CN105812326B - A kind of centralized control method and system of isomery firewall policy - Google Patents

A kind of centralized control method and system of isomery firewall policy Download PDF

Info

Publication number
CN105812326B
CN105812326B CN201410848484.5A CN201410848484A CN105812326B CN 105812326 B CN105812326 B CN 105812326B CN 201410848484 A CN201410848484 A CN 201410848484A CN 105812326 B CN105812326 B CN 105812326B
Authority
CN
China
Prior art keywords
firewall
network security
firewall rule
rule
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410848484.5A
Other languages
Chinese (zh)
Other versions
CN105812326A (en
Inventor
刘盼
李高超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LEADSEC TECHNOLOGY CO LTD
Original Assignee
BEIJING LEADSEC TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LEADSEC TECHNOLOGY CO LTD filed Critical BEIJING LEADSEC TECHNOLOGY CO LTD
Priority to CN201410848484.5A priority Critical patent/CN105812326B/en
Publication of CN105812326A publication Critical patent/CN105812326A/en
Application granted granted Critical
Publication of CN105812326B publication Critical patent/CN105812326B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of centralized control method and systems of isomery firewall policy, comprising: respectively according to the different fire-proof model of different manufacturers, different fire prevention wall forms is customized using xml high abstraction modelling technique.Selection fire prevention wall form, for the distinct device of same model firewall, building is applied to the network security combined strategy of distinct device in fire prevention wall form, includes one or more firewall rules in each network security combined strategy.Firewall rule is combined, delete and/or is modified, and to the combination, delete and/or modify and be monitored.By the one or many citation network security combination strategies of scheduling engine, execute firewall rule issue and/or not timing is synchronous.Scheme through the invention can satisfy high efficiency network security control demand.

Description

A kind of centralized control method and system of isomery firewall policy
Technical field
The present invention relates to computer network security application field more particularly to a kind of centralized controls of isomery firewall policy Method and system.
Background technique
With the high speed development of IT application in enterprises, each viroid, wooden horse, illegal invasion are just seriously threatening the network of enterprise Safety." patron saint " of the firewall as maintaining enterprise network security, the just of interest, use by more and more enterprises.Fire prevention Wall has been effectively isolated the Intranet and outer network environment of enterprise, by scientific allocation, reasonable security strategy, to different trust regions Data flow effectively controlled, unreasonable strategy configuration will make it perform practically no function.The increasingly complication of network environment, The continuous improvement of demand for security, the upgrading repeatedly of undue influence, an urgent demand can in time, rationally, efficient grasp and adjustment The firewall security policy of variant position in network realizes the safeguard protection effect of firewall conscientiously.
Summary of the invention
To solve the above-mentioned problems, the invention proposes a kind of centralized control method and system of isomery firewall policy, It can satisfy high efficiency network security control demand.
In order to achieve the above object, the invention proposes a kind of centralized control method of isomery firewall policy, this method Include:
Respectively according to the different fire-proof model of different manufacturers, customized using xml high abstraction modelling technique different anti- Wall with flues template.
Selection fire prevention wall form is constructed in fire prevention wall form and is applied to for the distinct device of same model firewall The network security combined strategy of distinct device includes one or more firewall rules in each network security combined strategy.
Firewall rule is combined, delete and/or is modified, and to the combination, delete and/or modify and be monitored.
By the one or many citation network security combination strategies of scheduling engine, execute firewall rule issue and/or Not timing is synchronous.
Preferably, this method further include: the firewall of each model can only customize a fire prevention wall form, each fire prevention Wall form completes the synchronous task of the firewall rule binding in fire prevention wall form and/or issues task;Same model is prevented The firewall rule of wall with flues customization can be applied in combination simultaneously, and the firewall rule of the firewall customization of different model can not be same When be applied in combination.
Preferably, for the distinct device of same model firewall, building is applied to distinct device in fire prevention wall form Network security combined strategy refer to: according to the different situations of distinct device, the network security policy of every kind of equipment is formulated, when this When network security policy is not able to satisfy network security and needs, prepared network security policy is added or to previously made Fixed multiple network security policies are combined, and construct multiple network security policies of the various combination of same model firewall.
Preferably, firewall rule is combined, deleted and/or modified and referred to: according to network security demand, deleting net Useless firewall rule in network security combination strategy, and current firewall rule in network security combined strategy cannot expire When sufficient network security demand, formulates new firewall rule or the firewall rule previously formulated is reconfigured.
Preferably, execute the synchronization of firewall rule the following steps are included:
It is detection origin with administrative center's firewall objects of managed network, from target of the detection origin into managed network Node sends detection firewall rule data packet.
Each destination node is acquired to the feedback information packet of detection firewall rule data packet, feedback information packet is parsed, obtains The detection feedback information information of each destination node is taken, detection feedback information information includes detection destination address and detective path letter Breath.
Traversal and duplicate removal processing are carried out to the path of detection feedback information information, obtain acl list, the address pair of firewall As, address group objects, service object, service group object, time object, equipment Regulation version snapshot, execute record management.
Preferably, this method further include: after carrying out traversal parsing to the implementing result that firewall rule each time issues The implementing result for executing snapshot, and two same firewall rules under different time being selected to issue, to two implementing results Snapshot edition comparison is carried out, and the difference of two snapshot versions is labeled.
The present invention also proposes a kind of centralized control system of isomery firewall policy, the system include: template customized module, Network security combined strategy constructs module, firewall rule manages module, firewall rule issues and synchronization module.
Template customized module, for respectively according to the different fire-proof model of different manufacturers, using xml high abstraction model Technology customizes different fire prevention wall forms.
Network security combined strategy constructs module, for selecting fire prevention wall form, for the difference of same model firewall Equipment, building is applied to the network security combined strategy of distinct device, each network security combined strategy in fire prevention wall form In include one or more firewall rules.
Firewall rule manage module, for being combined, deleting and/or modifying to firewall rule, and to the combination, It deletes and/or modifies and be monitored.
Firewall rule issues and synchronization module, for passing through the one or many citation network security combination plans of scheduling engine Slightly, execute firewall rule issue and/or not timing is synchronous.
Preferably, network security combined strategy building module is also used to: according to the different situations of distinct device, formulating every kind The network security policy of equipment, when network security policy, which is not able to satisfy network security, to be needed, to prepared network security plan It is slightly added or previous prepared multiple network security policies is combined, construct different groups of same model firewall The multiple network security policies closed.
Preferably, firewall rule control module is also used to: according to network security demand, deleting network security combined strategy In useless firewall rule, and current firewall rule in network security combined strategy is not able to satisfy network security demand When, it formulates new firewall rule or the firewall rule previously formulated is reconfigured.
Preferably, firewall rule, which is issued, is also used to execute the same of firewall rule by following steps with synchronization module Step:
It is detection origin with administrative center's firewall objects of managed network, from target of the detection origin into managed network Node sends detection firewall rule data packet.
Each destination node is acquired to the feedback information packet of detection firewall rule data packet, feedback information packet is parsed, obtains The detection feedback information information of each destination node is taken, detection feedback information information includes detection destination address and detective path letter Breath.
Traversal and duplicate removal processing are carried out to the path of detection feedback information information, obtain acl list, the address pair of firewall As, address group objects, service object, service group object, time object, equipment Regulation version snapshot, execute record management.
Preferably, which further includes snapshot module, and the implementing result for issuing to firewall rule each time carries out The implementing result for executing snapshot after traversal parsing, and two same firewall rules under different time being selected to issue is right Two implementing results carry out snapshot edition comparison, and are labeled to the difference of two snapshot versions.
Compared with prior art, the present invention includes: the different fire-proof model according to different manufacturers respectively, using xml high Degree abstract model technology customizes different fire prevention wall forms.Selection fire prevention wall form, sets for the difference of same model firewall Standby, building is applied to the network security combined strategy of distinct device in fire prevention wall form, in each network security combined strategy Include one or more firewall rules.Firewall rule is combined, delete and/or is modified, and to the combination, delete And/or modification is monitored.By the one or many citation network security combination strategies of scheduling engine, firewall rule is executed It issues and/or not timing is synchronous.Scheme through the invention can satisfy high efficiency network security control demand.
Detailed description of the invention
The attached drawing in the embodiment of the present invention is illustrated below, the attached drawing in embodiment be for of the invention into one Step understands, is used to explain the present invention, does not constitute a limitation on the scope of protection of the present invention together with specification.
Fig. 1 is the centralized control method flow diagram of isomery firewall policy of the invention;
Fig. 2 is the centralized control system block diagram of isomery firewall policy of the invention.
Specific embodiment
For the ease of the understanding of those skilled in the art, the invention will be further described with reference to the accompanying drawing, not It can be used to limit the scope of the invention.
Traditional both firewall operations rule issues, need to write by third party's tool many cumbersome instructions be handed down to manually it is anti- Wall with flues, although instruction can also be handed down to corresponding firewall by this method, so that the effect to firewall control is played, It issues and once command is once write again to a firewall, cumbersome efficiency is very low.
Therefore the working method for needing to find a kind of higher efficiency meets high efficiency network security control demand.To understand The certainly above problem, example of the invention provide a kind of corresponding method that multiple firewalls can be used of strategy customization.
Specifically, the invention proposes a kind of centralized control methods of isomery firewall policy, as shown in Figure 1, this method Include:
S101, respectively according to the different fire-proof model of different manufacturers, customized using xml high abstraction modelling technique different Fire prevention wall form.
The embodiment of the present invention is based on the further investigation managed to Network Security Device, the comprehensive spy for using firewall box Point creates a template using certain Cisco, Huawei, juniper firewall as each model of example.
S102, selection fire prevention wall form are constructed in fire prevention wall form and are answered for the distinct device of same model firewall The network security combined strategy of distinct device is used, includes one or more firewall rule in each network security combined strategy Then.
Each template creates one or more prefabricated firewall rule of a strategy, not with spare same money firewall With the equipment calls strategy, such combined strategy can be applied to one or more firewall boxes.
Preferably, for the distinct device of same model firewall, building is applied to distinct device in fire prevention wall form Network security combined strategy refer to: according to the different situations of distinct device, the network security policy of every kind of equipment is formulated, when this When network security policy is not able to satisfy network security and needs, prepared network security policy is added or to previously made Fixed multiple network security policies are combined, and construct multiple network security policies of the various combination of same model firewall.
S103, firewall rule is combined, delete and/or is modified, and to the combination, delete and/or modify progress Monitoring.
Preferably, this method further include: the firewall of each model can only customize a fire prevention wall form, each fire prevention Wall form completes the synchronous task of the firewall rule binding in fire prevention wall form and/or issues task;Same model is prevented The firewall rule of wall with flues customization can be applied in combination simultaneously, and the firewall rule of the firewall customization of different model can not be same When be applied in combination.
Preferably, firewall rule is combined, deleted and/or modified and referred to: according to network security demand, deleting net Useless firewall rule in network security combination strategy, and current firewall rule in network security combined strategy cannot expire When sufficient network security demand, formulates new firewall rule or the firewall rule previously formulated is reconfigured.
In this step, rule can be issued to firewall before strategy is called and be combined, this form mainly for Safety equipment upgrading, rule binding.Rule can be issued to firewall before strategy is called to carry out deleting modification etc., this shape Formula upgrades mainly for safety equipment, rule changes, modification of orders.
S104, pass through the one or many citation network security combination strategies of scheduling engine, execute issuing for firewall rule And/or not timing is synchronous.
Preferably, execute the synchronization of firewall rule the following steps are included:
It S1041, take administrative center's firewall objects of managed network as detection origin, from detection origin into managed network Destination node send detection firewall rule data packet.(tri- sections of Cisco, Huawei, juniper mainstream firewalls)
S1042, each destination node of acquisition parse feedback information to the feedback information packet of detection firewall rule data packet Packet, obtains the detection feedback information information of each destination node, and detection feedback information information includes detection destination address and detection Routing information.
S1043, to detection feedback information information path carry out traversal and duplicate removal processing, obtain firewall acl list, Address object, service object, service group object, time object, equipment Regulation version snapshot, executes record pipe at address group objects Reason.
Preferably, in the case where authorizing network environment, manual synchronization firewall rule can be used, is specifically included:
From a certain producer's firewall, manual synchronization obtains firewall acl list, address object, address group objects, service pair As, service group object, time object, equipment Regulation version snapshot, execute record management etc..
Preferably, this method further include: after carrying out traversal parsing to the implementing result that firewall rule each time issues The implementing result for executing snapshot, and two same firewall rules under different time being selected to issue, to two implementing results Snapshot edition comparison is carried out, and the difference of two snapshot versions is labeled.
Preferably, this method further include: under non-artificial mode, timing carries out the inspection about network security combined strategy It looks into, which includes being judged with content combined strategy the process strategy of firewall rule change, and determining the process Being alerted when violation problem occur in strategy and content combined strategy.And implementation strategy checks problem informing function, the function It is realized based on workflow system, the problem of advising report is closed in output as unit of equipment, by the problem report with one starting of work order Equipment responsible person is given, request handles violation problem.
The present invention also proposes a kind of centralized control system 01 of isomery firewall policy, as shown in Fig. 2, the system includes: Template customized module 02, network security combined strategy building module 03, firewall rule control module 04, firewall rule issue With synchronization module 05.
Template customized module 02, for respectively according to the different fire-proof model of different manufacturers, using xml high abstraction mould Type technology customizes different fire prevention wall forms.
Network security combined strategy constructs module 03, for selecting fire prevention wall form, not for same model firewall Same equipment, building is applied to the network security combined strategy of distinct device in fire prevention wall form, and each network security combines plan Include one or more firewall rules in slightly.
Firewall rule manages module 04, for being combined, deleting and/or modifying to firewall rule, and to the group It closes, delete and/or modifies and be monitored.
Firewall rule issue with synchronization module 05, for pass through the one or many citation network security combinations of scheduling engine Strategy, execute firewall rule issue and/or not timing is synchronous.
Preferably, network security combined strategy building module 03 is also used to: according to the different situations of distinct device, being formulated every The network security policy of kind equipment, when network security policy, which is not able to satisfy network security, to be needed, to prepared network security Strategy is added or is combined to previous prepared multiple network security policies, constructs the difference of same model firewall Multiple network security policies of combination.
Preferably, firewall rule control module 04 is also used to: according to network security demand, being deleted network security and is combined plan Useless firewall rule in slightly, and current firewall rule in network security combined strategy is not able to satisfy network security and needs When asking, formulates new firewall rule or the firewall rule previously formulated is reconfigured.
Preferably, firewall rule, which is issued, is also used to execute the same of firewall rule by following steps with synchronization module 05 Step:
It is detection origin with administrative center's firewall objects of managed network, from target of the detection origin into managed network Node sends detection firewall rule data packet.
Each destination node is acquired to the feedback information packet of detection firewall rule data packet, feedback information packet is parsed, obtains The detection feedback information information of each destination node is taken, detection feedback information information includes detection destination address and detective path letter Breath.
Traversal and duplicate removal processing are carried out to the path of detection feedback information information, obtain acl list, the address pair of firewall As, address group objects, service object, service group object, time object, equipment Regulation version snapshot, execute record management.
Preferably, which further includes snapshot module 06, the implementing result for being issued to firewall rule each time into The implementing result for executing snapshot after row traversal parsing, and two same firewall rules under different time being selected to issue, Snapshot edition comparison is carried out to two implementing results, and the difference of two snapshot versions is labeled.
The centralized management of firewall policy facilitates from global angle and understands each firewall policy configuring condition, improves Plan as a whole, manage each local firewall policy configuration capabilities, supporting timely, efficient process burst firewall policy configuration needs It wants, has ensured the orderly progress of enterprise's commodity network trouble free service.
It should be noted that embodiment described above be merely for convenience of it will be understood by those skilled in the art that, and It is not used in and limits the scope of the invention, under the premise of not departing from inventive concept of the invention, those skilled in the art couple Any obvious replacement and improvement that the present invention is made etc. are within the scope of the present invention.

Claims (11)

1. a kind of centralized control method of isomery firewall policy, which is characterized in that the described method includes:
Respectively according to the different fire-proof model of different manufacturers, different firewalls is customized using xml high abstraction modelling technique Template;
The fire prevention wall form is selected, for the distinct device of same model firewall, constructs and answers in the fire prevention wall form The network security combined strategy of the distinct device is used, is prevented in each network security combined strategy comprising one or more Wall with flues rule;
The firewall rule is combined, deleted and/or modified, and to it is described combination, delete and/or modify and supervise Control;
By the one or many reference network security combined strategies of scheduling engine, issuing for the firewall rule is executed And/or not timing is synchronous.
2. the method as described in claim 1, which is characterized in that the method also includes: the firewall of each model can only A fire prevention wall form is customized, completes the firewall rule in the fire prevention wall form in each fire prevention wall form The synchronous task then bound and/or issue task;It can be simultaneously to the firewall rule of the firewall customization of same model It is applied in combination, the firewall rule of the firewall customization of different model can not be applied in combination simultaneously.
3. the method as described in claim 1, which is characterized in that the distinct device for same model firewall, in institute It states the network security combined strategy that building is applied to the distinct device in fire prevention wall form to refer to: according to the distinct device Different situations formulate the network security policy of every kind of equipment, when the network security policy, which is not able to satisfy network security, to be needed, The prepared network security policy is added or group is carried out to previous prepared multiple network security policies It closes, constructs multiple network security policies of the various combination of the same model firewall.
4. the method as described in claim 1, which is characterized in that it is described the firewall rule is combined, delete and/or Modification refers to: according to network security demand, delete the firewall rule useless in the network security combined strategy, and When the current firewall rule is not able to satisfy the network security demand in the network security combined strategy, formulate new The firewall rule reconfigures the firewall rule previously formulated.
5. the method as described in claim 1, which is characterized in that the synchronization for executing the firewall rule includes following step It is rapid:
It is detection origin with administrative center's firewall objects of managed network, from the detection origin into the managed network Destination node sends detection firewall rule data packet;
Each destination node is acquired to the feedback information packet of the detection firewall rule data packet, parses the feedback number According to packet, the detection feedback information information of each destination node is obtained, the detection feedback information information includes detection target Address and detecting routing information;
To it is described detection feedback information information path carry out traversal and duplicate removal processing, obtain the firewall acl list, Location object, service object, service group object, time object, equipment Regulation version snapshot, executes record management at address group objects.
6. the method as described in claim 1, which is characterized in that the method also includes: to the firewall rule each time The implementing result issued carries out executing snapshot after traversal parsing, and selects two same firewall rules under different time The implementing result issued carries out snapshot edition comparison to two implementing results, and to the difference of two snapshot versions It is labeled.
7. a kind of centralized control system of isomery firewall policy, which is characterized in that the system comprises: template customized module, Network security combined strategy constructs module, firewall rule manages module, firewall rule issues and synchronization module;
The template customized module, for respectively according to the different fire-proof model of different manufacturers, using xml high abstraction model Technology customizes different fire prevention wall forms;
The network security combined strategy constructs module, for selecting the fire prevention wall form, for same model firewall Distinct device, building is applied to the network security combined strategy of the distinct device in the fire prevention wall form, each described Include one or more firewall rules in network security combined strategy;
The firewall rule manages module, for the firewall rule to be combined, deletes and/or modified, and to institute Combination is stated, deletes and/or modifies and be monitored;
The firewall rule issues and synchronization module, for passing through the one or many reference network security groups of scheduling engine Close strategy, execute the firewall rule issue and/or not timing is synchronous.
8. system as claimed in claim 7, which is characterized in that the network security combined strategy building module is also used to: root According to the different situations of the distinct device, the network security policy of every kind of equipment is formulated, when the network security policy cannot expire When sufficient network security needs, the prepared network security policy is added or to previous prepared multiple nets Network security strategy is combined, and constructs multiple network security policies of the various combination of the same model firewall.
9. system as claimed in claim 7, which is characterized in that the firewall rule control module is also used to: according to network Demand for security is deleted the firewall rule useless in the network security combined strategy, and is combined in the network security When the current firewall rule is not able to satisfy the network security demand in strategy, formulate the new firewall rule or The firewall rule previously formulated is reconfigured.
10. system as claimed in claim 7, which is characterized in that the firewall rule is issued to be also used to lead to synchronization module Cross the synchronization that following steps execute the firewall rule:
It is detection origin with administrative center's firewall objects of managed network, from the detection origin into the managed network Destination node sends detection firewall rule data packet;
Each destination node is acquired to the feedback information packet of the detection firewall rule data packet, parses the feedback number According to packet, the detection feedback information information of each destination node is obtained, the detection feedback information information includes detection target Address and detecting routing information;
To it is described detection feedback information information path carry out traversal and duplicate removal processing, obtain the firewall acl list, Location object, service object, service group object, time object, equipment Regulation version snapshot, executes record management at address group objects.
11. system as claimed in claim 7, which is characterized in that the system also includes snapshot modules, for institute each time It states the implementing result that firewall rule issues to carry out executing snapshot after traversal parsing, and selection two is same under different time The implementing result that one firewall rule issues carries out snapshot edition comparison to two implementing results, and described fast to two It is labeled according to the difference of version.
CN201410848484.5A 2014-12-29 2014-12-29 A kind of centralized control method and system of isomery firewall policy Active CN105812326B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410848484.5A CN105812326B (en) 2014-12-29 2014-12-29 A kind of centralized control method and system of isomery firewall policy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410848484.5A CN105812326B (en) 2014-12-29 2014-12-29 A kind of centralized control method and system of isomery firewall policy

Publications (2)

Publication Number Publication Date
CN105812326A CN105812326A (en) 2016-07-27
CN105812326B true CN105812326B (en) 2019-06-11

Family

ID=56420247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410848484.5A Active CN105812326B (en) 2014-12-29 2014-12-29 A kind of centralized control method and system of isomery firewall policy

Country Status (1)

Country Link
CN (1) CN105812326B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973058A (en) * 2017-03-31 2017-07-21 北京奇艺世纪科技有限公司 A kind of Web application firewalls rule update method, apparatus and system
CN108040055A (en) * 2017-12-14 2018-05-15 广东天网安全信息科技有限公司 A kind of fire wall combined strategy and safety of cloud service protection
CN108092979B (en) * 2017-12-20 2021-05-28 国家电网公司 Firewall policy processing method and device
CN108650222B (en) * 2018-03-29 2020-10-02 华付云技术(深圳)有限公司 Firewall rule updating method and system based on stretching filtering
CN109413017B (en) * 2018-04-28 2020-07-31 武汉思普崚技术有限公司 Method and system for managing heterogeneous firewall
CN108429774A (en) * 2018-06-21 2018-08-21 蔡梦臣 A kind of firewall policy centralized optimization management method and its system
CN109714197B (en) * 2018-12-12 2021-09-21 杭州迪普科技股份有限公司 Method and device for configuring centralized control strategy in centralized control
CN109413110A (en) * 2018-12-19 2019-03-01 武汉思普崚技术有限公司 A kind of method and system of the managing main frame strategy based on firewall policy linkage
CN109547502A (en) * 2019-01-22 2019-03-29 成都亚信网络安全产业技术研究院有限公司 Firewall ACL management method and device
CN110011971B (en) * 2019-03-03 2022-04-12 杭州立思辰安科科技有限公司 Manual configuration method of network security policy
CN109862042A (en) * 2019-03-27 2019-06-07 泰萍科技(杭州)有限公司 A kind of isomeric network security reinforcement means and device
WO2021226781A1 (en) * 2020-05-11 2021-11-18 深圳市欢太科技有限公司 Firewall rule updating method and apparatus, server, and storage medium
CN113037752B (en) * 2021-03-09 2022-09-27 北京计算机技术及应用研究所 Lightweight heterogeneous firewall policy acquisition method and system
CN113709099B (en) * 2021-07-12 2023-11-07 新华三大数据技术有限公司 Mixed cloud firewall rule issuing method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604541A (en) * 2004-11-01 2005-04-06 沈明峰 Security policy based network security management system and method
CN1988478A (en) * 2006-12-14 2007-06-27 上海交通大学 Integrated tactic managing system based on expandable label language

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604541A (en) * 2004-11-01 2005-04-06 沈明峰 Security policy based network security management system and method
CN1988478A (en) * 2006-12-14 2007-06-27 上海交通大学 Integrated tactic managing system based on expandable label language

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"浅谈多重异构防火墙网络环境下的安全策略管理";乔辉;《科技研究》;20120519;第1页

Also Published As

Publication number Publication date
CN105812326A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
CN105812326B (en) A kind of centralized control method and system of isomery firewall policy
US9749361B2 (en) Security device controller
CN108965289B (en) A kind of network security collaboration means of defence and system
US20200356678A1 (en) Cybersecurity vulnerability mitigation framework
CN108040055A (en) A kind of fire wall combined strategy and safety of cloud service protection
CN104734872B (en) A kind of industrial backhaul network implementation method and system based on software defined network
US20160127418A1 (en) Policy-guided fulfillment of a cloud service
US20070299953A1 (en) Centralized work distribution management
JP2011100443A (en) Integrated unified threat management for process control system
KR20170054449A (en) Systems and methods for network analysis and reporting
CN101399698A (en) Safety management system, device and method
US10164908B2 (en) Filtration of network traffic using virtually-extended ternary content-addressable memory (TCAM)
CN105474171A (en) Model-based approach to intelligent automation in a computing domain
CN109379217A (en) A kind of different producer's arranging service device of Metropolitan Area Network (MAN)
CN110324334A (en) Secure group policy management method, device, equipment and computer readable storage medium
US11157292B2 (en) Instance mapping engine and tools
CN103281202B (en) The system and its front end rendering method of a kind of browser/server framework
CN105282099A (en) Firewall command generation method and device
AU2018217230B2 (en) Automated system for optimizing batch processing time
CN103942474A (en) Method for controlling permission three-dimensional model system in software project management process
Daniel et al. Seamless enablement of intelligent protection for enterprise cloud applications through service store
CN104426695B (en) A kind of heterogeneous types equipment account management method and system
Li et al. GolfEngine: Network management system for software defined networking
Massonet et al. Idea: Optimising multi-cloud deployments with security controls as constraints
Karafili et al. Automatic firewalls’ configuration using argumentation reasoning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant