Unlock instant, AI-driven research and patent intelligence for your innovation.

Firewall security configuration method and device

A configuration method and security configuration technology, applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve problems affecting business, hardware equipment failure, and safety rules not delivered to equipment, so as to reduce business failures, Reduce operating costs and increase the effect of good user experience

Active Publication Date: 2022-06-28
HANGZHOU DPTECH TECH
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under normal circumstances, the security rules of the cloud platform can be delivered to the hardware device normally, but in some cases, due to some dependent configurations that do not exist on the hardware device or other reasons, the security rules are not delivered to the device
[0004] If a certain security rule of the cloud platform fails to be delivered to the hardware device, it will cause the cloud platform to fail to deliver the security rules related to this rule to the hardware device in the future, which will seriously affect the business.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall security configuration method and device
  • Firewall security configuration method and device
  • Firewall security configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments, however, can be embodied in various forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this application will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar parts, and thus their repeated descriptions will be omitted.

[0033] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of the embodiments of the present application. However, those skilled in the art will appreciate that the technical solutions of the present application may be practiced without...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a firewall security configuration method and device, electronic equipment and a computer readable medium. The method comprises the following steps: a cloud platform configures security rules into a plurality of firewalls; generating a firewall rule state table according to the state return information of the plurality of firewalls; after the security rules are issued, determining a target firewall based on the firewall rule state table and the firewalls in a preset state; and performing configuration recovery on the security rule of the target firewall based on the firewall rule state table. According to the firewall security configuration method and device, the electronic equipment and the computer readable medium, firewall abnormal conditions caused by security rule configuration can be reduced, so that service faults are reduced, the operation cost is reduced, and good user experience is improved.

Description

technical field [0001] The present application relates to the field of computer information processing, and in particular, to a firewall security configuration method, apparatus, electronic device, and computer-readable medium. Background technique [0002] OpenStack covers all aspects of networking, virtualization, operating systems, servers, etc. Among them, the Neutron project provides network connection services for other services of OpenStack. The core services are Network, Subnet, and Router, and the extended services are FWaaS, etc. Because the FWaaS function implemented by software cannot meet the needs of users due to insufficient performance, hardware FW is used to implement the FWaaS function. The transfer of FWaaS functions is realized by distributing configuration to devices, and the distribution of security rules will be the top priority of transferring security functions. [0003] To create a new security rule, you need to add the newly configured security r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/02H04L63/0263H04L63/20Y02D30/50
Inventor 王瑞胡有福肖俊杰
Owner HANGZHOU DPTECH TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More