CN109040101A - A method of different security services are used based on openflow protocol realization multi-tenant - Google Patents

A method of different security services are used based on openflow protocol realization multi-tenant Download PDF

Info

Publication number
CN109040101A
CN109040101A CN201810978545.8A CN201810978545A CN109040101A CN 109040101 A CN109040101 A CN 109040101A CN 201810978545 A CN201810978545 A CN 201810978545A CN 109040101 A CN109040101 A CN 109040101A
Authority
CN
China
Prior art keywords
tenant
service
virtual switch
openflow
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810978545.8A
Other languages
Chinese (zh)
Inventor
张太成
张仝营
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing An Information Technology Co Ltd
Original Assignee
Beijing An Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing An Information Technology Co Ltd filed Critical Beijing An Information Technology Co Ltd
Priority to CN201810978545.8A priority Critical patent/CN109040101A/en
Publication of CN109040101A publication Critical patent/CN109040101A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of methods for using different security services based on openflow protocol realization multi-tenant, include the following steps: the hardware device for (1) using a server as secure resources pond;(2) a virtual switch is created, and the message that the virtual switch is arranged is controlled by openflow flow table;(3) the physical network card on the server is mounted on virtual switch, and creates multiple secure virtual machines, the secure virtual machine is respectively mounted on virtual switch there are two business Microsoft Loopback Adapter;(4) configuration service Microsoft Loopback Adapter is bridge mode in the secure virtual machine;(5) using each secure virtual machine as a security service, service chaining is formed by one or more security services, using SDN technology, may be implemented to same tenant while a variety of security services being provided, the different security service demands of different tenants can also be met simultaneously.

Description

A method of different security services are used based on openflow protocol realization multi-tenant
Technical field
The present invention relates to a kind of filed of network information security, and in particular to multi-tenant is required using different under a kind of cloud environment The implementation method of security service.
Background technique
With cloud computing and the development of cloud security, requirement of the cloud client to cloud security is higher and higher, does not require nothing more than safe factory Quotient meets the needs of security function, more to require to solve under current multi-tenant, and safety equipment dispersion, security service is single, pacifies Full service is arranged in pairs or groups the problems such as not flexible.Virtual secure service chaining is a new concept in cloud security, is serviced in existing technology Security service is single in chain, protection mode is not flexible, under multi-tenant scene to the network technology used in protection object by force according to Rely, for example requires to use vxlan.Therefore, how the virtualization Network Security Service resource pool based on openFlow agreement, utilize Virtualization and SDN technology carry out super all kinds of safety products of fusion and flexibly meet multi-tenant to provide security service chain abundant The requirement of lower difference security service, is that this field one needs the technical issues of solving.
Summary of the invention
The present invention provides a kind of methods for using different security services based on openflow protocol realization multi-tenant, utilize Virtualization and the super all kinds of safety products of fusion of openflow technology, provide security service chain abundant, neatly meet multi-tenant The requirement of lower difference security service.The specific technical solution of the present invention is as follows:
A method of different security services are used based on openflow protocol realization multi-tenant, which is characterized in that including Following steps:
(1) use hardware device of the server as secure resources pond, on the server installation support virtualization and The linux system of openflow, at least there are two physical network cards for the server;
(2) a virtual switch is created, and the message that the virtual switch is arranged is controlled by openflow flow table;
(3) the physical network card on the server is mounted on virtual switch, and creates multiple secure virtual machines, institute Secure virtual machine is stated respectively to be mounted on virtual switch there are two business Microsoft Loopback Adapter;
(4) configuration service Microsoft Loopback Adapter is bridge mode in the secure virtual machine, is provided by the virtual switch Order, inquire the business of associated port and secure virtual machine on the virtual switch where the business Microsoft Loopback Adapter Microsoft Loopback Adapter is No. port corresponding, and makes a record;
(5) using each secure virtual machine as a security service, service chaining is formed by one or more security services, is led to It crosses in messageNetwork identityTenant is distinguished, when all tenants use security service chain, using openflow agreement, to be looked into To No. port issue flow entry for unique identification of the network interface card on virtual switch, specify from a physical network card into message Go out after the service chaining from another physical network card;When different tenants use different service chainings, using openflow The flow entry of different service chainings is configured in different flow tables by agreement, setting default flow table, has identical tenant mark for all The message of knowledge jumps to same flow table.
Further, the physical network card of the server is two, and physical network card is for linking external network, one Physical network card requires protected user network for linking.
Further, the secure virtual machine is2 to 10
Further, describedNetwork identityFor the ip of tenant, subnet, vlan, port numbers or combinations thereof.
The beneficial effects of the present invention are using virtualization and SDN technology, a security service resource pool, which can merge, appoints The safety equipment of meaning can provide a variety of security services simultaneously to same tenant, can also meet the not TongAn of different tenants simultaneously Full demand for services.
Detailed description of the invention
Fig. 1 is a kind of original based on openflow protocol realization multi-tenant using the method for different security services of the invention Manage schematic diagram;
Fig. 2 is a kind of report based on openflow protocol realization multi-tenant using the method for different security services of the invention Text moves towards structure principle chart.
Specific embodiment
The present invention will be further explained below with reference to the attached drawings.
Fig. 1 is a kind of original based on openflow protocol realization multi-tenant using the method for different security services of the invention Manage schematic diagram.A kind of method that different security services are used based on openflow protocol realization multi-tenant, including walk as follows It is rapid:
(1) use hardware device of the server as secure resources pond, on the server installation support virtualization and The linux system of openflow, there are two physical network card, a Physical Networks to be clamped outer net, a physical network card for the server It connects by protection business network, outer net can use router according to practical application scene by protection business network, traditional network Or physical switches access.
(2) a virtual switch is created, and the message that the virtual switch is arranged is controlled by openflow flow table;
(2), by two physical network cards on the server, it is mounted on virtual switch, and create multiple secure virtuals Machine, the present embodiment are illustrated by taking three secure virtual machines A, B, C as an example, according to actual needs, can also be with when implementing the present invention Create more secure virtual machines;The secure virtual machine is respectively mounted on virtual switch there are two business Microsoft Loopback Adapter, will Each secure virtual machine is as a security service;
(4) configuration service Microsoft Loopback Adapter is bridge mode, i.e. two business void of virtual machine internal in the secure virtual machine Quasi- network interface card is directly communicated by inside ensuring.Entered by business Microsoft Loopback Adapter 1 message working business Microsoft Loopback Adapter 2 go out, equally by The message that business Microsoft Loopback Adapter 2 is entered can be gone out with business Microsoft Loopback Adapter 1.The order provided by the virtual switch, inquiry The business Microsoft Loopback Adapter of associated port and secure virtual machine is corresponding on to the virtual switch where business Microsoft Loopback Adapter No. port, and make a record;
(5) service chaining is formed by one or more security services, include A+B, A+C, B+C, A+B+C clothes in the present embodiment Business chain.Tenant is distinguished by ip, vlan, subnet, port numbers or combinations thereof in message, when all tenants useIt is sameSafety clothes Be engaged in chain when, using openflow agreement, with found No. port for unique mark of the business Microsoft Loopback Adapter on virtual switch Knowledge issues flow entry, it is specified from a physical network card into message go out after the service chaining from another physical network card;When When different tenants use different service chainings, using openflow agreement, the flow entry of different service chainings is configured at different In flow table, all messages with identical tenant identification are jumped to same flow table by setting default flow table.
Fig. 2 is a kind of report based on openflow protocol realization multi-tenant using the method for different security services of the invention Text moves towards structure principle chart.Specifically includes the following steps:
(1) prepare hardware device of the server as secure resources pond, on the server installation support to virtualize and The linux system of openflow, the server can be used there are two physical network card, and a physical network card links external network, One physical network card links protected tenant network.
(2) virtual machine interchanger is created, and the message that the interchanger is arranged is controlled by openflow flow table.
(3) two physical internet ports that will be used on server for secure virtual machine, are mounted on virtual switch, and create Secure virtual machine A, B, C, virtual machine A, B, C respectively need to be mounted on the same virtual switch there are two business Microsoft Loopback Adapter. The present embodiment is illustrated by taking three secure virtual machines as an example, when implementing the present invention, according to actual needs, can also be created more Secure virtual machine.
(4) configuration service Microsoft Loopback Adapter is bridge mode in secure virtual machine, to guarantee industry of the message from secure virtual machine Can obtain employment after entering Microsoft Loopback Adapter 2 of being engaged in of business Microsoft Loopback Adapter 1 is gone out.
(5) the order provided by virtual switch inquires associated on the virtual switch where business Microsoft Loopback Adapter The business Microsoft Loopback Adapter of port and virtual machine is No. port corresponding, and makes a record.
(6) using each secure virtual machine as a security service, corresponding function of safety protection is externally provided, by one Or multiple security services can form service chaining.Tenant can be distinguished by ip, subnet, vlan etc..It is specific as follows:
A, all tenants use same security service chain.For example, all tenants in the present embodiment use A+B security service Chain issues flow table with aforementioned find No. port using openflow agreement for unique identification of the network interface card on virtual switch :
A, it is specified to enter from the message that physical network card eth1 comes in from the business Microsoft Loopback Adapter A-1 of security service A, from safety clothes A business Microsoft Loopback Adapter A-2 go out message enter from security service B business Microsoft Loopback Adapter B-1, from security service B-2 go out message from Physical network card 2 goes out.
B, when message flow is reversed: specified virtual from the business of security service B from the message that physical network card eth2 comes in Network interface card B-2 enters, and the message gone out from safety clothes B business Microsoft Loopback Adapter B-1 enters from security service A business Microsoft Loopback Adapter A-2, from safety The message that service A-1 goes out goes out from physical network card eth1.
Such a to be directed to all tenants, the service chain building for enjoying security service A and B is completed.Service in service chaining Completely can be customized, it can be A and B, be also possible to A and C, be also possible to any combination such as A, B, C or in which one.
B, different tenants use different service chainings, illustrate by taking the tenant that ip is divided as an example.
Tenant 1 uses A+B security service chain, specifies from the message that physical network card eth1 comes in from the business of security service A Microsoft Loopback Adapter A-1 enters, and the message gone out from safety clothes A business Microsoft Loopback Adapter A-2 enters from security service B business Microsoft Loopback Adapter B-1, from The message that security service B-2 goes out goes out from physical network card 2.
Tenant 2 uses A+C service chaining, specifies virtual from the business of security service A from the message that physical network card eth1 comes in Network interface card A-1 enters, and the message gone out from safety clothes A business Microsoft Loopback Adapter A-2 enters from security service C business Microsoft Loopback Adapter C-1, from safety The message that service C-2 goes out goes out from physical network card 2.
Using openflow agreement, flow entry is issued:
A. referring to step A, the flow entry of A+B service chaining is configured in table1, the flow entry of A+C service chaining is configured In table2.
Configuration in b.table0 (default table): all messages with ip belonging to tenant 1 all jump to table1 by Table1 processing, all messages with ip belonging to tenant 2 all jump to table2 and are handled by table2.
In this way, the function that multi-tenant uses different security services can be realized.

Claims (4)

1. a kind of method for using different security services based on openflow protocol realization multi-tenant, which is characterized in that including such as Lower step:
(1) use hardware device of the server as secure resources pond, on the server installation support virtualization and The linux system of openflow, at least there are two physical network cards for the server;
(2) a virtual switch is created, and the message that the virtual switch is arranged is controlled by openflow flow table;
(3) the physical network card on the server is mounted on virtual switch, and creates multiple secure virtual machines, the peace Full virtual machine is respectively mounted on virtual switch there are two business Microsoft Loopback Adapter;
(4) configuration service Microsoft Loopback Adapter is bridge mode, the life provided by the virtual switch in the secure virtual machine It enables, it is virtual to inquire the business of associated port and secure virtual machine on the virtual switch where the business Microsoft Loopback Adapter Network interface card is No. port corresponding, and makes a record;
(5), using each secure virtual machine as a security service, service chaining is formed by one or more security services, passes through report Network identity distinguishes tenant in text, when all tenants use security service chain, using openflow agreement, with what is found No. port issues flow entry for unique identification of the network interface card on virtual switch, specify from a physical network card into message pass through Go out after the service chaining from another physical network card;When different tenants use different service chainings, using openflow agreement, The flow entry of different service chainings is configured in different flow tables, setting default flow table, by all with identical tenant identification Message jumps to same flow table.
2. a kind of method that different security services are used based on openflow protocol realization multi-tenant as described in claim 1, It is characterized in that, the physical network card of the server is two, a physical network card is for linking external network, a Physical Network Card requires protected tenant network for linking.
3. a kind of method that different security services are used based on openflow protocol realization multi-tenant as claimed in claim 2, It is characterized in that, the secure virtual machine is 2 to 10.
4. one kind as described in any claim in claims 1 to 3 is based on openflow protocol realization multi-tenant using not With the method for security service, which is characterized in that the network identity is the ip of tenant, subnet, vlan, port numbers or combinations thereof.
CN201810978545.8A 2018-08-27 2018-08-27 A method of different security services are used based on openflow protocol realization multi-tenant Pending CN109040101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810978545.8A CN109040101A (en) 2018-08-27 2018-08-27 A method of different security services are used based on openflow protocol realization multi-tenant

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810978545.8A CN109040101A (en) 2018-08-27 2018-08-27 A method of different security services are used based on openflow protocol realization multi-tenant

Publications (1)

Publication Number Publication Date
CN109040101A true CN109040101A (en) 2018-12-18

Family

ID=64624564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810978545.8A Pending CN109040101A (en) 2018-08-27 2018-08-27 A method of different security services are used based on openflow protocol realization multi-tenant

Country Status (1)

Country Link
CN (1) CN109040101A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995680A (en) * 2019-11-22 2020-04-10 北京浪潮数据技术有限公司 Virtual machine message receiving method, system, device and computer readable storage medium
CN111683308A (en) * 2020-05-29 2020-09-18 烽火通信科技股份有限公司 Method and device for realizing flexible bridging service on home gateway
CN114944952A (en) * 2022-05-20 2022-08-26 深信服科技股份有限公司 Data processing method, device, system, equipment and readable storage medium
CN115914135A (en) * 2021-08-03 2023-04-04 中移动信息技术有限公司 Data transmission method, virtual switch and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710432A (en) * 2012-04-27 2012-10-03 北京云杉世纪网络科技有限公司 System and method for managing virtual network in cloud computation data center
US20160344611A1 (en) * 2013-12-18 2016-11-24 Telefonaktiebolaget Lm Ericsson (Publ) Method and control node for handling data packets
CN107819663A (en) * 2017-11-27 2018-03-20 锐捷网络股份有限公司 A kind of method and apparatus for realizing virtual network function service chaining
CN107911258A (en) * 2017-12-29 2018-04-13 深信服科技股份有限公司 A kind of realization method and system in the secure resources pond based on SDN network
CN107920023A (en) * 2017-12-29 2018-04-17 深信服科技股份有限公司 A kind of realization method and system in secure resources pond
CN107959614A (en) * 2017-10-30 2018-04-24 广东睿江云计算股份有限公司 A kind of self-defined network-building method of multi-tenant based on network namespace, system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710432A (en) * 2012-04-27 2012-10-03 北京云杉世纪网络科技有限公司 System and method for managing virtual network in cloud computation data center
US20160344611A1 (en) * 2013-12-18 2016-11-24 Telefonaktiebolaget Lm Ericsson (Publ) Method and control node for handling data packets
CN107959614A (en) * 2017-10-30 2018-04-24 广东睿江云计算股份有限公司 A kind of self-defined network-building method of multi-tenant based on network namespace, system
CN107819663A (en) * 2017-11-27 2018-03-20 锐捷网络股份有限公司 A kind of method and apparatus for realizing virtual network function service chaining
CN107911258A (en) * 2017-12-29 2018-04-13 深信服科技股份有限公司 A kind of realization method and system in the secure resources pond based on SDN network
CN107920023A (en) * 2017-12-29 2018-04-17 深信服科技股份有限公司 A kind of realization method and system in secure resources pond

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995680A (en) * 2019-11-22 2020-04-10 北京浪潮数据技术有限公司 Virtual machine message receiving method, system, device and computer readable storage medium
CN111683308A (en) * 2020-05-29 2020-09-18 烽火通信科技股份有限公司 Method and device for realizing flexible bridging service on home gateway
CN111683308B (en) * 2020-05-29 2022-04-29 烽火通信科技股份有限公司 Method and device for realizing flexible bridging service on home gateway
CN115914135A (en) * 2021-08-03 2023-04-04 中移动信息技术有限公司 Data transmission method, virtual switch and storage medium
CN114944952A (en) * 2022-05-20 2022-08-26 深信服科技股份有限公司 Data processing method, device, system, equipment and readable storage medium
CN114944952B (en) * 2022-05-20 2023-11-07 深信服科技股份有限公司 Data processing method, device, system, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN109040101A (en) A method of different security services are used based on openflow protocol realization multi-tenant
US9178828B2 (en) Architecture for agentless service insertion
CN111614605B (en) Method for configuring firewall, security management system and computer readable medium
US10452422B2 (en) Method and apparatus for deploying virtual machine instance, and device
CN107278362B (en) The method of Message processing, host and system in cloud computing system
US10177936B2 (en) Quality of service (QoS) for multi-tenant-aware overlay virtual networks
EP3072263B1 (en) Multi-tenant isolation in a cloud environment using software defined networking
CN110301104B (en) Optical line terminal OLT equipment virtualization method and related equipment
EP3273640A1 (en) Link selection for communication with a service function cluster
US20180013841A1 (en) Automatic service function validation in a virtual network environment
CN105100026B (en) A kind of safe retransmission method of message and device
US10050739B2 (en) Optical communication system with hardware root of trust (HRoT) and network function virtualization (NFV)
CN105933248B (en) Service insertion within a basic virtual network environment
US20110035494A1 (en) Network virtualization for a virtualized server data center environment
CN112130957B (en) Method and system for using intelligent network card for breaking through virtualization isolation of container
CN106936715A (en) virtual machine message control method and device
Masutani et al. Requirements and design of flexible NFV network infrastructure node leveraging SDN/OpenFlow
CN114584511A (en) Extending software-defined networks between public cloud computing infrastructures and data centers
Chandramouli et al. Secure virtual network configuration for virtual machine (vm) protection
CN104144130B (en) Method, system and the access switch of virtual machine system interconnection
CN104168200A (en) Open vSwitch-based method and system for realizing ACL function
US11962499B2 (en) Multitenancy for service machines
CN104579778A (en) Simple implementation method for enterprise internal network virtualization
Liu et al. To achieve a security service chain by integration of NFV and SDN
Jeuk et al. Tenant-id: Tagging tenant assets in cloud environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181218