Unlock instant, AI-driven research and patent intelligence for your innovation.

Firewall policy auditing method and device, equipment and storage medium

A firewall strategy and strategy technology, applied in the field of network information security, can solve the problem of high error rate of audit results

Active Publication Date: 2022-04-12
章和技术(广州)有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In fact, there are often multiple firewall policy rules actually configured, and the combination of these multiple policy rules may meet the firewall policy rules required by the business, but the existing technology only combines the firewall policy rules actually configured with the firewall policy rules required by the business For comparison, if each of the actually configured firewall policy rules does not meet the firewall policy rules required by the business, the combination of these multiple policy rules will be directly judged as inconsistent, which will increase the error rate of the audit results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall policy auditing method and device, equipment and storage medium
  • Firewall policy auditing method and device, equipment and storage medium
  • Firewall policy auditing method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0025] Firewall is a technology that helps computer networks build a relatively isolated protective barrier between internal and external networks by organically combining various software and hardware devices for security management and screening to protect user data and information security. .

[0026] Firewalls can be deployed on communication devices in the network. In the work of checking the compliance of firewall security policies and rules, it involves the filtering process o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a firewall policy auditing method and device, equipment and a storage medium, and the method comprises the steps: obtaining a firewall policy rule required by a service and a plurality of actually configured firewall policy rules, taking one actually configured policy rule as a first target rule, and carrying out the auditing of a firewall policy according to the firewall policy rule required by the service; matching the first target rule with the firewall policy rule required by the service according to a preset matching policy to obtain a first matching result, and judging whether the first matching result is a null set or not; and if yes, matching the firewall policy rule required by the service with each actually configured firewall policy rule according to the matching policy for the actually configured firewall policy rule to obtain a second matching result, and determining whether the first rule set accords with the firewall policy rule required by the service based on the second matching result. According to the scheme, whether the first rule set accords with the firewall policy rule required by the service can be more accurately judged, so that the accuracy of the audit result is improved.

Description

technical field [0001] The present application relates to the technical field of network information security, in particular to a firewall policy audit method, device, equipment and storage medium. Background technique [0002] With the rapid development of network technology, in the field of network information security technology, firewalls, as the first checkpoint of the network, need to set which accesses are allowed to pass and which ones need to be blocked through firewall policies. Among them, the original business in the network requires a set of firewall policy rules, but the actual configured firewall policy rules may not meet the business requirements. Compare the firewall policy rules of the firewall to check whether the actually configured policy rules meet the firewall policy rules originally required by the business. [0003] In fact, there are often multiple firewall policy rules actually configured, and the combination of these multiple policy rules may mee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
Inventor 江辉
Owner 章和技术(广州)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More