Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Switch linkage firewall protection improving method

A switch and firewall technology, which is applied in the field of switch linkage firewall protection improvement, to achieve the effect of improving retrieval efficiency and reducing local area network

Inactive Publication Date: 2020-04-28
ZHUMADIAN POWER SUPPLY ELECTRIC POWER OFHENAN +1
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Tools such as MSN and QQ can communicate through port 80, and software such as SoftEther can encapsulate all TCP / IP communications into HTTPS packets and send them. Using traditional stateful inspection firewalls is simply impossible to prevent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Switch linkage firewall protection improving method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0021] Example: see figure 1 .

[0022] The method of improving the protection of the switch linkage firewall, realizes the network monitoring through the packet capture tool, cooperates with the port mirroring technology to use the static IP to bind the MAC and the IP in two directions without changing the IPV4 protocol, and at the same time uses VLAN to reduce the local area network and improve the retrieval efficiency , find the source of threat events, link with the switch, block the path of threat events, make up for the shortcomings of traditional firewalls, and provide in-depth protection for network security.

[0023] The application will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0024] Step 1. Set up bypass monitoring on the switch on the same network segment as the network security protection server; the switch supports port mirroring, and uses the port mirroring of the switch to copy all data passing through the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a switch linkage firewall protection improving method. According to the switch linkage firewall protection improving method, network monitoring is realized through a packet capturing tool. In cooperation with a port mirroring technology, the MAC and the IP are subjected to bidirectional binding by utilizing the static IP under the condition of not changing an IPV4 protocol.Meanwhile, the VLAN is used for reducing the local area network, improving the retrieval efficiency, discovering the source of the threat event, being linked with the switch, blocking the path of thethreat event, making up the defects of the traditional firewall and providing network security deep protection.

Description

Technical field: [0001] The invention relates to the field of computer network security, in particular to a method for improving the protection of a switch linkage firewall. Background technique: [0002] With the proliferation of viruses, worms, Trojans, backdoors, and blended threats, security threats at the application and network layers are becoming commonplace. Traditional firewalls can only block or allow specific IP addresses and ports, and the things that can be protected are quite limited. Hackers have developed a large number of methods to bypass firewall policies, including: using port scanners to find open ports on firewalls, and attacks and detection programs through Ports opened by the firewall pass through the firewall. Tools such as MSN and QQ can communicate through port 80, and software such as SoftEther can encapsulate all TCP / IP communications into HTTPS packets and send them. It is impossible to defend against traditional stateful inspection firewalls. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/2503H04L61/2517H04L63/02H04L63/1441H04L63/302
Inventor 李明明王瑞琦耿洁宇赵毅冯勇宋仁杰闫娇王方胡健潘巍翟玲玲宋志勇李新静谢杨赵博文赵志文
Owner ZHUMADIAN POWER SUPPLY ELECTRIC POWER OFHENAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products