Supercharge Your Innovation With Domain-Expert AI Agents!

Firewall verification method and device, computer equipment and storage medium

A verification method and a technology of a firewall, applied in the field of network security

Active Publication Date: 2021-02-19
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of this application is to provide a firewall verification method, a firewall verification device, computer equipment, and a computer-readable storage medium, aiming at improving the security between the internal host cluster and the external service cluster while solving the problem of how to ensure the security of the host cluster. The problem of firewall verification efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall verification method and device, computer equipment and storage medium
  • Firewall verification method and device, computer equipment and storage medium
  • Firewall verification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0042] refer to figure 1 , in one embodiment, the firewall verification method includes:

[0043] Step S10, when the account information and login password of the target host are received, use the remote connection component to log in the target host according to the account information and the login password.

[0044] Step S20, using the parameter parsing module to obtain in batches the source addresses corresponding to each host in the host cluster where the target host is located, and the service cluster information corresponding to the host cluster, wherein the servic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a firewall verification method which comprises the following steps: logging in a target host by utilizing a remote connection component according to account information and a login password of the target host; obtaining source addresses corresponding to hosts in a host cluster where the target host is located and service cluster information corresponding to the host clusterin batches by using a parameter analysis module; generating a first list according to the plurality of source addresses, and generating a second list according to the plurality of pieces of service cluster information; determining a Cartesian product between the first list and the second list, and determining a firewall verification path corresponding to each host according to the Cartesian product; and testing whether the firewall on each firewall verification path is opened or not. The invention further discloses a firewall verification device, computer equipment and a computer readable storage medium. According to the application, under the condition of ensuring the security of the host cluster, the efficiency of verifying the firewall between the internal host cluster and the externalservice cluster is improved.

Description

technical field [0001] The present application relates to the field of network security, and in particular to a firewall verification method, a firewall verification device, computer equipment, and a computer-readable storage medium. Background technique [0002] With the rapid development and wide application of network technology, network security issues have become increasingly serious. In order to improve the security of network data exchange, a firewall is usually installed between the internal network and the external network. While the multiple hosts of the internal system are in the process of calling the data of the external system, it is necessary to verify whether the firewall between the above-mentioned internal system and each external system to be called is opened. [0003] At present, the commonly used method of verifying whether the firewall is enabled first needs to manually log in to the host one by one, and query the destination IP address and destination...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0876H04L63/083H04L63/20
Inventor 白露露
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More