CN109743316B - Data transmission method, exit router, firewall and double firewall systems - Google Patents

Data transmission method, exit router, firewall and double firewall systems Download PDF

Info

Publication number
CN109743316B
CN109743316B CN201811643288.9A CN201811643288A CN109743316B CN 109743316 B CN109743316 B CN 109743316B CN 201811643288 A CN201811643288 A CN 201811643288A CN 109743316 B CN109743316 B CN 109743316B
Authority
CN
China
Prior art keywords
router
firewall
firewalls
ipsec virtual
ipsec
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811643288.9A
Other languages
Chinese (zh)
Other versions
CN109743316A (en
Inventor
王东
张晖
陈静
林晨
王延军
伍军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201811643288.9A priority Critical patent/CN109743316B/en
Publication of CN109743316A publication Critical patent/CN109743316A/en
Application granted granted Critical
Publication of CN109743316B publication Critical patent/CN109743316B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a data transmission method, an exit router, a firewall and a double firewall system, wherein the exit router in the double firewall system is used for acquiring the link state of IPSEC virtual tunnels corresponding to the two firewalls; and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with opposite-end equipment through the two IPSEC virtual tunnels by adopting a load sharing mode. The method of the invention enables two firewalls to process IPSEC VPN service flow in a load way through the load sharing of the double active modes of the double firewall systems, improves the data transmission speed, avoids the waste of resources, has higher reliability and stability, does not need to arrange two firewalls on opposite-end equipment, and avoids the increase of cost and the waste of address resources.

Description

Data transmission method, exit router, firewall and double firewall systems
Technical Field
The invention relates to the technical field of communication, in particular to a data transmission method, an outlet router, a firewall and a double firewall system.
Background
Firewall (Firewall), also known as a protective wall, was invented in 1993 by the Check Point founder Gil Shwed and introduced into the Internet (US5606668(A) 1993-12-15). It is a network security system located between an internal network and an external network. An information security system allows or restricts the passage of transmitted data according to specific rules. Government, traffic, public security, telecommunication, finance, energy and other departments all bear intranet information systems, and with the demand of internet service development, these enterprise-level intranet systems and networks usually need to establish session connection with public networks. In order to prevent the intranet from receiving network intrusion and network attack, the firewall is widely applied to isolate the intranet from the public network.
Because the flow of public network service is larger, the traditional firewall architecture deployed at the public network outlet of the enterprise network at present generally adopts a mode that two devices are mutually master and backup, when the master device fails, the backup device can immediately bear the service, and the service which needs to be forwarded through the device is ensured not to be interrupted. In the prior art, two firewalls work at three layers according to service interfaces, and a load sharing networking of an uplink and downlink connection switch configures dual-computer hot standby. One firewall is a main firewall, and the IPSEC tunnel between the opposite terminal equipment and the firewall is established. When the IPSEC tunnel is established, the opposite terminal equipment can only carry out the operation with the main firewall, and the standby firewall can not establish the IPSEC tunnel. If the active firewall fails, the opposite end device needs to establish an IPSEC tunnel with the standby firewall.
In the prior art, the local terminal has two firewalls, and normally, only the main firewall is used for data transmission, which causes waste of system resources and limits the data transmission speed.
Disclosure of Invention
The invention provides a data transmission method, an exit router, a firewall and a double firewall system, which are used for improving the data transmission speed and avoiding the waste of resources by sharing the load of the two firewalls in a double active mode.
One aspect of the present invention is to provide a data transmission method, which is applied to a dual firewall system, where the dual firewall system includes: the method comprises the following steps that two firewalls, an exit router and an intranet router which are mutually hot standby are respectively configured to be in an Active activation state, the two firewalls respectively establish IPSEC virtual tunnels with opposite end equipment through the exit router, and the two firewalls are respectively connected with the intranet equipment through the intranet router, and the method comprises the following steps:
the exit router acquires the link state of the IPSEC virtual tunnel corresponding to the two firewalls;
and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with the opposite terminal equipment through the two IPSEC virtual tunnels in a load sharing mode.
Further, the method further comprises:
and if the link state of one IPSEC virtual tunnel is in an abnormal working state, the exit router transmits all data with the opposite terminal equipment through the other IPSEC virtual tunnel.
Further, the method further comprises:
the egress router identifying a type of the data;
and if the data type is a preset data type, the exit router transmits data with the opposite terminal device through the IPSEC virtual tunnel corresponding to the preset data type.
Further, before the two firewalls respectively perform data transmission with the peer device through the corresponding IPSEC virtual tunnels, the method further includes:
and the exit router configures an IP address as the exit gateway address of the two IPSEC virtual tunnels.
Another aspect of the present invention is to provide an egress router applied to a dual firewall system, where the dual firewall system includes: two firewall, export router and the intranet router that each other is hot to be equipped with, two firewall configure respectively into Active activation state, just two firewall pass through respectively export router and opposite terminal equipment establish IPSEC virtual tunnel, two firewall pass through respectively intranet router and intranet equipment are connected, the export router includes:
the monitoring module is used for acquiring the link states of the IPSEC virtual tunnels corresponding to the two firewalls;
and the processing module is used for performing data transmission with the opposite terminal equipment through the two IPSEC virtual tunnels by adopting a load sharing mode if the link states of the two IPSEC virtual tunnels are both in a normal working state.
Further, the processing module is further configured to:
and if the link state of one IPSEC virtual tunnel is in an abnormal working state, transmitting all data by the other IPSEC virtual tunnel and the opposite-end equipment.
Further, the processing module is further configured to:
and identifying the type of the data, and if the type of the data is a preset data type, performing data transmission with the opposite terminal equipment through the IPSEC virtual tunnel corresponding to the preset data type.
Further, the processing module is further configured to:
and configuring an IP address as the exit gateway address of the two IPSEC virtual tunnels.
Another aspect of the present invention is to provide a firewall for a dual firewall system, the dual firewall system comprising: the two firewalls, the exit router and the intranet router are mutually hot standby;
the firewall is configured to be in an Active activation state;
the firewall is configured and synchronized with another firewall through a heartbeat wire;
the firewall establishes an IPSEC virtual tunnel with opposite terminal equipment through the exit router, and the two firewalls are respectively connected with the intranet equipment through the intranet router.
Another aspect of the present invention provides a dual firewall system, comprising: an egress router as described above, two firewalls as described above, and an intranet router;
the two firewalls are respectively configured to be in an Active activation state, the two firewalls respectively establish IPSEC virtual tunnels with opposite-end equipment through the exit router, and the two firewalls are respectively connected with intranet equipment through the intranet router.
According to the data transmission method, the exit router, the firewall and the double firewall systems, the exit router in the double firewall systems acquires the link states of IPSEC virtual tunnels corresponding to the two firewalls; and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with opposite-end equipment through the two IPSEC virtual tunnels by adopting a load sharing mode. The method of the invention enables two firewalls to process IPSEC VPN service flow in a load way through the load sharing of the double active modes of the double firewall systems, improves the data transmission speed, avoids the waste of resources, has higher reliability and stability, does not need to arrange two firewalls on opposite-end equipment, and avoids the increase of cost and the waste of address resources.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a diagram of a network architecture for a dual firewall system according to an embodiment of the present invention;
fig. 2 is a flowchart of a data transmission method according to an embodiment of the present invention;
fig. 3 is a flowchart of a data transmission method according to another embodiment of the present invention;
fig. 4 is a block diagram of an egress router according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
FIG. 1 is a diagram of a network architecture for a dual firewall system according to an embodiment of the present invention; fig. 2 is a flowchart of a data transmission method according to an embodiment of the present invention. The embodiment of the invention provides a data transmission method, which is applied to a double firewall system shown in figure 1, wherein the double firewall system comprises: the firewall system comprises two firewalls 111 and 112, an exit router 120 and an intranet router 130 which are mutually hot-standby, wherein the two firewalls 111 and 112 are respectively configured to be in an Active activation state, and the two firewalls 111 and 112 respectively establish an IPSEC (Internet Protocol Security) virtual tunnel with an opposite terminal device 200 through the exit router 120 and are connected with the intranet device 300 through the intranet router 130.
As shown in fig. 2, a VRRP Protocol (Virtual Router Redundancy Protocol) is configured between the two firewalls and the intranet Router, the VRRP Protocol is configured for the egress Router, and the routing is reachable through a static routing or a dynamic routing Protocol, the two firewalls are both configured with a dual-hot-standby function, and both firewalls are configured in an Active activation state, so that cooperative work is realized through dual activities, and the spare firewall is prevented from being in an idle state to cause resource waste. In the dual firewall system of this embodiment, the two firewalls respectively establish an IPSEC Virtual tunnel with the peer device through the egress router, so that the IPSEC VPN traffic flows through the two IPSEC Virtual tunnels in a shuttling manner, thereby implementing data transmission with the peer device, where the IPSEC VPN refers to a VPN (Virtual Private Network) technology that implements remote access by using an IPSEC protocol, and provides end-to-end encryption and authentication services for public and Private networks. It should be noted that, because the two firewall systems respectively establish the IPSEC virtual tunnels with the opposite-end device through the egress router, that is, the two IPSEC virtual tunnels share one link between the egress router and the opposite-end device, if the opposite-end device can only support one VPN tunnel, it is not necessary to set two firewalls at the opposite end to satisfy the establishment of the two IPSEC virtual tunnels, thereby avoiding the increase of cost and the waste of address resources.
As shown in fig. 2, the method comprises the following specific steps:
s101, the exit router acquires the link state of the IPSEC virtual tunnels corresponding to the two firewalls.
In this embodiment, the egress router determines whether the two firewalls work normally by detecting the link status of the IPSEC virtual tunnels corresponding to the two firewalls. Specifically, the egress router monitors the link status between the two firewalls and the egress router. Optionally, the egress router may monitor in real time, or monitor when there is a data transmission task.
And S102, if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with the opposite terminal equipment through the two IPSEC virtual tunnels in a load sharing mode.
In this embodiment, when the egress router detects that the link states of the two IPSEC virtual tunnels are both normal operating states, that is, the two firewalls are both normal operating states, the egress router performs data transmission with the opposite device through the two IPSEC virtual tunnels in a load sharing manner, specifically including sending data and receiving data, so that the IPSEC VPN traffic flows shuttle between the two IPSEC virtual tunnels. Optionally, in this embodiment, flow-based load sharing, packet-based load sharing, or broadband-based load sharing may be adopted.
It should be noted that, when data is sent from the intranet device to the opposite end through the intranet router, the intranet router may also use the process executed by the egress router in the present invention.
In the data transmission method provided by this embodiment, the exit router in the dual firewall system obtains the link states of the IPSEC virtual tunnels corresponding to the two firewalls; and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with opposite-end equipment through the two IPSEC virtual tunnels by adopting a load sharing mode. According to the method, through the load sharing of the double active modes of the double firewall systems, the two firewalls can process the IPSEC VPN service flow in a load mode, the data transmission speed is improved, the waste of resources is avoided, meanwhile, the method has higher reliability and stability, the opposite-end equipment does not need to be provided with the two firewalls, and the increase of cost and the waste of address resources are avoided.
Fig. 3 is a flowchart of a data transmission method according to another embodiment of the present invention. On the basis of the foregoing embodiment, after the egress router acquires the link states of the IPSEC virtual tunnels corresponding to the two firewalls in S101, the method further includes:
s201, if the link state of one IPSEC virtual tunnel is in an abnormal working state, the exit router transmits all data with the opposite terminal equipment through the other IPSEC virtual tunnel.
In this embodiment, when the egress router detects that any one of the link states in the two IPSEC virtual tunnels is an abnormal working state, it indicates that the corresponding firewall fails, and at this time, the other firewall takes over the work of the failed firewall in a balanced manner, that is, all data of the peer device is transmitted by the IPSEC virtual tunnel that normally works, so as to improve the reliability and stability of the dual firewall system.
And when the exit router detects that the failed link is recovered to be normal again, the load sharing in the dual active mode is recovered.
Further, the method provided by the above embodiment may further include:
the egress router identifying a type of the data;
and if the data type is a preset data type, the exit router transmits data with the opposite terminal device through the IPSEC virtual tunnel corresponding to the preset data type.
In this embodiment, it may be autonomously specified that specific service data is transmitted through a specific IPSEC virtual tunnel, that is, the type of the data is set in advance, the egress router identifies the type of the data to be transmitted, and if the type of the data is a predetermined data type, a matched IPSEC virtual tunnel is selected. Of course, if the link state of the IPSEC virtual tunnel is an abnormal working state, another IPSEC virtual tunnel is used for data transmission.
Further, before the two firewalls respectively perform data transmission with the peer device through the corresponding IPSEC virtual tunnels, the method further includes:
and the exit router configures an IP address as the exit gateway address of the two IPSEC virtual tunnels.
In this embodiment, the two firewalls and the external access are implemented by performing Address Translation of multiple NATs (Network Address Translation) on the IP Address, so that the IPSEC and the NAT are perfectly combined in the dual active mode.
In the data transmission method provided by this embodiment, the exit router in the dual firewall system obtains the link states of the IPSEC virtual tunnels corresponding to the two firewalls; and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with opposite-end equipment through the two IPSEC virtual tunnels by adopting a load sharing mode. According to the method, through the load sharing of the double active modes of the double firewall systems, the two firewalls can process the IPSEC VPN service flow in a load mode, the data transmission speed is improved, the waste of resources is avoided, meanwhile, the method has higher reliability and stability, the opposite-end equipment does not need to be provided with the two firewalls, and the increase of cost and the waste of address resources are avoided.
Fig. 4 is a block diagram of an egress router according to an embodiment of the present invention. An embodiment of the present invention provides an egress router, which may perform a processing procedure provided in an embodiment of a data transmission method, as shown in fig. 4, where the egress router is applied to a dual firewall system, where the dual firewall system includes: two firewall, export router and the intranet router that each other is hot to be equipped with, two firewall configure respectively into Active activation state, just two firewall pass through respectively export router and opposite terminal equipment establish IPSEC virtual tunnel, two firewall pass through respectively intranet router and intranet equipment are connected, the export router includes: a monitoring module 121, and a processing module 122.
The monitoring module 121 is configured to obtain link states of IPSEC virtual tunnels corresponding to the two firewalls;
and the processing module 122 is configured to perform data transmission with the opposite end device through the two IPSEC virtual tunnels in a load sharing manner if the link states of the two IPSEC virtual tunnels are both normal working states.
Further, the processing module 122 is further configured to:
and if the link state of one IPSEC virtual tunnel is in an abnormal working state, transmitting all data by the other IPSEC virtual tunnel and the opposite-end equipment.
Further, the processing module 122 is further configured to:
and identifying the type of the data, and if the type of the data is a preset data type, performing data transmission with the opposite terminal equipment through the IPSEC virtual tunnel corresponding to the preset data type.
Further, the processing module 122 is further configured to:
and configuring an IP address as the exit gateway address of the two IPSEC virtual tunnels.
The egress router provided in the embodiment of the present invention may be specifically configured to execute the method embodiments provided in fig. 2 and 3, and specific functions are not described herein again.
In the egress router provided in this embodiment, the link states of the IPSEC virtual tunnels corresponding to the two firewalls are obtained through the egress router in the two firewall systems; and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with opposite-end equipment through the two IPSEC virtual tunnels by adopting a load sharing mode. The outlet router of the embodiment enables two firewalls to process the IPSECVPN service flow in a load mode by configuring the load sharing of the double active modes of the double firewall systems, improves the data transmission speed, avoids the waste of resources, has higher reliability and stability, and does not need to be provided with two firewalls on opposite-end equipment, thereby avoiding the increase of cost and the waste of address resources.
Another embodiment of the present invention provides a firewall, which is used in a dual firewall system, where the dual firewall system includes: the two firewalls, the exit router and the intranet router are mutually hot standby;
the firewall is configured to be in an Active activation state;
the firewall is configured and synchronized with another firewall through a heartbeat wire;
the firewall establishes an IPSEC virtual tunnel with opposite terminal equipment through the exit router, and the two firewalls are respectively connected with the intranet equipment through the intranet router.
In this embodiment, two firewalls may be configured through the following steps:
1) configuring an uplink and downlink service interface (configuring an interface IP address and adding the interface into a corresponding safe area);
2) configuring an inter-domain security policy of a firewall (configuring forwarding policies of a Trust domain and an Untrust domain, and allowing messages before encapsulation and after decapsulation to pass through the firewall; local strategies of a Local domain and an Untrust domain are configured, and the IKE negotiation message is allowed to normally pass through a firewall;
3) configuring a firewall to a private network router of a client;
4) configuring and operating an OSPF dynamic router protocol on a firewall;
5) configuring an access control list and defining data streams needing to be protected;
6) configure IPSec security offer named tran 1;
7) configuring an IKE security proposal with sequence number 10;
8) configuring an IKE Peer;
9) configuring an IPSec security policy template with the name of map _ temp serial number being 1;
10) a security policy template map _ temp is referred to in IPSec security policy map 1;
11) applying a security policy map1 on the upper business interface;
12) and starting the dual-machine configuration of the firewall.
Specifically, taking one of the firewalls as an example, 1) configures an uplink service interface and a downlink service interface (configuration command as follows), and configures the uplink service interface (gigabit ethernet1/0/1) of the firewall (USG6600-1), that is, the interface connected to the egress router, into an Active group and a standby group at the same time, thereby implementing the configuration of the Active state of the firewall.
[USG6600-1-GigabitEthernet1/0/1]hrp track active
[USG6600-1-GigabitEthernet1/0/1]hrp track standby
Further, dynamic learning is prevented by 3) configuring a private network router of a firewall to a client, wherein the configuration commands are as follows:
[USG6600-1]ip route-static 10.1.2.0 255.255.255.0 132.168.7.2
[USG6600-1]ip route-static 10.1.3.0 255.255.255.0 60.29.112.122
further, by 12) starting the dual-machine configuration of the firewall, the load sharing, session fast backup, automatic real-time backup configuration command and periodic backup status information of the two firewalls are realized, and the specific configuration command is as follows:
[USG6600-1]hrp interface GigabitEthernet 1/0/2
[USG6600-1]hrp enable
HRP_A[USG6600-1]hrp loadbalance-device
HRP_A[USG6600-1]hrp mirror session enable
HRP_A[USG6600-1]hrp auto-sync config
in the firewall provided by this embodiment, the exit router in the dual firewall system obtains the link states of the IPSEC virtual tunnels corresponding to the two firewalls; and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with opposite-end equipment through the two IPSEC virtual tunnels by adopting a load sharing mode. In this embodiment, by configuring load sharing of the dual active modes of the dual firewall systems, the two firewalls can load and process IPSEC VPN traffic, so that data transmission speed is increased, waste of resources is avoided, and meanwhile, higher reliability and stability are achieved.
Another embodiment of the present invention provides a double firewall system, as specifically shown in fig. 1, including: an egress router as described in the above embodiments, two firewalls as described in the above embodiments, and an intranet router;
the two firewalls are respectively configured to be in an Active activation state, the two firewalls respectively establish IPSEC virtual tunnels with opposite-end equipment through the exit router, and the two firewalls are respectively connected with intranet equipment through the intranet router.
According to the double firewall system, the link states of IPSEC virtual tunnels corresponding to the two firewalls are obtained through the exit router in the double firewall system; and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with opposite-end equipment through the two IPSEC virtual tunnels by adopting a load sharing mode. In this embodiment, by configuring load sharing of the dual active modes of the dual firewall systems, the two firewalls can load and process IPSEC VPN traffic, so that data transmission speed is increased, waste of resources is avoided, and meanwhile, higher reliability and stability are achieved.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A data transmission method is characterized by being applied to a double firewall system, wherein the double firewall system comprises: the method comprises the following steps that two firewalls, an exit router and an intranet router which are mutually hot standby are respectively configured to be in an Active activation state, the two firewalls respectively establish IPSEC virtual tunnels with opposite end equipment through the exit router, and the two firewalls are respectively connected with the intranet equipment through the intranet router, and the method comprises the following steps:
the exit router acquires the link state of the IPSEC virtual tunnel corresponding to the two firewalls;
and if the link states of the two IPSEC virtual tunnels are both in a normal working state, the exit router performs data transmission with the opposite terminal equipment through the two IPSEC virtual tunnels in a load sharing mode, and the opposite terminal equipment is provided with a firewall.
2. The method of claim 1, further comprising:
and if the link state of one IPSEC virtual tunnel is in an abnormal working state, the exit router transmits all data with the opposite terminal equipment through the other IPSEC virtual tunnel.
3. The method of claim 1, further comprising:
the egress router identifying a type of the data;
and if the data type is a preset data type, the exit router transmits data with the opposite terminal device through the IPSEC virtual tunnel corresponding to the preset data type.
4. The method according to any one of claims 1 to 3, wherein before the two firewalls respectively perform data transmission with the peer device through the corresponding IPSEC virtual tunnels, the method further comprises:
and the exit router configures an IP address as the exit gateway address of the two IPSEC virtual tunnels.
5. An egress router, applied to a dual firewall system, the dual firewall system comprising: two firewall, export router and the intranet router that each other is hot to be equipped with, two firewall configure respectively into Active activation state, just two firewall pass through respectively export router and opposite terminal equipment establish IPSEC virtual tunnel, two firewall pass through respectively intranet router and intranet equipment are connected, the export router includes:
the monitoring module is used for acquiring the link states of the IPSEC virtual tunnels corresponding to the two firewalls;
and the processing module is used for performing data transmission with the opposite terminal equipment through the two IPSEC virtual tunnels by adopting a load sharing mode if the link states of the two IPSEC virtual tunnels are both in a normal working state, and the opposite terminal equipment is provided with a firewall.
6. The egress router of claim 5, wherein the processing module is further configured to:
and if the link state of one IPSEC virtual tunnel is in an abnormal working state, transmitting all data by the other IPSEC virtual tunnel and the opposite-end equipment.
7. The egress router of claim 5, wherein the processing module is further configured to:
and identifying the type of the data, and if the type of the data is a preset data type, performing data transmission with the opposite terminal equipment through the IPSEC virtual tunnel corresponding to the preset data type.
8. The egress router of any of claims 5-7, wherein the processing module is further configured to:
and configuring an IP address as the exit gateway address of the two IPSEC virtual tunnels.
9. A firewall, for use in a dual firewall system, the dual firewall system comprising: the two firewalls, the exit router and the intranet router are mutually hot standby;
the firewall is configured to be in an Active activation state;
the firewall is configured and synchronized with another firewall through a heartbeat wire;
the firewall establishes an IPSEC virtual tunnel with the opposite terminal equipment through the exit router, the two firewalls are respectively connected with the intranet equipment through the intranet router, and the opposite terminal equipment is provided with one firewall.
10. A dual fire wall system, comprising: the egress router of any one of claims 5-8, two firewalls of claim 9, and an intranet router;
the two firewalls are respectively configured to be in an Active activation state, the two firewalls respectively establish IPSEC virtual tunnels with opposite-end equipment through the exit router, the two firewalls are respectively connected with the intranet equipment through the intranet router, and the opposite-end equipment is provided with one firewall.
CN201811643288.9A 2018-12-29 2018-12-29 Data transmission method, exit router, firewall and double firewall systems Active CN109743316B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811643288.9A CN109743316B (en) 2018-12-29 2018-12-29 Data transmission method, exit router, firewall and double firewall systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811643288.9A CN109743316B (en) 2018-12-29 2018-12-29 Data transmission method, exit router, firewall and double firewall systems

Publications (2)

Publication Number Publication Date
CN109743316A CN109743316A (en) 2019-05-10
CN109743316B true CN109743316B (en) 2021-06-29

Family

ID=66362627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811643288.9A Active CN109743316B (en) 2018-12-29 2018-12-29 Data transmission method, exit router, firewall and double firewall systems

Country Status (1)

Country Link
CN (1) CN109743316B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113872880B (en) * 2020-06-30 2024-04-16 华为技术有限公司 Network, data transmission method and device
CN112702439B (en) * 2020-12-31 2022-11-15 北京天融信网络安全技术有限公司 Method for synchronizing status of gatekeeper and isolated gatekeeper
CN113645117B (en) * 2021-07-08 2023-04-07 郑州信大捷安信息技术股份有限公司 IPSec protocol-based multi-channel intelligent routing method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725702A (en) * 2004-07-20 2006-01-25 联想网御科技(北京)有限公司 Network safety equipment and assemblied system and method for implementing high availability
US7480737B2 (en) * 2002-10-25 2009-01-20 International Business Machines Corporation Technique for addressing a cluster of network servers
CN102006310A (en) * 2010-12-24 2011-04-06 山石网科通信技术(北京)有限公司 Data stream processing method and firewall
CN103501299A (en) * 2013-09-24 2014-01-08 曙光信息产业(北京)有限公司 Firewall cluster management method and system
CN105450550A (en) * 2015-11-10 2016-03-30 北京奇虎科技有限公司 Channel priority adjustment method and device for router

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7480737B2 (en) * 2002-10-25 2009-01-20 International Business Machines Corporation Technique for addressing a cluster of network servers
CN1725702A (en) * 2004-07-20 2006-01-25 联想网御科技(北京)有限公司 Network safety equipment and assemblied system and method for implementing high availability
CN102006310A (en) * 2010-12-24 2011-04-06 山石网科通信技术(北京)有限公司 Data stream processing method and firewall
CN103501299A (en) * 2013-09-24 2014-01-08 曙光信息产业(北京)有限公司 Firewall cluster management method and system
CN105450550A (en) * 2015-11-10 2016-03-30 北京奇虎科技有限公司 Channel priority adjustment method and device for router

Also Published As

Publication number Publication date
CN109743316A (en) 2019-05-10

Similar Documents

Publication Publication Date Title
US11082304B2 (en) Methods, systems, and computer readable media for providing a multi-tenant software-defined wide area network (SD-WAN) node
EP3761592B1 (en) System and method for virtual interfaces and advanced smart routing in a global virtual network
EP2579634B1 (en) Methods and apparatus for a self-organized layer-2 enterprise network architecture
US9065802B2 (en) Policy-based configuration of internet protocol security for a virtual private network
US8713305B2 (en) Packet transmission method, apparatus, and network system
EP2579514B1 (en) Method and apparatus for a converged wired/wireless enterprise network architecture
US9231918B2 (en) Use of virtual network interfaces and a websocket based transport mechanism to realize secure node-to-site and site-to-site virtual private network solutions
CN109743316B (en) Data transmission method, exit router, firewall and double firewall systems
CN101262409A (en) Virtual private network VPN access method and device
CN108011759B (en) VPN management method, device and system
US20220210130A1 (en) Method and apparatus for maintaining a resilient vpn connection
CN109450905B (en) Method, device and system for transmitting data
CN110661858A (en) Websocket-based intranet penetration method and system
US8365253B2 (en) Method and system for secure management of co-located customer premises equipment
WO2022001937A1 (en) Service transmission method and apparatus, network device, and storage medium
JP5345651B2 (en) Secure tunneling platform system and method
US20200287868A1 (en) Systems and methods for in-band remote management
Wolinsky et al. On the design and implementation of structured P2P VPNs
CN112039854A (en) Data transmission method, device and storage medium
US7729289B2 (en) Method, system and computer program product for routing information across firewalls
KR102376484B1 (en) Apparatus and method for automatic switching of duplication lines
KR101308089B1 (en) Ipsec vpn system and method for supporing high availability
CN102946359B (en) Method and device for forwarding flow
CN115883256B (en) Data transmission method, device and storage medium based on encryption tunnel
WO2023070572A1 (en) Communication device and method therein for facilitating ipsec communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant