CN107819874B - Method for remotely controlling firewall terminal - Google Patents

Method for remotely controlling firewall terminal Download PDF

Info

Publication number
CN107819874B
CN107819874B CN201711202166.1A CN201711202166A CN107819874B CN 107819874 B CN107819874 B CN 107819874B CN 201711202166 A CN201711202166 A CN 201711202166A CN 107819874 B CN107819874 B CN 107819874B
Authority
CN
China
Prior art keywords
firewall
terminal
control server
network
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711202166.1A
Other languages
Chinese (zh)
Other versions
CN107819874A (en
Inventor
陆世尧
陈卓
周东
唐毅敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing city vocational college
Original Assignee
Nanjing city vocational college
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing city vocational college filed Critical Nanjing city vocational college
Priority to CN201711202166.1A priority Critical patent/CN107819874B/en
Publication of CN107819874A publication Critical patent/CN107819874A/en
Application granted granted Critical
Publication of CN107819874B publication Critical patent/CN107819874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances

Abstract

A user can easily access a firewall control server only by inputting a control server address and a port through an APP handheld terminal and through an Internet network, then editing of a built-in script in the firewall control server and setting of a firewall terminal IP address required to be connected are achieved, and the script is operated in the firewall control server to send an instruction to the firewall terminal, so that the method for controlling the firewall terminal to close the network, recover the network and check the network connection state is achieved. The method and the system are convenient and quick, can quickly and efficiently realize the remote control of the firewall terminal, and save the cost.

Description

Method for remotely controlling firewall terminal
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a method for remotely controlling a firewall terminal.
Background
Along with the progress of society, the dependence of people on networks is increased day by day, some unsafe factors come along while enjoying the convenience brought to people by the networks, which is mainly reflected in that server information is leaked, illegally is tampered, network information and network resources are illegally occupied, the existence of information safety hidden dangers adds a plurality of unstable factors to the life of people, even serious economic loss and personal safety are caused sometimes, how to make network protection becomes a hot topic, even the most comprehensive protection of the network is possible to be attacked by network hackers, and once the illegal invasion occurs, virus programs can be rapidly diffused through a network, data resources can be gradually leaked along with the lapse of time, and a machine room administrator is difficult to catch up to a network machine room control network firewall in the first time and timely control the network state and rapidly isolate the network.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a method for remotely controlling a firewall terminal.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for remotely controlling a firewall terminal is characterized by comprising an Internet network, an APP handheld terminal for connecting network remote operation, a firewall control server connected with the network, and a firewall terminal connected with the firewall control server through a TCP/IP;
setting an IP address and a Web port of a firewall control server through an APP handheld terminal, calling a character string splicing method after clicking a confirmation button to combine the IP address and the Web port of the server to form a URL path, and accessing an IIS service of the firewall control server through an HTTP protocol of an Internet network;
providing database service in the firewall control server, wherein the database service comprises a Servernfo data table used for storing an IP address, a management port, a user name and a password of a firewall terminal;
the firewall terminal IP address, the management port, the user name and the password which are connected with the firewall control server are set through the configuration page of the firewall control server, after configuration is completed, a confirmation button is clicked on the configuration page of the firewall control server, a database library connection method is called, the firewall terminal IP address, the management port, the user name and the password are sent to a database of the firewall control server to be stored, a stored prompt box is popped out after storage is successful, and the control console page of the APP handheld terminal is skipped.
In order to optimize the technical scheme, the specific measures adopted further comprise:
after the IIS service of the firewall control server is successfully accessed, the IIS service of the firewall control server firstly provides a user identity authentication page, the user identity authentication page requires to input a management account and a management password, the user identity authentication is completed by inputting the pre-allocated management account and the pre-allocated management password of the firewall control server and clicking confirmation at the APP handheld terminal, and if the authentication is successful, the APP handheld terminal can jump to the firewall control server configuration page; if the verification fails, the user is prompted to input the account number or the password in a wrong way, and the user is asked to input the prompt box again.
The control cabinet page of the APP handheld terminal comprises three buttons capable of being clicked, namely a network disconnection button, a network recovery button and a state query button, three PHP control scripts are arranged in the firewall control server, namely a network disconnection PHP script, a network recovery PHP script and a state check PHP script, wherein the network disconnection button corresponds to the network disconnection PHP script, the network recovery button corresponds to the network recovery PHP script, and the state check button corresponds to the state check PHP script.
The control command in the disconnection network PHP script comprises a shutdown port instruction line, the control command in the recovery network PHP script comprises a no shutdown port instruction line, the control command in the inquiry network PHP script comprises a show mac-address-table instruction line, and the three PHP control scripts comprise receiving parameter functions, are used for receiving data information provided by database service in a firewall server and comprise firewall terminal IP addresses, management ports, user names, passwords and control commands.
The firewall control server is internally provided with an SSH2 extension frame of the PHP server, the SSH2 extension frame is used for executing a PHP script in the firewall control server to realize a shell command in the running script, the PHP server is provided with an 80-port Web access port, and when the PHP server receives an HTTP request of the APP handheld terminal access control script, the instruction in the script is executed.
When a key-off button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the shutdown port instructions contained in the script are executed one by using ssh2_ exec, after the execution of the instructions is completed, all network ports are closed by the firewall terminal, and at this time, a prompt box of 'success in network disconnection by one key' is popped up by the APP handheld terminal console page.
When a one-key recovery button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the no shutdown port instructions contained in the script are executed one by ssh2_ exec, after the instructions are executed, the firewall terminal opens the set network port, and at this time, a prompt box of 'one-key network recovery success' is popped up from the APP hand-held terminal console page.
When the state query button is clicked, a button click event is called, the event firstly calls a post request method of the primary JS, and Servernfo data table information in a database of the firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the show mac-address-table instructions contained in the script are executed one by using ssh2_ exec, after the instructions are executed, the firewall terminal inquires the states of all network ports, at this moment, a prompt box of 'state inquiry success' is popped up on the APP handheld terminal console page, and the state result is displayed on the console page of the APP handheld terminal.
The invention has the beneficial effects that: the user only needs to hold terminal alright remote control through APP and prevents hot wall terminal, and convenient operation is swift, can realize preventing the remote control at hot wall terminal fast high-efficiently to practice thrift the cost.
Drawings
Fig. 1 is a network topology diagram of the present invention.
Fig. 2 is a flow control diagram of the present invention.
Detailed Description
The present invention will now be described in further detail with reference to the accompanying drawings.
The method for remotely controlling the firewall terminal comprises an Internet network, an APP handheld terminal for connecting the network for remote operation, a firewall control server connected with the Internet network and a firewall terminal connected with the firewall control server through a TCP/IP (transmission control protocol/Internet protocol), wherein the APP handheld terminal is connected with the network for remote operation, and the firewall terminal is connected with the firewall control server through a TCP/IP (Internet protocol).
The APP handheld terminal remote control method specifically comprises the following steps:
an IP address (or an access domain name corresponding to the IP address) and a Web port of a firewall control server are set through an APP handheld terminal, a character string splicing method is called after a confirmation button is clicked to combine the IP address (or the access domain name corresponding to the IP address) and the Web port of the server into a URL path (similar to HTTP:// xxx. 8080), and then the IIS service of the firewall control server is accessed through an HTTP protocol of an Internet network.
After the access is successful, the IIS service of the firewall control server firstly provides a user identity authentication page, the user identity authentication page requires to input a management account and a management password, the pre-allocated management account and the pre-allocated management password of the firewall control server are input, the APP handheld terminal clicks to confirm to complete the user identity authentication, and if the authentication is successful, the APP handheld terminal can skip the firewall control server configuration page; if the verification fails, the user is prompted to input the account number or the password in a wrong way, and the user is asked to input the prompt box again.
The firewall control server provides database service, and comprises a Servernfo data table for storing firewall terminal IP address, management port, user name and password.
And setting a firewall terminal IP address, a management port, a user name and a password connected with the firewall control server through the APP firewall control server configuration page. And after the configuration is finished, clicking a confirmation button on a configuration page of the APP firewall control server, namely calling a database connection method, and sending the IP address, the management port, the user name and the password of the firewall terminal to a database of the firewall control server for storage. And popping up a stored prompt box after successful storage, and jumping to an APP handheld terminal console page.
The APP handheld terminal console page comprises three buttons which can be clicked, namely a one-key network breaking button, a one-key recovery button and a state query button, wherein the colors of the three buttons respectively correspond to red, green and yellow.
The firewall control server is internally provided with three PHP control scripts which are a network disconnection PHP script, a network recovery PHP script and a state check PHP script. The system comprises three buttons which are respectively corresponding to APP handheld terminals, namely a red one-key network breaking button corresponds to a network breaking PHP script, a green one-key recovery button corresponds to a network recovery PHP script, and a yellow state checking button corresponds to a state checking PHP script.
The control command in the disconnection network PHP script comprises a shutdown port instruction line, the control command in the recovery network PHP script comprises a no shutdown port instruction line, the control command in the inquiry network PHP script comprises a show mac-address-table instruction line, and the shutdown port instruction line, the no shutdown port instruction line and the show mac-address-table instruction line are all three control commands of the firewall.
The instruction line of the Shutdown port can be specifically refined into 3 steps:
the first step is as follows: sending a vi/etc/sysconfig/iptables command to the terminal to open a configuration file;
the second step is that: adding a statement in a configuration file, wherein the statement is used for adding a network port needing to be closed, for example, an 80 port (only the 80 port is opened locally), and commanding the following steps of A INPUT-p tcp-m state-state NEW-m tcp-dport 80-j DROP;
the third step: and sending a service iptables restart command to the terminal, restarting the firewall and finishing the modification.
The instruction line of the NoShutdown port can be specifically refined into 3 steps:
the first step is as follows: sending a vi/etc/sysconfig/iptables command to the terminal to open a configuration file;
the second step is that: adding a statement in a configuration file, wherein the statement is used for adding a network port needing to be opened, for example, an 80 port (only the 80 port is opened locally), and commanding the following steps of A INPUT-p tcp-m state-state NEW-m tcp-dport 80-j ACCEPT;
the third step: and sending a service iptables restart command to the terminal, restarting the firewall and finishing the modification.
The specific steps of the instruction line of the show mac-address-table are as follows:
the first step is as follows: sending an/etc/init.d/iptables status command to a terminal to inquire the state of a firewall port;
the second step is that: check if port 80 is open.
The three PHP control script contents all comprise a receiving parameter function, are used for receiving data information provided by database service in a firewall server and comprise firewall terminal IP addresses, management ports, user names, passwords and control commands.
An SSH2 extension framework of the PHP server is provided in the firewall control server, the SSH2 extension framework can be used for executing the PHP script in the firewall control server to realize the shell command in the running script, the PHP server provides an 80-port Web access, and when the PHP server receives an HTTP request of the APP handheld terminal access control script, the instruction in the script is executed.
When a user clicks a red button, namely a key-off button, a button click event is called, the event firstly calls a post request method of the original JS, and Serverinfo data table information (the information comprises an IP address, a management port, a user name and a password of a firewall terminal) in a database of the firewall control server is sent to a PHP script in the firewall control server. And calling an open method of the JS, and accessing the PHP script in the firewall control server in an HTTP request mode through an 80 port, namely, the firewall control server starts to execute the shell commands in the PHP script one by one. The Shell command firstly gives the IP address and the management port of the received firewall terminal to the firewall terminal and remotely connects the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, a shutdown port instruction contained in the script is executed one by ssh2_ exec, after the instruction is executed, the firewall terminal immediately closes all network ports, and at this time, a prompt box of 'network successful disconnection by one key' is popped up from the APP handheld terminal console page.
When a user clicks a green button, namely a one-key recovery button, a button clicking event is called, the event firstly calls a post request method of the original JS, and Serverinfo data table information (the information comprises an IP address, a management port, a user name and a password of a firewall terminal) in a database of the firewall control server is sent to a PHP script in the firewall control server. And calling an open method of the JS, and accessing the PHP script in the firewall control server in an HTTP request mode through an 80 port, namely, the firewall control server starts to execute the shell commands in the PHP script one by one. The Shell command firstly gives the IP address and the management port of the received firewall terminal to the firewall terminal and remotely connects the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, ssh2_ exec is used to execute a no shutdown port instruction line contained in the script one by one. After the instruction is executed, the firewall terminal immediately opens the set network port, and at the moment, a prompt box of 'one-key network recovery success' is popped up on the APP handheld terminal console page.
When the user clicks a yellow button, namely a state inquiry button, a button clicking event is called, the event firstly calls a post request method of the original JS, and Serverinfo data table information (the information comprises an IP address of a firewall terminal, a management port, a user name and a password) in a database of the firewall control server is sent to a PHP script in the firewall control server. And calling an open method of the JS, and accessing the PHP script in the firewall control server in an HTTP request mode through an 80 port, namely, the firewall control server starts to execute the shell commands in the PHP script one by one. The Shell command firstly gives the IP address and the management port of the received firewall terminal to the firewall terminal and remotely connects the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify login by using $ ssh2_ auth _ password; after logging in the firewall terminal successfully, the ssh2_ exec is used to execute a show mac-address-table instruction line contained in the script one by one. After the instruction is executed, the firewall terminal immediately inquires all network port states, at the moment, a prompt box of 'state inquiry success' can be popped up on the APP handheld terminal console page, and a state result is displayed on the APP handheld terminal console page.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.

Claims (1)

1. A method for remotely controlling a firewall terminal is characterized by comprising an Internet network, an APP handheld terminal for connecting network remote operation, a firewall control server connected with the network, and a firewall terminal connected with the firewall control server through a TCP/IP;
setting an IP address and a Web port of a firewall control server through an APP handheld terminal, calling a character string splicing method after clicking a confirmation button to combine the IP address and the Web port of the server to form a URL path, and accessing an IIS service of the firewall control server through an HTTP protocol of an Internet network;
providing database service in the firewall control server, wherein the database service comprises a Servernfo data table used for storing an IP address, a management port, a user name and a password of a firewall terminal;
setting a firewall terminal IP address, a management port, a user name and a password connected with a firewall control server through a configuration page of the firewall control server, clicking a confirmation button on the configuration page of the firewall control server after configuration is finished, calling a database connection method, sending the firewall terminal IP address, the management port, the user name and the password into a database of the firewall control server for storage, popping up a stored prompt box after storage is successful, and jumping to a console page of an APP handheld terminal;
after the IIS service of the firewall control server is successfully accessed, the IIS service of the firewall control server firstly provides a user identity authentication page, the user identity authentication page requires to input a management account and a management password, the user identity authentication is completed by inputting the pre-allocated management account and the pre-allocated management password of the firewall control server and clicking confirmation at the APP handheld terminal, and if the authentication is successful, the APP handheld terminal can jump to the firewall control server configuration page; if the verification fails, prompting the user that the account number or the password is input wrongly, and re-inputting a prompt box;
the control console page of the APP handheld terminal comprises three buttons which can be clicked, namely a network disconnection button, a one-key recovery button and a state query button, three PHP control scripts are arranged in the firewall control server and respectively comprise a network disconnection PHP script, a network recovery PHP script and a state check PHP script, wherein the one-key network disconnection button corresponds to the network disconnection PHP script, the one-key recovery button corresponds to the network recovery PHP script, and the state check button corresponds to the state check PHP script;
the method comprises the steps that a control command in a disconnected network PHP script comprises a shutdown port instruction line, a control command in a recovered network PHP script comprises a no shutdown port instruction line, and a control command in an inquired network PHP script comprises a show mac-address-table instruction line, wherein the three PHP control scripts comprise receiving parameter functions and are used for receiving data information provided by database services in a firewall server and comprise a firewall terminal IP address, a management port, a user name, a password and a control command;
an SSH2 extension frame of the PHP server is provided in the firewall control server, an SSH2 extension frame is used for executing a PHP script in the firewall control server to realize a shell command in the running script, the PHP server provides an 80-port Web access, and when the PHP server receives an HTTP request of the APP handheld terminal access control script, the instruction in the script is executed;
when a key-off button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, executing shutdown port instructions contained in the script one by using ssh2_ exec, closing all network ports by the firewall terminal after the instructions are executed, and popping up a prompt box of 'success in network disconnection by one key' on the APP handheld terminal console page;
when a one-key recovery button is clicked, a button clicking event is called, the event firstly calls a post request method of a primary JS, and Serverinfo data table information in a database of a firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the no shutdown port instructions contained in the script are executed one by ssh2_ exec, after the instructions are executed, the firewall terminal opens the set network port, and at the moment, a prompt box of 'one-key network recovery success' is popped up from the APP handheld terminal console page;
when the state query button is clicked, a button click event is called, the event firstly calls a post request method of the primary JS, and Servernfo data table information in a database of the firewall control server is sent to a PHP script in the firewall control server; then calling an open method of JS, accessing the PHP script in the firewall control server through an 80 port in an HTTP request mode, and starting the firewall control server to execute shell commands in the PHP script one by one; the Shell commands the received IP address and the management port of the firewall terminal to remotely connect the firewall terminal by using $ ssh2 = ssh2_ connect; after the connection is successful, the received user name and password are sent to the firewall terminal to verify the login by using $ ssh2_ auth _ password; after the firewall terminal is successfully logged in, the show mac-address-table instructions contained in the script are executed one by using ssh2_ exec, after the instructions are executed, the firewall terminal inquires the states of all network ports, at this moment, a prompt box of 'state inquiry success' is popped up on the APP handheld terminal console page, and the state result is displayed on the console page of the APP handheld terminal.
CN201711202166.1A 2017-11-27 2017-11-27 Method for remotely controlling firewall terminal Active CN107819874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711202166.1A CN107819874B (en) 2017-11-27 2017-11-27 Method for remotely controlling firewall terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711202166.1A CN107819874B (en) 2017-11-27 2017-11-27 Method for remotely controlling firewall terminal

Publications (2)

Publication Number Publication Date
CN107819874A CN107819874A (en) 2018-03-20
CN107819874B true CN107819874B (en) 2020-12-01

Family

ID=61610263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711202166.1A Active CN107819874B (en) 2017-11-27 2017-11-27 Method for remotely controlling firewall terminal

Country Status (1)

Country Link
CN (1) CN107819874B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737559A (en) * 2018-05-30 2018-11-02 郑州云海信息技术有限公司 Remote entry method, system, equipment and the readable storage medium storing program for executing of goal systems
CN109104291B (en) * 2018-06-07 2021-07-30 内蒙古工业大学 Network disconnection control method, network disconnection control device and network control system
CN108924112A (en) * 2018-06-25 2018-11-30 深圳烟草工业有限责任公司 A kind of method for connecting network and device
CN109040064A (en) * 2018-08-01 2018-12-18 郑州市景安网络科技股份有限公司 A kind of server seals and stops method, apparatus, equipment and readable storage medium storing program for executing
CN109933001A (en) * 2019-04-11 2019-06-25 韩拥军 Firewall, method and system for programmable logic controller (PLC)
CN110225117A (en) * 2019-06-12 2019-09-10 武汉通威电子有限公司 A kind of method of long-range control firewall terminal
CN110493064A (en) * 2019-08-30 2019-11-22 深圳壹账通智能科技有限公司 Firewall management method, apparatus, computer equipment and storage medium
CN110798340B (en) * 2019-10-10 2022-11-25 平安普惠企业管理有限公司 Port information combing method, device and server
CN111526150A (en) * 2020-04-28 2020-08-11 吴飞 Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port
CN112104630B (en) * 2020-09-07 2021-06-08 广东机电职业技术学院 Website one-key closing method and device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739612A (en) * 2011-04-12 2012-10-17 深圳市金蝶中间件有限公司 Remote control method and intermediate server
CN103634301A (en) * 2013-11-14 2014-03-12 新浪网技术(中国)有限公司 Client side and method for accessing private data stored in server by user
CN104253833A (en) * 2013-06-26 2014-12-31 北京神州泰岳软件股份有限公司 Remote process operating method and system
CN105490826A (en) * 2014-09-16 2016-04-13 钛马信息网络技术有限公司 Configuration management system and method based on automatic discovery
CN105577654A (en) * 2015-12-18 2016-05-11 浪潮集团有限公司 Linux dynamic firewall management method
CN105872019A (en) * 2016-03-23 2016-08-17 北京搜狐新媒体信息技术有限公司 Method and device for logging in Docker container by Web end
CN107193586A (en) * 2017-04-20 2017-09-22 广州番禺职业技术学院 Info client cloud terminal management software installation methods

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150067762A1 (en) * 2013-09-03 2015-03-05 Samsung Electronics Co., Ltd. Method and system for configuring smart home gateway firewall

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739612A (en) * 2011-04-12 2012-10-17 深圳市金蝶中间件有限公司 Remote control method and intermediate server
CN104253833A (en) * 2013-06-26 2014-12-31 北京神州泰岳软件股份有限公司 Remote process operating method and system
CN103634301A (en) * 2013-11-14 2014-03-12 新浪网技术(中国)有限公司 Client side and method for accessing private data stored in server by user
CN105490826A (en) * 2014-09-16 2016-04-13 钛马信息网络技术有限公司 Configuration management system and method based on automatic discovery
CN105577654A (en) * 2015-12-18 2016-05-11 浪潮集团有限公司 Linux dynamic firewall management method
CN105872019A (en) * 2016-03-23 2016-08-17 北京搜狐新媒体信息技术有限公司 Method and device for logging in Docker container by Web end
CN107193586A (en) * 2017-04-20 2017-09-22 广州番禺职业技术学院 Info client cloud terminal management software installation methods

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"防火墙远程管理浅析";铃声沉默;《百度文库》;20110428;第一页第3、4段,第二页第4段 *

Also Published As

Publication number Publication date
CN107819874A (en) 2018-03-20

Similar Documents

Publication Publication Date Title
CN107819874B (en) Method for remotely controlling firewall terminal
CN104346559B (en) Authority request response method and corresponding device
CN102347941B (en) A kind of safety applications control method based on open platform
CN108616882A (en) Household appliance matches network method, method of network entry, device, storage medium and equipment
CN111181998B (en) Design method of honeypot capture system for terminal equipment of Internet of things
CN105656890A (en) FIDO (Fast Identity Online) authenticator, system and method based on TEE (Trusted Execution Environment) and wireless confirmation
CN104639536A (en) Method and system for preventing network attack
CN112261083B (en) Remote control method, system and virtual machine server
CN109600371A (en) A kind of network layer leakage location and method
US20230013371A1 (en) Data communication method, apparatus, and device, storage medium, and computer program product
CN114995214A (en) Method, system, device, equipment and storage medium for remotely accessing application
CN107294910B (en) Login method and server
CN103634304B (en) A kind of method realizing quick WEB authentication on intelligent television
CN110620814A (en) Control method and system for operation and maintenance login of Web browser
CN110225117A (en) A kind of method of long-range control firewall terminal
CN103475491A (en) Remote maintenance system which is logged in to safely without code and achieving method
CN108881127A (en) A kind of method and system of control remote access permission
CN104883341A (en) Application management device, terminal and application management method
CN106230781A (en) The method and device preventing network attack of sing on web authentication techniques
CN109327455A (en) A kind of access method of NAS device, device, equipment and readable storage medium storing program for executing
CN102917359A (en) Mobile terminal with PPPoE number dialing function and number dialing method thereof
KR102118380B1 (en) An access control system of controlling server jobs by users
CN109669785A (en) Page sharing method, device, server and the storage medium of terminal applies
CN116743496A (en) Device remote operation method, device, computer device and storage medium
CN104702612B (en) A kind of user authentication process method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant