CN101635701A - Method for controlling safe access - Google Patents

Method for controlling safe access Download PDF

Info

Publication number
CN101635701A
CN101635701A CN200810116950A CN200810116950A CN101635701A CN 101635701 A CN101635701 A CN 101635701A CN 200810116950 A CN200810116950 A CN 200810116950A CN 200810116950 A CN200810116950 A CN 200810116950A CN 101635701 A CN101635701 A CN 101635701A
Authority
CN
China
Prior art keywords
user
role
data flow
user role
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810116950A
Other languages
Chinese (zh)
Inventor
刘向明
王钟
莫宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hillstone Networks Communication Technology (Beijing) Co Ltd
Original Assignee
Hillstone Networks Communication Technology (Beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hillstone Networks Communication Technology (Beijing) Co Ltd filed Critical Hillstone Networks Communication Technology (Beijing) Co Ltd
Priority to CN200810116950A priority Critical patent/CN101635701A/en
Publication of CN101635701A publication Critical patent/CN101635701A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a method for controlling safe access. The method comprises the following steps of: 1, in a process of access and authentication of a user, determining the role played by the user according to a user attribute; and 2, adding the determined user role to a firewall strategy so as to realize user role-based safe access control. Therefore, the method is backward-compatible with the functions of the conventional firewalls and realizes different user behavior managements on different users through the role-based safe access control, thereby laying a foundation for the integration of the network and security technology; and simultaneously, the method does not do any change in the priority and the first match principle of the firewall strategy and can be easily accepted by managers familiar with the firewall.

Description

The method of safe access control
Technical field
The present invention relates to network security, more specifically, relate to a kind of method of safe access control.
Background technology
Traditional firewall strategy or access control list (ACL) judgement determine whether allowing data flow according to the lower floor's attribute in the data flow.The attribute of general firewall policy foundation comprises that source address, source port, destination address, destination interface, protocol number or application type determine whether to allow passing through of data flow.General incoming interface and outgoing interface also can become the part of firewall policy.Some manufacturers can introduce the notion of security domain, utilize incoming interface security domain or outgoing interface security domain.Firewall policy is first matching principle.
On the basis of firewall policy, some manufacturers have introduced the notion of certification policy, and whether mate these tactful data flow must allow according to the information decision of organizing through authentication.But still utilize first the coupling principle.
Below be the example of a firewall policy:
The source interface territory Purpose interface territory Source address Source port Destination address Destination interface Agreement Group Action
Interior fields External domain Any ?Any ???? www.sina.com ????80 ?TCP g1 Do not allow
Interior fields External domain Any ?Any ????Any ????Any ?Any g2 Allow
Interior fields The DMZ territory 10.1.1.1 ?Any ????1.1.1.1 ????Any ?Any Allow Allow
External domain The DMZ territory Any ?Any ????1.1.1.1 ????80 ?TCP Allow Allow
Under the situation in given source interface territory and purpose interface territory, some manufacturer introduces the notion of authentication group.If detected stream coupling goes up these strategies, the user can determine group under it by firewall authentication.Determine whether to allow data flow pass through according to organizing whether to mate.
The source interface territory Purpose interface territory Source address Source port Destination address Destination interface Agreement Group Action
Interior fields External domain ??Any ??Any ?? www.sina.com ??80 ??TCP ??g1 Allow
Interior fields External domain ??Any ??Any ??Any ??80 ??TCP ??g2 Allow
Because the coupling of firewall policy is first coupling, if the group in the strategy of first coupling is not right, then data flow will be rejected.Even other strategy matching are arranged later on.For example, in the superincumbent example, if the Intranet user visit that belongs to g2 is arranged Www.sina.com, be article one strategy then because of first coupling based on the IP five-tuple, so we only can utilize this strategy to mate the information of group, if group does not match, we will can not continue to search the second strategy.
Based on role's access control (Role-Based Access Control-RBAC) or based on the access control (Identity-based Access Control) of identity is not new ideas.Application in the network equipment is representative with secure socket layer protocol VPN (virtual private network) (SSLVPN, security socket layer virtual private network).In traditional SSL VPN, can occur utilizing the authentication back to obtain the example of information from the radius certificate server.
The realization of different manufacturers is slightly different, and some introduces the notion of strategy group, searches the policy group according to user's group.Some then utilizes user or group to be index.Because a user may belong to a plurality of groups, thus between each strategy, make preferentially of group, or directly give strategy with priority.
User, group ??URL Action
??Tim?Liu ?? http://marketing.hillstonenet.com Do not allow
Sell ?? http://marketing.hillstonenet.com Allow
The engineer ?? http://eng.hillstonenet.com Allow
Strategy and the fire compartment wall of SSL VPN are very different, and can't directly incorporate firewall policy.
Summary of the invention
In order in fire compartment wall, to support access control based on the role, the present invention proposes a kind of method of safe access control, this method may further comprise the steps: step 1, in user's access and verification process, determine user role according to user property; And step 2, determined user role is added in the firewall policy, to realize safe access control based on user role.
Wherein, between step 1 and step 2, also comprise: set up system user role tabulation, and determined user role is inserted in the system user role tabulation.
Also comprise in step 2: set up in the process in data flow, according to the information of system user role tabulation and data flow, specified data flows pairing user role; And mate the firewall policy that has added user role according to lower floor's attribute of pairing user role of determined data flow and data flow, to realize safe access control based on user role.
The method according to this invention, user property comprise one or more in the following attribute: the safe condition of the security domain at user name, user's group, user's IP address, user place, user's access way, the employed PC of user and PC that the user uses.
Role's tabulation is made up of determined user role and user property.
In addition, the information of data flow comprises port information, security domain, encrypted state and IP heading.
Lower floor's attribute of data flow comprises source address, source port, destination address, destination interface and the protocol type of data flow.
The method according to this invention, the user supports one or more roles.
Therefore, adopt the method for the present invention can be backwards-compatible fully to the traditional firewall function, and the access control based on the role has realized different user is carried out different user behavior management, this lays the foundation for integrated network and safe practice, simultaneously, this method is not changed the priority and first matching principle of firewall policy, and is more acceptant to the administrative staff that are familiar with fire compartment wall.
Other features and advantages of the present invention will be set forth in the following description, and, partly from specification, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in the specification of being write, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide further understanding of the present invention, and constitutes the part of specification, is used from explanation the present invention with embodiments of the invention one, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method according to this invention; And
Fig. 2 is the schematic diagram according to the embodiment of the inventive method.
Embodiment
Below in conjunction with accompanying drawing the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein only is used for description and interpretation the present invention, and be not used in qualification the present invention.
As shown in Figure 1, this method may further comprise the steps:
S102 in user's access and verification process, determines user role according to user property; And
S104 adds determined user role in the firewall policy to, to realize the safe access control based on user role.
Wherein, between S102 and S104, also comprise: set up system user role tabulation, and determined user role is inserted in the system user role tabulation.
Also comprise in S104: set up in the process in data flow, according to the information of system user role tabulation and data flow, specified data flows pairing user role; And mate the firewall policy that has added user role according to lower floor's attribute of pairing user role of determined data flow and data flow, to realize safe access control based on user role.
The method according to this invention, user property comprise one or more in the following attribute: the safe condition of the security domain at user name, user's group, user's IP address, user place, user's access way, the employed PC of user and PC that the user uses.
Role's tabulation is made up of determined user role and user property.
In addition, the information of data flow comprises port information, security domain, encrypted state and IP heading.
Lower floor's attribute of data flow comprises source address, source port, destination address, destination interface and the protocol type of data flow.
The method according to this invention, the user supports one or more roles.
Next embodiments of the invention are described.
User's role can be according to the decision of next parameter or Several Parameters: user name, user's group, IP address, user place security domain, user's access way, the safe condition of user PC, user PC and other roles' of user combination.
The user insert and verification process in, can determine his role (may for multinomial) according to user's login attribute, the state that authenticates attribute and his employed PC.In the system actor tabulation, insert an object.Role's tabulation comprises: IP address; User place security domain; User's access way; User's role (may be multinomial).
Set up in the fire compartment wall data flow and can carry out strategy in the process and search, we search according to port information, security domain, VPN and IP heading diagonal angle the swatch color list, obtain the Role Information of this data flow.
Introduce role's notion in firewall policy, the coupling of firewall policy no longer is the IP five-tuple, but comprises hexa-atomic group of role.
This embodiment supports general firewall policy and based on the mixing fully of role's strategy, and is the same with firewall policy, relies on the natural ordering of strategy to determine priority.
Compatible fully with firewall policy in the past, each tactful role can be " Any ", promptly mates all user roles.The role is that the strategy of " Any " is degenerated to general firewall policy.
Mate to comprise hexa-atomic group of role, keep first matching principle of firewall policy.
Support that the user has a plurality of roles, but the role there is not priority, complete natural priority level according to strategy.
Be exemplified below:
Group Source address Source port Destination address Destination interface Agreement Action
The casual labour ??Any ??Any ??Intranet ??80 ??TCP Do not allow
The engineer ??Any ??Any ??Intranet ??80 ??TCP Allow
??Any ??Any ??Any ??Any ??80 ??TCP Allow
In this example, to the visit of Intranet address, all belong to all can't visiting of casual labour (Contractor) group.All belong to can visiting of engineer (Engineer) group.If a user not only belongs to the Contractor group but also belongs to the Engineer group, then he can't visit Intranet, because unallowed strategy is preceding.Can visit if want to reach all Engineer, and the purpose that other Contractor can not visit, it is just passable that the second strategy is put into article one front.
For example on firewall box, support SSL VPN simultaneously.Present embodiment can reach the fusion fully of firewall policy and SSL VPN strategy.
Group Source address Source port Destination address Destination interface Agreement Action
??SSL ??Any ??Any The Intranet server ??Any ??Any Do not allow
The engineer ??Any ??Any The Eng server ??Any ??Any Allow
??Any ??Eng_IPs ??Any ??Any ??Any ??Any Allow
??Any ??Any ??Any The Email server ??Any ??Any Allow
Fig. 2 is the schematic diagram according to the embodiment of the inventive method.
As shown in Figure 2, the security gateway of a company has the dual-use function of fire compartment wall and SSL VPN, when the user when public network inserts with SSL VPN, system gives a role " SSL " for these flows, for the engineer (Engineers) of those long-range accesses, this system has also given another role " Engineer ".Company's Intranet has two kinds of PC: a class is the Utility Engineers, group of addresses is Eng_IPs, another kind of is other people usefulness, and group of addresses is that Other_IPs company has three servers: e-mail service device (Email Server), internal server (Intranet Server) and research and development are with server (Eng Server).
Be provided with these strategies in the Policy List:
The remote access user mustn't visit internal server (Intranet Server);
No matter researching and developing with server (Eng Server) of the long-range access of engineer with can visiting of inter access;
The PC of engineer in the Intranet can visit the Intranet Servers-all; And
Though other people long-range access with inter access can see Email, visit e-mail service device (Email Server).
In sum, adopt the method for the present invention can be backwards-compatible fully to the traditional firewall function, and the access control based on the role has realized different user is carried out different user behavior management, this lays the foundation for integrated network and safe practice, simultaneously, this method is not changed the priority and first matching principle of firewall policy, and is more acceptant to the administrative staff that are familiar with fire compartment wall.
Be the preferred embodiments of the present invention only below, be not limited to the present invention, for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. the method for a safe access control is characterized in that, said method comprising the steps of:
Step 1 in user's access and verification process, is determined user role according to user property; And
Step 2 is added determined user role in the firewall policy to, to realize the safe access control based on user role.
2. method according to claim 1 is characterized in that, also comprises between described step 1 and described step 2:
Set up system user role tabulation, and determined user role is inserted in the described system user role tabulation.
3. method according to claim 2 is characterized in that, also comprises in described step 2:
Set up in the process in data flow,, determine the pairing user role of described data flow according to the information of described system user role tabulation and described data flow; And
Lower floor's attribute according to pairing user role of determined described data flow and described data flow mates the firewall policy that has added user role, to realize the safe access control based on user role.
4. method according to claim 3, it is characterized in that described user property comprises one or more in the following attribute: the safe condition of the security domain at user name, user's group, user's IP address, user place, user's access way, the employed PC of user and PC that the user uses.
5. method according to claim 4 is characterized in that, described role's tabulation is made up of determined user role and described user property.
6. method according to claim 5 is characterized in that, the information of described data flow comprises port information, security domain, encrypted state and IP heading.
7. method according to claim 6 is characterized in that, lower floor's attribute of described data flow comprises source address, source port, destination address, destination interface and the protocol type of described data flow.
8. method according to claim 7 is characterized in that described user supports one or more roles.
CN200810116950A 2008-07-21 2008-07-21 Method for controlling safe access Pending CN101635701A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810116950A CN101635701A (en) 2008-07-21 2008-07-21 Method for controlling safe access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810116950A CN101635701A (en) 2008-07-21 2008-07-21 Method for controlling safe access

Publications (1)

Publication Number Publication Date
CN101635701A true CN101635701A (en) 2010-01-27

Family

ID=41594763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810116950A Pending CN101635701A (en) 2008-07-21 2008-07-21 Method for controlling safe access

Country Status (1)

Country Link
CN (1) CN101635701A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984295A (en) * 2013-02-12 2014-08-13 西门子公司 Method for user management and a power plant control system thereof for a power plant system
CN105592052A (en) * 2015-09-10 2016-05-18 杭州华三通信技术有限公司 Method and device for configuring firewall rules
CN106375330A (en) * 2016-09-21 2017-02-01 东软集团股份有限公司 Data detection method and device
WO2021046782A1 (en) * 2019-09-11 2021-03-18 Oppo广东移动通信有限公司 Access control method, device, and storage medium
CN113225409A (en) * 2021-05-27 2021-08-06 北京天融信网络安全技术有限公司 NAT load balancing access method, device and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1697450A (en) * 2005-04-14 2005-11-16 西安交大捷普网络科技有限公司 Quick method for realizing authentication function of firewall

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1697450A (en) * 2005-04-14 2005-11-16 西安交大捷普网络科技有限公司 Quick method for realizing authentication function of firewall

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984295A (en) * 2013-02-12 2014-08-13 西门子公司 Method for user management and a power plant control system thereof for a power plant system
CN105592052A (en) * 2015-09-10 2016-05-18 杭州华三通信技术有限公司 Method and device for configuring firewall rules
CN105592052B (en) * 2015-09-10 2019-06-07 新华三技术有限公司 A kind of firewall rule configuration method and device
CN106375330A (en) * 2016-09-21 2017-02-01 东软集团股份有限公司 Data detection method and device
WO2021046782A1 (en) * 2019-09-11 2021-03-18 Oppo广东移动通信有限公司 Access control method, device, and storage medium
CN113728600A (en) * 2019-09-11 2021-11-30 Oppo广东移动通信有限公司 Access control method, device and storage medium
CN113728600B (en) * 2019-09-11 2023-10-24 Oppo广东移动通信有限公司 Access control method, equipment and storage medium
CN113225409A (en) * 2021-05-27 2021-08-06 北京天融信网络安全技术有限公司 NAT load balancing access method, device and storage medium

Similar Documents

Publication Publication Date Title
CN110351381B (en) Block chain-based Internet of things trusted distributed data sharing method
US8001610B1 (en) Network defense system utilizing endpoint health indicators and user identity
CN103457878B (en) A kind of access control method based on stream
CN101167093A (en) System and method for developing and using trusted policy based on a social model
CN109302310B (en) A kind of network O&M vulnerability analysis method
CN101635701A (en) Method for controlling safe access
JP2016045934A (en) Customer data management for data analysis outsourcing
Lampropoulos et al. Identity management directions in future internet
JP2023506004A (en) Programmable switching devices for network infrastructure
Alsmadi The integration of access control levels based on SDN
Leskinen Evaluation criteria for future identity management
Taylor et al. Implementing role based access control for federated information systems on the web
Müller et al. A secure service infrastructure for interconnecting future home networks based on DPWS and XACML
Chandersekaran et al. Use case based access control
Wijesekara A Literature Review on Access Control in Networking Employing Blockchain
Feeney et al. A trust model for capability delegation in federated policy systems
Cisco Understanding the Network Topology Tree
Cisco Understanding the Network Topology Tree
Cisco Understanding the Network Topology Tree
Cisco Understanding the Network Topology Tree
Cisco Populating the Network Topology Tree
Seneviratne et al. Integrated Corporate Network Service Architecture for Bring Your Own Device (BYOD) Policy
Cisco Populating the Network Topology Tree
Cisco Populating the Network Topology Tree
Gordon A matter of trust

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract

Assignee: Suzhou Shanshi Network Co., Ltd.

Assignor: Hillstone Networks Communication Technology (Beijing) Co., Ltd.

Contract record no.: 2012990000129

Denomination of invention: A method and device for secure access control based on user

License type: Exclusive License

Open date: 20100127

Record date: 20120326

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100127