Unlock instant, AI-driven research and patent intelligence for your innovation.

Firewall penetration method and system

A firewall and management server technology, applied in the field of network security, can solve the problems of lack of versatility and inability to realize communication between devices inside and outside the firewall, etc., and achieve the effect of safe and reliable data communication channels and high versatility

Active Publication Date: 2019-04-02
南京中孚信息技术有限公司
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the firewall penetration based on the SSH port forwarding technology depends on the firewall to release the SSH communication port. Once the firewall blocks the port, this method cannot realize the communication between the devices inside and outside the firewall, and is not universal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall penetration method and system
  • Firewall penetration method and system
  • Firewall penetration method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions in the present disclosure will be clearly and completely described below in conjunction with the drawings in the present disclosure. Obviously, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The components of the present disclosure generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the present disclosure provided in the accompanying drawings is not intended to limit the scope of the claimed disclosure, but merely represents selected embodiments of the present disclosure. Based on the embodiments of the present disclosure, all other embodiments obtained by those skilled in the art without creative effort shall fall within the protection scope of the present disclosure.

[0043] It should be noted that like numerals and letters denote similar items...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a firewall penetration method and a firewall penetration system, which relate to the technical field of network security. The firewall penetration system provided by the invention comprises a server and a client, wherein a firewall is set between the server and the client, and the server comprises a management server; the client establishes a connection with a management server by means of a set first parameter and further penetrates a firewall and transmits data monitored by means of a monitoring port of the client to the management server, the data transmitted by meansof the client is analyzed after the data transmitted by means of the client is monitored by means of a monitoring port of the management server, and the data is transmitted to a port specified by themanagement server. Further, the firewall penetration method and the firewall penetration system realized the effects of being capable of penetrating the firewall, being safe and reliable, and being high in universality.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and in particular, to a firewall penetration method and system. Background technique [0002] Currently, based on the Secure Shell (SSH) port forwarding technology, SSH will automatically encrypt and decrypt all network data between the SSH client and the server, and transfer the network data of other Transmission Control Protocol (Transmission Control Protocol, TCP) ports to The data is forwarded through the SSH link, and the corresponding encryption and decryption services are automatically provided. If the firewall in the working environment restricts the use of some network ports, but allows SSH connections, then it is also possible to use SSH by forwarding the TCP port. communication. [0003] However, the firewall penetration based on the SSH port forwarding technology depends on the firewall allowing the SSH communication port. Once the firewall blocks the port, this met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 龚宇陈英华马奥吴兵
Owner 南京中孚信息技术有限公司