CN106131020A - The module of a kind of firewall virtualization and management method - Google Patents
The module of a kind of firewall virtualization and management method Download PDFInfo
- Publication number
- CN106131020A CN106131020A CN201610558943.5A CN201610558943A CN106131020A CN 106131020 A CN106131020 A CN 106131020A CN 201610558943 A CN201610558943 A CN 201610558943A CN 106131020 A CN106131020 A CN 106131020A
- Authority
- CN
- China
- Prior art keywords
- vfw
- module
- configuration
- engine
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses module and the management method of a kind of firewall virtualization, module including firewall virtualization, described virtualized module includes order line module, interface administration module, each business module, system SCM module, VFW management module, device management module and operating system nucleus, also include the module management method of firewall virtualization, including VFW configuration management S1, distributed fire wall management S2, Distributed engine group management S3 and firewall virtualization system initialization management S4.The present invention, make virtual firewall compatible and support the fire wall of two kinds of forms, security engine provides the environment of VFW, support the preliminary configuration of VFW, the operation of support safety business, and safeguard the membership relation of VFW and MDC, and improve efficiency and the quality of finished item, switch device simultaneously and before keeps compatibility.
Description
Technical field
The present invention relates to firewall virtualization technical field, particularly relate to module and the management of a kind of firewall virtualization
Method.
Background technology
Present physics fire wall has two groups of forms: packaging fire wall and fire wall plug-in card, along with the Internet development and
The renewal of firewall product, needs virtual firewall to support the fire wall of two kinds of forms simultaneously, and support virtualized tentatively
Configuration and the operation of safety service, make new virtualization product and switch device before keep compatibility, in view of exchange
Machine equipment has supported MDC, in order to high efficiency, high-quality finished item switch device simultaneously and before keep compatibility, produces
Product require to realize VFW based on MDC and support the fire wall of two kinds of forms, and therefore the present invention proposes a kind of VFW Firewall
The module of planization and management method.
Summary of the invention
The invention aims to solve shortcoming present in prior art, and a kind of firewall virtualization proposed
Module and management method.
To achieve these goals, present invention employs following technical scheme:
The module of a kind of firewall virtualization and management method, including the module of firewall virtualization, it is characterised in that: described
Virtualized module includes order line module, interface administration module, each business module, system SCM module, VFW management module, sets
Standby management module and operating system nucleus, described order line module is for providing configuration VFW for equipment manager (authority is higher)
The instruction such as (create, start, stop, deleting, Resources allocation), described interface administration module is for managing master control borad or the industry of equipment
Business board notify this plate when extracting in all VFW board events, described each business module is used for configuring data and service data also
Virtualizing, independent preservation in units of MDC/VFW after virtualization, for the memory space of correlation module distribution VFW data, institute
State system SCM module for manage VFW user service service state, described VFW management module for receive and process order
The instruction that row module sends, and all of VFW board event, described device management module is for managing the board thing of an equipment
Part, described operating system nucleus is deleted for the establishment for VFW, starts, stops operation and is carried out operating system configuration
Processing, such as file system, cpu resource, memory source, disk resource etc. need to virtualize, by VFW module by calling
What operating system provided common interface completes, and operating system also needs to responsible processing equipment engine internal memory, disk, CPU etc. and is
The assignment constraint of system resource;Described VFW management module is made up of MDC node, VFW node, security engine and security engine group, institute
State security engine for processing parts of safety service, can a corresponding CPU or a hardware thread (such as FPGA is real
Existing) etc, described security engine group is polymerized by multiple security engines, and described MDC node is put for assembling to security engine
Information, described VFW node is used for assembling to security engine putting resource, and described VFW management module is based on packaging type firewall box
With being handed over security engine by switch with realization, described packaging type firewall box and fire wall plug-in card of fire wall plug-in card
Mutually.
Preferably, the configuration of VFW needs to recover to equipment the configuration before once shutdown when system start-up.Recover
Order is followed successively by VFW establishment, VFW describes information, engine (group) distribution, Resources limit (internal memory, CPU, disk), affiliated MDC,
VFW start is recovered in MDC environment.VFW configuration recover need equipment control engine assemble put the most normal with the configuration of MDC
Just start after recovery to perform.
Preferably, during system start-up, master control borad first recovers the configuration of MDC and VFW, and interface board is in master control borad fourth stage
After can move the configuration of this plate to, the master control borad MDC and the VFW configuration according to the configuration of engine group, in recovery engine.
Preferably, the configuration of security engine group is recovered by equipment control, draws VFW to configure at security engine to master control borad
Time, it is desirable to engine group has created and has come into force.Recovery engine assembles when putting, and because in engine group, leading engine has started, other draws
Hold up member could start, thus VFW for engine group without special handling.But need to be transported to according under the engine group of engine place
Put and recover.
Beneficial effects of the present invention: make virtual firewall compatible and support the fire wall of two kinds of forms, at security engine
The environment of upper offer VFW, supports the preliminary configuration of VFW, the operation of support safety business, and safeguards that the subordinate of VFW and MDC is closed
System, improves efficiency and the quality of finished item, and switch device simultaneously and before keeps compatibility.
Accompanying drawing explanation
Fig. 1 is module and the structural representation of management method of a kind of firewall virtualization that the present invention proposes;
Fig. 2 is module and the structural representation of management method VFW management module of a kind of firewall virtualization that the present invention proposes
Figure.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.
Reference Fig. 1-2, the module of a kind of firewall virtualization and management method, including the module of firewall virtualization,
It is characterized in that: described virtualized module includes order line module, interface administration module, each business module, system SCM mould
Block, VFW management module, device management module and operating system nucleus, described order line module is used for as equipment manager (authority
Higher) provide configuration VFW(to create, start, stop, deleting, Resources allocation etc.) instruct, described interface administration module is used for managing
The master control borad of equipment or business board be all VFW board events in notifying this plate when extracting, and described each business module is used for configuring
Data and service data also virtualize, and independent in units of MDC/VFW after virtualization preserve, and distribute VFW for correlation module
The memory space of data, described system SCM module is for managing the service state of VFW user's service, and described VFW management module is used
In receiving and process the instruction that order line module sends, and all of VFW board event, described device management module is used for managing
The board event of reason equipment, described operating system nucleus is deleted for the establishment for VFW, start, is stopped operation and right
Operating system configuration processes, and such as file system, cpu resource, memory source, disk resource etc. need to virtualize,
By VFW module by call operation system provide common interface complete, operating system also need to be responsible for processing equipment engine
The assignment constraint of the system resources such as internal memory, disk, CPU;Described VFW management module by MDC node, VFW node, security engine and
Security engine group forms, and described security engine, can a corresponding CPU or a hardware for processing parts of safety service
Thread (such as FPGA realize) etc, described security engine group is polymerized by multiple security engines, described MDC node be used for
Security engine group configuration information, described VFW node is used for assembling to security engine putting resource, and described VFW management module is based on bag
Dress formula firewall box and fire wall plug-in card to realize, described packaging type firewall box and fire wall plug-in card pass through switch
Mutual with security engine.
A kind of module management method of firewall virtualization, including the module management method of firewall virtualization, its feature
It is: include VFW configuration management S1, distributed fire wall management S2, Distributed engine group management S3 and firewall virtualization system
System initializes management S4, the steps include:
S1, system manager input configuration from control station process commands row plug-in unit or control station plug-in unit, and plug-in unit is first to input configuration
Carry out validity checking;If legal, call LIB interface and be issued to MDC process, configuration is carried out effectiveness and iterative testing;
If checking and passing through, master control borad processes, and is reconfigured at being synchronized to security engine, issues driving;After processing normal termination, record preserves number
According to, resynchronisation configuration data are to all slave control board.
S2, main control board VFW order line module configuring request parameter is carried out after preliminary validity checking structure with
Daemon communication information structure, then configuration message is sent to main control board virtualization finger daemon;By to configuration parameter
Coupling will configuration message distribution to Message Processing submodule, it is reasonable that the process submodule configuration parameter to issuing carries out effectiveness
Property check after, then configuration message is sent on target Blade plate security engine;The configuration performing reality on security engine please
Ask action, and after preservation relevant configuration information, result is replied to main control board on security engine;Main control board
Preserve and again configuration synchronized transmission is preserved configuration data, the most primary master to slave control board after controlling blocks of data and DBM data
Result is fed back to plug-in unit by control plate, shows result at device end.
S3, when main control board is sent on security engine, first send engine group primary security engine send out the most again
Deliver to process on other security engines.
When S4, process initialization, first mdcd process calls each functional module initialization function, and such as LIPC initializes
With log-in command row form clue, call VFW profile management module and obtain the virtualization configuration of storage in DBM configuration file
After configuration re-issued order line processing module, each function sub-modules of call instruction row processing module in order
SET function, processes according to the configuration data recovery one by one obtained from DBM configuration file.VFW CERATE first recovery, adjusts
With core functions module creation VFW, this is the principle that holding is identical substantially with the recovery order of MDC configuration, and VFW START is in void
The final stage that planization configuration recovers performs, and calls core functions and starts VFW, starts init process in VFW simultaneously, and this is also multiple
Recovering flow process with the configuration of MDC, the configuration of VFW needs to recover to equipment the configuration before once shutdown when system start-up.
The order recovered is followed successively by that VFW creates, VFW describes information, engine (group) distribution, Resources limit (internal memory, CPU, disk), affiliated
MDC, recovers VFW start in MDC environment.The configuration of VFW recovers to need to assemble, at equipment control engine, the configuration put with MDC
Just starting to perform after all normal recovery, during system start-up, master control borad first recovers the configuration of MDC and VFW, and interface board is in master control
Can move the configuration of this plate after plate fourth stage to, master control borad configures according to the configuration of engine group, MDC and VFW in recovery engine,
The configuration of security engine group is recovered by equipment control, when security engine draws VFW to configure to master control borad, it is desirable to engine group is
Through creating and coming into force.Recovery engine assembles when putting, and because in engine group, leading engine has started, other engines members could start,
So VFW for engine group without special handling.But need to recover according to the configuration that issues of engine place engine group.
In the present invention, make virtual firewall compatible and support the fire wall of two kinds of forms, security engine provides VFW
Environment, support the preliminary configuration of VFW, the operation of support safety business, and safeguard the membership relation of VFW and MDC, improve
The efficiency of one-tenth project and quality, switch device simultaneously and before keeps compatibility.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention is not limited thereto,
Any those familiar with the art in the technical scope that the invention discloses, according to technical scheme and
Inventive concept equivalent or change in addition, all should contain within protection scope of the present invention.
Claims (5)
1. the module of firewall virtualization and a management method, including the module of firewall virtualization, it is characterised in that: institute
State virtualized module include order line module, interface administration module, each business module, system SCM module, VFW management module,
Device management module and operating system nucleus, described order line module is for providing configuration for equipment manager (authority is higher)
VFW(creates, starts, stops, deleting, Resources allocation etc.) instruction, described interface administration module is for managing the master control borad of equipment
Or business board notify this plate when extracting in all VFW board events, described each business module is used for configuring data and runs number
According to and virtualize, independent in units of MDC/VFW after virtualization preserve, the storage for correlation module distribution VFW data is empty
Between, described system SCM module is for managing the service state of VFW user's service, and described VFW management module is used for receiving and processing
The instruction that order line module sends, and all of VFW board event, described device management module is for managing the plate of an equipment
Card event, described operating system nucleus is deleted for the establishment for VFW, starts, stops operation and is configured operating system
Processing, such as file system, cpu resource, memory source, disk resource etc. need to virtualize, VFW module pass through
What call operation system provided common interface completes, and operating system also needs to be responsible for processing equipment engine internal memory, disk, CPU
Assignment constraint etc. system resource;Described VFW management module is by MDC node, VFW node, security engine and security engine group group
Become, described security engine for processing parts of safety service, can a corresponding CPU or a hardware thread (such as
FPGA realizes) etc, described security engine group is polymerized by multiple security engines, and described MDC node is for security engine
Group configuration information, described VFW node is used for assembling to security engine putting resource, and described VFW management module is prevented fires based on packaging type
Wall equipment and fire wall plug-in card to realize, described packaging type firewall box and fire wall plug-in card are drawn with safe by switch
Hold up mutual.
2. a module management method for firewall virtualization, including the module management method of firewall virtualization, its feature exists
In: include VFW configuration management S1, distributed fire wall management S2, Distributed engine group management S3 and firewall virtualization system
Initialize management S4, the steps include:
S1, system manager input configuration from control station process commands row plug-in unit or control station plug-in unit, and plug-in unit is first to input configuration
Carry out validity checking;If legal, call LIB interface and be issued to MDC process, configuration is carried out effectiveness and iterative testing;
If checking and passing through, master control borad processes, and is reconfigured at being synchronized to security engine, issues driving;After processing normal termination, record preserves number
According to, resynchronisation configuration data are to all slave control board;
S2, main control board VFW order line module carry out structure and Daemon after preliminary validity checking to configuring request parameter
Communication information structure, then configuration message is sent to main control board virtualization finger daemon;By the coupling to configuration parameter
Configuration message distribution is carried out effectiveness reasonableness check to Message Processing submodule, the process submodule configuration parameter to issuing
After, then configuration message is sent on target Blade plate security engine;The configuring request performing reality on security engine is moved
Make, and after preservation relevant configuration information, result is replied to main control board on security engine;Main control board preserves
Again configuration synchronized transmission is preserved configuration data, simultaneously main control board to slave control board after controlling blocks of data and DBM data
Result is fed back to plug-in unit, shows result at device end;
S3, when main control board is sent on security engine, first send engine group primary security engine then re-send to
Process on other security engines;
When S4, process initialization, first mdcd process calls each functional module initialization function, and such as LIPC initializes and note
Volume order line form clue, calling will after VFW profile management module obtains the virtualization configuration stored in DBM configuration file
Configuration re-issues order line processing module, in order the SET letter of each function sub-modules of call instruction row processing module
Number, processes according to the configuration data recovery one by one obtained from DBM configuration file;
VFW CERATE first recovery, calls core functions module creation VFW, and the recovery order that this and MDC configure is basic
Keeping identical principle, the final stage that VFW START recovers in virtualization configuration performs, and calls core functions and starts VFW, with
Init process in Shi Qidong VFW, this is also the configuration recovery flow process of multiplexing MDC.
3. according to module and the management method of a kind of firewall virtualization described in claim 1 or 2, it is characterised in that
The configuration of VFW needs to recover to equipment the configuration before once shutdown when system start-up;
Recover order be followed successively by VFW create, VFW describe information, engine (group) distribution, Resources limit (internal memory, CPU, disk),
Affiliated MDC, recovers VFW start in MDC environment;The configuration of VFW recovers to need to assemble at equipment control engine to put with MDC's
Just start to perform after all normal recovery of configuration.
The module of a kind of firewall virtualization the most according to claim 1 and 2 and management method, it is characterised in that be
When system starts, master control borad first recovers the configuration of MDC and VFW, and interface board can move the configuration of this plate after master control borad fourth stage to,
Master control borad is according to the configuration of engine group, MDC and the VFW configuration in recovery engine.
The module of a kind of firewall virtualization the most according to claim 1 and 2 and management method, it is characterised in that peace
The configuration of full engine group is recovered by equipment control, when security engine draws VFW to configure to master control borad, it is desirable to engine group is
Create and come into force;Recovery engine assembles when putting, and because in engine group, leading engine has started, other engines members could start, institute
With VFW for engine group without special handling;But need to recover according to the configuration that issues of engine place engine group.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610558943.5A CN106131020B (en) | 2016-07-17 | 2016-07-17 | Firewall virtualization module and management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610558943.5A CN106131020B (en) | 2016-07-17 | 2016-07-17 | Firewall virtualization module and management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106131020A true CN106131020A (en) | 2016-11-16 |
CN106131020B CN106131020B (en) | 2020-05-01 |
Family
ID=57283915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610558943.5A Active CN106131020B (en) | 2016-07-17 | 2016-07-17 | Firewall virtualization module and management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106131020B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756490A (en) * | 2018-12-26 | 2019-05-14 | 新华三技术有限公司 | A kind of MDC implementation method and device |
CN113037654A (en) * | 2021-02-25 | 2021-06-25 | 迈普通信技术股份有限公司 | Distributed switch service board virtualization method and device and electronic equipment |
CN113938297A (en) * | 2021-10-09 | 2022-01-14 | 北京天地和兴科技有限公司 | Firewall device capable of dynamically expanding service port and operation method thereof |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1556633A (en) * | 2003-12-30 | 2004-12-22 | 港湾网络有限公司 | Route exchanger of integrated fire proof wall |
CN1805410A (en) * | 2006-01-24 | 2006-07-19 | 杭州华为三康技术有限公司 | Switching device with firewall function |
CN201813399U (en) * | 2010-08-04 | 2011-04-27 | 上海忆通广达信息技术有限公司 | Virtual private network facility based on firewalls for enterprises |
CN103401887A (en) * | 2013-08-20 | 2013-11-20 | 曙光信息产业(北京)有限公司 | Method and device for controlling firewall equipment and firewall equipment |
US20140372508A1 (en) * | 2013-06-14 | 2014-12-18 | Andrew T. Fausak | Native client tunnel service for client-server communication |
CN104468822A (en) * | 2014-12-24 | 2015-03-25 | 成都索贝数码科技股份有限公司 | Media platform architecture for cloud calculation |
US20150229674A1 (en) * | 2008-08-20 | 2015-08-13 | Reliant Security | Payment card industry (pci) compliant architecture and associated methodology of managing a service infrastructure |
CN105100026A (en) * | 2014-05-22 | 2015-11-25 | 杭州华三通信技术有限公司 | Safe message forwarding method and safe message forwarding device |
CN105141571A (en) * | 2014-06-09 | 2015-12-09 | 中兴通讯股份有限公司 | Distributed virtual firewall device and method |
CN105656841A (en) * | 2014-11-11 | 2016-06-08 | 杭州华三通信技术有限公司 | Method and device for realizing virtual firewall in software defined network |
CN205356398U (en) * | 2015-12-17 | 2016-06-29 | 重庆电子工程职业学院 | Network security system |
-
2016
- 2016-07-17 CN CN201610558943.5A patent/CN106131020B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1556633A (en) * | 2003-12-30 | 2004-12-22 | 港湾网络有限公司 | Route exchanger of integrated fire proof wall |
CN1805410A (en) * | 2006-01-24 | 2006-07-19 | 杭州华为三康技术有限公司 | Switching device with firewall function |
US20150229674A1 (en) * | 2008-08-20 | 2015-08-13 | Reliant Security | Payment card industry (pci) compliant architecture and associated methodology of managing a service infrastructure |
CN201813399U (en) * | 2010-08-04 | 2011-04-27 | 上海忆通广达信息技术有限公司 | Virtual private network facility based on firewalls for enterprises |
US20140372508A1 (en) * | 2013-06-14 | 2014-12-18 | Andrew T. Fausak | Native client tunnel service for client-server communication |
CN103401887A (en) * | 2013-08-20 | 2013-11-20 | 曙光信息产业(北京)有限公司 | Method and device for controlling firewall equipment and firewall equipment |
CN105100026A (en) * | 2014-05-22 | 2015-11-25 | 杭州华三通信技术有限公司 | Safe message forwarding method and safe message forwarding device |
CN105141571A (en) * | 2014-06-09 | 2015-12-09 | 中兴通讯股份有限公司 | Distributed virtual firewall device and method |
CN105656841A (en) * | 2014-11-11 | 2016-06-08 | 杭州华三通信技术有限公司 | Method and device for realizing virtual firewall in software defined network |
CN104468822A (en) * | 2014-12-24 | 2015-03-25 | 成都索贝数码科技股份有限公司 | Media platform architecture for cloud calculation |
CN205356398U (en) * | 2015-12-17 | 2016-06-29 | 重庆电子工程职业学院 | Network security system |
Non-Patent Citations (2)
Title |
---|
唐璐,赵宏: "IPsec加密数据流与防火墙过滤模式兼容问题", 《华中科技大学学报(自然科学版)》 * |
李伟: "基于状态检测的防火墙技术研究与实现", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756490A (en) * | 2018-12-26 | 2019-05-14 | 新华三技术有限公司 | A kind of MDC implementation method and device |
CN109756490B (en) * | 2018-12-26 | 2021-09-21 | 新华三技术有限公司 | MDC (media data center) implementation method and device |
CN113037654A (en) * | 2021-02-25 | 2021-06-25 | 迈普通信技术股份有限公司 | Distributed switch service board virtualization method and device and electronic equipment |
CN113037654B (en) * | 2021-02-25 | 2022-04-05 | 迈普通信技术股份有限公司 | Distributed switch service board virtualization method and device and electronic equipment |
CN113938297A (en) * | 2021-10-09 | 2022-01-14 | 北京天地和兴科技有限公司 | Firewall device capable of dynamically expanding service port and operation method thereof |
CN113938297B (en) * | 2021-10-09 | 2023-12-19 | 北京天地和兴科技有限公司 | Firewall device capable of dynamically expanding service port and operation method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN106131020B (en) | 2020-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107493310B (en) | Cloud resource processing method and cloud management platform | |
CN103890728B (en) | The method of live migration of virtual machine and server | |
US9703654B2 (en) | Method, system, and apparatus for cloud application redundancy | |
CN107515776A (en) | The uninterrupted upgrade method of business, node to be upgraded and readable storage medium storing program for executing | |
CN105243321B (en) | A kind of cipher machine, realization and working method based on container virtualization technology | |
CN103870749B (en) | A kind of safety monitoring system and method for realizing dummy machine system | |
CN102591702A (en) | Virtualization processing method, related device and computer system | |
CN103051710A (en) | Virtual cloud platform management system and method | |
CN106131020A (en) | The module of a kind of firewall virtualization and management method | |
CN112100262A (en) | Method and system for quickly building and dynamically expanding multi-tenant software as a service (SaaS) platform | |
CN102594861A (en) | Cloud storage system with balanced multi-server load | |
CN107273440A (en) | Computer application, date storage method, micro services and microdata storehouse | |
CN103235725A (en) | Linux-based rapid deployment method for Oracle database in cloud computing | |
CN105635311A (en) | Method for synchronizing resource pool information in cloud management platform | |
CN106469103A (en) | The maintaining method of hard disk and device | |
CN103207965A (en) | Method and device for License authentication in virtual environment | |
CN105653401A (en) | Method and device for scheduling disaster recovery, operation and maintenance, monitoring and emergency start-stop of application systems | |
CN105335235A (en) | IaaS mode based resource management system and method | |
CN115348126A (en) | Network target range entity equipment access method, device and implementation system | |
CN108347450A (en) | A kind of method and apparatus of Telnet | |
CN104461719B (en) | A kind of empty interrupt expansion method towards partition operating system | |
CN109375874A (en) | A kind of call method of distributed storage, device and equipment | |
CN102843438A (en) | Method and system for cloud computation node management | |
CN106254419A (en) | System and method virtual machine operated by control station server | |
CN104484221A (en) | Method for taking over existing vCenter cluster by CloudStack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |