Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security configuration method and device

A security configuration and network security technology, applied in the field of network security configuration methods and devices, can solve problems such as low configuration efficiency and high configuration error rate, and achieve the effects of improving configuration efficiency, avoiding human errors, and improving reliability

Active Publication Date: 2020-01-14
NEW H3C BIG DATA TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned process of modifying the configuration of the operating system of the network nodes is manually completed by the cooperation of the big data cluster administrator and the operating system administrator. The configuration efficiency is low and the configuration error rate is high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security configuration method and device
  • Network security configuration method and device
  • Network security configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Various exemplary embodiments, features, and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.

[0038] The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as superior or better than other embodiments.

[0039] In addition, in order to better illustrate the present disclosure, numerous specific details are given in the following specific implementation manners. It will be understood by those skilled in the art that the present disclosure may be practiced without some of the specific details. In some instances, methods, means, componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security configuration method and apparatus. The method comprises the following steps: an Agent obtains reference information of network security of a service node to which the Agent belongs, and transmits the reference information to the server node; the Agent receives a security configuration instruction sent by the server node, wherein the security configuration instruction comprises a security configuration parameter; and the Agent modifies the configuration of the network security of the service node to which the Agent belongs according to the security configuration parameter in response to the security configuration instruction. According to the network security configuration method and apparatus provided by the embodiment of the invention, the configuration efficiency of network security can be greatly improved, human caused errors are avoided, the configuration error rate is reduced, and the reliability of a big data cluster is greatly improved.

Description

technical field [0001] The present disclosure relates to the technical field of communications, and in particular to a network security configuration method and device. Background technique [0002] A big data cluster is a cluster environment with one server and multiple network nodes. [0003] In related technologies, when modifying the configuration of the operating system of the network nodes in the big data cluster, the big data cluster administrator and the operating system administrator need to cooperate to manually complete the modification of the configuration of the operating system of the network nodes. For example, first, the administrator of the big data cluster manually sets the network nodes to be adjusted to the maintenance mode. Then, the operating system administrator manually modifies the configuration of the operating system of the network node to be adjusted. Finally, the administrator of the big data cluster exits the maintenance mode of the network no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
CPCH04L41/0886
Inventor 饶云
Owner NEW H3C BIG DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products