Network security deployment method, device and equipment and readable storage medium

A technology for network security and network configuration information, which is applied in the fields of equipment and readable storage media, network security deployment methods, and devices, and can solve problems such as low efficiency and failure to meet user needs

Pending Publication Date: 2020-07-03
SANGFOR TECH INC
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the efficiency of network security construction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security deployment method, device and equipment and readable storage medium
  • Network security deployment method, device and equipment and readable storage medium
  • Network security deployment method, device and equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] For the convenience of description, the abbreviations or related technical names involved in this article are explained below:

[0055] NFV (Network Functions Virtualization): Network function virtualization, using virtualization technology to divide the functions of the network node level into several functional blocks, which are implemented in software, and are no longer limited to hardware architectu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security deployment method, device and equipment and a readable storage medium, and the method comprises the following steps: receiving a network security deploymentrequest, and obtaining a security template corresponding to the network security deployment request from a security template library; performing network environment parameter configuration on the security template by using network configuration information input by a user to obtain a complete security template model; analyzing the complete security template model to generate an automation instruction; and executing the automation instruction to complete network security deployment. Therefore, the method can reduce the threshold of intranet security construction, and improves the online efficiency of network security construction deployment.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a network security deployment method, device, equipment and readable storage medium. Background technique [0002] The current popular virtualization technology has been able to solve some problems of hardware cost and operation and maintenance management. Traditional all-in-one machines provide a variety of virtualized security components and network topology orchestration interfaces. Network administrators use visualization software to drag and drop the required security components to create, and then perform network configuration and deployment, and component configuration and deployment. [0003] However, the traditional one-virtual-many solution still cannot solve the complex problem of security construction. The reasons are as follows: the general construction process includes: security threat modeling-security solution design-network planning-equipment dep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0843H04L41/0886H04L63/20
Inventor 李文博
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products