts are likely to occur. Especially for a layer of virtual / physical routing structure, the policy routing table is more complicated
[0011] 3. The current security resource pool drainage method, because security resource pool routing is required, so this method only supports routing mode deployment. After modification, it can also support gateway mode deployment, but it does not support transparent mode (no router) deployment
[0012] 4. In the current security resource pool drainage method, because the network connection function and the drainage strategy function of the security resource pool service chain are all realized through the policy routing of the resource pool, the network connection part of the security resource pool drainage method and the security service The chain drainage part is tightly coupled, and when the policy routing realizes the security service chain drainage, the policy management is complicated. When the customer network scene changes, the security service chain must be redeployed to meet the drainage needs in the new scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and system of general security resource pool service chain
  • Implementation method and system of general security resource pool service chain
  • Implementation method and system of general security resource pool service chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The embodiment of the present invention provides a general security resource pool service chain implementation method, which is used to realize the automatic connection between the customer side network and the customer service flow in different deployment modes through the network connection device in the security resource pool, and Through the service chain drainage device, the strategic drainage of customer business traffic is realized, and the self-defined matching domain drainage function of the service chain drainage device enables the service chain drainage device to simplify the forwarding table items related to traffic drainage through the NSH packet mode, and realize the flow table Item management is simplified and automated.

[0103] For ease of understanding, the technical terms in this article are explained as follows:

[0104] SDN: Software-defined network, composed of SDN controllers and switching devices.

[0105] SDN switching device: A device at the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an implementation method of a general security resource pool service chain to realize automatic connection with a security resource pool service chain under different arrangement modes of a customer network. The method disclosed by the embodiment of the invention comprises the following steps: configuring a network connection device of a security resourcepool, a service chain drainage device and a security function assembly, wherein the network connection device comprises a router and / or exchange equipment, the service chain guide device comprises exchange equipment, and the exchange equipment supports flexible drainage for a customized matching domain; automatically realizing connection with customer service flow through the network connection device; draining the customer service flow to the security function assembly through the service chain drainage device according to a packing mode for a data packet NSH (Network Function Header) of theservice chain ; and after the customer service flow passes through the security function assembly, returning the customer service flow to a customer service center system or an outer network through the service chain drainage device and the network connection device.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a method and system for realizing a general security resource pool service chain. Background technique [0002] As the concept of security resource pools is gradually accepted by the public, the deployment schemes of security resource pools are gradually increasing. During the deployment process, customer needs are mainly divided into three categories: [0003] 1. The customer's physical router supports the policy routing function, which can direct traffic to the security resource pool for cleaning; [0004] 2. If the customer's routing does not support the policy routing function, the security resource pool is required to clean the traffic, and the security resource pool is also required to implement the policy routing function; [0005] 3. If the customer's original physical security equipment is deployed in a transparent manner, the security resource pool is require...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/721H04L12/741H04L12/813H04L45/74H04L47/20
CPCH04L45/38H04L45/54H04L47/20H04L2212/00
Inventor 陈晓帆任勇兵马耀泉古亮
Owner SANGFOR TECH INC