CN106131020A - The module of a kind of firewall virtualization and management method - Google Patents

The module of a kind of firewall virtualization and management method Download PDF

Info

Publication number
CN106131020A
CN106131020A CN201610558943.5A CN201610558943A CN106131020A CN 106131020 A CN106131020 A CN 106131020A CN 201610558943 A CN201610558943 A CN 201610558943A CN 106131020 A CN106131020 A CN 106131020A
Authority
CN
China
Prior art keywords
vfw
module
configuration
engine
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610558943.5A
Other languages
Chinese (zh)
Other versions
CN106131020B (en
Inventor
方明
叶剑鸣
刘贵全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Bi Song Data Technology Co Ltd
Original Assignee
Hefei Bi Song Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Bi Song Data Technology Co Ltd filed Critical Hefei Bi Song Data Technology Co Ltd
Priority to CN201610558943.5A priority Critical patent/CN106131020B/en
Publication of CN106131020A publication Critical patent/CN106131020A/en
Application granted granted Critical
Publication of CN106131020B publication Critical patent/CN106131020B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses module and the management method of a kind of firewall virtualization, module including firewall virtualization, described virtualized module includes order line module, interface administration module, each business module, system SCM module, VFW management module, device management module and operating system nucleus, also include the module management method of firewall virtualization, including VFW configuration management S1, distributed fire wall management S2, Distributed engine group management S3 and firewall virtualization system initialization management S4.The present invention, make virtual firewall compatible and support the fire wall of two kinds of forms, security engine provides the environment of VFW, support the preliminary configuration of VFW, the operation of support safety business, and safeguard the membership relation of VFW and MDC, and improve efficiency and the quality of finished item, switch device simultaneously and before keeps compatibility.

Description

The module of a kind of firewall virtualization and management method
Technical field
The present invention relates to firewall virtualization technical field, particularly relate to module and the management of a kind of firewall virtualization Method.
Background technology
Present physics fire wall has two groups of forms: packaging fire wall and fire wall plug-in card, along with the Internet development and The renewal of firewall product, needs virtual firewall to support the fire wall of two kinds of forms simultaneously, and support virtualized tentatively Configuration and the operation of safety service, make new virtualization product and switch device before keep compatibility, in view of exchange Machine equipment has supported MDC, in order to high efficiency, high-quality finished item switch device simultaneously and before keep compatibility, produces Product require to realize VFW based on MDC and support the fire wall of two kinds of forms, and therefore the present invention proposes a kind of VFW Firewall The module of planization and management method.
Summary of the invention
The invention aims to solve shortcoming present in prior art, and a kind of firewall virtualization proposed Module and management method.
To achieve these goals, present invention employs following technical scheme:
The module of a kind of firewall virtualization and management method, including the module of firewall virtualization, it is characterised in that: described Virtualized module includes order line module, interface administration module, each business module, system SCM module, VFW management module, sets Standby management module and operating system nucleus, described order line module is for providing configuration VFW for equipment manager (authority is higher) The instruction such as (create, start, stop, deleting, Resources allocation), described interface administration module is for managing master control borad or the industry of equipment Business board notify this plate when extracting in all VFW board events, described each business module is used for configuring data and service data also Virtualizing, independent preservation in units of MDC/VFW after virtualization, for the memory space of correlation module distribution VFW data, institute State system SCM module for manage VFW user service service state, described VFW management module for receive and process order The instruction that row module sends, and all of VFW board event, described device management module is for managing the board thing of an equipment Part, described operating system nucleus is deleted for the establishment for VFW, starts, stops operation and is carried out operating system configuration Processing, such as file system, cpu resource, memory source, disk resource etc. need to virtualize, by VFW module by calling What operating system provided common interface completes, and operating system also needs to responsible processing equipment engine internal memory, disk, CPU etc. and is The assignment constraint of system resource;Described VFW management module is made up of MDC node, VFW node, security engine and security engine group, institute State security engine for processing parts of safety service, can a corresponding CPU or a hardware thread (such as FPGA is real Existing) etc, described security engine group is polymerized by multiple security engines, and described MDC node is put for assembling to security engine Information, described VFW node is used for assembling to security engine putting resource, and described VFW management module is based on packaging type firewall box With being handed over security engine by switch with realization, described packaging type firewall box and fire wall plug-in card of fire wall plug-in card Mutually.
Preferably, the configuration of VFW needs to recover to equipment the configuration before once shutdown when system start-up.Recover Order is followed successively by VFW establishment, VFW describes information, engine (group) distribution, Resources limit (internal memory, CPU, disk), affiliated MDC, VFW start is recovered in MDC environment.VFW configuration recover need equipment control engine assemble put the most normal with the configuration of MDC Just start after recovery to perform.
Preferably, during system start-up, master control borad first recovers the configuration of MDC and VFW, and interface board is in master control borad fourth stage After can move the configuration of this plate to, the master control borad MDC and the VFW configuration according to the configuration of engine group, in recovery engine.
Preferably, the configuration of security engine group is recovered by equipment control, draws VFW to configure at security engine to master control borad Time, it is desirable to engine group has created and has come into force.Recovery engine assembles when putting, and because in engine group, leading engine has started, other draws Hold up member could start, thus VFW for engine group without special handling.But need to be transported to according under the engine group of engine place Put and recover.
Beneficial effects of the present invention: make virtual firewall compatible and support the fire wall of two kinds of forms, at security engine The environment of upper offer VFW, supports the preliminary configuration of VFW, the operation of support safety business, and safeguards that the subordinate of VFW and MDC is closed System, improves efficiency and the quality of finished item, and switch device simultaneously and before keeps compatibility.
Accompanying drawing explanation
Fig. 1 is module and the structural representation of management method of a kind of firewall virtualization that the present invention proposes;
Fig. 2 is module and the structural representation of management method VFW management module of a kind of firewall virtualization that the present invention proposes Figure.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.
Reference Fig. 1-2, the module of a kind of firewall virtualization and management method, including the module of firewall virtualization, It is characterized in that: described virtualized module includes order line module, interface administration module, each business module, system SCM mould Block, VFW management module, device management module and operating system nucleus, described order line module is used for as equipment manager (authority Higher) provide configuration VFW(to create, start, stop, deleting, Resources allocation etc.) instruct, described interface administration module is used for managing The master control borad of equipment or business board be all VFW board events in notifying this plate when extracting, and described each business module is used for configuring Data and service data also virtualize, and independent in units of MDC/VFW after virtualization preserve, and distribute VFW for correlation module The memory space of data, described system SCM module is for managing the service state of VFW user's service, and described VFW management module is used In receiving and process the instruction that order line module sends, and all of VFW board event, described device management module is used for managing The board event of reason equipment, described operating system nucleus is deleted for the establishment for VFW, start, is stopped operation and right Operating system configuration processes, and such as file system, cpu resource, memory source, disk resource etc. need to virtualize, By VFW module by call operation system provide common interface complete, operating system also need to be responsible for processing equipment engine The assignment constraint of the system resources such as internal memory, disk, CPU;Described VFW management module by MDC node, VFW node, security engine and Security engine group forms, and described security engine, can a corresponding CPU or a hardware for processing parts of safety service Thread (such as FPGA realize) etc, described security engine group is polymerized by multiple security engines, described MDC node be used for Security engine group configuration information, described VFW node is used for assembling to security engine putting resource, and described VFW management module is based on bag Dress formula firewall box and fire wall plug-in card to realize, described packaging type firewall box and fire wall plug-in card pass through switch Mutual with security engine.
A kind of module management method of firewall virtualization, including the module management method of firewall virtualization, its feature It is: include VFW configuration management S1, distributed fire wall management S2, Distributed engine group management S3 and firewall virtualization system System initializes management S4, the steps include:
S1, system manager input configuration from control station process commands row plug-in unit or control station plug-in unit, and plug-in unit is first to input configuration Carry out validity checking;If legal, call LIB interface and be issued to MDC process, configuration is carried out effectiveness and iterative testing; If checking and passing through, master control borad processes, and is reconfigured at being synchronized to security engine, issues driving;After processing normal termination, record preserves number According to, resynchronisation configuration data are to all slave control board.
S2, main control board VFW order line module configuring request parameter is carried out after preliminary validity checking structure with Daemon communication information structure, then configuration message is sent to main control board virtualization finger daemon;By to configuration parameter Coupling will configuration message distribution to Message Processing submodule, it is reasonable that the process submodule configuration parameter to issuing carries out effectiveness Property check after, then configuration message is sent on target Blade plate security engine;The configuration performing reality on security engine please Ask action, and after preservation relevant configuration information, result is replied to main control board on security engine;Main control board Preserve and again configuration synchronized transmission is preserved configuration data, the most primary master to slave control board after controlling blocks of data and DBM data Result is fed back to plug-in unit by control plate, shows result at device end.
S3, when main control board is sent on security engine, first send engine group primary security engine send out the most again Deliver to process on other security engines.
When S4, process initialization, first mdcd process calls each functional module initialization function, and such as LIPC initializes With log-in command row form clue, call VFW profile management module and obtain the virtualization configuration of storage in DBM configuration file After configuration re-issued order line processing module, each function sub-modules of call instruction row processing module in order SET function, processes according to the configuration data recovery one by one obtained from DBM configuration file.VFW CERATE first recovery, adjusts With core functions module creation VFW, this is the principle that holding is identical substantially with the recovery order of MDC configuration, and VFW START is in void The final stage that planization configuration recovers performs, and calls core functions and starts VFW, starts init process in VFW simultaneously, and this is also multiple Recovering flow process with the configuration of MDC, the configuration of VFW needs to recover to equipment the configuration before once shutdown when system start-up. The order recovered is followed successively by that VFW creates, VFW describes information, engine (group) distribution, Resources limit (internal memory, CPU, disk), affiliated MDC, recovers VFW start in MDC environment.The configuration of VFW recovers to need to assemble, at equipment control engine, the configuration put with MDC Just starting to perform after all normal recovery, during system start-up, master control borad first recovers the configuration of MDC and VFW, and interface board is in master control Can move the configuration of this plate after plate fourth stage to, master control borad configures according to the configuration of engine group, MDC and VFW in recovery engine, The configuration of security engine group is recovered by equipment control, when security engine draws VFW to configure to master control borad, it is desirable to engine group is Through creating and coming into force.Recovery engine assembles when putting, and because in engine group, leading engine has started, other engines members could start, So VFW for engine group without special handling.But need to recover according to the configuration that issues of engine place engine group.
In the present invention, make virtual firewall compatible and support the fire wall of two kinds of forms, security engine provides VFW Environment, support the preliminary configuration of VFW, the operation of support safety business, and safeguard the membership relation of VFW and MDC, improve The efficiency of one-tenth project and quality, switch device simultaneously and before keeps compatibility.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention is not limited thereto, Any those familiar with the art in the technical scope that the invention discloses, according to technical scheme and Inventive concept equivalent or change in addition, all should contain within protection scope of the present invention.

Claims (5)

1. the module of firewall virtualization and a management method, including the module of firewall virtualization, it is characterised in that: institute State virtualized module include order line module, interface administration module, each business module, system SCM module, VFW management module, Device management module and operating system nucleus, described order line module is for providing configuration for equipment manager (authority is higher) VFW(creates, starts, stops, deleting, Resources allocation etc.) instruction, described interface administration module is for managing the master control borad of equipment Or business board notify this plate when extracting in all VFW board events, described each business module is used for configuring data and runs number According to and virtualize, independent in units of MDC/VFW after virtualization preserve, the storage for correlation module distribution VFW data is empty Between, described system SCM module is for managing the service state of VFW user's service, and described VFW management module is used for receiving and processing The instruction that order line module sends, and all of VFW board event, described device management module is for managing the plate of an equipment Card event, described operating system nucleus is deleted for the establishment for VFW, starts, stops operation and is configured operating system Processing, such as file system, cpu resource, memory source, disk resource etc. need to virtualize, VFW module pass through What call operation system provided common interface completes, and operating system also needs to be responsible for processing equipment engine internal memory, disk, CPU Assignment constraint etc. system resource;Described VFW management module is by MDC node, VFW node, security engine and security engine group group Become, described security engine for processing parts of safety service, can a corresponding CPU or a hardware thread (such as FPGA realizes) etc, described security engine group is polymerized by multiple security engines, and described MDC node is for security engine Group configuration information, described VFW node is used for assembling to security engine putting resource, and described VFW management module is prevented fires based on packaging type Wall equipment and fire wall plug-in card to realize, described packaging type firewall box and fire wall plug-in card are drawn with safe by switch Hold up mutual.
2. a module management method for firewall virtualization, including the module management method of firewall virtualization, its feature exists In: include VFW configuration management S1, distributed fire wall management S2, Distributed engine group management S3 and firewall virtualization system Initialize management S4, the steps include:
S1, system manager input configuration from control station process commands row plug-in unit or control station plug-in unit, and plug-in unit is first to input configuration Carry out validity checking;If legal, call LIB interface and be issued to MDC process, configuration is carried out effectiveness and iterative testing; If checking and passing through, master control borad processes, and is reconfigured at being synchronized to security engine, issues driving;After processing normal termination, record preserves number According to, resynchronisation configuration data are to all slave control board;
S2, main control board VFW order line module carry out structure and Daemon after preliminary validity checking to configuring request parameter Communication information structure, then configuration message is sent to main control board virtualization finger daemon;By the coupling to configuration parameter Configuration message distribution is carried out effectiveness reasonableness check to Message Processing submodule, the process submodule configuration parameter to issuing After, then configuration message is sent on target Blade plate security engine;The configuring request performing reality on security engine is moved Make, and after preservation relevant configuration information, result is replied to main control board on security engine;Main control board preserves Again configuration synchronized transmission is preserved configuration data, simultaneously main control board to slave control board after controlling blocks of data and DBM data Result is fed back to plug-in unit, shows result at device end;
S3, when main control board is sent on security engine, first send engine group primary security engine then re-send to Process on other security engines;
When S4, process initialization, first mdcd process calls each functional module initialization function, and such as LIPC initializes and note Volume order line form clue, calling will after VFW profile management module obtains the virtualization configuration stored in DBM configuration file Configuration re-issues order line processing module, in order the SET letter of each function sub-modules of call instruction row processing module Number, processes according to the configuration data recovery one by one obtained from DBM configuration file;
VFW CERATE first recovery, calls core functions module creation VFW, and the recovery order that this and MDC configure is basic Keeping identical principle, the final stage that VFW START recovers in virtualization configuration performs, and calls core functions and starts VFW, with Init process in Shi Qidong VFW, this is also the configuration recovery flow process of multiplexing MDC.
3. according to module and the management method of a kind of firewall virtualization described in claim 1 or 2, it is characterised in that The configuration of VFW needs to recover to equipment the configuration before once shutdown when system start-up;
Recover order be followed successively by VFW create, VFW describe information, engine (group) distribution, Resources limit (internal memory, CPU, disk), Affiliated MDC, recovers VFW start in MDC environment;The configuration of VFW recovers to need to assemble at equipment control engine to put with MDC's Just start to perform after all normal recovery of configuration.
The module of a kind of firewall virtualization the most according to claim 1 and 2 and management method, it is characterised in that be When system starts, master control borad first recovers the configuration of MDC and VFW, and interface board can move the configuration of this plate after master control borad fourth stage to, Master control borad is according to the configuration of engine group, MDC and the VFW configuration in recovery engine.
The module of a kind of firewall virtualization the most according to claim 1 and 2 and management method, it is characterised in that peace The configuration of full engine group is recovered by equipment control, when security engine draws VFW to configure to master control borad, it is desirable to engine group is Create and come into force;Recovery engine assembles when putting, and because in engine group, leading engine has started, other engines members could start, institute With VFW for engine group without special handling;But need to recover according to the configuration that issues of engine place engine group.
CN201610558943.5A 2016-07-17 2016-07-17 Firewall virtualization module and management method Active CN106131020B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610558943.5A CN106131020B (en) 2016-07-17 2016-07-17 Firewall virtualization module and management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610558943.5A CN106131020B (en) 2016-07-17 2016-07-17 Firewall virtualization module and management method

Publications (2)

Publication Number Publication Date
CN106131020A true CN106131020A (en) 2016-11-16
CN106131020B CN106131020B (en) 2020-05-01

Family

ID=57283915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610558943.5A Active CN106131020B (en) 2016-07-17 2016-07-17 Firewall virtualization module and management method

Country Status (1)

Country Link
CN (1) CN106131020B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756490A (en) * 2018-12-26 2019-05-14 新华三技术有限公司 A kind of MDC implementation method and device
CN113037654A (en) * 2021-02-25 2021-06-25 迈普通信技术股份有限公司 Distributed switch service board virtualization method and device and electronic equipment
CN113938297A (en) * 2021-10-09 2022-01-14 北京天地和兴科技有限公司 Firewall device capable of dynamically expanding service port and operation method thereof

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556633A (en) * 2003-12-30 2004-12-22 港湾网络有限公司 Route exchanger of integrated fire proof wall
CN1805410A (en) * 2006-01-24 2006-07-19 杭州华为三康技术有限公司 Switching device with firewall function
CN201813399U (en) * 2010-08-04 2011-04-27 上海忆通广达信息技术有限公司 Virtual private network facility based on firewalls for enterprises
CN103401887A (en) * 2013-08-20 2013-11-20 曙光信息产业(北京)有限公司 Method and device for controlling firewall equipment and firewall equipment
US20140372508A1 (en) * 2013-06-14 2014-12-18 Andrew T. Fausak Native client tunnel service for client-server communication
CN104468822A (en) * 2014-12-24 2015-03-25 成都索贝数码科技股份有限公司 Media platform architecture for cloud calculation
US20150229674A1 (en) * 2008-08-20 2015-08-13 Reliant Security Payment card industry (pci) compliant architecture and associated methodology of managing a service infrastructure
CN105100026A (en) * 2014-05-22 2015-11-25 杭州华三通信技术有限公司 Safe message forwarding method and safe message forwarding device
CN105141571A (en) * 2014-06-09 2015-12-09 中兴通讯股份有限公司 Distributed virtual firewall device and method
CN105656841A (en) * 2014-11-11 2016-06-08 杭州华三通信技术有限公司 Method and device for realizing virtual firewall in software defined network
CN205356398U (en) * 2015-12-17 2016-06-29 重庆电子工程职业学院 Network security system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556633A (en) * 2003-12-30 2004-12-22 港湾网络有限公司 Route exchanger of integrated fire proof wall
CN1805410A (en) * 2006-01-24 2006-07-19 杭州华为三康技术有限公司 Switching device with firewall function
US20150229674A1 (en) * 2008-08-20 2015-08-13 Reliant Security Payment card industry (pci) compliant architecture and associated methodology of managing a service infrastructure
CN201813399U (en) * 2010-08-04 2011-04-27 上海忆通广达信息技术有限公司 Virtual private network facility based on firewalls for enterprises
US20140372508A1 (en) * 2013-06-14 2014-12-18 Andrew T. Fausak Native client tunnel service for client-server communication
CN103401887A (en) * 2013-08-20 2013-11-20 曙光信息产业(北京)有限公司 Method and device for controlling firewall equipment and firewall equipment
CN105100026A (en) * 2014-05-22 2015-11-25 杭州华三通信技术有限公司 Safe message forwarding method and safe message forwarding device
CN105141571A (en) * 2014-06-09 2015-12-09 中兴通讯股份有限公司 Distributed virtual firewall device and method
CN105656841A (en) * 2014-11-11 2016-06-08 杭州华三通信技术有限公司 Method and device for realizing virtual firewall in software defined network
CN104468822A (en) * 2014-12-24 2015-03-25 成都索贝数码科技股份有限公司 Media platform architecture for cloud calculation
CN205356398U (en) * 2015-12-17 2016-06-29 重庆电子工程职业学院 Network security system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
唐璐,赵宏: "IPsec加密数据流与防火墙过滤模式兼容问题", 《华中科技大学学报(自然科学版)》 *
李伟: "基于状态检测的防火墙技术研究与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756490A (en) * 2018-12-26 2019-05-14 新华三技术有限公司 A kind of MDC implementation method and device
CN109756490B (en) * 2018-12-26 2021-09-21 新华三技术有限公司 MDC (media data center) implementation method and device
CN113037654A (en) * 2021-02-25 2021-06-25 迈普通信技术股份有限公司 Distributed switch service board virtualization method and device and electronic equipment
CN113037654B (en) * 2021-02-25 2022-04-05 迈普通信技术股份有限公司 Distributed switch service board virtualization method and device and electronic equipment
CN113938297A (en) * 2021-10-09 2022-01-14 北京天地和兴科技有限公司 Firewall device capable of dynamically expanding service port and operation method thereof
CN113938297B (en) * 2021-10-09 2023-12-19 北京天地和兴科技有限公司 Firewall device capable of dynamically expanding service port and operation method thereof

Also Published As

Publication number Publication date
CN106131020B (en) 2020-05-01

Similar Documents

Publication Publication Date Title
CN107493310B (en) Cloud resource processing method and cloud management platform
CN103890728B (en) The method of live migration of virtual machine and server
US9703654B2 (en) Method, system, and apparatus for cloud application redundancy
CN107515776A (en) The uninterrupted upgrade method of business, node to be upgraded and readable storage medium storing program for executing
CN105243321B (en) A kind of cipher machine, realization and working method based on container virtualization technology
CN103870749B (en) A kind of safety monitoring system and method for realizing dummy machine system
CN102591702A (en) Virtualization processing method, related device and computer system
CN103051710A (en) Virtual cloud platform management system and method
CN106131020A (en) The module of a kind of firewall virtualization and management method
CN112100262A (en) Method and system for quickly building and dynamically expanding multi-tenant software as a service (SaaS) platform
CN102594861A (en) Cloud storage system with balanced multi-server load
CN107273440A (en) Computer application, date storage method, micro services and microdata storehouse
CN103235725A (en) Linux-based rapid deployment method for Oracle database in cloud computing
CN105635311A (en) Method for synchronizing resource pool information in cloud management platform
CN106469103A (en) The maintaining method of hard disk and device
CN103207965A (en) Method and device for License authentication in virtual environment
CN105653401A (en) Method and device for scheduling disaster recovery, operation and maintenance, monitoring and emergency start-stop of application systems
CN105335235A (en) IaaS mode based resource management system and method
CN115348126A (en) Network target range entity equipment access method, device and implementation system
CN108347450A (en) A kind of method and apparatus of Telnet
CN104461719B (en) A kind of empty interrupt expansion method towards partition operating system
CN109375874A (en) A kind of call method of distributed storage, device and equipment
CN102843438A (en) Method and system for cloud computation node management
CN106254419A (en) System and method virtual machine operated by control station server
CN104484221A (en) Method for taking over existing vCenter cluster by CloudStack

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant