Security policy acceleration table construction method and device
A security policy and construction method technology, applied in the field of network security, can solve the problems of memory consumption, security policy check failure, long duration, etc., to reduce the consumption of memory and CPU resources, reduce the probability of check failure, and speed up the construction. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0032] The words appearing in the embodiments of the present application are explained below.
[0033] Security policy rules: including matching items and action items. After receiving the data packet, the network device matches the data packet with the matching item, determines the matching item matching the data packet, and processes the data packet according to the action item corresponding to the matching item.
[0034] Domain name change event: the network device determines th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


