Unlock instant, AI-driven research and patent intelligence for your innovation.

Strategy centralized configuration system and method for network security equipment

A centralized configuration and network security technology, applied in the field of network security, can solve problems such as incomplete solutions and no implementation methods

Pending Publication Date: 2020-09-04
西安交大捷普网络科技有限公司
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution still classifies and summarizes the existing different interfaces and distinguishes standardized interfaces from non-standardized interfaces. The policy distribution is also carried out according to standardized and non-standardized interfaces, and the solution to the problem is not thorough; and read through the application. The full text mainly describes the technical solution from the perspective of purpose and function, and does not propose a specific implementation method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strategy centralized configuration system and method for network security equipment
  • Strategy centralized configuration system and method for network security equipment
  • Strategy centralized configuration system and method for network security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] The technical principle involved in the present invention will be described first.

[0037] REST is an architecture for organizing Web services. Its goal is to create a distributed system with good scalability. It proposes a series of architectures and constraints: clients and servers communicate with each other through a unified interface; clients and It will not deal with a server in a fixed manner; the client is required to maintain its own state and provide the information necessary to process the request stored by itself each time it sends a request; the system needs to be able to properly cache the request to minimize server-side Information transmission between the client and the client to improve performance; use a unified interface to complete the interaction between subsystems and between services and users....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a strategy centralized configuration system and method for network security equipment, and the method comprises the steps: firstly an equipment end and a management end communicating through a unified configuration protocol and a specified unified interface, and not needing to adapt to different management interfaces for different manufacturers or different products; secondly, achieving automatic interface generation based on XML, and a configuration interface does not need to be designed in a targeted mode. As a top-layer management system, the system provides unifiedprotocol agreement, facilitates the centralized construction of a unified security policy control and distribution mechanism, and has positive significance for the implementation of intensive securityequipment and policy management.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a system and a method for implementing centralized configuration strategies for different network security devices. Background technique [0002] Information security integrated centralized management system (SOC) is a centralized information exchange, information storage, and information processing platform, which can perform unified control and management of various resources in the IT environment, collect and integrate various security events and IT asset alarms, Organize independent resources and applications as a whole, so that network administrators, security administrators and operation and maintenance personnel can discover and deal with various important security events and alarms; at the same time, it can conduct in-depth analysis and risk identification of events and alarms, and provide multiple A means of security response and recovery, so as to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/10H04L63/08H04L63/0807H04L63/10H04L63/101H04L63/20
Inventor 王平陈宏伟
Owner 西安交大捷普网络科技有限公司