CN105245504A - North-south flow safety protection system in cloud computing network - Google Patents

North-south flow safety protection system in cloud computing network Download PDF

Info

Publication number
CN105245504A
CN105245504A CN201510574191.7A CN201510574191A CN105245504A CN 105245504 A CN105245504 A CN 105245504A CN 201510574191 A CN201510574191 A CN 201510574191A CN 105245504 A CN105245504 A CN 105245504A
Authority
CN
China
Prior art keywords
network
tenant
logic
virtual machine
firewall
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510574191.7A
Other languages
Chinese (zh)
Inventor
王智民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING OPZOON TECHNOLOGY Co Ltd
Opzoon Technology Co Ltd
Original Assignee
BEIJING OPZOON TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING OPZOON TECHNOLOGY Co Ltd filed Critical BEIJING OPZOON TECHNOLOGY Co Ltd
Priority to CN201510574191.7A priority Critical patent/CN105245504A/en
Publication of CN105245504A publication Critical patent/CN105245504A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a north-south flow safety protection system in a cloud computing network. The system comprises a virtual machine occupied by a tenant, a virtual firewall for monitoring communication between the virtual machine currently occupied by the tenant and a Network, a first network forwarding layer and a second network forwarding layer, wherein the first network forwarding layer is used for judging a source of a message through recognizing a label of the received message, if the message is from the virtual machine, the message is forwarded to the virtual firewall corresponding to the tenant of the current virtual machine, and the message processed by the virtual firewall is sent to the Network via a second-layer switch and a third-layer switch; and the second network forwarding layer is used for receiving the message from the Network, judging the tenant to which the message belongs through recognizing the label of the message, issuing the message to the virtual machine corresponding to the tenant designated by the label of the message, and forwarding the message sent by the virtual machine to the second-layer switch.

Description

North-south traffic security guard system in a kind of system for cloud computing
Technical field
The present invention relates to field of cloud computer technology, particularly relate to traffic security guard system in north-south in a kind of system for cloud computing.
Background technology
Virtual computation environmental is formed primarily of empty machine VM, both virtualization system Hypervisor.From the angle of network boundary protection, potential safety hazards such as there is empty machine VM north-south flow, East and West direction flow is accessed, invade, hide.
Cross-node in the networks most situation of tenant inside, that double layer network structure (is not got rid of and had Three Tiered Network Architecture yet mostly simultaneously, but consider the problem such as empty machine migration across data center, in most cases still adopt large double layer network structure), so access has following features between the inner empty machine VM of tenant.The empty machine of same tenant is on different physical nodes, and the flow of exchanging visit goes out physical node.The empty machine of same tenant is all in a large double layer network, and exchanging visit flow is wanted to pass through three-layer network.The internal network of same tenant may need to divide different safety zone VN, and the security strategy between safety zone is different.
Longitudinal flow comprises the normal discharge access request from client to server side, and three layers of flow forwarded between different VM.The common feature of these flows is that its exchange necessarily passes external hardware safety protection layer, and we are also referred to as longitudinal flow control layer.
On the one hand, the protection method of these flows is compared with the security protection of traditional data center does not have essential distinction; On the other hand, the cloud security under virtualized environment is disposed, because there is the service model of many tenants, the virtual realization degree therefore for equipment has had again higher requirement.
Because longitudinal flow exists the concept of many tenants, then demand be it is also proposed to safety, the security protection based on tenant can be realized.
Summary of the invention
The object of this invention is to provide one to be embedded into seamless for empty machine fire compartment wall in virtual platform, thus realize in system for cloud computing the security protection of north-south flow.
In order to realize foregoing invention object, to the invention provides in a kind of system for cloud computing north-south traffic security protection deployment system, comprising: the virtual machine that tenant takies and the virtual firewall communicated for monitoring the virtual machine shared by current tenant and Network network, first network forwarding and second network forwarding;
Described first network forwarding, for being judged the source of this message by the identification of the label to the message received, if source is virtual machine, then by described message repeating to current virtual machine tenant corresponding to virtual firewall, and the message after this virtual firewall process is sent to Network network through Layer 2 switch and three-tier switch, if source is Network network, then by described message repeating to this message label indicated by virtual firewall, and the message after this virtual firewall process is sent to second network forwarding through Layer 2 switch,
Described second network forwarding, during for receiving the message from Network network, the tenant that this message belongs to is judged by the identification of the label to message, and this message is issued to the virtual machine corresponding to the tenant indicated by label of this message, also for message repeating that virtual machine is sent to Layer 2 switch.
Wherein, described first network forwarding and virtual firewall run on first server and troop, and described second network forwarding and virtual machine run on second server cluster.
Wherein, described second network forwarding comprises physical network card, logic network interface card and logic bridge;
Described second server is trooped and is comprised multiple physical server, same physical server comprises physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks jig has the Logic Networks clamp interface identical with the tenant's quantity on present physical server, each Logic Networks clamp interface connects a described logic bridge, and each Logic Networks bridging connects one or more virtual machines of the same tenant run on present physical server.
Wherein, described first network forwarding comprises physical network card, logic network interface card and logic bridge;
The physical server of described first server cluster has physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this logic network interface card is except having with except described tenant one to one Logic Networks clamp interface, also there is the Logic Networks clamp interface receiving and come from Network network message, each Logic Networks clamp interface connects a described logic bridge, and Logic Networks bridging connects the virtual firewall of the tenant corresponding to it.
Wherein, described first network forwarding comprises physical network card, logic network interface card and logic bridge;
The physical server of described first server cluster has physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks links and connects described logic bridge, and described logic bridge connects the Tap interface of the virtual machine running virtual firewall respectively.
Wherein, when described virtual firewall is operated in route pattern, described virtual firewall internal configurations has VLAN and gateway.
Wherein, when described virtual firewall is operated in transparent mode, described three-tier switch connects hardware firewall, and configure routing gateway and Nat on this three-tier switch.
Wherein, the physical server of described first server cluster runs a virtual machine, this virtual machine runs and described tenant virtual firewall one to one,
Described first network forwarding comprises physical network card and logic network interface card;
The physical server of described first server cluster has physical network card described in multiple, and these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, and this Logic Networks links the virtual firewall connect corresponding to each tenant.
According to another aspect of the present invention, north-south traffic security protection deployment system in a kind of system for cloud computing, comprising: the virtual machine that tenant takies and the hardware firewall communicated for monitoring the virtual machine shared by current tenant and Network network;
Described hardware firewall is deployed in three-tier switch, and hardware firewall inside comprises and each tenant logic firewall unit one to one, and each logic firewall unit connects physical network card respectively, and this physical network card connects Layer 2 switch;
Described virtual machine runs on second server and troops, described second server is trooped and is comprised multiple physical server, same physical server comprises physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks jig has the Logic Networks clamp interface identical with the tenant's quantity on present physical server, each Logic Networks clamp interface connects a described logic bridge, and each Logic Networks bridging connects one or more virtual machines of the same tenant run on present physical server.
According to another aspect of the present invention, north-south traffic security protection deployment system in a kind of system for cloud computing, comprising: the virtual machine that tenant takies and the hardware firewall communicated for monitoring the virtual machine shared by current tenant and Network network;
Described virtual machine runs on cluster of servers, described cluster of servers comprises multiple physical server, same physical server comprises physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks jig has the Logic Networks clamp interface identical with the tenant's quantity on present physical server, each Logic Networks clamp interface connects a described logic bridge, and each Logic Networks bridging connects one or more virtual machines of the same tenant run on present physical server;
Described hardware firewall inside comprises and each tenant logic firewall unit one to one, each logic firewall unit connects each physical network card being placed in hardware firewall respectively, the physical network card that the server zone that part physical network interface card connects operation virtual machine is concentrated, part physical network interface card is connected to Network network by Layer 2 switch and three-tier switch.
Accompanying drawing explanation
Fig. 1 is the deployment architecture schematic diagram according to first embodiment of the invention;
Fig. 2 is the deployment architecture schematic diagram according to second embodiment of the invention;
Fig. 3 is the deployment architecture schematic diagram according to third embodiment of the invention;
Fig. 4 is the deployment architecture schematic diagram according to four embodiment of the invention;
Fig. 5 is the deployment architecture schematic diagram according to fifth embodiment of the invention;
Fig. 6 is the deployment architecture schematic diagram according to sixth embodiment of the invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with embodiment also with reference to accompanying drawing, the present invention is described in more detail.Should be appreciated that, these describe just exemplary, and do not really want to limit the scope of the invention.In addition, in the following description, the description to known features and technology is eliminated, to avoid unnecessarily obscuring concept of the present invention.
Fig. 1 is the deployment architecture schematic diagram according to first embodiment of the invention.
The scene that this deployment architecture is suitable for is the safety system that tenant needs independently to have routing function, and the identification of tenant simultaneously depends on virtual platform, instead of safety system.
As shown in Figure 1, in system for cloud computing, north-south traffic security protection deployment system comprises: first server is trooped ClusterA and second server cluster ClusterB, Layer 2 switch L2Switch and three-tier switch L3Switch.
Suppose that current cloud computing platform provides service for two tenants, in order to sake of clarity, in Fig. 1, oval frame line is represented as the resource that tenant 1 provides service, the frame line of rectangle is represented as the resource that tenant 2 provides service, and trapezoidal frame line represents the shared resource of tenant 1 and tenant 2.
ClusterB comprises two physical server Host2 and Host3.In Host2, tenant 1 occupies two virtual machine VM, and tenant 2 occupies 1 virtual machine VM.In Host3, tenant 1 occupies 1 virtual machine VM, and tenant 2 occupies 2 virtual machine VM.
Run 2 virtual machine VM in physical server Host1 in ClusterA, every platform virtual machine has run a virtual firewall VFW (Virtualfirewal).Two VFW are responsible for the VM of the tenant 1 and VM of tenant 2 in monitoring ClusterB respectively.
Virtual machine in ClusterB connects Layer 2 switch L2Switch by second network forwarding.Second network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br100, br200.Physical network card eth0, eth1 on Host2 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 2 virtual machines of service, and br200 connects for tenant 2 provides 1 virtual machine of service.Physical network card eth0, eth1 on Host3 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 1 virtual machine of service, and br200 connects for tenant 2 provides 2 virtual machines of service.
Virtual firewall in ClusterA on virtual machine connects Layer 2 switch L2Switch by first network forwarding.First network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br100, br200, br400.Physical network card eth0, eth1 on Host1 are bound to logic network interface card bond0, logic network interface card bond0 has 3 Logic Networks clamp interface bond0.100 and bond0.200 and bond0.400, wherein bond0.100 provides service for tenant 1, bond0.200 provides service for tenant 2, bond0.400 connects outside Network network, and simultaneously for tenant 1 and tenant 2 provide service.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200, and bond0.400 connects logic bridge br400.Br100 connects for tenant 1 provides the virtual firewall of service, and br200 connects to be provided the virtual firewall of service for tenant 1 for tenant 2 provides the virtual firewall of service, br400 to connect simultaneously and provide the virtual firewall of service for tenant 2.
For the resource apparatus distributing IP address of tenant.
The virtual firewall private IP address arranging the tenant 1 on Host1 is: 192.188.60.1.The private IP address arranging all virtual machines of tenant 1 in ClusterB is respectively: 192.188.60.2; 192.188.60.3; 192.188.60.4.
The virtual firewall private IP address arranging the tenant 2 on Host1 is: 192.188.61.1.The private IP address arranging all virtual machines of tenant 2 in ClusterB is respectively: 192.188.61.2; 192.188.61.3; 192.188.61.4.
When the IP address of the tenant 1 be positioned on Host2 is: the virtual machine VM of 192.188.60.2 is by when being sent to Network network in advance by message, when the virtual firewall being positioned at tenant 1 on Host1 belongs to its monitoring range according to the tag recognition of message to this message, the default interception rule according to virtual firewall processes this message.
Fig. 2 is the deployment architecture schematic diagram according to second embodiment of the invention.
The scene that this deployment architecture is suitable for is the safety system that tenant needs independently to have routing function, and the identification of tenant simultaneously depends on safety system, instead of virtual platform.
As shown in Figure 2, in system for cloud computing, north-south traffic security protection deployment system comprises: first server is trooped ClusterA and second server cluster ClusterB, Layer 2 switch L2Switch and three-tier switch L3Switch.
Suppose that current cloud computing platform provides service for two tenants, in order to sake of clarity, in Fig. 2, oval frame line is represented as the resource that tenant 1 provides service, the frame line of rectangle is represented as the resource that tenant 2 provides service, and trapezoidal frame line represents the shared resource of tenant 1 and tenant 2.
ClusterB comprises two physical server Host2 and Host3.In Host2, tenant 1 occupies two virtual machine VM, and tenant 2 occupies 1 virtual machine VM.In Host3, tenant 1 takies 1 virtual machine VM, and tenant 2 occupies 2 virtual machine VM.
Run 2 virtual machine VM in physical server Host1 in ClusterA, every platform virtual machine runs a virtual firewall VFW (Virtualfirewal), this virtual firewall VFW internal configurations VlAN and gateway.The VM of the tenant 1 and virtual machine VM of tenant 2 in two VFW monitored in common ClusterB.Wherein, every platform virtual machine VM has 2 logic network interface card Tap, and wherein, a logic network interface card Tap mouth of a virtual machine is used for providing service for tenant 1, and a logic network interface card Tap mouth of another virtual machine is used for providing service for tenant 2.
Virtual machine in ClusterB connects Layer 2 switch L2Switch by second network forwarding.Second network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br100, br200.Physical network card eth0, eth1 on Host2 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 2 virtual machines of service, and br200 connects for tenant 2 provides 1 virtual machine of service.Physical network card eth0, eth1 on Host3 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 1 virtual machine of service, and br200 connects for tenant 2 provides 2 virtual machines of service.
Virtual firewall in ClusterA on virtual machine connects the trunk port of Layer 2 switch L2Switch by first network forwarding.First network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br0.Physical network card eth0, eth1 on Host1 are bound to logic network interface card bond0, and logic network interface card bond0 connects logic bridge br0.Br0 connects the Tap interface of the virtual machine providing the virtual firewall of service to run for tenant 1 and tenant 2 respectively.
For the resource apparatus distributing IP address of tenant.
Arrange on Host1 and for tenant 1 provides the private IP address of the Tap port of service be: 192.188.60.1.
The private IP address arranging all virtual machines of tenant 1 in ClusterB is respectively: 192.188.60.2; 192.188.60.3; 192.188.60.4.
Arrange on Host1 and for tenant 2 provides the private IP address of the Tap port of service be: 192.188.61.1.The private IP address arranging all virtual machines of tenant 2 in ClusterB is respectively: 192.188.61.2; 192.188.61.3; 192.188.61.4.
Arrange on Host1 and connect outside Network network and simultaneously for tenant 1 and tenant 2 provide the private IP address of two of service Tap ports to be respectively: 192.188.63.1 and 192.188.63.2.
When the IP address of the tenant 1 be positioned on Host2 is: the virtual machine VM of 192.188.60.2 is by when being sent to Network network in advance by message, when the virtual firewall being positioned at tenant 1 on Host1 belongs to its monitoring range according to the tag recognition of message to this message, the default interception rule according to virtual firewall processes this message.
Fig. 3 is the deployment architecture schematic diagram according to third embodiment of the invention.
The scene that this deployment architecture is suitable for is tenant's needs independently transparent security system (IPS, AV etc.), and the identification of tenant simultaneously depends on safety system, instead of virtual platform.
As shown in Figure 3, in system for cloud computing, north-south traffic security protection deployment system comprises: first server is trooped ClusterA and second server cluster ClusterB, Layer 2 switch L2Switch and three-tier switch L3Switch.
Suppose that current cloud computing platform provides service for two tenants, in order to sake of clarity, in Fig. 3, oval frame line is represented as the resource that tenant 1 provides service, the frame line of rectangle is represented as the resource that tenant 2 provides service, and trapezoidal frame line represents the shared resource of tenant 1 and tenant 2.
ClusterB comprises two physical server Host2 and Host3.In Host2, tenant 1 occupies two virtual machine VM, and tenant 2 occupies 1 virtual machine VM.In Host3, tenant 1 takies 1 virtual machine VM, and tenant 2 occupies 2 virtual machine VM.
Run 2 virtual machine VM in physical server Host1 in ClusterA, every platform virtual machine has run a virtual firewall VFW (Virtualfirewal).The VM of the tenant 1 and virtual machine VM of tenant 2 in two VFW monitored in common ClusterB.Wherein, every platform virtual machine VM has 2 logic network interface card Tap, and a logic network interface card Tap mouth of a virtual machine is used for providing service for tenant 1, and a logic network interface card Tap mouth of another virtual machine is used for providing service for tenant 2.
Virtual machine in ClusterB connects Layer 2 switch L2Switch by second network forwarding.Second network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br100, br200.Physical network card eth0, eth1 on Host2 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 2 virtual machines of service, and br200 connects for tenant 2 provides 1 virtual machine of service.Physical network card eth0, eth1 on Host3 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 1 virtual machine of service, and br200 connects for tenant 2 provides 2 virtual machines of service.
Virtual firewall in ClusterA on virtual machine connects the trunk port of Layer 2 switch L2Switch by first network forwarding.First network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br0.Physical network card eth0, eth1 on Host1 are bound to logic network interface card bond0, and logic network interface card bond0 connects logic bridge br0.Br0 connects the Tap interface of the virtual machine providing the virtual firewall of service to run for tenant 1 and tenant 2 respectively.
Three-tier switch connects physics fire compartment wall, and configure routing gateway and Nat on this three-tier switch.
For the resource apparatus distributing IP address of tenant.
The private IP address arranging all virtual machines of tenant 1 in ClusterB is respectively: 192.188.60.2; 192.188.60.3; 192.188.60.4.
The private IP address arranging all virtual machines of tenant 2 in ClusterB is respectively: 192.188.61.2; 192.188.61.3; 192.188.61.4.
When the IP address of the tenant 1 be positioned on Host2 is: the virtual machine VM of 192.188.60.2 is by when being sent to Network network in advance by message, when the virtual firewall being positioned at tenant 1 on Host1 belongs to its monitoring range according to the tag recognition of message to this message, the default interception rule according to virtual firewall processes this message.
Fig. 4 is the deployment architecture schematic diagram according to four embodiment of the invention.
The scene that this deployment architecture is suitable for is the safety system that tenant does not need independently to have routing function, and be security protection characteristic, now multiple tenant shares a safety system, and identification and the isolation of tenant depend on safety system, and this safety system is that empty machine form provides.
As shown in Figure 4, in system for cloud computing, north-south traffic security protection deployment system comprises: first server is trooped ClusterA and second server cluster ClusterB, Layer 2 switch L2Switch and three-tier switch L3Switch.
Suppose that current cloud computing platform provides service for two tenants, in order to sake of clarity, in Fig. 4, oval frame line is represented as the resource that tenant 1 provides service, the frame line of rectangle is represented as the resource that tenant 2 provides service, and trapezoidal frame line represents the shared resource of tenant 1 and tenant 2.
ClusterB comprises two physical server Host2 and Host3.In Host2, tenant 1 occupies two virtual machine VM, and tenant 2 occupies 1 virtual machine VM.In Host3, tenant 1 takies 1 virtual machine VM, and tenant 2 occupies 2 virtual machine VM.
Run 1 virtual machine VM in physical server in ClusterA, this virtual machine runs a virtual firewall VFW (Virtualfirewal), it is for the virtual machine VM of the VM and tenant 2 that monitor tenant 1 in ClusterB.Wherein, mark off 2 logic firewall unit in virtual firewall VFW inside, the corresponding tenant of each logic firewall unit.
Virtual machine in ClusterB connects Layer 2 switch L2Switch by second network forwarding.Second network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br100, br200.Physical network card eth0, eth1 on Host2 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 2 virtual machines of service, and br200 connects for tenant 2 provides 1 virtual machine of service.Physical network card eth0, eth1 on Host3 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 1 virtual machine of service, and br200 connects for tenant 2 provides 2 virtual machines of service.
Virtual firewall in ClusterA on virtual machine connects the trunk port of Layer 2 switch L2Switch by first network forwarding.First network forwarding comprises physical network card eth0, eth1, logic network interface card bond0.Physical network card eth0, eth1 in ClusterA are bound to logic network interface card bond0, and logic network interface card bond0 connects respectively for tenant 1 and tenant 2 provide the logic firewall unit of service.
For the resource apparatus distributing IP address of tenant.
The private IP address arranging all virtual machines of tenant 1 in ClusterB is respectively: 192.188.60.2; 192.188.60.3; 192.188.60.4.
The private IP address arranging all virtual machines of tenant 2 in ClusterB is respectively: 192.188.61.2; 192.188.61.3; 192.188.61.4.
When the IP address of the tenant 1 be positioned on Host2 is: the virtual machine VM of 192.188.60.2 is by when being sent to Network network in advance by message, when the virtual firewall being positioned at tenant 1 on Host1 belongs to its monitoring range according to the tag recognition of message to this message, the default interception rule according to virtual firewall processes this message.
Fig. 5 is the deployment architecture schematic diagram according to fifth embodiment of the invention.
The scene that this deployment architecture is suitable for is the safety system that tenant does not need independently to have routing function, and be security protection characteristic, now multiple tenant shares a safety system, and identification and the isolation of tenant depend on safety system, and this safety system is that hardware state provides.
As shown in Figure 5, in system for cloud computing, north-south traffic security protection deployment system comprises: first server troop ClusterA, be arranged in hardware firewall in three-tier switch L3Switch and Layer 2 switch L2Switch.
Suppose that current cloud computing platform provides service for two tenants, in order to sake of clarity, in Fig. 5, oval frame line is represented as the resource that tenant 1 provides service, the frame line of rectangle is represented as the resource that tenant 2 provides service, and trapezoidal frame line represents the shared resource of tenant 1 and tenant 2.
ClusterB comprises two physical server Host2 and Host3.In Host2, tenant 1 occupies two virtual machine VM, and tenant 2 occupies 1 virtual machine VM.In Host3, tenant 1 takies 1 virtual machine VM, and tenant 2 occupies 2 virtual machine VM.
Virtual machine in ClusterB connects Layer 2 switch L2Switch by second network forwarding.Second network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br100, br200.Physical network card eth0, eth1 on Host2 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 2 virtual machines of service, and br200 connects for tenant 2 provides 1 virtual machine of service.Physical network card eth0, eth1 on Host3 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 1 virtual machine of service, and br200 connects for tenant 2 provides 2 virtual machines of service.
Mark off 2 logic firewall unit in hardware firewall host1, the corresponding tenant of each logic firewall unit, for monitor this tenant in ClusterB virtual machine VM and Network between communication.
Hardware firewall connects the trunk port of Layer 2 switch L2Switch by first network forwarding.First network forwarding comprises physical network card eth0, eth1.Physical network card eth0, eth1 connect logic firewall unit respectively.
For the resource apparatus distributing IP address of tenant.
The private IP address arranging all virtual machines of tenant 1 in ClusterB is respectively: 192.188.60.2; 192.188.60.3; 192.188.60.4.
The private IP address arranging all virtual machines of tenant 2 in ClusterB is respectively: 192.188.61.2; 192.188.61.3; 192.188.61.4.
When the IP address of the tenant 1 be positioned on Host2 is: the virtual machine VM of 192.188.60.2 is by when being sent to Network network in advance by message, when the logic firewall unit being positioned at tenant 1 on Host1 belongs to its monitoring range according to the tag recognition of message to this message, the default interception rule according to logic firewall unit processes this message.
Fig. 6 is the deployment architecture schematic diagram according to sixth embodiment of the invention.
The scene that this deployment architecture is suitable for does not need independently transparent security system for tenant, and be security protection characteristic, now multiple tenant shares a safety system, and identification and the isolation of tenant depend on safety system, and this safety system is that hardware state provides.
As shown in Figure 6, in system for cloud computing, north-south traffic security protection deployment system comprises: first server is trooped ClusterA, hardware firewall, Layer 2 switch L2Switch and three-tier switch L3Switch.
Suppose that current cloud computing platform provides service for two tenants, in order to sake of clarity, in Fig. 6, oval frame line is represented as the resource that tenant 1 provides service, the frame line of rectangle is represented as the resource that tenant 2 provides service, and trapezoidal frame line represents the shared resource of tenant 1 and tenant 2.
ClusterB comprises two physical server Host2 and Host3.In Host2, tenant 1 occupies two virtual machine VM, and tenant 2 occupies 1 virtual machine VM.In Host3, tenant 1 takies 1 virtual machine VM, and tenant 2 occupies 2 virtual machine VM.
Virtual machine in ClusterB connects Layer 2 switch L2Switch by second network forwarding.Second network forwarding comprises physical network card eth0, eth1, logic network interface card bond0 and logic bridge br100, br200.Physical network card eth0, eth1 on Host2 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 2 virtual machines of service, and br200 connects for tenant 2 provides 1 virtual machine of service.Physical network card eth0, eth1 on Host3 are bound to logic network interface card bond0, and logic network interface card bond0 has two Logic Networks clamp interface bond0.100 and bond0.200, and wherein bond0.100 provides service for tenant 1, and bond0.200 provides service for tenant 2.Bond0.100 connects logic bridge br100, and bond0.200 connects logic bridge br200.Br100 connects for tenant 1 provides 1 virtual machine of service, and br200 connects for tenant 2 provides 2 virtual machines of service.
Mark off 2 logic firewall unit in hardware firewall host1, the corresponding tenant of each logic firewall unit, for monitor this tenant in ClusterB virtual machine VM and Network between communication.
Hardware firewall comprises physical network card eth0, eth1.Wherein, physical network card eth0 connects the trunk port of Layer 2 switch L2Switch, and physical network card eth1 connects physical network card eth0, the eth1 of the physical server in ClusterB respectively.
The trunk interface of Layer 2 switch L2Switch is connected to three-tier switch L3Switch, and three-tier switch L3Switch connects Network network.
For the resource apparatus distributing IP address of tenant.
The private IP address arranging all virtual machines of tenant 1 in ClusterB is respectively: 192.188.60.2; 192.188.60.3; 192.188.60.4.
The private IP address arranging all virtual machines of tenant 2 in ClusterB is respectively: 192.188.61.2; 192.188.61.3; 192.188.61.4.
When the IP address of the tenant 1 be positioned on Host2 is: the virtual machine VM of 192.188.60.2 is by when being sent to Network network in advance by message, when the logic firewall unit being positioned at tenant 1 on Host1 belongs to its monitoring range according to the tag recognition of message to this message, the default interception rule according to logic firewall unit processes this message.
Should be understood that, above-mentioned embodiment of the present invention only for exemplary illustration or explain principle of the present invention, and is not construed as limiting the invention.Therefore, any amendment made when without departing from the spirit and scope of the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.In addition, claims of the present invention be intended to contain fall into claims scope and border or this scope and border equivalents in whole change and modification.

Claims (10)

1. north-south traffic security protection deployment system in a system for cloud computing, it is characterized in that, comprising: the virtual machine that tenant takies and the virtual firewall communicated for monitoring the virtual machine shared by current tenant and Network network, first network forwarding and second network forwarding;
Described first network forwarding, for being judged the source of this message by the identification of the label to the message received, if source is virtual machine, then by described message repeating to current virtual machine tenant corresponding to virtual firewall, and the message after this virtual firewall process is sent to Network network through Layer 2 switch and three-tier switch, if source is Network network, then by described message repeating to this message label indicated by virtual firewall, and the message after this virtual firewall process is sent to second network forwarding through Layer 2 switch,
Described second network forwarding, during for receiving the message from Network network, the tenant that this message belongs to is judged by the identification of the label to message, and this message is issued to the virtual machine corresponding to the tenant indicated by label of this message, also for message repeating that virtual machine is sent to Layer 2 switch.
2. system according to claim 1, is characterized in that, described first network forwarding and virtual firewall run on first server and troop, and described second network forwarding and virtual machine run on second server cluster.
3. system according to claim 2, is characterized in that, described second network forwarding comprises physical network card, logic network interface card and logic bridge;
Described second server is trooped and is comprised multiple physical server, same physical server comprises physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks jig has the Logic Networks clamp interface identical with the tenant's quantity on present physical server, each Logic Networks clamp interface connects a described logic bridge, and each Logic Networks bridging connects one or more virtual machines of the same tenant run on present physical server.
4. system according to claim 2, is characterized in that, described first network forwarding comprises physical network card, logic network interface card and logic bridge;
The physical server of described first server cluster has physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this logic network interface card is except having with except described tenant one to one Logic Networks clamp interface, also there is the Logic Networks clamp interface receiving and come from Network network message, each Logic Networks clamp interface connects a described logic bridge, and Logic Networks bridging connects the virtual firewall of the tenant corresponding to it.
5. system according to claim 3, is characterized in that, described first network forwarding comprises physical network card, logic network interface card and logic bridge;
The physical server of described first server cluster has physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks links and connects described logic bridge, and described logic bridge connects the Tap interface of the virtual machine running virtual firewall respectively.
6. system according to claim 5, is characterized in that, when described virtual firewall is operated in route pattern, described virtual firewall internal configurations has VLAN and gateway.
7. system according to claim 5, is characterized in that, when described virtual firewall is operated in transparent mode, described three-tier switch connects hardware firewall, and configure routing gateway and Nat on this three-tier switch.
8. system according to claim 3, is characterized in that,
The physical server of described first server cluster runs a virtual machine, this virtual machine runs and described tenant virtual firewall one to one,
Described first network forwarding comprises physical network card and logic network interface card;
The physical server of described first server cluster has physical network card described in multiple, and these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, and this Logic Networks links the virtual firewall connect corresponding to each tenant.
9. a north-south traffic security protection deployment system in system for cloud computing, is characterized in that, comprising: the virtual machine that tenant takies and the hardware firewall communicated for monitoring the virtual machine shared by current tenant and Network network;
Described hardware firewall is deployed in three-tier switch, and hardware firewall inside comprises and each tenant logic firewall unit one to one, and each logic firewall unit connects physical network card respectively, and this physical network card connects Layer 2 switch;
Described virtual machine runs on second server and troops, described second server is trooped and is comprised multiple physical server, same physical server comprises physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks jig has the Logic Networks clamp interface identical with the tenant's quantity on present physical server, each Logic Networks clamp interface connects a described logic bridge, and each Logic Networks bridging connects one or more virtual machines of the same tenant run on present physical server.
10. a north-south traffic security protection deployment system in system for cloud computing, is characterized in that, comprising: the virtual machine that tenant takies and the hardware firewall communicated for monitoring the virtual machine shared by current tenant and Network network;
Described virtual machine runs on cluster of servers, described cluster of servers comprises multiple physical server, same physical server comprises physical network card described in multiple, these multiple physical network cards are bound to same Zhang Suoshu logic network interface card, this Logic Networks jig has the Logic Networks clamp interface identical with the tenant's quantity on present physical server, each Logic Networks clamp interface connects a described logic bridge, and each Logic Networks bridging connects one or more virtual machines of the same tenant run on present physical server;
Described hardware firewall inside comprises and each tenant logic firewall unit one to one, each logic firewall unit connects each physical network card being placed in hardware firewall respectively, the physical network card that the server zone that part physical network interface card connects operation virtual machine is concentrated, part physical network interface card is connected to Network network by Layer 2 switch and three-tier switch.
CN201510574191.7A 2015-09-10 2015-09-10 North-south flow safety protection system in cloud computing network Pending CN105245504A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510574191.7A CN105245504A (en) 2015-09-10 2015-09-10 North-south flow safety protection system in cloud computing network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510574191.7A CN105245504A (en) 2015-09-10 2015-09-10 North-south flow safety protection system in cloud computing network

Publications (1)

Publication Number Publication Date
CN105245504A true CN105245504A (en) 2016-01-13

Family

ID=55043004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510574191.7A Pending CN105245504A (en) 2015-09-10 2015-09-10 North-south flow safety protection system in cloud computing network

Country Status (1)

Country Link
CN (1) CN105245504A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790091A (en) * 2016-12-23 2017-05-31 深圳市深信服电子科技有限公司 A kind of cloud security guard system and flow cleaning method
CN107046546A (en) * 2017-05-18 2017-08-15 郑州云海信息技术有限公司 A kind of network safety control method and device
CN107241283A (en) * 2017-05-23 2017-10-10 国家计算机网络与信息安全管理中心 A kind of East and West direction network traffics mirror image acquisition method across main frame tenant
CN109669761A (en) * 2018-12-21 2019-04-23 合肥时代智慧高新投资管理有限公司 A kind of SDN controller system
CN111371740A (en) * 2020-02-17 2020-07-03 华云数据有限公司 Message flow monitoring method and system and electronic equipment
CN111556110A (en) * 2020-04-21 2020-08-18 贵州新致普惠信息技术有限公司 Automatic adaptation method for different physical service networks of private cloud system
CN111800340A (en) * 2020-06-05 2020-10-20 北京京东尚科信息技术有限公司 Data packet forwarding method and device
CN111934971A (en) * 2020-08-12 2020-11-13 杭州默安科技有限公司 Method and device for local network access from mapping service spanning three-layer network to multiple VLANs and multiple IPs

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321936B1 (en) * 2007-05-30 2012-11-27 M86 Security, Inc. System and method for malicious software detection in multiple protocols
CN103973673A (en) * 2014-04-09 2014-08-06 汉柏科技有限公司 Virtual firewall partitioning method and equipment
CN104301321A (en) * 2014-10-22 2015-01-21 北京启明星辰信息技术股份有限公司 Method and system for achieving distributed network safety protection
US8972581B2 (en) * 2010-11-05 2015-03-03 Verizon Patent And Licensing Inc. Server clustering in a computing-on-demand system
US20150163200A1 (en) * 2011-07-12 2015-06-11 Cisco Technology, Inc. Zone-Based Firewall Policy Model for a Virtualized Data Center

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321936B1 (en) * 2007-05-30 2012-11-27 M86 Security, Inc. System and method for malicious software detection in multiple protocols
US8972581B2 (en) * 2010-11-05 2015-03-03 Verizon Patent And Licensing Inc. Server clustering in a computing-on-demand system
US20150163200A1 (en) * 2011-07-12 2015-06-11 Cisco Technology, Inc. Zone-Based Firewall Policy Model for a Virtualized Data Center
CN103973673A (en) * 2014-04-09 2014-08-06 汉柏科技有限公司 Virtual firewall partitioning method and equipment
CN104301321A (en) * 2014-10-22 2015-01-21 北京启明星辰信息技术股份有限公司 Method and system for achieving distributed network safety protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王景学: "云计算虚拟机防护系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790091B (en) * 2016-12-23 2020-10-27 深信服科技股份有限公司 Cloud safety protection system and flow cleaning method
CN106790091A (en) * 2016-12-23 2017-05-31 深圳市深信服电子科技有限公司 A kind of cloud security guard system and flow cleaning method
CN107046546A (en) * 2017-05-18 2017-08-15 郑州云海信息技术有限公司 A kind of network safety control method and device
CN107241283A (en) * 2017-05-23 2017-10-10 国家计算机网络与信息安全管理中心 A kind of East and West direction network traffics mirror image acquisition method across main frame tenant
CN107241283B (en) * 2017-05-23 2020-06-05 国家计算机网络与信息安全管理中心 Cross-host tenant east-west network traffic mirror image acquisition method
CN109669761A (en) * 2018-12-21 2019-04-23 合肥时代智慧高新投资管理有限公司 A kind of SDN controller system
CN109669761B (en) * 2018-12-21 2023-01-13 合肥时代智慧高新投资管理有限公司 SDN controller system
CN111371740A (en) * 2020-02-17 2020-07-03 华云数据有限公司 Message flow monitoring method and system and electronic equipment
CN111556110A (en) * 2020-04-21 2020-08-18 贵州新致普惠信息技术有限公司 Automatic adaptation method for different physical service networks of private cloud system
CN111556110B (en) * 2020-04-21 2022-09-06 贵州新致普惠信息技术有限公司 Automatic adaptation method for different physical service networks of private cloud system
CN111800340B (en) * 2020-06-05 2022-08-12 北京京东尚科信息技术有限公司 Data packet forwarding method and device
CN111800340A (en) * 2020-06-05 2020-10-20 北京京东尚科信息技术有限公司 Data packet forwarding method and device
CN111934971A (en) * 2020-08-12 2020-11-13 杭州默安科技有限公司 Method and device for local network access from mapping service spanning three-layer network to multiple VLANs and multiple IPs

Similar Documents

Publication Publication Date Title
CN105245504A (en) North-south flow safety protection system in cloud computing network
US10791066B2 (en) Virtual network
US8989188B2 (en) Preventing leaks among private virtual local area network ports due to configuration changes in a headless mode
US9755959B2 (en) Dynamic service path creation
CN106878048B (en) Fault processing method and device
CN107332812B (en) Method and device for realizing network access control
CN104685507B (en) Virtual secure device architecture is provided to virtual cloud foundation structure
US8385356B2 (en) Data frame forwarding using a multitiered distributed virtual bridge hierarchy
CN109462534B (en) Local interconnect controller, local interconnect control method, and computer storage medium
US9137119B2 (en) Efficient handling of multi-destination traffic in an internet protocol fabric data center
CN101938370B9 (en) Redundant pseudowires for a border gateway protocol based virtual private local area network service multihoming environment
WO2016055027A1 (en) Table entry in software defined network
CN108173694B (en) Security resource pool access method and system of data center
CN117178534A (en) Network management services in points of presence
US9374310B2 (en) Systems and methods of inter data center out-bound traffic management
CN105634942B (en) Method and switch for forwarding message
CN105530259A (en) Message filtering method and equipment
CN104813611A (en) Virtual device context (VDC) integration for network services
US10103980B1 (en) Methods and apparatus for maintaining an integrated routing and bridging interface
WO2016107594A1 (en) Accessing external network from virtual network
CN105429870A (en) VXLAN security gateway device and application method thereof in SDN
CN112822037B (en) Flow arrangement method and system for security resource pool
CN105791402A (en) Network virtualization realization method of cloud computing platform and corresponding plug-in and agent
CN103973578A (en) Virtual machine traffic redirection method and device
US11159342B2 (en) MAC address synchronization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160113

WD01 Invention patent application deemed withdrawn after publication