Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A bypass blocking method, device and storage medium

A device and illegal technology, applied in the computer field, which can solve the problems of the intranet terminal unable to connect to the gateway, the ARP table error, and the blocking of legal connections.

Active Publication Date: 2021-01-05
BEIJING ANBOTONG TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By forging the ARP response packet, the ARP table of the illegally connected terminal is wrong, and it cannot connect to the gateway, thus blocking the connection
[0012] This method can only take effect on devices on the same network segment as the bypass listening device, and it will prevent illegally connected intranet terminals from connecting to the gateway. It is very effective in terms of effect, but it also causes a problem. It not only prevents the illegal connection of the intranet terminal response, but also blocks the legal connection between the normal terminal and the intranet terminal, which has a great impact on the normal application in the network
[0013] Therefore, based on the above analysis, there is currently no effective and reasonable way to block bypass

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A bypass blocking method, device and storage medium
  • A bypass blocking method, device and storage medium
  • A bypass blocking method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In view of the shortcomings of the prior art that cannot fully and completely block abnormal links, the purpose of the present invention is to provide a bypass blocking method, device and storage medium, which can fully and completely block abnormal connections and make up for existing bypass connections. Insufficient blocking method.

[0044] In order to make the object, technical solution and effect of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] see figure 1 , the bypass blocking method provided by the embodiment of the present invention, comprising the following steps:

[0046] S1. Obtain a mirror image packet of the access link from the switch.

[0047]In this embodiment, when the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a bypass blocking method, device and storage medium. The method includes: S1. Acquiring a mirror message of an access link from a switch; S2. Judging whether the access link is Illegal link, if yes, then extract the source IP and destination IP in the mirrored message; S3, extract the IP address in the preset blocking range from the source IP and destination IP in the mirrored message, and extract The IP that goes out is as blocking IP; S4, generate attack message with the IP of described blocking IP and firewall as source and purpose IP, and send N times of the preset number of times of described attack message to described firewall device; S5 , and create an effect check timer for the blocking IP; S6. When the timer expires, judge whether the blocking IP is successfully blocked, if not, repeat S4 to S5 until the blocking IP until successfully blocked. The invention can achieve the purpose of only blocking illegal links without affecting normal flow.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a bypass blocking method, device and storage medium. Background technique [0002] Bypass blocking is to use the method of bypass interception to obtain data packets on the Internet, and then restore the protocol and block according to the content. The advantage of this type of technology is that it does not affect the speed of Internet access, and there is no special setting requirement for users. Generally speaking, it is connected in parallel to the Internet outlet, which will not affect the stability of the original network. [0003] At present, the methods of managing the network and blocking illegal connections by bypass can be divided into three categories: [0004] 1. Send a TCP Reset packet. [0005] The implementation method is: when the bypass monitoring device finds an illegal link, it will send a TCP RESET packet to both ends of the link. At this time, the termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/741H04L45/74
CPCH04L63/0236H04L67/1095H04L45/74
Inventor 李萌
Owner BEIJING ANBOTONG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products