Network control method and equipment

A technology for controlling equipment and control algorithms, applied in the field of communication control, can solve problems that cannot be solved at the same time, and data packet filtering technologies are incompatible with each other

Inactive Publication Date: 2004-08-18
HITACHI LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These problems cannot be solved at the same time, even in cases where multiple existing firewall technologies are some simple combination
The reason is that it is not possible t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network control method and equipment
  • Network control method and equipment
  • Network control method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Hereinafter, preferred embodiments of the present invention will be specifically described.

[0028] Specific examples of the transmission control request detection device in this embodiment will be described hereinafter, such as an intrusion monitoring system for detecting abnormal transmission, a user authentication server for user firewall authentication, and a user authentication server for distribution The firewall's policy server is available. Specific examples of transmission control devices, such as packet filters, bandwidth managers, application gateways, and personal firewalls, are available. Preferably, the transmission control computing device can communicate with the transmission request detection device and the transmission control device in a reliable communication state by using the network for management, encapsulation of information, and the like. The network is usually owned by a telecommunications company or by the operator of the corporate network. ...

Embodiment 2

[0053] According to the present invention, Figure 5 An example of a network configuration is shown. The corporate network 500 includes a backbone egress router 510, a transmission control router 520, an authentication server 530, an intrusion detection system 540, a distributed firewall policy server 550, and a terminal 560 at the ingress of the distributed firewall. The transmission control computing device 230 is connected to the authentication server 530, the intrusion monitoring system 540, and the terminal 560 at the ingress of the distributed firewall through the transmission control request interface 240, and to the backbone egress router 510, the transmission control router 520, and the transmission control interface 245. Distributed Firewall Policy Server 550.

[0054] When a user of the terminal 570 located outside the company network wants to access the terminal 560 inside the company network, first, the user must log in to the authentication server 530 . When lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

By using combinations of a plurality of firewall techniques and making these techniques work together appropriately, problems presented with popular use of always-on Internet connections and end-to-end communications using IPv6 are resolved. This flexible manner of applying access control techniques grants favors to corporate network users, resulting from the popular use of always-on Internet connections and IPv6, e.g., the promotion of teleworking and virtual offices. A traffic control computing device which processes control requests from traffic control devices, provided in a network, coordinates the control actions of the individual traffic control devices appropriately.

Description

technical field [0001] The invention relates to a communication control technology in the Internet, in particular to a firewall technology. technical background [0002] When connecting an internal network such as a corporate network to the Internet, a firewall is usually placed between the intranet and the Internet to prevent unauthorized access from the Internet to the intranet. [0003] Assuming that any access from the extranet to the intranet is unauthenticated, the firewall will operate. The current situation is that the Internet is always connected and the use of Ipv6 end-to-end communication is very common. However, in any case, the above assumptions are becoming more and more contradictory to the needs of intranet users. In particular, we look at the following Happening. For example, when a traveling businessman, or a home telecommuter tries to access his or her company's internal network, the firewall considers the access to be unauthorized. [0004] As an examp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/66H04L12/24H04L12/70H04L29/06
CPCH04L63/0218H04L63/20H04L63/0263
Inventor 铃木伸介新善文池田尚哉
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products