CN106789542A - A kind of implementation method of cloud data center security service chain - Google Patents

A kind of implementation method of cloud data center security service chain Download PDF

Info

Publication number
CN106789542A
CN106789542A CN201710124814.XA CN201710124814A CN106789542A CN 106789542 A CN106789542 A CN 106789542A CN 201710124814 A CN201710124814 A CN 201710124814A CN 106789542 A CN106789542 A CN 106789542A
Authority
CN
China
Prior art keywords
security service
flow
service node
vlan
local
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710124814.XA
Other languages
Chinese (zh)
Other versions
CN106789542B (en
Inventor
王凯
李军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201710124814.XA priority Critical patent/CN106789542B/en
Publication of CN106789542A publication Critical patent/CN106789542A/en
Application granted granted Critical
Publication of CN106789542B publication Critical patent/CN106789542B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/38Flow based routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/125Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of implementation method of cloud data center security service chain, and methods described includes:Reception carries the flow of the vlan information corresponding to local security service node;If inquiring the access control policy matched with the header packet information of the flow in local flow table, VLAN is carried out to the flow and is peeled off and is sent to local security service node, so that the local security service node carries out safety detection;The policy action in access control policy according to the matching will be revised as the vlan information of next-hop security service node by the VLAN of the flow of safety detection and be sent by exchange network.A kind of implementation method of cloud data center security service chain that the present invention is provided, security service chain is realized based on VLAN agreements, and design is simple, functional and O&M cost is low.

Description

A kind of implementation method of cloud data center security service chain
Technical field
The present invention relates to network safety filed, more particularly, to a kind of realization side of cloud data center security service chain Method.
Background technology
Cloud data center is to utilize cloud computing technology, and the data of new generation of all kinds of cloud computing services are automatically provided on demand Center.The traffic performance of cloud data center is huge with the traffic performance difference of conventional data centers, and with software defined network, The fast development and sizable application of the new technology such as network virtualization and network function virtualization, cloud data center network is compared to biography For system data center network, new security challenge is faced with:Cloud data center becomes increasingly dependent on above-mentioned Intel Virtualization Technology to carry For more efficient and flexible service deployment so that secure border is difficult to define, logical network topology according to the demand of business at any time Variable, traditional security architecture based on physical boundary protection cannot carry out effective security protection to it;Cloud data center industry Business scene is increasingly complex, and the individual demand to security of network and information is more strong, and conventional security hardware device is by software With hardware binding, fixed security function is externally provided, keeper can only carry out easy configuration, nothing by interface hand-manipulated to it Method carries out flexible function adjustment and customization according to service application scene, it is impossible to meet resilient expansion and the demand for security of business.
In order to tackle these security challenges, current cloud data center is mainly anti-by realizing safety using security service chain Shield.Security service chain is based on the security capabilities resource pool that Overlay (covering) network struction is concentrated, will by the controller concentrated Need the service traffics for carrying out security protection to drain into security service node to be detected and protected, and according to the safe plan of business Slightly sequentially, these security service nodes include FW (Firewall, fire wall), IDS for the protection of demand layout security service node (Intrusion Prevention System, enter for (Intrusion Detection System, intruding detection system), IPS Invade system of defense) or anti-virus equipment etc..Be as shown in Figure 1 based on VXLAN (Virtual Extensible LAN, it is expansible VLAN) the security service chain model that builds, each security service node of the security service chain can be located at identical or not Same security capabilities resource pool, by the way that towards tenant or application oriented security service chain layout interface, controller is issued automatically Drainage strategy is to each service chaining node, and the handling process after service chaining node matching drainage strategy is as follows:Source VM (Virtual Machine, virtual machine) corresponding to VTEP (VXLAN Tunnel End Point, VXLAN endpoint of a tunnel) source VM is sent Flow carries out VXLAN encapsulation and the message after encapsulation is forwarded into the VTEP corresponding to first security service node;First VTEP corresponding to security service node is decapsulated after the message after receiving encapsulation to the message, then will decapsulation The message for obtaining afterwards, i.e., the flow that source VM sends is transmitted to first security service node;First security service node convection current Amount carries out safety service treatment, then the flow is sent into VTEP;VTEP searches next-hop security service node and by the message VTEP corresponding to next-hop security service node is transmitted to after re-starting encapsulation;Aforesaid operations are repeated, until having carried out institute After the treatment of some safety services, the IP of the VTEP of VTEP corresponding to last security service node according to corresponding to purpose VM Address is packaged and forwards to message;After VTEP corresponding to purpose VM receives message, the message is unsealed Dress, is then sent to purpose VM.The flow that source VM sends reaches purpose VM through these security service nodes, it is achieved thereby that institute The safety service of needs.
The implementation method of current security service chain is except based on VXLAN technologies mentioned above, also including:NVGRE (Network Virtualization using Generic Routing Encapsulation, use generic route encapsulation Network virtualization) and GENEVE (Generic Network Virtualization Encapsulation, universal network Virtual enclosures) etc. technology.These technologies are full tunnel encapsulation technologies, for virtualized server, the encapsulation and decapsulation in tunnel The cpu resource of server can be very consumed, causes the performance of server very low, this East and West direction stream for almost running full line rate Amount means that by the treatment of security service chain packet loss phenomenon may be produced.Moreover, also needed on virtualized server The interface of additional configuration endpoint of a tunnel, for checking which message needs into tunnel and judges to pass through inspection according to configuration Message do what kind for the treatment of, cause O&M extremely complex.
The content of the invention
In order to the implementation method for solving existing security service chain causes virtualized server performance based on tunnel encapsulation technology The complicated problem of low, O&M, the present invention provides a kind of implementation method of cloud data center security service chain.
According to an aspect of the present invention, there is provided a kind of implementation method of cloud data center security service chain, including:
Step 1, receive upper hop security service node corresponding to vSwitch sent by exchange network, carry The flow of the vlan information corresponding to local security service node;
Step 2, if inquiring the access control policy matched with the header packet information of the flow in local flow table, Carry out VLAN strippings to the flow, and sent to local the flow after VLAN is peeled off by virtual network interface Security service node, so that the local security service node carries out safety detection;
Step 3, receive local security service node transmission by after the flow of safety detection, according to the matching The vlan information of the flow by safety detection is revised as next-hop safety clothes by the policy action in access control policy Vlan information corresponding to business node, and the amended stream by safety detection of vlan information is sent by exchange network Amount.
Wherein, step 1 also includes:If the local security service node is the first jump security service node, source VM is received Stream that corresponding vSwitch is sent by exchange network, carrying vlan information corresponding to local security service node Amount.
Wherein, step 3 is further included:If the local security service node is final jump security service node,
The policy action in access control policy according to the matching is by by the vlan information of the flow of safety detection Change the vlan information corresponding to purpose VM;
Sent corresponding to the amended flow by safety detection of vlan information to purpose VM by exchange network VSwitch, peeled off and by local virtual so that the vSwitch corresponding to purpose VM carries out VLAN to received flow The network port is transmitted to purpose VM.
Wherein, the header packet information determines that the type of the header packet information includes according to user-defined safety regulation:Source One or more in port numbers, destination slogan, protocol type, source IP address and purpose IP address.
Wherein, in step 2, at least one access control policy, the access control policy are included in the local flow table Determined according to user-defined safety regulation, the access control policy includes:First matching field and the first policy action;Its In, first matching field is corresponding with the header packet information.
Wherein, carried locally by what exchange network sent in the vSwitch corresponding to the reception source VM in step 1 Before the flow of the vlan information corresponding to security service node, also include:
After vSwitch corresponding to the VM of source receives multiple flows of source VM transmissions, Hash is carried out to the multiple flow Treatment;
The result that vSwitch corresponding to the VM of source is processed according to Hash, confirms the load that there is matching in local flow table Balance policy, and according to the policy action of the load balancing, multiple flows that source VM sends are transmitted to matching respectively Security service node corresponding to vSwitch.
Wherein, it is described the multiple flow is carried out Hash treatment include:To the feature field in each flow header packet information Last m bit value carry out mask treatment, wherein, m is log2N round up after value, N for security service chain number, The feature field includes:Port number field, IP address field or protocol type field.
Wherein, the load balancing includes:Second matching field and the second policy action.
According to another aspect of the present invention, there is provided a kind of virtual switch, including:
Receiving unit, is sent for receiving the virtual switch corresponding to upper hop security service node by exchange network , the flow for carrying vlan information corresponding to local security service node;
Flow table matching unit, if for inquiring the access matched with the header packet information of the flow in local flow table Control strategy, then carry out VLAN strippings to the flow, and by virtual network interface by the stream after VLAN is peeled off Amount is sent to local security service node, so that the local security service node carries out safety detection;
Retransmission unit, for receive local security service node transmission by after the flow of safety detection, according to institute State the policy action in the access control policy of matching the vlan information of the flow by safety detection is revised as it is next The vlan information corresponding to security service node is jumped, and it is amended described by safety to send vlan information by exchange network The flow of detection.
According to another aspect of the present invention, there is provided a kind of cloud data center security service chain, including:One or more Virtual switch, controller and security service node, wherein the virtual switch corresponds to security service node, source VM and mesh VM, wherein,
The controller, for receiving user-defined safety regulation and each void according to safety regulation configuration Intend the access control policy of interchanger;
The security service node, for carrying out safety detection to received flow, and by virtual network interface Send by the flow after safety detection;
Virtual switch corresponding to the security service node, for needing the flow for carrying out safety detection to perform VLAN strip operations, and it is transmitted to security service node;Or, for the access control policy according to matching by described by pacifying The vlan information of the flow that full inspection is surveyed is revised as the vlan information corresponding to next-hop security service node, and by exchange network Send the amended flow by safety detection of vlan information;
Virtual switch corresponding to the source VM, for will be sent from source VM the need for carry out safety detection flow introducing First jumps security service node;
Virtual switch corresponding to the purpose VM, the flow for final jump security service node to be sent is drawn To purpose VM.
A kind of implementation method of cloud data center security service chain proposed by the present invention, based on VLAN (Virtual LAN, VLAN) agreement realizes security service chain, design that simple, functional and O&M cost is low, it is to avoid use tunnel Performance and O&M cost caused by packaged type.
Brief description of the drawings
Fig. 1 is that prior art is based on the security service chain model schematic diagram that VXLAN builds;
Fig. 2 according to one embodiment of the invention to provide a kind of flow of the implementation method of cloud data center security service chain Figure;
Fig. 3 is the signal of security service chain under the cloud data center Network traffic model that is provided according to one embodiment of the invention Figure;
Fig. 4 is that security service chain shows under another cloud data center Network traffic model according to one embodiment of the invention It is intended to;
Fig. 5 is the stream of the implementation method of a kind of cloud data center security service chain provided according to another embodiment of the present invention Cheng Tu;
Fig. 6 is the stream of the implementation method of a kind of cloud data center security service chain provided according to another embodiment of the present invention Cheng Tu;
Fig. 7 according to another embodiment of the present invention to be based on the realization of a kind of cloud data center security service chain that Fig. 5 is provided The flow chart of method;
Fig. 8 is the schematic diagram of security service chain load balancing provided according to another embodiment of the present invention;
Fig. 9 is the structural representation of virtual switch provided according to further embodiment of this invention.
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiment of the invention is described in further detail.Hereinafter implement Example is not limited to the scope of the present invention for illustrating the present invention.
A kind of Fig. 2 implementation methods of cloud data center security service chain for one embodiment of the invention is provided, including:
S21, receive it is that the vSwitch corresponding to upper hop security service node sends by exchange network, carry The flow of the vlan information corresponding to ground security service node;
S22 is right if inquiring the access control policy matched with the header packet information of the flow in local flow table The flow carries out VLAN strippings, and is sent to local peace the flow after VLAN is peeled off by virtual network interface Full service node, so that the local security service node carries out safety detection;
S23, receive local security service node transmission by after the flow of safety detection, according to the visit of the matching Ask that the vlan information of the flow by safety detection is revised as next-hop security service by the policy action in control strategy Vlan information corresponding to node, and the amended stream by safety detection of vlan information is sent by exchange network Amount.
With continuing to develop for software defined network technology and network function Intel Virtualization Technology, the network of cloud data center is Overlay (covering) network of virtualization, i.e. virtual network is carried on physical network.One physical services of cloud data center Device by operation virtual server (Hypervisor) thereon, can create multiple virtual machines (Virtual Machine, ) and virtual switch (Virtual Switch, referred to vSwitch below) VM.The flow of cloud data center is in a network During transmission, the inspection by various security service nodes (Security Service Equipment, SSE) is generally required Survey, just can guarantee that network can be supplied to user security, quick, stabilization network service according to design requirement.These safety clothes Business node includes well known fire wall (FireWalls), intrusion detection (Intrusion Prevention System), anti-disease Malicious equipment etc..Flow passes through these security service nodes according to set required by user-defined safety regulation, passes through The safety detection of these security service nodes, so as to realize the security service chain in cloud data center network.
Specifically, flow refers to a series of set of the net bags in network, and meets source IP address, purpose IP address, association View type, source port number and a series of net bags of destination slogan identical are just properly termed as meeting the flow of same rule.This hair It is bright clear in order to state, by the difference saying such as message, packet, packet, it is collectively referred to as net bag.Based on VLAN agreements by LAN Multiple VLAN subnets are divided into, each subnet has a VLAN ID, and the vlan information of security service node is to refer to security service The VLAN ID values of the VLAN subnets belonging to node.The VLAN corresponding to local security service node is carried described in step S21 The flow of information refers to the vSwitch corresponding to upper hop security service node with corresponding to local security service node Vlan information carries out VLAN format conversion to flow, and all net bags that will be in flow turn from common two layers of Ethernet message format VLAN format is changed to, VLAN conversions are carried out by flow, the flow can just be connect by the vSwitch of local security service node Receive.Exchange network uses traditional double layer network deployment way, and the exchange network is one based on two layers of VLAN agreements The switching matrix of structure, can be interpreted as being made up of multiple switch or router with abstract, and this switching matrix ensure that Normal double layered communication can be also carried out without security service chain between virtual machine in same VLAN subnets, and is ensured Proper communication is carried out by the three-tier switch or router in exchange network between virtual machine in different VLAN subnets.
Specifically, in step S22, the flow table defines the forward-path of flow, and the flow table of each vSwitch is comprising extremely A few flow table item, each flow table item is included:Matching field and the instruction set to be performed after the match is successful.The packet header of the flow Information refers to two layers to four layers of net packet header information.The access control policy is exactly a kind of flow table item, for entering to flow Row filtering, i.e., only allow user-defined flow to enter security service chain, and access control policy is that controller is defined according to user Safety regulation be handed down to vSwitch's automatically.Carry out the flow VLAN to peel off refers to that will carry local security service The flow of node vlan information is converted into common two layers of Ethernet message format from VLAN format, so that local security service node Safety detection can be carried out to received flow, the purpose for the arrangement is that the embodiment of the present invention need not go additional configuration to pacify Full service node can process VLAN format net bag.Local security service node is by corresponding to virtual network interface and its VSwitch communicated, the vSwitch corresponding to it will be sent to by the flow after safety detection.
Specifically, in step S23, it is previously mentioned that implementing for access control policy is flow table item, thus it is described Policy action refers to the instruction set to be performed after the match is successful, and the policy action includes:Change the vlan information of flow and refer to Constant flow is to be forwarded to which destination interface etc..The VLAN letters of next-hop security service node are contained in the policy action Breath, i.e. after vSwitch corresponding to local security service node is to received flow implementation strategy action, exchange network meeting Flow is forwarded to by next-hop by the identification that the header packet information of next-hop security service node vlan information is carried to flow VSwtich corresponding to security service node.
The implementation method of the security service chain is specifically included:VSwitch corresponding to local security service node is received It is that vSwitch corresponding to upper hop security service node is sent by exchange network, carry local security service node institute The flow of corresponding vlan information;If the vSwitch corresponding to local security service node is inquired and institute in local flow table The access control policy that the header packet information of flow matches is stated, then VLAN strippings is carried out to the flow, and by virtual network Port sends to local security service node the flow after VLAN is peeled off, for the local security service node Carry out safety detection;VSwitch corresponding to local security service node is receiving the process that local security service node sends After the flow of safety detection, the policy action in access control policy according to the matching is by the stream by safety detection The vlan information of amount is revised as the vlan information of next-hop security service node, and after by exchange network, vlan information is changed The flow by safety detection send vSwitch corresponding to the next-hop security service node.
The implementation method of a kind of cloud data center security service chain provided in an embodiment of the present invention, by using VLAN agreements To realize forwarding of the flow in security service chain, simple, functional and O&M cost is designed low.
For example, as shown in figure 3, to pacify under a kind of cloud data center Network traffic model provided in an embodiment of the present invention The schematic diagram of full service chaining.What deserves to be explained is, the figure is only schematic diagram, virtual machine (VM), virtual switch (vSwitch) and The number of security service node (SSE) can be multiple, be not limited solely to the number in figure, and the deployment way of exchange network can be more It is complicated.
User define VM1-1 to VM2-4 flow will by security service node SSE1-1, SSE2-2, SSE3-1 and SSE4-1 carries out safety detection, then, controller after user-defined safety regulation is received, be respectively configured VM1-1, The access control policy on vSwitch corresponding to SSE1-1, SSE2-2, SSE3-1, SSE4-1 and VM2-4, with SSE2-2 institutes As a example by access control policy on corresponding vSwitch, the flow that the vSwitch corresponding to SSE1-1 sends is received, if stream The source IP address of amount is that 1.1.1.1, purpose IP address are 2.2.2.2, then change its VLAN for 1000, and be sent to network connecing Mouth 2.VSwitch corresponding to local security service node SSE2-2 is received corresponding to upper hop security service node SSE1-1 Flow that vSwitch is sent by exchange network, carrying vlan information corresponding to local security service node;Local peace VSwitch corresponding to full service node SSE2-2 is inquired in the flow table of local vSwitch and believed with the packet header of the flow The access control policy that breath (source IP address is 1.1.1.1, purpose IP address are 2.2.2.2) matches, is carried out to the flow VLAN is peeled off, and is sent to local security service node the flow after VLAN is peeled off by virtual network interface SSE2-2, so that the local security service node SSE2-2 carries out safety detection;Local security service node SSE2-2 institutes are right The vSwitch for answering, in the SSE2-2 transmissions of reception local security service node by after the flow of safety detection, according to described The vlan information of the flow by safety detection is revised as next-hop peace by the policy action in the access control policy matched somebody with somebody The VLAN 1000 of full service node SSE3-1, is forwarded, after by exchange network, vlan information is changed from output port 2 The flow by safety detection send vSwitch corresponding to the next-hop security service node SSE3-1.
Each jump security service node in security service chain performs aforesaid operations to flow, finally, flow from VM1-1 according to Secondary detecting up to VM2-4 by security service node SSE1-1, SSE2-2, SSE3-1 and SSE4-1.
The treatment of the acknowledgement back flow for being sent from purpose VM is identical with above-mentioned flow, as shown in figure 4, for from mesh The acknowledgement back flows that send of VM, the VLAN that equally modification VLAN is received by each jump security service node successively, and Finally it is revised as the VLAN that source VM is received.Will not be repeated here.
As shown in figure 5, a kind of implementation method of the cloud data center security service chain provided for another embodiment of the present invention, If the local security service node is the first jump security service node, methods described includes:
S51, receive source VM corresponding to vSwitch sent by exchange network, carry local security service node The flow of corresponding vlan information;
S52 is right if inquiring the access control policy matched with the header packet information of the flow in local flow table The flow carries out VLAN strippings, and is sent to local peace the flow after VLAN is peeled off by virtual network interface Full service node, so that the local security service node carries out safety detection;
S53, receive local security service node transmission by after the flow of safety detection, according to the visit of the matching Ask that the vlan information of the flow by safety detection is revised as next-hop security service by the policy action in control strategy Vlan information corresponding to node, and the amended stream by safety detection of vlan information is sent by exchange network Amount.
Specifically, if the local security service node is the first jump security service node, local security service node The flow for being received is from the vSwitch corresponding to the VM of source.The flow that vSwitch corresponding to the VM of source sends in the source VM of receiving Afterwards, the control strategy that equally conducts interviews matching will need the flow for carrying out safety detection to introduce security service chain, i.e., in source VM institutes The access control that inquiry matches with the presence or absence of the header packet information of the flow sent with the source VM in the flow table of corresponding vSwitch System strategy, if in the presence of the access control policy for matching, the policy action in the access control policy according to the matching will The vlan information of the flow that the source VM sends is revised as the vlan information of the first jump security service node, and exchange network just can be with The flow that source VM sends is forwarded to the vSwitch corresponding to the first jump security service node.If not inquiring and the source VM The access control policy that the header packet information of the flow for sending matches, i.e., the flow that described source VM sends needs not move through safety clothes The treatment of business chain, then directly send to purpose VM the flow of source VM according to the forward-path of original exchange network.
The vSwitch that first vSwitch jumped corresponding to security service node is received corresponding to the VM of source passes through exchange network Flow sending, carrying vlan information corresponding to local security service node;If the first jump security service node institute is right The vSwitch for answering inquires the access control policy matched with the header packet information of the flow in local flow table, then to institute Stating flow carries out VLAN strippings, and is sent to the first jump peace the flow after VLAN is peeled off by virtual network interface Full service node, so that the described first jump security service node carries out safety detection to the flow after VLAN is peeled off; VSwitch corresponding to first jump security service node receive the transmission of the first jump security service node by safety detection After flow, the policy action in access control policy according to the matching believes the VLAN of the flow by safety detection Breath is revised as the vlan information of next-hop security service node, and by exchange network by the amended process of vlan information The flow of safety detection sends the vSwitch corresponding to the next-hop security service node.
A kind of implementation method of cloud data center security service chain that the embodiment of the present invention is proposed, safety clothes are jumped by first The flow that vSwitch corresponding to business node will send from source VM introduces security service chain, it is not necessary to configures extra drainage and connects Mouthful, so that very simple to the O&M of security service chain.
For example, as shown in figure 3, by taking the access control policy on the vSwitch corresponding to SSE1-1 as an example, such as receiving The flow that vSwitch corresponding to VM1-1 sends, if the source IP address of flow is 1.1.1.1, purpose IP address being 2.2.2.2, then it is 999 to change its VLAN, and is sent to network interface 3.First jumps corresponding to security service node SSE1-1 VSwitch receive VM1-1 corresponding to vSwitch sent by exchange network, carry the first jump security service node The flow of corresponding vlan information;VSwitch corresponding to first jump security service node SSE1-1 is local vSwitch's Inquired in flow table and matched with the header packet information (source IP address is 1.1.1.1, purpose IP address are 2.2.2.2) of the flow Access control policy, carry out VLAN strippings to the flow, and by virtual network interface by the institute after VLAN is peeled off Flow is stated to send to the first jump security service node SSE1-1, so that SSE1-1 carries out safety detection;First jumps security service section VSwitch corresponding to point SSE1-1, receives the flow by safety detection that SSE1-1 sends, according to the access of the matching The vlan information of the flow by safety detection is revised as next-hop security service section by the policy action in control strategy VLAN 999 corresponding to point SSE2-2, and sent the flow after treatment under described by exchange network from output port 3 One jumps the corresponding vSwitch of security service node SSE2-2.
A kind of implementation method of cloud data center security service chain of another embodiment of the present invention offer is provided, If the local security service node is final jump security service node, methods described includes:
S61, receive it is that the vSwitch corresponding to upper hop security service node sends by exchange network, carry The flow of the vlan information corresponding to ground security service node;
S62 is right if inquiring the access control policy matched with the header packet information of the flow in local flow table The flow carries out VLAN strippings, and is sent to local peace the flow after VLAN is peeled off by virtual network interface Full service node, so that the local security service node carries out safety detection;
S63, the policy action in access control policy according to the matching is by by the VLAN of the flow of safety detection Vlan information of the information modification corresponding to purpose VM;
S64, the amended flow by safety detection of vlan information to purpose VM institutes is sent by exchange network Corresponding vSwitch, peels off and by local so that the vSwitch corresponding to purpose VM carries out VLAN to received flow Virtual network interface is transmitted to purpose VM.
Specifically, if the local security service node is final jump security service node, final jump safety clothes The next-hop node of business node is purpose VM.VSwitch corresponding to purpose VM receives the amended warp of vlan information The flow of safety detection is crossed, because this flow is VLAN net bag forms, it is therefore desirable to VLAN strippings are performed to this flow and is converted into Purpose VM is then forwarded to after common ether network packet.
VSwitch corresponding to final jump security service node is received corresponding to upper hop security service node The flow for carrying the vlan information corresponding to local security service node that vSwitch is sent by exchange network;If last VSwitch corresponding to one jump security service node is inquired in the flow table of local vSwitch and believed with the packet header of the flow The access control policy of manner of breathing matching, then carry out VLAN strippings to the flow, and by virtual network interface by the process Flow after VLAN is peeled off is sent to local security service node, so that the local security service node carries out safety detection; The policy action of vSwitch corresponding to final jump security service node in the access control policy of the matching will be through The vlan information modification for crossing the flow of safety detection is the vlan information corresponding to purpose VM;Final jump security service node institute Corresponding vSwitch sends the amended flow by safety detection of vlan information to purpose VM institutes by exchange network Corresponding vSwitch, peels off and by local so that the vSwitch corresponding to purpose VM carries out VLAN to received flow Virtual network interface is transmitted to purpose VM.
The implementation method of a kind of cloud data center security service chain that the embodiment of the present invention is proposed, by final jump safety VSwitch corresponding to service node will be sent to purpose VM by the flow of safety detection, it is not necessary to configure extra output Interface, so that very simple to the O&M of security service chain.
For example, as shown in figure 3, with the access control on the vSwitch corresponding to final jump security service node SSE4-1 As a example by system strategy, the flow that the vSwitch as corresponding to receiving SSE3-1 sends, if the source IP address of flow is 1.1.1.1, purpose IP address are 2.2.2.2, then it is 1002 to change its VLAN, and is sent to the network port 2.SSE4-1 institutes are right The vSwitch for answering receives the carrying that the vSwitch corresponding to upper hop security service node SSE3-1 is sent by exchange network There is the flow of the vlan information corresponding to local security service node;VSwitch corresponding to SSE4-1 is looked into local flow table Ask the access control matched with the header packet information (source IP address is 1.1.1.1, purpose IP address are 2.2.2.2) of the flow System strategy, carries out VLAN strippings to the flow, and by virtual network interface by the flow after VLAN is peeled off send to Local security service node SSE4-1, so that SSE4-1 carries out safety detection.VSwitch corresponding to SSE4-1, is receiving this Ground security service node SSE4-1 send by after the flow of safety detection, in the access control policy according to the matching Policy action will be the VLAN 1002 corresponding to purpose VM by the modification of the vlan information of the flow of safety detection, and from output The flow after treatment is sent the vSwitch corresponding to the purpose VM by exchange network for port 2, so that purpose VM institutes are right The vSwitch for answering to be received and VLAN is carried out to the flow after the flow peeled off and be transmitted to purpose VM.
Another embodiment of the present invention, on the basis of the various embodiments described above, the peace that the header packet information is formulated according to user Full rule determines that the type of the header packet information includes:Source port number, destination slogan, protocol type, source IP address and purpose One or more in IP address.
Specifically, the header packet information of flow refers to IP five-tuples, i.e. IP source address, IP destination addresses, association in the present embodiment One or more in view number, source port and destination interface, specifically used which header packet information and access control policy are carried out Match somebody with somebody, specified by the safety regulation of user input, be not that IP five-tuples all have to use, can for example specify simultaneously makes With source IP address, purpose IP address, protocol type, source port number and destination slogan go to be matched with access control policy, Wherein a certain type can also only be specified, it is also possible to which what is not specified, match all IP flows.
The safety regulation that vSwitch corresponding to local security service node is specified according to user determine it is specifically used which kind of Header packet information matches with the access control policy in its flow table, and the type of the header packet information includes:Source port number, purpose One or more in port numbers, protocol type, source IP address and purpose IP address.
A kind of implementation method of security service chain provided in an embodiment of the present invention, what the header packet information was specified according to user Safety regulation and determine, layout is flexibly simple so that security service chain can be according to the business demand flexible deployment of user.
Another embodiment of the present invention, on the basis of the various embodiments described above, visits in the local flow table comprising at least one Control strategy is asked, the safety regulation that the access control policy is formulated according to user determines that the access control policy includes:The One matching field and the first policy action;Wherein, first matching field is corresponding with the header packet information.
Specifically, access control policy is a kind of flow table item, and access control policy is the peace that controller is formulated according to user Full rule carries out matching somebody with somebody to postpone being handed down to vSwitch's automatically.First matching field is corresponding with the header packet information, that is, wrap Which kind of type header uses, and first matching field is also adopted by this type, specifically, the first matching field bag Include:One or more in source port number, destination slogan, protocol type, source IP address and purpose IP address.First plan Slightly action refers to the instruction set to be performed after the match is successful, is specifically included:The vlan information of the received flow of modification is Vlan information corresponding to next-hop security service node, and specify the output port information of the flow after treatment.Local peace Received flow is transmitted to next-hop security service by the vSwitch corresponding to full service node according to the first policy action Node.
The embodiment of the present invention can realize virtual switch based on Open vSwitch, Open vSwitch be by What Nicira Networks were dominated, operate in the virtual switch on virtual platform (such as KVM, Xen).It is flat in virtualization On platform, Layer2 switching function can be provided for the end points of dynamic change, preferably control access strategy, the network in virtual network Isolation, traffic monitoring etc..
By taking the access control policy on the vSwitch corresponding to SSE2-2 as an example, as corresponding to receiving SSE1-1 VSwitch send flow, if the source IP address of flow be 1.1.1.1, purpose IP address be 2.2.2.2, then change it VLAN is 1000, and is sent to network interface 2.So, it is right on the vSwitch corresponding to SSE2-2 in Open vSwitch The access control policy answered is:
In_port=1, ip, nw_src=1.1.1.1, nw_dst=2.2.2.2, actions=mod_vlan_vid: 1000,output:2;
Wherein, in_port is input slogan, and ip is protocol type, and nw_src is source IP address, for the purpose of nw_dst IP address, this four is the first matching field of access control policy.Actions will be then performed after the match is successful for corresponding Policy action, mod_vlan_vid:1000 is that flow VLAN is revised as into 1000,1000 is next-hop security service node institute Corresponding vlan information.
A kind of implementation method of cloud data center security service chain provided in an embodiment of the present invention, the access control policy Obtained according to the safety regulation that user formulates so that security service chain can be according to the business demand flexible deployment of user.
Another embodiment of the present invention, on the basis of above-described embodiment, as shown in fig. 7, in Fig. 5 steps S51 VSwitch corresponding to the reception source VM is carried corresponding to local security service node by what exchange network sent Before the flow of vlan information, also include:
After S71, the vSwitch corresponding to the VM of source receive multiple flows of source VM transmissions, the multiple flow is carried out Hash treatment;
S72, the result that the vSwitch corresponding to the VM of source is processed according to Hash confirms there is matching in local flow table Load balancing, and according to the policy action of the load balancing, multiple flows that source VM sends are transmitted to respectively VSwitch corresponding to the security service node of matching.
Specifically, for a plurality of security service chain, stream is realized by increasing load balancing in the entrance of service chaining Measure the equilibrium treatment between a plurality of security service chain.VSwitch corresponding to the VM of source receives multiple flows of source VM transmissions Afterwards, Hash treatment is carried out to the multiple flow first.The result that vSwitch corresponding to the VM of source is processed according to Hash is local Search whether there is the load balancing of matching in flow table, different Kazakhstan can be obtained after Hash treatment is carried out to different flows Uncommon value, different cryptographic Hash can match different load balancings, so as to the strategy in the load balancing The VLAN that action is received first security service node that the VLAN of each flow is revised as different security service chains, it is so each Flow will be dispensed to different security service chains and be processed, and the final jump security service node of security service chain is then The VLAN of flow will be revised as the VLAN that final VM is received, so as to complete the parallel processing of different security service chains.It is right In round flow, the strategy of execution is consistent, that is, ensure that the flow for belonging to same session is assigned to identical service chaining Processed.
The implementation method of a kind of cloud data center security service chain provided in an embodiment of the present invention, by security service chain Entrance increase load balancing, can further improve the security protection performance of security service chain.
As shown in figure 8, VM-1-1 flows out are by that after the polices node treatment given tacit consent to, can be distributed to different two Bar security service chain is processed, i.e. VM-1-1 → SSE-1-1 → SSE-2-2 → SSE-1-3 → SSE-1-4 → VM-2-4 and VM-1-1 → SSE-2-1 → SSE-1-2 → SSE-2-3 → SSE-2-4 → VM-2-4, after two service chaining completion treatment, stream Amount can be revised as the VLAN that identical VM-2-4 is received, so as to be received by VM-2-4.For reverse VM-2-4 → VM-1-1 Flow, processed in the same way, if the web traffic of VM-1-1 → VM-2-4 is by the security service of top Chain treatment, and SSH flows are processed by the security service chain of lower section, then reverse web traffic equally can be by strategy The security service chain for being balanced to top is processed, and the security service chain that SSH flows equally can also be balanced to lower section is processed.
Another embodiment of the present invention, it is described that Hash treatment is carried out to the multiple flow on the basis of above-described embodiment Including:The last m bit value to the feature field in each flow header packet information carries out mask treatment, wherein, m is log2N to On round after value, N is the number of security service chain, and the feature field includes:Port number field, IP address field or agreement Type field.
Specifically, the header packet information of flow includes:Source port number, destination slogan, protocol type, source IP address and purpose One or more in IP address.The feature field includes:Port number field, IP address field or protocol type field.Its In, port number field is source port number and destination slogan, and IP address field is source IP address and purpose IP address, protocol type Field includes:IP, TCP, UDP or Stream Control Transmission Protocol etc..The data of the security service chain are obtained according to the safety regulation that user formulates Arrive.
After vSwitch corresponding to the VM of source receives multiple flows of source VM transmissions, according to the number N of security service chain, Calculate log2The value M that N rounds up, the last M bit value to the feature field in each flow header packet information is carried out at mask Reason.
A kind of implementation method of cloud data center security service chain provided in an embodiment of the present invention, can be according to security service The method of the flexible number selection Hash treatment of chain, can further improve the security protection performance of security service chain.
Such as, for Transmission Control Protocol, if controller creates 2 security service chains according to the safety regulation that user formulates, that Last bit value to the port number field in each flow header packet information carries out mask treatment.If controller is according to user The safety regulation of formulation creates 4 security service chains, due to log24=2, then to the port numbers word in each flow header packet information Last 2 of section carry out mask treatment.If controller creates 3 security service chains according to the safety regulation that user formulates, by In log23 round up after for 2, then last 2 to the port number field in each flow header packet information carry out mask treatment.
Another embodiment of the present invention, on the basis of above-described embodiment, the load balancing includes:Second matching word Section and the second policy action.
The load balancing is a kind of flow table item, therefore including:Second matching field and the second policy action, it is described Second matching field includes carrying out the feature field of flow the different cryptographic Hash for obtaining after Hash treatment, second strategy Action is according to different cryptographic Hash by flow matches to different security service chains.
The implementation method of a kind of cloud data center security service chain provided in an embodiment of the present invention, by load balancing By different traffic distribution to different security service chains, it is possible to increase the security protection performance of security service chain, obtain preferable Performance.
For example, for Transmission Control Protocol, if controller creates 2 security service chains according to the safety regulation that user formulates, that Last bit value to the port number field in each flow header packet information carries out mask treatment, and according to different Hash It is worth flow matches to different security service chains.The load balancing is as follows:
Source port number and destination slogan are odd number or are the flow of even number, are distributed to service chaining A treatment;
Source port number and destination slogan are respectively the flow of a strange idol, are distributed to service chaining B treatment.
In Open vSwitch, above-mentioned load balancing is implemented as follows:
Ovs-ofctl add-flow ovsbr in_port=1, ip, tcp, tp_src=0/0x0001, tp_dst= 0/0x0001, actions=" mod_vlan_vid:1001,output:2";
Ovs-ofctl add-flow ovsbr in_port=1, ip, tcp, tp_src=1/0x0001, tp_dst= 1/0x0001, actions=" mod_vlan_vid:1001,output:2";
Ovs-ofctl add-flow ovsbr in_port=1, ip, tcp, tp_src=0/0x0001, tp_dst= 1/0x0001, actions=" mod_vlan_vid:1002,output:2";
Ovs-ofctl add-flow ovsbr in_port=1, ip, tcp, tp_src=1/0x0001, tp_dst= 0/0x0001, actions=" mod_vlan_vid:1002,output:2";
If in the presence of 4 service chainings, it is possible to use log24=2 bit carries out Hash treatment, and load balancing is such as Under:
Source port number and last 2 bits of destination slogan be 00 be 01 or be 10 or be 11 flow, It is distributed to service chaining A treatment;
Source port number and last 2 bits of destination slogan are respectively one 00 1 01 or respectively one 10 1 11 Flow, be distributed to service chaining B treatment;
Source port number and last 2 bits of destination slogan are respectively one 00 1 10 or respectively one 01 1 11 Flow, be distributed to service chaining C treatment;
Source port number and last 2 bits of destination slogan are respectively one 00 1 11 or respectively one 01 1 10 Flow, be distributed to service chaining D treatment.
A kind of further embodiment of this invention, there is provided virtual switch, as shown in figure 9, including:Receiving unit 901, flow table With unit 902 and retransmission unit 903, wherein,
Receiving unit 901, exchange network is passed through for receiving the virtual switch corresponding to upper hop security service node Flow sending, carrying vlan information corresponding to local security service node;
Flow table matching unit 902, if matching with the header packet information of the flow for inquiring in local flow table Access control policy, then carry out VLAN strippings to the flow, and by virtual network interface by the institute after VLAN is peeled off State flow to send to local security service node, so that the local security service node carries out safety detection;
Retransmission unit 903, for receive the transmission of local security service node by after the flow of safety detection, according to Be revised as down for the vlan information of the flow by safety detection by the policy action in the access control policy of the matching One jumps the vlan information corresponding to security service node, and it is amended described by peace to send vlan information by exchange network The flow that full inspection is surveyed.
Specifically, the virtual switch that receiving unit 901 is received corresponding to upper hop security service node passes through switching network The flow for carrying the vlan information corresponding to local security service node that network sends;Flow table matching unit 902 is locally flowing Inquiry whether there is the access control policy matched with the header packet information of the flow in table, if in the presence of the access control of matching Strategy, then 902 pairs of flows of flow table matching unit carry out VLAN strippings, local security service node vlan information will be carried Flow be converted into common two layers of Ethernet message format from VLAN format, and will be peeled off by VLAN by virtual network interface Flow afterwards is sent to local security service node, to cause that local security service node carries out safety detection to the flow;Turn Bill unit 903, receive local security service node transmission by after the flow of safety detection, according to the access of the matching The vlan information of the flow by safety detection is revised as next-hop security service section by the policy action in control strategy The vlan information of point, and be transmitted to the amended flow by safety detection of vlan information by exchange network next Jump the virtual switch corresponding to security service node.
The embodiment of the present invention provides a kind of virtual switch, and flow is drained into safety clothes by matching access control policy Business node can simplify the realization of security service chain, and do not need additional configuration for access control to carry out safety detection Interface, O&M is simple.
A kind of further embodiment of this invention, there is provided cloud data center security service chain, including:One or more is virtually handed over Change planes, controller and security service node, wherein the virtual switch corresponds to security service node, source VM and purpose VM, Wherein,
The controller, for receiving user-defined safety regulation and each void according to safety regulation configuration Intend the access control policy of interchanger;
The security service node, for carrying out safety detection to received flow, and by virtual network interface Send by the flow after safety detection;
Virtual switch corresponding to the security service node, for needing the flow for carrying out safety detection to perform VLAN strip operations, and it is transmitted to security service node;Or, for the access control policy according to matching by described by pacifying The vlan information of the flow that full inspection is surveyed is revised as the vlan information corresponding to next-hop security service node, and by exchange network Send the amended flow by safety detection of vlan information;
Virtual switch corresponding to the source VM, for will be sent from source VM the need for carry out safety detection flow introducing First jumps security service node;
Virtual switch corresponding to the purpose VM, the flow for final jump security service node to be sent is drawn To purpose VM.
Specifically, user-defined safety regulation refers to that user specifies specific flow by which security service section successively Point is detected that controller then determines specifically to use what type of header packet information according to user-defined safety regulation, accordingly Ground determines the matching field of access control policy, and which security service node sequentially passed through according to flow, determines the forwarding of flow Path, so as to go to set the policy action in access control policy, the access control policy that controller will be established is issued to respectively Individual virtual switch.
Security service node carries out safety detection to the flow for being received, and security service node was mentioned in above-described embodiment Type have various such that it is able to flow implement multi-angle security protection.After the completion of the detection process of security service node Flow can be forwarded by the local virtual network port, so that flow can enter next-hop security service node.
Virtual switch corresponding to security service node, the virtual switch as provided in above-mentioned embodiment, herein Repeat no more.
Virtual switch corresponding to the VM of source, is considered as the entrance of security service chain, for will need to enter safety clothes The flow of business chain introduces first and jumps security service node, specifically, searches whether exist and institute by its local flow table The access control policy that the header packet information of flow matches is stated, if in the presence of, illustrate that the flow needs to carry out safety detection, so that The vlan information of the flow is revised as the first jump security service node by the policy action in access control policy according to matching Corresponding vlan information is simultaneously forwarded;If not existing, illustrate that the flow need not carry out safety detection, then by the flow Purpose VM is sent to according to common forward-path.
Virtual switch corresponding to purpose VM, can be regarded as the outlet of security service chain, by final jump safety clothes The flow that business node sends draws security service chain, purpose VM is sent to, so as to complete the communication between source VM and purpose VM.
A kind of cloud data center security service chain proposed by the present invention, can carry out flexible portion according to the demand for security of user Administration, design is simple, functional and O&M cost is low, can reach good security protection effect.
Finally, the present processes are only preferably embodiment, are not intended to limit the scope of the present invention.It is all Within the spirit and principles in the present invention, any modification, equivalent substitution and improvements made etc. should be included in protection of the invention Within the scope of.

Claims (10)

1. a kind of implementation method of cloud data center security service chain, it is characterised in that including:
Step 1, receive upper hop security service node corresponding to vSwitch sent by exchange network, carry locally The flow of the vlan information corresponding to security service node;
Step 2, if inquiring the access control policy matched with the header packet information of the flow in local flow table, to institute Stating flow carries out VLAN strippings, and is sent to local security the flow after VLAN is peeled off by virtual network interface Service node, so that the local security service node carries out safety detection;
Step 3, receive local security service node transmission by after the flow of safety detection, according to the access of the matching The vlan information of the flow by safety detection is revised as next-hop security service section by the policy action in control strategy The corresponding vlan information of point, and the amended flow by safety detection of vlan information is sent by exchange network.
2. the implementation method of security service chain according to claim 1, it is characterised in that step 1 also includes:If described Security service node in ground is the first jump security service node,
It is that vSwitch corresponding to the VM of reception source is sent by exchange network, carry corresponding to local security service node The flow of vlan information.
3. the implementation method of security service chain according to claim 1, it is characterised in that step 3 is further included:If institute Local security service node is stated for final jump security service node,
The policy action in access control policy according to the matching will be changed by the vlan information of the flow of safety detection Vlan information corresponding to purpose VM;
Sent corresponding to the amended flow by safety detection of vlan information to purpose VM by exchange network VSwitch, peels off and by local virtual net so that the vSwitch corresponding to purpose VM carries out VLAN to received flow Network port is transmitted to purpose VM.
4. according to the implementation method of any described security service chain of claims 1 to 3, it is characterised in that the header packet information Determined according to user-defined safety regulation, the type of the header packet information includes:Source port number, destination slogan, protocol class One or more in type, source IP address and purpose IP address.
5. according to the implementation method of any described security service chain of claims 1 to 3, it is characterised in that described in step 2 At least one access control policy is included in local flow table, the access control policy is true according to user-defined safety regulation Fixed, the access control policy includes:First matching field and the first policy action;Wherein, first matching field and institute State header packet information corresponding.
6. the implementation method of security service chain according to claim 2, it is characterised in that in the reception source in step 1 The stream for carrying the vlan information corresponding to local security service node that vSwitch corresponding to VM is sent by exchange network Before amount, also include:
After vSwitch corresponding to the VM of source receives multiple flows of source VM transmissions, Hash treatment is carried out to the multiple flow;
The result that vSwitch corresponding to the VM of source is processed according to Hash, confirms the load balancing that there is matching in local flow table Strategy, and according to the policy action of the load balancing, multiple flows that source VM sends are transmitted to the peace of matching respectively VSwitch corresponding to full service node.
7. the implementation method of security service chain according to claim 6, it is characterised in that described to enter to the multiple flow The treatment of row Hash includes:The last m bit value to the feature field in each flow header packet information carries out mask treatment, wherein, m It is log2N round up after value, N is the number of security service chain, and the feature field includes:Port number field, IP address Field or protocol type field.
8. the implementation method of security service chain according to claim 6, it is characterised in that the load balancing bag Include:Second matching field and the second policy action.
9. a kind of virtual switch, it is characterised in that including:
Receiving unit, for receive it is that the virtual switch corresponding to upper hop security service node is sent by exchange network, Carry the flow of the vlan information corresponding to local security service node;
Flow table matching unit, if for inquiring the access control matched with the header packet information of the flow in local flow table Strategy, then carry out VLAN strippings, and send out the flow after VLAN is peeled off by virtual network interface to the flow Local security service node is delivered to, so that the local security service node carries out safety detection;
Retransmission unit, for receive local security service node transmission by after the flow of safety detection, according to described The vlan information of the flow by safety detection is revised as next-hop peace by the policy action in the access control policy matched somebody with somebody Vlan information corresponding to full service node, and it is amended described by safety detection to send vlan information by exchange network Flow.
10. a kind of cloud data center security service chain, it is characterised in that including:One or more is as claimed in claim 9 Virtual switch, controller and security service node, wherein the virtual switch corresponds to security service node, source VM and mesh VM, wherein,
The controller, for receiving user-defined safety regulation and each virtual friendship according to safety regulation configuration The access control policy changed planes;
The security service node, for carrying out safety detection to received flow, and is sent by virtual network interface By the flow of safety detection;
Virtual switch corresponding to the security service node, for being shelled to needing the flow for carrying out safety detection to perform VLAN From operation, and it is transmitted to security service node;Or, for according to matching access control policy by described by safety detection Flow the vlan information vlan information that is revised as corresponding to next-hop security service node, and sent by exchange network The amended flow by safety detection of vlan information;
Virtual switch corresponding to the source VM, for will be sent from source VM the need for carry out safety detection flow introduce first Jump security service node;
Virtual switch corresponding to the purpose VM, for the flow that final jump security service node sends to be led into mesh VM.
CN201710124814.XA 2017-03-03 2017-03-03 A kind of implementation method of cloud data center security service chain Active CN106789542B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710124814.XA CN106789542B (en) 2017-03-03 2017-03-03 A kind of implementation method of cloud data center security service chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710124814.XA CN106789542B (en) 2017-03-03 2017-03-03 A kind of implementation method of cloud data center security service chain

Publications (2)

Publication Number Publication Date
CN106789542A true CN106789542A (en) 2017-05-31
CN106789542B CN106789542B (en) 2019-08-09

Family

ID=58961233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710124814.XA Active CN106789542B (en) 2017-03-03 2017-03-03 A kind of implementation method of cloud data center security service chain

Country Status (1)

Country Link
CN (1) CN106789542B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107911258A (en) * 2017-12-29 2018-04-13 深信服科技股份有限公司 A kind of realization method and system in the secure resources pond based on SDN network
CN107920023A (en) * 2017-12-29 2018-04-17 深信服科技股份有限公司 A kind of realization method and system in secure resources pond
CN107947965A (en) * 2017-11-07 2018-04-20 清华大学 Service chaining compiler
CN108199958A (en) * 2017-12-29 2018-06-22 深信服科技股份有限公司 A kind of general secure resources pond service chaining realization method and system
CN109889533A (en) * 2019-03-11 2019-06-14 北京网御星云信息技术有限公司 Security defend method and system, computer readable storage medium under cloud environment
CN109981355A (en) * 2019-03-11 2019-07-05 北京网御星云信息技术有限公司 Security defend method and system, computer readable storage medium for cloud environment
WO2019153127A1 (en) * 2018-02-06 2019-08-15 Nokia Shanghai Bell Co., Ltd. Method, apparatus, and computer readable medium for providing security service for data center
CN110213181A (en) * 2019-04-28 2019-09-06 华为技术有限公司 Data drainage device and data drainage method in virtual network
CN110311838A (en) * 2019-07-24 2019-10-08 北京神州绿盟信息安全科技股份有限公司 A kind of method and device of security service traffic statistics
CN110324282A (en) * 2018-03-29 2019-10-11 华耀(中国)科技有限公司 The load-balancing method and its system of SSL/TLS visualization flow
CN111756632A (en) * 2020-06-22 2020-10-09 中国电子科技集团公司第五十四研究所 Security service chain dynamic arranging method based on MPLS encapsulation
CN113098728A (en) * 2019-12-23 2021-07-09 华为技术有限公司 Health check method of load balancing system and related equipment
CN114070639A (en) * 2021-11-19 2022-02-18 北京天融信网络安全技术有限公司 Message secure forwarding method and device and network security equipment
CN114629853A (en) * 2022-02-28 2022-06-14 天翼安全科技有限公司 Traffic classification control method based on security service chain analysis in security resource pool
CN114944952A (en) * 2022-05-20 2022-08-26 深信服科技股份有限公司 Data processing method, device, system, equipment and readable storage medium
CN115695086A (en) * 2022-09-19 2023-02-03 中电信数智科技有限公司 System and method for realizing service chain function based on VLAN network
CN116055412A (en) * 2023-01-16 2023-05-02 山石网科通信技术股份有限公司 Flow control method, device and storage medium based on security service chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618379A (en) * 2015-02-04 2015-05-13 北京天地互连信息技术有限公司 IDC service scene-oriented security service arranging method and network structure
CN105450522A (en) * 2014-09-24 2016-03-30 英特尔公司 Techniques for routing service chain flow packets between virtual machines
US20160094440A1 (en) * 2014-09-30 2016-03-31 International Business Machines Corporation Forwarding a packet by a nve in nvo3 network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450522A (en) * 2014-09-24 2016-03-30 英特尔公司 Techniques for routing service chain flow packets between virtual machines
US20160094440A1 (en) * 2014-09-30 2016-03-31 International Business Machines Corporation Forwarding a packet by a nve in nvo3 network
CN104618379A (en) * 2015-02-04 2015-05-13 北京天地互连信息技术有限公司 IDC service scene-oriented security service arranging method and network structure

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李军: ""防火墙上台阶:安全网关多层过滤技术的走向"", 《信息网络安全》 *
陈兴蜀 等: ""虚拟网络环境下安全服务接入方法"", 《华中科技大学学报(自然科学版)》 *

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107947965A (en) * 2017-11-07 2018-04-20 清华大学 Service chaining compiler
CN107911258A (en) * 2017-12-29 2018-04-13 深信服科技股份有限公司 A kind of realization method and system in the secure resources pond based on SDN network
CN107920023A (en) * 2017-12-29 2018-04-17 深信服科技股份有限公司 A kind of realization method and system in secure resources pond
CN108199958A (en) * 2017-12-29 2018-06-22 深信服科技股份有限公司 A kind of general secure resources pond service chaining realization method and system
CN108199958B (en) * 2017-12-29 2021-04-09 深信服科技股份有限公司 Universal secure resource pool service chain implementation method and system
WO2019153127A1 (en) * 2018-02-06 2019-08-15 Nokia Shanghai Bell Co., Ltd. Method, apparatus, and computer readable medium for providing security service for data center
US11558353B2 (en) 2018-02-06 2023-01-17 Nokia Technologies Oy Method, apparatus, and computer readable medium for providing security service for data center
CN110324282A (en) * 2018-03-29 2019-10-11 华耀(中国)科技有限公司 The load-balancing method and its system of SSL/TLS visualization flow
CN109889533A (en) * 2019-03-11 2019-06-14 北京网御星云信息技术有限公司 Security defend method and system, computer readable storage medium under cloud environment
CN109889533B (en) * 2019-03-11 2021-07-20 北京网御星云信息技术有限公司 Security defense method and system under cloud environment and computer readable storage medium
CN109981355A (en) * 2019-03-11 2019-07-05 北京网御星云信息技术有限公司 Security defend method and system, computer readable storage medium for cloud environment
CN110213181A (en) * 2019-04-28 2019-09-06 华为技术有限公司 Data drainage device and data drainage method in virtual network
WO2020220977A1 (en) * 2019-04-28 2020-11-05 华为技术有限公司 Data flow guiding apparatus and data flow guiding method in virtual network
CN110311838A (en) * 2019-07-24 2019-10-08 北京神州绿盟信息安全科技股份有限公司 A kind of method and device of security service traffic statistics
CN110311838B (en) * 2019-07-24 2021-05-04 绿盟科技集团股份有限公司 Method and device for counting safety service flow
CN113098728A (en) * 2019-12-23 2021-07-09 华为技术有限公司 Health check method of load balancing system and related equipment
CN113098728B (en) * 2019-12-23 2023-12-19 华为云计算技术有限公司 Health check method of load balancing system and related equipment
CN111756632A (en) * 2020-06-22 2020-10-09 中国电子科技集团公司第五十四研究所 Security service chain dynamic arranging method based on MPLS encapsulation
CN114070639A (en) * 2021-11-19 2022-02-18 北京天融信网络安全技术有限公司 Message secure forwarding method and device and network security equipment
CN114070639B (en) * 2021-11-19 2024-04-23 北京天融信网络安全技术有限公司 Message security forwarding method and device and network security equipment
CN114629853A (en) * 2022-02-28 2022-06-14 天翼安全科技有限公司 Traffic classification control method based on security service chain analysis in security resource pool
CN114944952A (en) * 2022-05-20 2022-08-26 深信服科技股份有限公司 Data processing method, device, system, equipment and readable storage medium
CN114944952B (en) * 2022-05-20 2023-11-07 深信服科技股份有限公司 Data processing method, device, system, equipment and readable storage medium
CN115695086A (en) * 2022-09-19 2023-02-03 中电信数智科技有限公司 System and method for realizing service chain function based on VLAN network
CN115695086B (en) * 2022-09-19 2024-01-19 中电信数智科技有限公司 System and method for realizing service chain function based on VLAN (virtual local area network)
CN116055412A (en) * 2023-01-16 2023-05-02 山石网科通信技术股份有限公司 Flow control method, device and storage medium based on security service chain

Also Published As

Publication number Publication date
CN106789542B (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN106789542B (en) A kind of implementation method of cloud data center security service chain
US11765085B2 (en) Switch with network services packet processing by service software instances
CN107819663B (en) Method and device for realizing virtual network function service chain
US9742575B2 (en) Explicit list encoding of sparse multicast group membership information with Bit Index Explicit Replication (BIER)
US9432205B2 (en) Explicit block encoding of multicast group membership information with bit index explicit replication (BIER)
CN104521195B (en) The method and system of the orderly business model of software definition is created in a communication network
US8811398B2 (en) Method for routing data packets using VLANs
CN104243270B (en) A kind of method and apparatus for establishing tunnel
CN105227463B (en) A kind of communication means in distributed apparatus between business board
JP4598462B2 (en) Provider network providing an L2-VPN service and edge router
US20200382421A1 (en) Efficient troubleshooting in openflow switches
US9036636B1 (en) System and methods for managing network packet broadcasting
CN108353024A (en) It is reduced via the multicast state of tunnelling in routing system
CN108055878A (en) Using Border Gateway Protocol maximum segment identifier depth is disclosed to applications
CN109076018A (en) Utilize IS-IS exposure maximum node and/or the technology of Link Fragmentation identifier depth
CN107948086A (en) A kind of data packet sending method, device and mixed cloud network system
CN106464522A (en) A method and system for network function placement
CN106105115A (en) The service chaining originated by service node in network environment
CN107210966A (en) In software definition networking (SDN) system the fragments for packet without restructuring is forwarded using L4 L7 headers
CN110178342A (en) The scalable application level of SDN network monitors
CN105681198B (en) A kind of business chain processing method, equipment and system
CN106105114B (en) The more preferable replacement path of more ownership IS-IS prefixes
CN108092934A (en) Safety service system and method
JP2018518925A (en) Packet forwarding
CN109691026A (en) Method and apparatus for updating multiple multiprotocol label switching (MPLS) two-way converting detection (BFD) sessions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant