A processing method for endogenous security dynamic protection function of routing and switching equipment

A technology of switching equipment and protection functions, applied in the field of communication network security, can solve the problems of refined management timeliness, lack of dynamic policy linkage, increased network maintenance costs, and security protection equipment affecting network performance and efficiency, etc., to achieve fine-tuning Manage and avoid the risk of dealing with performance bottlenecks and meet the effects of high-performance security protection

Active Publication Date: 2022-02-08
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the early network security deployment, it was a relatively common security protection measure to connect routing and switching devices and firewall devices in series in the network. In this way, the separate security protection deployment can provide comprehensive protection capabilities to a certain extent. However, based on There are deficiencies in network attack defense at the application layer, network fine-grained management, timeliness of active defense, and dynamic policy linkage. The performance bottleneck of some security protection equipment will also seriously affect network performance and efficiency, and increase network maintenance costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A processing method for endogenous security dynamic protection function of routing and switching equipment
  • A processing method for endogenous security dynamic protection function of routing and switching equipment
  • A processing method for endogenous security dynamic protection function of routing and switching equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, specific implementations of the present invention are now described. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0038]The present invention proposes an endogenous safety protection method for routing and switching equipment, wherein endogenous refers to abandoning external safety equipment and relying on the switching chip and multi-core processor inside the routing and switching equipment to realize the safety p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a processing method for endogenous safety and dynamic protection functions of routing switching equipment, relying on switching chips and multi-core processors inside the routing switching equipment to achieve security protection, including: detecting and identifying the content of the 2-7 layer of the message, Implement refined security control strategies based on classification results; the switch chip completes message filtering and attack defense functions for the 2-4 layer of the message; the multi-core processor detects the content of the 3-7 layer of the message, completes the deep security defense detection, and sends The switch chip actively issues security control policies, which are finally executed by the switch chip. The switch chip cooperates with the multi-core processor to realize the in-depth detection of the message content, and can actively implement the security control strategy in a targeted manner, which greatly improves the active protection capability of the routing and switching equipment. The method of one-time detection, matching, and multiple multiplexing greatly reduces the impact on system performance and avoids the risk of processing performance bottlenecks caused by the introduction of some safety protection equipment.

Description

technical field [0001] The invention relates to the technical field of communication network security, in particular to a processing method for a routing switching device with a built-in security dynamic protection function. Background technique [0002] Traditional routing and switching devices focus on functions such as routing processing and data forwarding, and only provide weak security protection functions. For example, the AAA authentication function can only solve basic user login and access security issues, and the ACL filtering function can only perform quintuple matching and filtering on packets at layer 4 and below. With the expansion of the application scale of the network, more and more security issues such as network attacks, data theft, and destruction have emerged. It is precisely because of the many insecure factors in the network that network construction and users must adopt corresponding network security Technology to plug security loopholes, provide se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/123H04L63/1441H04L63/1458H04L63/1466H04L63/10H04L63/20
Inventor 吴海涛王宏谢卫杨素梅梁文婷杨玉发胡贵华铭轩
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products