CN107819874B - Method for remotely controlling firewall terminal - Google Patents
Method for remotely controlling firewall terminal Download PDFInfo
- Publication number
- CN107819874B CN107819874B CN201711202166.1A CN201711202166A CN107819874B CN 107819874 B CN107819874 B CN 107819874B CN 201711202166 A CN201711202166 A CN 201711202166A CN 107819874 B CN107819874 B CN 107819874B
- Authority
- CN
- China
- Prior art keywords
- firewall
- terminal
- control server
- network
- port
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000013515 script Methods 0.000 claims abstract description 83
- 238000011084 recovery Methods 0.000 claims description 20
- 238000012790 confirmation Methods 0.000 claims description 8
- 101000643431 Homo sapiens Protein phosphatase Slingshot homolog 2 Proteins 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 3
- 230000009191 jumping Effects 0.000 claims description 2
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 241001513109 Chrysocephalum apiculatum Species 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
A user can easily access a firewall control server only by inputting a control server address and a port through an APP handheld terminal and through an Internet network, then editing of a built-in script in the firewall control server and setting of a firewall terminal IP address required to be connected are achieved, and the script is operated in the firewall control server to send an instruction to the firewall terminal, so that the method for controlling the firewall terminal to close the network, recover the network and check the network connection state is achieved. The method and the system are convenient and quick, can quickly and efficiently realize the remote control of the firewall terminal, and save the cost.
Description
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a method for remotely controlling a firewall terminal.
Background
Along with the progress of society, the dependence of people on networks is increased day by day, some unsafe factors come along while enjoying the convenience brought to people by the networks, which is mainly reflected in that server information is leaked, illegally is tampered, network information and network resources are illegally occupied, the existence of information safety hidden dangers adds a plurality of unstable factors to the life of people, even serious economic loss and personal safety are caused sometimes, how to make network protection becomes a hot topic, even the most comprehensive protection of the network is possible to be attacked by network hackers, and once the illegal invasion occurs, virus programs can be rapidly diffused through a network, data resources can be gradually leaked along with the lapse of time, and a machine room administrator is difficult to catch up to a network machine room control network firewall in the first time and timely control the network state and rapidly isolate the network.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a method for remotely controlling a firewall terminal.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for remotely controlling a firewall terminal is characterized by comprising an Internet network, an APP handheld terminal for connecting network remote operation, a firewall control server connected with the network, and a firewall terminal connected with the firewall control server through a TCP/IP;
setting an IP address and a Web port of a firewall control server through an APP handheld terminal, calling a character string splicing method after clicking a confirmation button to combine the IP address and the Web port of the server to form a URL path, and accessing an IIS service of the firewall control server through an HTTP protocol of an Internet network;
providing database service in the firewall control server, wherein the database service comprises a Servernfo data table used for storing an IP address, a management port, a user name and a password of a firewall terminal;
the firewall terminal IP address, the management port, the user name and the password which are connected with the firewall control server are set through the configuration page of the firewall control server, after configuration is completed, a confirmation button is clicked on the configuration page of the firewall control server, a database library connection method is called, the firewall terminal IP address, the management port, the user name and the password are sent to a database of the firewall control server to be stored, a stored prompt box is popped out after storage is successful, and the control console page of the APP handheld terminal is skipped.
In order to optimize the technical scheme, the specific measures adopted further comprise:
after the IIS service of the firewall control server is successfully accessed, the IIS service of the firewall control server firstly provides a user identity authentication page, the user identity authentication page requires to input a management account and a management password, the user identity authentication is completed by inputting the pre-allocated management account and the pre-allocated management password of the firewall control server and clicking confirmation at the APP handheld terminal, and if the authentication is successful, the APP handheld terminal can jump to the firewall control server configuration page; if the verification fails, the user is prompted to input the account number or the password in a wrong way, and the user is asked to input the prompt box again.
The control cabinet page of the APP handheld terminal comprises three buttons capable of being clicked, namely a network disconnection button, a network recovery button and a state query button, three PHP control scripts are arranged in the firewall control server, namely a network disconnection PHP script, a network recovery PHP script and a state check PHP script, wherein the network disconnection button corresponds to the network disconnection PHP script, the network recovery button corresponds to the network recovery PHP script, and the state check button corresponds to the state check PHP script.
The control command in the disconnection network PHP script comprises a shutdown port instruction line, the control command in the recovery network PHP script comprises a no shutdown port instruction line, the control command in the inquiry network PHP script comprises a show mac-address-table instruction line, and the three PHP control scripts comprise receiving parameter functions, are used for receiving data information provided by database service in a firewall server and comprise firewall terminal IP addresses, management ports, user names, passwords and control commands.
The firewall control server is internally provided with an SSH2 extension frame of the PHP server, the SSH2 extension frame is used for executing a PHP script in the firewall control server to realize a shell command in the running script, the PHP server is provided with an 80-port Web access port, and when the PHP server receives an HTTP request of the APP handheld terminal access control script, the instruction in the script is executed.
When a key-off button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the shutdown port instructions contained in the script are executed one by using ssh2_ exec, after the execution of the instructions is completed, all network ports are closed by the firewall terminal, and at this time, a prompt box of 'success in network disconnection by one key' is popped up by the APP handheld terminal console page.
When a one-key recovery button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the no shutdown port instructions contained in the script are executed one by ssh2_ exec, after the instructions are executed, the firewall terminal opens the set network port, and at this time, a prompt box of 'one-key network recovery success' is popped up from the APP hand-held terminal console page.
When the state query button is clicked, a button click event is called, the event firstly calls a post request method of the primary JS, and Servernfo data table information in a database of the firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the show mac-address-table instructions contained in the script are executed one by using ssh2_ exec, after the instructions are executed, the firewall terminal inquires the states of all network ports, at this moment, a prompt box of 'state inquiry success' is popped up on the APP handheld terminal console page, and the state result is displayed on the console page of the APP handheld terminal.
The invention has the beneficial effects that: the user only needs to hold terminal alright remote control through APP and prevents hot wall terminal, and convenient operation is swift, can realize preventing the remote control at hot wall terminal fast high-efficiently to practice thrift the cost.
Drawings
Fig. 1 is a network topology diagram of the present invention.
Fig. 2 is a flow control diagram of the present invention.
Detailed Description
The present invention will now be described in further detail with reference to the accompanying drawings.
The method for remotely controlling the firewall terminal comprises an Internet network, an APP handheld terminal for connecting the network for remote operation, a firewall control server connected with the Internet network and a firewall terminal connected with the firewall control server through a TCP/IP (transmission control protocol/Internet protocol), wherein the APP handheld terminal is connected with the network for remote operation, and the firewall terminal is connected with the firewall control server through a TCP/IP (Internet protocol).
The APP handheld terminal remote control method specifically comprises the following steps:
an IP address (or an access domain name corresponding to the IP address) and a Web port of a firewall control server are set through an APP handheld terminal, a character string splicing method is called after a confirmation button is clicked to combine the IP address (or the access domain name corresponding to the IP address) and the Web port of the server into a URL path (similar to HTTP:// xxx. 8080), and then the IIS service of the firewall control server is accessed through an HTTP protocol of an Internet network.
After the access is successful, the IIS service of the firewall control server firstly provides a user identity authentication page, the user identity authentication page requires to input a management account and a management password, the pre-allocated management account and the pre-allocated management password of the firewall control server are input, the APP handheld terminal clicks to confirm to complete the user identity authentication, and if the authentication is successful, the APP handheld terminal can skip the firewall control server configuration page; if the verification fails, the user is prompted to input the account number or the password in a wrong way, and the user is asked to input the prompt box again.
The firewall control server provides database service, and comprises a Servernfo data table for storing firewall terminal IP address, management port, user name and password.
And setting a firewall terminal IP address, a management port, a user name and a password connected with the firewall control server through the APP firewall control server configuration page. And after the configuration is finished, clicking a confirmation button on a configuration page of the APP firewall control server, namely calling a database connection method, and sending the IP address, the management port, the user name and the password of the firewall terminal to a database of the firewall control server for storage. And popping up a stored prompt box after successful storage, and jumping to an APP handheld terminal console page.
The APP handheld terminal console page comprises three buttons which can be clicked, namely a one-key network breaking button, a one-key recovery button and a state query button, wherein the colors of the three buttons respectively correspond to red, green and yellow.
The firewall control server is internally provided with three PHP control scripts which are a network disconnection PHP script, a network recovery PHP script and a state check PHP script. The system comprises three buttons which are respectively corresponding to APP handheld terminals, namely a red one-key network breaking button corresponds to a network breaking PHP script, a green one-key recovery button corresponds to a network recovery PHP script, and a yellow state checking button corresponds to a state checking PHP script.
The control command in the disconnection network PHP script comprises a shutdown port instruction line, the control command in the recovery network PHP script comprises a no shutdown port instruction line, the control command in the inquiry network PHP script comprises a show mac-address-table instruction line, and the shutdown port instruction line, the no shutdown port instruction line and the show mac-address-table instruction line are all three control commands of the firewall.
The instruction line of the Shutdown port can be specifically refined into 3 steps:
the first step is as follows: sending a vi/etc/sysconfig/iptables command to the terminal to open a configuration file;
the second step is that: adding a statement in a configuration file, wherein the statement is used for adding a network port needing to be closed, for example, an 80 port (only the 80 port is opened locally), and commanding the following steps of A INPUT-p tcp-m state-state NEW-m tcp-dport 80-j DROP;
the third step: and sending a service iptables restart command to the terminal, restarting the firewall and finishing the modification.
The instruction line of the NoShutdown port can be specifically refined into 3 steps:
the first step is as follows: sending a vi/etc/sysconfig/iptables command to the terminal to open a configuration file;
the second step is that: adding a statement in a configuration file, wherein the statement is used for adding a network port needing to be opened, for example, an 80 port (only the 80 port is opened locally), and commanding the following steps of A INPUT-p tcp-m state-state NEW-m tcp-dport 80-j ACCEPT;
the third step: and sending a service iptables restart command to the terminal, restarting the firewall and finishing the modification.
The specific steps of the instruction line of the show mac-address-table are as follows:
the first step is as follows: sending an/etc/init.d/iptables status command to a terminal to inquire the state of a firewall port;
the second step is that: check if port 80 is open.
The three PHP control script contents all comprise a receiving parameter function, are used for receiving data information provided by database service in a firewall server and comprise firewall terminal IP addresses, management ports, user names, passwords and control commands.
An SSH2 extension framework of the PHP server is provided in the firewall control server, the SSH2 extension framework can be used for executing the PHP script in the firewall control server to realize the shell command in the running script, the PHP server provides an 80-port Web access, and when the PHP server receives an HTTP request of the APP handheld terminal access control script, the instruction in the script is executed.
When a user clicks a red button, namely a key-off button, a button click event is called, the event firstly calls a post request method of the original JS, and Serverinfo data table information (the information comprises an IP address, a management port, a user name and a password of a firewall terminal) in a database of the firewall control server is sent to a PHP script in the firewall control server. And calling an open method of the JS, and accessing the PHP script in the firewall control server in an HTTP request mode through an 80 port, namely, the firewall control server starts to execute the shell commands in the PHP script one by one. The Shell command firstly gives the IP address and the management port of the received firewall terminal to the firewall terminal and remotely connects the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, a shutdown port instruction contained in the script is executed one by ssh2_ exec, after the instruction is executed, the firewall terminal immediately closes all network ports, and at this time, a prompt box of 'network successful disconnection by one key' is popped up from the APP handheld terminal console page.
When a user clicks a green button, namely a one-key recovery button, a button clicking event is called, the event firstly calls a post request method of the original JS, and Serverinfo data table information (the information comprises an IP address, a management port, a user name and a password of a firewall terminal) in a database of the firewall control server is sent to a PHP script in the firewall control server. And calling an open method of the JS, and accessing the PHP script in the firewall control server in an HTTP request mode through an 80 port, namely, the firewall control server starts to execute the shell commands in the PHP script one by one. The Shell command firstly gives the IP address and the management port of the received firewall terminal to the firewall terminal and remotely connects the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, ssh2_ exec is used to execute a no shutdown port instruction line contained in the script one by one. After the instruction is executed, the firewall terminal immediately opens the set network port, and at the moment, a prompt box of 'one-key network recovery success' is popped up on the APP handheld terminal console page.
When the user clicks a yellow button, namely a state inquiry button, a button clicking event is called, the event firstly calls a post request method of the original JS, and Serverinfo data table information (the information comprises an IP address of a firewall terminal, a management port, a user name and a password) in a database of the firewall control server is sent to a PHP script in the firewall control server. And calling an open method of the JS, and accessing the PHP script in the firewall control server in an HTTP request mode through an 80 port, namely, the firewall control server starts to execute the shell commands in the PHP script one by one. The Shell command firstly gives the IP address and the management port of the received firewall terminal to the firewall terminal and remotely connects the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify login by using $ ssh2_ auth _ password; after logging in the firewall terminal successfully, the ssh2_ exec is used to execute a show mac-address-table instruction line contained in the script one by one. After the instruction is executed, the firewall terminal immediately inquires all network port states, at the moment, a prompt box of 'state inquiry success' can be popped up on the APP handheld terminal console page, and a state result is displayed on the APP handheld terminal console page.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.
Claims (1)
1. A method for remotely controlling a firewall terminal is characterized by comprising an Internet network, an APP handheld terminal for connecting network remote operation, a firewall control server connected with the network, and a firewall terminal connected with the firewall control server through a TCP/IP;
setting an IP address and a Web port of a firewall control server through an APP handheld terminal, calling a character string splicing method after clicking a confirmation button to combine the IP address and the Web port of the server to form a URL path, and accessing an IIS service of the firewall control server through an HTTP protocol of an Internet network;
providing database service in the firewall control server, wherein the database service comprises a Servernfo data table used for storing an IP address, a management port, a user name and a password of a firewall terminal;
setting a firewall terminal IP address, a management port, a user name and a password connected with a firewall control server through a configuration page of the firewall control server, clicking a confirmation button on the configuration page of the firewall control server after configuration is finished, calling a database connection method, sending the firewall terminal IP address, the management port, the user name and the password into a database of the firewall control server for storage, popping up a stored prompt box after storage is successful, and jumping to a console page of an APP handheld terminal;
after the IIS service of the firewall control server is successfully accessed, the IIS service of the firewall control server firstly provides a user identity authentication page, the user identity authentication page requires to input a management account and a management password, the user identity authentication is completed by inputting the pre-allocated management account and the pre-allocated management password of the firewall control server and clicking confirmation at the APP handheld terminal, and if the authentication is successful, the APP handheld terminal can jump to the firewall control server configuration page; if the verification fails, prompting the user that the account number or the password is input wrongly, and re-inputting a prompt box;
the control console page of the APP handheld terminal comprises three buttons which can be clicked, namely a network disconnection button, a one-key recovery button and a state query button, three PHP control scripts are arranged in the firewall control server and respectively comprise a network disconnection PHP script, a network recovery PHP script and a state check PHP script, wherein the one-key network disconnection button corresponds to the network disconnection PHP script, the one-key recovery button corresponds to the network recovery PHP script, and the state check button corresponds to the state check PHP script;
the method comprises the steps that a control command in a disconnected network PHP script comprises a shutdown port instruction line, a control command in a recovered network PHP script comprises a no shutdown port instruction line, and a control command in an inquired network PHP script comprises a show mac-address-table instruction line, wherein the three PHP control scripts comprise receiving parameter functions and are used for receiving data information provided by database services in a firewall server and comprise a firewall terminal IP address, a management port, a user name, a password and a control command;
an SSH2 extension frame of the PHP server is provided in the firewall control server, an SSH2 extension frame is used for executing a PHP script in the firewall control server to realize a shell command in the running script, the PHP server provides an 80-port Web access, and when the PHP server receives an HTTP request of the APP handheld terminal access control script, the instruction in the script is executed;
when a key-off button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, executing shutdown port instructions contained in the script one by using ssh2_ exec, closing all network ports by the firewall terminal after the instructions are executed, and popping up a prompt box of 'success in network disconnection by one key' on the APP handheld terminal console page;
when a one-key recovery button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the no shutdown port instructions contained in the script are executed one by ssh2_ exec, after the instructions are executed, the firewall terminal opens the set network port, and at the moment, a prompt box of 'one-key network recovery success' is popped up from the APP handheld terminal console page;
when the state query button is clicked, a button click event is called, the event firstly calls a post request method of the primary JS, and Servernfo data table information in a database of the firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the show mac-address-table instructions contained in the script are executed one by using ssh2_ exec, after the instructions are executed, the firewall terminal inquires the states of all network ports, at this moment, a prompt box of 'state inquiry success' is popped up on the APP handheld terminal console page, and the state result is displayed on the console page of the APP handheld terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711202166.1A CN107819874B (en) | 2017-11-27 | 2017-11-27 | Method for remotely controlling firewall terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711202166.1A CN107819874B (en) | 2017-11-27 | 2017-11-27 | Method for remotely controlling firewall terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107819874A CN107819874A (en) | 2018-03-20 |
CN107819874B true CN107819874B (en) | 2020-12-01 |
Family
ID=61610263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711202166.1A Active CN107819874B (en) | 2017-11-27 | 2017-11-27 | Method for remotely controlling firewall terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107819874B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108737559A (en) * | 2018-05-30 | 2018-11-02 | 郑州云海信息技术有限公司 | Remote entry method, system, equipment and the readable storage medium storing program for executing of goal systems |
CN109104291B (en) * | 2018-06-07 | 2021-07-30 | 内蒙古工业大学 | Network disconnection control method, network disconnection control device and network control system |
CN108924112A (en) * | 2018-06-25 | 2018-11-30 | 深圳烟草工业有限责任公司 | A kind of method for connecting network and device |
CN109040064A (en) * | 2018-08-01 | 2018-12-18 | 郑州市景安网络科技股份有限公司 | A kind of server seals and stops method, apparatus, equipment and readable storage medium storing program for executing |
CN109933001A (en) * | 2019-04-11 | 2019-06-25 | 韩拥军 | Firewall, method and system for programmable logic controller (PLC) |
CN110225117A (en) * | 2019-06-12 | 2019-09-10 | 武汉通威电子有限公司 | A kind of method of long-range control firewall terminal |
CN110493064A (en) * | 2019-08-30 | 2019-11-22 | 深圳壹账通智能科技有限公司 | Firewall management method, apparatus, computer equipment and storage medium |
CN110798340B (en) * | 2019-10-10 | 2022-11-25 | 平安普惠企业管理有限公司 | Port information combing method, device and server |
CN111526150A (en) * | 2020-04-28 | 2020-08-11 | 吴飞 | Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port |
CN112104630B (en) * | 2020-09-07 | 2021-06-08 | 广东机电职业技术学院 | Website one-key closing method and device, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739612A (en) * | 2011-04-12 | 2012-10-17 | 深圳市金蝶中间件有限公司 | Remote control method and intermediate server |
CN103634301A (en) * | 2013-11-14 | 2014-03-12 | 新浪网技术(中国)有限公司 | Client side and method for accessing private data stored in server by user |
CN104253833A (en) * | 2013-06-26 | 2014-12-31 | 北京神州泰岳软件股份有限公司 | Remote process operating method and system |
CN105490826A (en) * | 2014-09-16 | 2016-04-13 | 钛马信息网络技术有限公司 | Configuration management system and method based on automatic discovery |
CN105577654A (en) * | 2015-12-18 | 2016-05-11 | 浪潮集团有限公司 | Linux dynamic firewall management method |
CN105872019A (en) * | 2016-03-23 | 2016-08-17 | 北京搜狐新媒体信息技术有限公司 | Method and device for logging in Docker container by Web end |
CN107193586A (en) * | 2017-04-20 | 2017-09-22 | 广州番禺职业技术学院 | Info client cloud terminal management software installation methods |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150067762A1 (en) * | 2013-09-03 | 2015-03-05 | Samsung Electronics Co., Ltd. | Method and system for configuring smart home gateway firewall |
-
2017
- 2017-11-27 CN CN201711202166.1A patent/CN107819874B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739612A (en) * | 2011-04-12 | 2012-10-17 | 深圳市金蝶中间件有限公司 | Remote control method and intermediate server |
CN104253833A (en) * | 2013-06-26 | 2014-12-31 | 北京神州泰岳软件股份有限公司 | Remote process operating method and system |
CN103634301A (en) * | 2013-11-14 | 2014-03-12 | 新浪网技术(中国)有限公司 | Client side and method for accessing private data stored in server by user |
CN105490826A (en) * | 2014-09-16 | 2016-04-13 | 钛马信息网络技术有限公司 | Configuration management system and method based on automatic discovery |
CN105577654A (en) * | 2015-12-18 | 2016-05-11 | 浪潮集团有限公司 | Linux dynamic firewall management method |
CN105872019A (en) * | 2016-03-23 | 2016-08-17 | 北京搜狐新媒体信息技术有限公司 | Method and device for logging in Docker container by Web end |
CN107193586A (en) * | 2017-04-20 | 2017-09-22 | 广州番禺职业技术学院 | Info client cloud terminal management software installation methods |
Non-Patent Citations (1)
Title |
---|
"防火墙远程管理浅析";铃声沉默;《百度文库》;20110428;第一页第3、4段,第二页第4段 * |
Also Published As
Publication number | Publication date |
---|---|
CN107819874A (en) | 2018-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107819874B (en) | Method for remotely controlling firewall terminal | |
CN104346559B (en) | Authority request response method and corresponding device | |
CN102347941B (en) | A kind of safety applications control method based on open platform | |
CN108616882A (en) | Household appliance matches network method, method of network entry, device, storage medium and equipment | |
CN112261083B (en) | Remote control method, system and virtual machine server | |
CN104639536A (en) | Method and system for preventing network attack | |
CN114995214A (en) | Method, system, device, equipment and storage medium for remotely accessing application | |
CN103368809A (en) | Internet reverse penetration tunnel implementation method | |
US20230013371A1 (en) | Data communication method, apparatus, and device, storage medium, and computer program product | |
CN111181998A (en) | Design method of honeypot capture system for terminal equipment of Internet of things | |
CN107294910B (en) | Login method and server | |
CN103634304B (en) | A kind of method realizing quick WEB authentication on intelligent television | |
CN110620814A (en) | Control method and system for operation and maintenance login of Web browser | |
CN110225117A (en) | A kind of method of long-range control firewall terminal | |
CN104883341A (en) | Application management device, terminal and application management method | |
CN103034811B (en) | A kind of method, system and device of file process | |
CN106230781A (en) | The method and device preventing network attack of sing on web authentication techniques | |
CN109327455A (en) | A kind of access method of NAS device, device, equipment and readable storage medium storing program for executing | |
KR102118380B1 (en) | An access control system of controlling server jobs by users | |
CN109669785A (en) | Page sharing method, device, server and the storage medium of terminal applies | |
CN102624724B (en) | Security gateway and method for securely logging in server by gateway | |
CN104702612B (en) | A kind of user authentication process method and device | |
Bella et al. | A socio-technical methodology for the security and privacy analysis of services | |
US20160072768A1 (en) | Cellular-call activated, mechanical interrupt device for a wired connection to the Internet | |
CN106375265A (en) | Household gateway and communication management method and communication system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: No. 462 Heyan Road, Nanjing City, Jiangsu Province, China 210038 Patentee after: Nanjing City Vocational College (Nanjing Open University) Country or region after: China Address before: No. 462 Heyan Road, Nanjing City, Jiangsu Province, China 210038 Patentee before: NANJING CITY VOCATIONAL College Country or region before: China |