CN108777642A - A kind of network cryptographic machine network mapping information acquisition method using self study - Google Patents
A kind of network cryptographic machine network mapping information acquisition method using self study Download PDFInfo
- Publication number
- CN108777642A CN108777642A CN201810585302.8A CN201810585302A CN108777642A CN 108777642 A CN108777642 A CN 108777642A CN 201810585302 A CN201810585302 A CN 201810585302A CN 108777642 A CN108777642 A CN 108777642A
- Authority
- CN
- China
- Prior art keywords
- network
- cryptographic machine
- machine
- network cryptographic
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides a kind of network cryptographic machine network mapping information acquisition method using self study, belong to network cryptographic machine technology for information acquisition field, the present invention obtains the server ip address informations that network cryptographic machine is connected automatically by the way of self study, by data traffic.The present invention can quickly, efficiently, accurately obtain the network mapping information of network cryptographic machine, contribute to the automatically dispose of cloud data center large scale network equipment, and deployment time and human and material resources cost are saved in great less artificial participation.
Description
Technical field
It a kind of is reflected the present invention relates to network cryptographic machine technology for information acquisition more particularly to using the network cryptographic machine network of self study
Penetrate information acquisition method.
Background technology
During one of the core technology of cloud computing as Next Generation Internet constantly self is evolved and is improved.With cloud
Computing technique is greatly developed, and the office application based on cloud computing has become the trend of informatization certainty.It is built in cloud computing
If in the process, being safely one can not ignore the critical issue that can not also bypass.Ensure that the safety of office cloud system not only exists
In can provide reliable and stable business service, while a kind of directly embodiment of even more information security.The usual portion of network cryptographic machine
Administration can play protection work well before the server of cloud data center for the extraneous physical server for accessing cloud data center
With, the unauthorized access to physical server is can effectively prevent, the safety of the entire cloud computing of raising that can be more safe and reliable,
Ensure Working information safety.
Invention content
In order to solve the above technical problems, the present invention proposes a kind of network cryptographic machine network mapping letter using self study
Cease acquisition methods.The IP address information for the physical server that network cryptographic machine is protected can automatically, be fast and accurately obtained,
Network cryptographic machine is set to dispose more quickness and high efficiency in cloud data center.
The technical solution adopted by the present invention is that:
A kind of network cryptographic machine network mapping information acquisition method using self study, content include:
By the way of self study, the letters such as the addresses server ip that network cryptographic machine is connected are obtained automatically by data traffic
Breath.
A kind of specific program-network cryptographic machine traffic flow analysis software is run on network cryptographic machine, by business
Analysis, the self study of flow, network cryptographic machine can fast and accurately obtain the addresses ip for the server that data traffic is reached
Etc. information.
Main includes three aspects:
1)The operational network cipher machine traffic flow analysis software on network cryptographic machine, business is run in entire cloud platform;
2)It can be with the IP address of self study to server by network cryptographic machine traffic flow analysis software;
3)Finally set network cryptographic machine to encryption mode.
On network cryptographic machine before operational network cipher machine traffic flow analysis software, need first to carry out in cloud data center
Deployment.After cloud data center deployment, network cryptographic machine is arranged to bright logical pattern.
Wherein,
Network cryptographic machine traffic flow analysis software
Network cryptographic machine traffic flow analysis software be it is a kind of can be by obtaining net to the analysis of network topology business datum flow
The program of physical server relevant information in network topology, the running software is on network cryptographic machine.
Specific implementation is:The business datum of user is after software, and software meeting record traffic data flow is specific to remember
Record data are the source IP address of customer objective IP address and user then can clearly remember in this way by the record analysis of the software
Which lower user of record needs which business accessed, and in conjunction with self-learning property, primarily determines that user accesses the permission of cloud data.
Self study
When disposing cloud data center, network cryptographic machine is set to bright logical pattern, after having disposed data center, in network cipher
Traffic flow analysis software is run on machine, while the business of a period of time, business flow point are run under the bright logical pattern of network cryptographic machine
The IP address of related physical server can be obtained by the business self-learning networks topology of operation by analysing software.
The beneficial effects of the invention are as follows
It can reduce artificial participation efficiently quickly at cloud data center on-premise network cipher machine, save human and material resources, time
Cost.
Description of the drawings
Fig. 1 is the workflow schematic diagram of the present invention.
Specific implementation mode
More detailed elaboration is carried out to present disclosure below:
As shown in Figure 1, network cryptographic machine is arranged to bright logical pattern after the completion of cloud data center is disposed;
The operational network cipher machine traffic flow analysis software on network cryptographic machine runs the industry of a period of time in entire cloud platform
Business;
It can be with the IP address of self study to server by network cryptographic machine traffic flow analysis software;
Finally set network cryptographic machine to encryption mode.
The content of present invention includes mainly:
Network cryptographic machine traffic flow analysis software
The business datum of user is after software, and software meeting record traffic data flow, physical record data are customer objective IP
The source IP address of address and user then can clearly record which user needs to visit in this way by the record analysis of the software
Which business asked, in conjunction with self-learning property, primarily determines that user accesses the permission of cloud data.
Self study
When disposing cloud data center, network cryptographic machine is set to bright logical pattern, after having disposed data center, in network cipher
Traffic flow analysis software is run on machine, while the business of a period of time, business flow point are run under the bright logical pattern of network cryptographic machine
The IP address of related physical server can be obtained by the business self-learning networks topology of operation by analysing software.
Claims (8)
1. a kind of network cryptographic machine network mapping information acquisition method using self study, which is characterized in that
By the way of self study, the server ip address informations that network cryptographic machine is connected are obtained automatically by data traffic.
2. according to the method described in claim 1, it is characterized in that,
A kind of program, i.e. network cryptographic machine traffic flow analysis software are run on network cryptographic machine, by dividing service traffics
Analysis, self study, network cryptographic machine can fast and accurately obtain the ip address informations for the server that data traffic is reached.
3. according to the method described in claim 2, it is characterized in that,
Main includes three aspects:
1)The operational network cipher machine traffic flow analysis software on network cryptographic machine, business is run in entire cloud platform;
2)It can be with the IP address of self study to server by network cryptographic machine traffic flow analysis software;
3)Finally set network cryptographic machine to encryption mode.
4. according to the method described in claim 3, it is characterized in that,
On network cryptographic machine before operational network cipher machine traffic flow analysis software, need first in cloud data center carry out portion
Administration.
5. method according to claim 3 or 4, which is characterized in that
After cloud data center deployment, network cryptographic machine is arranged to bright logical pattern.
6. according to the method described in claim 3, it is characterized in that,
Wherein,
Network cryptographic machine traffic flow analysis software
Network cryptographic machine traffic flow analysis software be it is a kind of can be by obtaining net to the analysis of network topology business datum flow
The program of physical server relevant information in network topology, the running software is on network cryptographic machine.
7. according to the method described in claim 6, it is characterized in that,
Specific implementation is:The business datum of user is after software, software meeting record traffic data flow, physical record number
According to the source IP address for customer objective IP address and user, in this way by the record analysis of the software, then can clearly record
Which user needs which business accessed, and in conjunction with self-learning property, primarily determines that user accesses the permission of cloud data.
8. according to the method described in claim 3, it is characterized in that,
Self study
When disposing cloud data center, network cryptographic machine is set to bright logical pattern, after having disposed data center, in network cipher
Traffic flow analysis software is run on machine, while running business under the bright logical pattern of network cryptographic machine, and traffic flow analysis software can
By the business self-learning networks topology of operation, the IP address of related physical server is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810585302.8A CN108777642A (en) | 2018-06-08 | 2018-06-08 | A kind of network cryptographic machine network mapping information acquisition method using self study |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810585302.8A CN108777642A (en) | 2018-06-08 | 2018-06-08 | A kind of network cryptographic machine network mapping information acquisition method using self study |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108777642A true CN108777642A (en) | 2018-11-09 |
Family
ID=64025821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810585302.8A Pending CN108777642A (en) | 2018-06-08 | 2018-06-08 | A kind of network cryptographic machine network mapping information acquisition method using self study |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108777642A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924800A (en) * | 2009-06-11 | 2010-12-22 | 华为技术有限公司 | Method for obtaining IP address of DHCPv6 server, DHCPv6 server and DHCPv6 communication system |
CN103428044A (en) * | 2012-05-24 | 2013-12-04 | 中国移动通信集团贵州有限公司 | Data packet monitoring method, device and system |
CN106453687A (en) * | 2016-11-21 | 2017-02-22 | 中国联合网络通信集团有限公司 | Method of obtaining IP of target device, MME network element and DNS server |
-
2018
- 2018-06-08 CN CN201810585302.8A patent/CN108777642A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924800A (en) * | 2009-06-11 | 2010-12-22 | 华为技术有限公司 | Method for obtaining IP address of DHCPv6 server, DHCPv6 server and DHCPv6 communication system |
CN103428044A (en) * | 2012-05-24 | 2013-12-04 | 中国移动通信集团贵州有限公司 | Data packet monitoring method, device and system |
CN106453687A (en) * | 2016-11-21 | 2017-02-22 | 中国联合网络通信集团有限公司 | Method of obtaining IP of target device, MME network element and DNS server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101562609B (en) | VPN network security loophole detection and global admittance controlling system | |
CN107566379A (en) | A kind of government information resources shared system based on block chain | |
CN104811433B (en) | The distributed Internet of things system and implementation method of a kind of C/S frameworks | |
CN110336810A (en) | Information sharing method, platform and calculating equipment | |
CN111666578A (en) | Data management method and device, electronic equipment and computer readable storage medium | |
CN105915535B (en) | A kind of virtual resources access control method based on user identity | |
CN107463839A (en) | A kind of system and method for managing application program | |
CN104683394A (en) | Cloud computing platform database benchmark test system for new technology and method thereof | |
CN109344624A (en) | Penetration test method, platform, equipment and storage medium based on cloud cooperation | |
CN103136255A (en) | Method and device for information management | |
CN114238959A (en) | User access behavior evaluation method and system based on zero-trust security system | |
CN107566334B (en) | A kind of distribution terminal safety monitoring method and device realized based on agency | |
CN113111951A (en) | Data processing method and device | |
CN108027856A (en) | The real-time indicator of attack information is established using credible platform module | |
CN112261045A (en) | Network attack data automatic generation method and system based on attack principle | |
JP2009003549A (en) | Data management device, data management method, data management program, and data management program storage medium | |
CN110474916A (en) | Web oriented application provides the method and device of franchise account | |
JP2015132927A (en) | Information processing system, information processing device, monitoring device, monitoring method, and program | |
CN113010897A (en) | Cloud computing security management method and system | |
CN108777642A (en) | A kind of network cryptographic machine network mapping information acquisition method using self study | |
CN104009846B (en) | A kind of single-sign-on apparatus and method | |
CN106888197A (en) | The processing method and equipment of a kind of network risks | |
CN114157470B (en) | Token management method and device | |
CN113065126B (en) | Personal information compliance method and device based on distributed data sandbox | |
CN107454112A (en) | A kind of method and its system for accessing trusted application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181109 |
|
RJ01 | Rejection of invention patent application after publication |