Firewall security policy adjusting method and device
A technology of security policy and adjustment method, applied in the field of network security, which can solve the problems of high subjectivity and wrong judgment of artificially configured security policy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.
[0047] First combine the following figure 1 A possible system architecture applicable to the embodiments of the present application is introduced.
[0048] Please refer to figure 1 , which exemplarily shows a schematic structural diagram of a system to which this embodiment of the present application is applicable. The system 100 may include a user end device 101 , a network end device 102 , a firewall 103 , a switch 104 and an analysis platform 105 .
[0049] Wherein, the client device 101 and the network device 102 are connected through a network, and in order to improve the security of Internet access, generally, a firewall 103 can be set between the client device 101 and the network device 102, that is, The message sent by...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com