CN111147528B - Method for managing network security policy - Google Patents

Method for managing network security policy Download PDF

Info

Publication number
CN111147528B
CN111147528B CN202010259752.5A CN202010259752A CN111147528B CN 111147528 B CN111147528 B CN 111147528B CN 202010259752 A CN202010259752 A CN 202010259752A CN 111147528 B CN111147528 B CN 111147528B
Authority
CN
China
Prior art keywords
network security
security policy
host
management module
minimum function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010259752.5A
Other languages
Chinese (zh)
Other versions
CN111147528A (en
Inventor
杨雪皎
向上文
王洪华
雷涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan XW Bank Co Ltd
Original Assignee
Sichuan XW Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan XW Bank Co Ltd filed Critical Sichuan XW Bank Co Ltd
Priority to CN202010259752.5A priority Critical patent/CN111147528B/en
Publication of CN111147528A publication Critical patent/CN111147528A/en
Application granted granted Critical
Publication of CN111147528B publication Critical patent/CN111147528B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Abstract

The invention relates to a method for managing network security policy, comprising: A. grouping all resources related to all host systems according to a minimum function module; B. setting a set of minimum function modules with the same network resource access authority as a role according to the calling relation among different host systems; C. the asset information is stored through an asset management module and is synchronized into corresponding firewall equipment when a new resource is added or a resource is changed; D. the network security policy management module generates a network security policy based on role control according to the calling relationship among different host systems, and then configures the network security policy into firewall equipment, and the network security policy management module updates the configuration state of the network security policy. The invention obviously reduces the number of items of the network security policy, manages the network security policy based on the actual function classification, and can ensure the network security to the maximum extent and facilitate the subsequent adjustment of the network security policy.

Description

Method for managing network security policy
Technical Field
The invention relates to the field of network security, in particular to a method for managing network security policies.
Background
The firewall is widely applied to the network environment of each enterprise as a basic network security device. The network security access control system is the only access of information among different networks or network security domains, can control (allow, reject and monitor) information flow entering and exiting the network according to the security policy of an enterprise, and has strong anti-attack capability. It is an infrastructure that provides information security services, implements networks, and information security. Logically, the firewall is a splitter, a limiter, and an analyzer, which effectively monitors any activity between the intranet and the Internet and ensures the security of the intranet.
With the increase of access to internal and external applications of an enterprise, a very large network security policy needs to be configured and managed. In the current configuration of network security policy, there are two main categories according to granularity, one is detail IP and the other is large IP segment. For the detailed IP, it can be guaranteed that the firewall only passes through a specific flow as much as possible, but there are many entries, once the applied IP is changed, the network security policy on the firewall concerned needs to be adjusted, and the management is inconvenient; large IP segments (e.g., based on a C segment), the number of entries is relatively reduced, and relatively little change is made, but from a security point of view, the security management cannot be well controlled due to the coarse granularity. In addition, another mode is to combine the two modes, part of the two modes is configured as detailed IP, and part of the two modes is configured as IP segments, so that although the advantages of the two modes can be combined to a certain extent, there still exists management complexity, and specifically, there is no scientific and reasonable distinguishing method for which parts should be configured with detailed IP and which parts should be configured with IP segments.
Disclosure of Invention
The invention provides a method for managing network security policy, which can conveniently manage and maintain the network security policy while ensuring the network security as much as possible.
The method for managing the network security policy comprises the following steps:
A. grouping all host resources related to all host systems according to a minimum function module, wherein each minimum function module at least comprises one host, and each host corresponds to an IP address and the same external port;
B. setting a set of minimum function modules with the same network resource access authority as a role according to the calling relation among different host systems, wherein the IP of a host in each minimum function module in the set is different from the IP of the host of the accessed network resource; the network resource provides the same service function for all the hosts (generally expressed as IP: port) which are provided with the same external port and different IP addresses in each minimum function module;
C. the asset information is stored through an asset management module, the asset information comprises host resources related to all host systems and the grouping and role of the minimum function module, and the stored asset information is synchronously configured into corresponding firewall equipment when the host resources are newly added or changed;
D. the network security policy management module generates a network security policy based on role control according to the calling relationship among different host systems; and configuring the network security policy to corresponding firewall equipment, and updating the configuration state of the network security policy in a network security policy management module.
The minimum function module in the present invention refers to a group of hosts providing a single service, and each host in the same group usually has the same external port, and each host has a different IP address. The core of the invention is that the concept of roles is introduced in the management of network security policy, and one role is an IP (equipment, module and system) set with the same network resource access authority. Grouping all host resources according to a minimum function module, for example, a host resource providing a portal website can be divided into a system A front end (comprising a plurality of hosts), a system A cache and a system A database; an access resource for training and learning is divided into a system B front end (comprising a plurality of hosts) and a system B database; in addition, the application of a message queue service C system is provided, a plurality of hosts are contained in the C system, and the external ports of all the hosts are 5672. If the system a front end and the system B front end both use the system C application service, the system a front end and the system B front end are set to have the same role R, where the role R represents an IP set that can access 5672 port services of all hosts below the system C application service, and all host IP sets of the system a front end and the system B front end have the role R. And one host can also have multiple roles at the same time, that is, one host can use multiple different minimum function modules to provide external services.
And then storing all host resources and grouping information through an asset management module, and synchronously configuring the asset information into corresponding firewall equipment for network security management when new or changed. The network security policy management module is used for storing and managing the network security policy based on role control, and updating the configuration state of the network security policy in the network security policy management module according to the feedback of the firewall equipment.
In the invention, the asset management module synchronously configures the asset information into the corresponding firewall equipment, and the network security policy management module generates, manages and maintains the network security policy, and all the technicians in the field can realize the management and maintenance according to the conventional mode or the principle of the conventional mode, which is not the invention point of the invention.
Further, when a minimum function module is newly added, asset information related to the newly added minimum function module is added to the asset management module, a network object is newly built on the corresponding firewall equipment synchronously, a role corresponding to the newly added minimum function module and a network security policy corresponding to the role are newly built in the network security policy management module according to the access requirements of other systems on the newly added minimum function module, and then the configuration of the newly built network security policy in the firewall equipment is completed synchronously.
Further, when the host in the minimum function module is changed and the external port of the minimum function module is not changed, the changed host information is synchronously updated into the asset information in the asset management module, and the corresponding information of the changed host is synchronously configured into the corresponding firewall equipment through the step C. The host in the minimum functional module of change comprises the host with the corresponding IP address which is newly added, modified and deleted in the minimum functional module.
Further, when the external port of the host in the minimum function module is changed, the asset information of the minimum function module in the asset management module is updated, and the corresponding information of the changed host is synchronously configured into the corresponding firewall equipment through the step C; and changing the network security policy of the corresponding role of the minimum function module in the network security policy management module, and updating the changed network security policy into the corresponding firewall equipment. Although the external port of the minimum function module is changed, the function provided by the minimum function module to the outside is not changed, so that the corresponding role for accessing the minimum function module is not changed, and only the network access policy corresponding to the role is changed.
On the basis, in the step D, after the network security policy based on role control is generated, the network security policy is directly issued to the corresponding firewall equipment for configuration through the network security policy management module, after the configuration is completed, the firewall equipment returns confirmation information to the network security policy management module, and the configuration state of the network security policy is updated in the network security policy management module; or manually completing the configuration of the network security policy of the firewall equipment by a human, and then manually updating the configuration state of the network security policy in the network security policy management module.
The invention manages the network security policy through roles, remarkably reduces the number of items of the network security policy, manages the network security policy based on actual function classification, and can ensure the network security to the maximum extent and facilitate the subsequent adjustment of the network security policy.
The present invention will be described in further detail with reference to the following examples. This should not be understood as limiting the scope of the above-described subject matter of the present invention to the following examples. Various substitutions and alterations according to the general knowledge and conventional practice in the art are intended to be included within the scope of the present invention without departing from the technical spirit of the present invention as described above.
Drawings
FIG. 1 is a flow chart of a method for managing network security policies of the present invention.
Fig. 2 is a timing flowchart of embodiment 1.
Fig. 3 is a timing flowchart of embodiment 2.
Fig. 4 is a timing flowchart of embodiment 3.
Detailed Description
As shown in fig. 1, the method for managing network security policy of the present invention includes:
A. grouping all host resources related to all host systems according to a minimum function module, wherein each minimum function module at least comprises one host, and each host corresponds to an IP address and the same external port;
B. setting a set of minimum function modules with the same network resource access authority as a role according to the calling relation among different host systems, wherein the IP of a host in each minimum function module in the set is different from the IP of the host of the accessed network resource; the network resource provides the same service function for all hosts which are externally provided with the same external port and have different IP addresses in each minimum function module, and is generally expressed as an IP port;
C. the asset information is stored through an asset management module, the asset information comprises host resources related to all host systems and the grouping and role of the minimum function module, and the stored asset information is synchronously configured into corresponding firewall equipment when the host resources are newly added or changed;
when the minimum function module is newly added, adding asset information related to the newly added minimum function module in the asset management module, synchronously establishing a network object on the corresponding firewall equipment, establishing a role corresponding to the newly added minimum function module and a network security policy corresponding to the role in accessing the newly added minimum function module in the network security policy management module according to the access requirement of other systems on the newly added minimum function module, and then synchronously finishing the configuration of the newly established network security policy in the firewall equipment.
When a host in a minimum function module is changed (newly added, modified and deleted) and an external port of the minimum function module is not changed, the changed host information is synchronously updated into the asset information in the asset management module, and the corresponding information of the changed host is synchronously configured into the corresponding firewall equipment.
When an external port of a host in a minimum function module is changed, updating the asset information of the minimum function module in the asset management module, and synchronously configuring the corresponding information of the changed host to the corresponding firewall equipment; and changing the network security policy of the corresponding role of the minimum function module in the network security policy management module, and updating the changed network security policy into the corresponding firewall equipment. Although the external port of the minimum function module is changed, the corresponding function provided by the minimum function module for accessing the external port is not changed, so that the role corresponding to the minimum function module is not changed, and only the network access policy corresponding to the role is changed.
D. The network security policy management module generates a network security policy based on role control according to the calling relationship among different host systems, the network security policy management module directly issues the network security policy to corresponding firewall equipment for configuration, the firewall equipment returns confirmation information to the network security policy management module after the configuration is finished, and the configuration state of the network security policy is updated in the network security policy management module; or manually completing the configuration of the network security policy of the firewall equipment by a human, and then manually updating the configuration state of the network security policy in the network security policy management module.
The asset management module synchronously configures the asset information into the corresponding firewall equipment, and the network security policy management module generates, manages and maintains the network security policy, and those skilled in the art can implement the asset information according to the conventional mode or the principle of the conventional mode, which is not the invention point of the present invention.
The following example explains the new creation and change of the network security policy based on roles through the embodiments:
example 1:
the system A comprises a mysql database cluster, the host 1, the host 2 and the host 3 are respectively a master library, a slave library and a backup library in the mysql database cluster of the system A, and external ports are 3306. The host 1, the host 2 and the host 3 are taken as a minimum function module, and the minimum function module is named as: system a-mysql, which is external to the external port: 3306. the B system is used for providing web services and needs to query data of the mysql database cluster of the A system. The system A also comprises a minimum function module named as system A-nginx and system A-java, and comprises a plurality of hosts respectively, as shown in Table 1.
Table 1:
Figure GDA0002524751300000051
according to the steps B and C, the information of the role R1 generated and stored by the network security policy management module is shown in Table 2: table 2:
Figure GDA0002524751300000052
here role R1 represents the set of all hosts accessing the A System-mysql: 3306 port services. If the external port of the system A-mysql is changed from 3306 to 3307, since the access service provided to the external is still the original mysql, the role R1 is not changed, and the port of the destination service is updated to TCP: 3307. However, if a database instance is added or changed on the host of the system a-mysql and the port 3307 is used to provide services to the outside, the role that can access the system a-mysql 3307 services at this time is no longer the role R1, but a new role R1' is needed.
At this time, the B system is newly online, the B system has two groups, i.e., a B system-mysql and a B system-nginx, and includes 5 hosts, and specific information stored in the asset management module is shown in table 3.
Table 3:
Figure GDA0002524751300000053
in this embodiment, the front-end application of the system B needs to access the front end of the system a, and the system a also needs to access the system B, so two roles need to be newly established in the network security management module: role R2 and role R3, as shown in table 4.
Table 4:
character Source network object Destination network object Destination service To firewalls Policy states
R2 B System-nginx System a-nginx TCP:443 F1,F3 /
R3 System A-java B System-nginx TCP:443 F2,F3 /
The steps for managing the network security policy are therefore shown in fig. 2:
step 1: before the system B is on line, asset registration information needs to be submitted to an asset management module, related information of the system B is added to the asset management module, and network objects, namely a system B-mysql and a system B-nginx, are newly built on corresponding firewall equipment F3;
step 2: according to the calling relationship between the systems, corresponding roles R2 and R3 are established in the network security management module;
and step 3: the network security management module automatically issues or manually configures corresponding network security policies in corresponding firewall equipment;
and 4, step 4: after the network security policy configuration on the firewall device takes effect, the configuration state of the network security policy recorded in the network security management module is fed back and updated to the network security management module.
Example 2:
on the basis of embodiment 1, the host information of the original B system is changed, and a new host 3 is added to the B system-nginx packet, and the information in the asset management module is shown in table 5.
Table 5:
Figure GDA0002524751300000061
since the change does not involve a role change, the network security policy of the network security management module is not changed, and the steps of managing the network security policy are shown in fig. 3:
step 1: the system B-nginx is additionally provided with a host 3, the information updating of the system B-nginx is completed in the asset management module, and the network object on the corresponding firewall F3 is synchronously updated;
step 2: since the system call relationship is not changed, the policy on the network security policy management module does not need to be updated.
Example 3:
in addition to example 1, the external port of the a system-nginx was changed from 443, which is the original port, to 5443, as shown in table 6.
Table 6:
Figure GDA0002524751300000071
this results in a change in the policy of role R2 for system a-nginx, as shown in table 7.
Table 7:
character Source network object Destination network object Destination service To firewalls Policy states
R2 B System-nginx System a-nginx TCP:5443 F1,F3 /
The steps for managing the network security policy are therefore shown in fig. 4:
step 1: and changing the external port of the A system-nginx, and updating the asset registration information of the A system-nginx in the asset management module. Because the IP address of the host of the A system-nginx is not changed, the network object on the firewall equipment does not need to be updated;
step 2: because the external port of the a system-nginx is changed from the original 443 to 5443, the network security policy corresponding to the role R2 is also changed, and the network security policy record and the network security policy configuration record of the role R2 in the network security management module are updated;
and step 3: updating the network security policy on the corresponding firewall automatically or manually;
and 4, step 4: after the network security policy configuration of the firewall device takes effect, the configuration state of the network security policy recorded in the network security management module is fed back and updated to the network security management module.

Claims (5)

1. A method of managing network security policies, comprising:
A. grouping all host resources related to all host systems according to a minimum function module, wherein each minimum function module at least comprises one host, and each host corresponds to an IP address and the same external port;
B. setting a set of minimum function modules with the same network resource access authority as a role according to the calling relation among different host systems, wherein the IP of a host in each minimum function module in the set is different from the IP of the host of the accessed network resource; the network resource provides the same service function for all hosts which externally provide the same service function, have the same external port and have different IP addresses in each minimum function module;
C. the asset information is stored through an asset management module, the asset information comprises host resources related to all host systems and the grouping and role of the minimum function module, and the stored asset information is synchronously configured into corresponding firewall equipment when the host resources are newly added or changed;
D. the network security policy management module generates a network security policy based on role control according to the calling relationship among different host systems; and configuring the network security policy to corresponding firewall equipment, and updating the configuration state of the network security policy in a network security policy management module.
2. A method of managing network security policies according to claim 1, characterized by: when a minimum function module is newly added, asset information related to the newly added minimum function module is added into an asset management module, a network object is newly built on corresponding firewall equipment synchronously, a role corresponding to the newly added minimum function module and a network security policy corresponding to the role are newly built in a network security policy management module according to the access requirements of other systems on the newly added minimum function module, and then the configuration of the newly built network security policy in the firewall equipment is completed synchronously.
3. A method of managing network security policies according to claim 1, characterized by: and C, when the host in one minimum function module is changed and the external port of the minimum function module is not changed, synchronously updating the changed host information into the asset information in the asset management module, and synchronously configuring the corresponding information of the changed host into the corresponding firewall equipment through the step C.
4. A method of managing network security policies according to claim 1, characterized by: when the external port of the host in the minimum functional module is changed, updating the asset information of the minimum functional module in the asset management module, and synchronously configuring the corresponding information of the changed host to the corresponding firewall equipment through the step C; and changing the network security policy of the corresponding role of the minimum function module in the network security policy management module, and updating the changed network security policy into the corresponding firewall equipment.
5. Method of managing network security policies according to one of claims 1 to 4, characterized in that: step D, after generating the network security policy based on role control, directly issuing the network security policy to corresponding firewall equipment for configuration through a network security policy management module, returning confirmation information to the network security policy management module by the firewall equipment after configuration is completed, and updating the configuration state of the network security policy in the network security policy management module; or manually completing the configuration of the network security policy of the firewall equipment by a human, and then manually updating the configuration state of the network security policy in the network security policy management module.
CN202010259752.5A 2020-04-03 2020-04-03 Method for managing network security policy Active CN111147528B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010259752.5A CN111147528B (en) 2020-04-03 2020-04-03 Method for managing network security policy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010259752.5A CN111147528B (en) 2020-04-03 2020-04-03 Method for managing network security policy

Publications (2)

Publication Number Publication Date
CN111147528A CN111147528A (en) 2020-05-12
CN111147528B true CN111147528B (en) 2020-08-21

Family

ID=70528783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010259752.5A Active CN111147528B (en) 2020-04-03 2020-04-03 Method for managing network security policy

Country Status (1)

Country Link
CN (1) CN111147528B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800392B (en) * 2020-06-15 2023-08-25 广州海颐信息安全技术有限公司 Dynamic minimized privilege access control method and device
CN111600912A (en) * 2020-07-22 2020-08-28 四川新网银行股份有限公司 Network security policy management system
CN112738114B (en) * 2020-12-31 2023-04-07 四川新网银行股份有限公司 Configuration method of network security policy
CN112787867B (en) * 2021-01-25 2023-02-10 上海瀚银信息技术有限公司 Automatic processing system and method for firewall policy tasks
CN112817994B (en) * 2021-02-02 2024-01-30 中国工商银行股份有限公司 Association relationship asset management device, system and method
CN112887324B (en) * 2021-02-20 2022-07-08 广西电网有限责任公司 Policy configuration management system for network security device of power monitoring system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2296989C (en) * 1999-01-29 2005-10-25 Lucent Technologies Inc. A method and apparatus for managing a firewall
US7657926B1 (en) * 2004-03-19 2010-02-02 3Com Corporation Enabling network communication from role based authentication
CN101714997A (en) * 2010-01-15 2010-05-26 中国工商银行股份有限公司 Firewall strategy-generating method, device and system
CN102394885A (en) * 2011-11-09 2012-03-28 中国人民解放军信息工程大学 Information classification protection automatic verification method based on data stream
CN103281333A (en) * 2013-06-17 2013-09-04 苏州山石网络有限公司 Forwarding method and device of data flow
CN105959331A (en) * 2016-07-19 2016-09-21 上海携程商务有限公司 Firewall policy optimization method and device
CN106254379A (en) * 2016-09-09 2016-12-21 上海携程商务有限公司 The processing system of network security policy and processing method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3783608B2 (en) * 2001-10-31 2006-06-07 ソニー株式会社 COMMUNICATION METHOD, COMMUNICATION SYSTEM, DATA PROCESSING DEVICE, SERVER DEVICE, AND PROGRAM
US10341298B1 (en) * 2016-03-29 2019-07-02 Amazon Technologies, Inc. Security rules for application firewalls
CN106850259B (en) * 2016-12-22 2019-12-17 北京元心科技有限公司 Method and device for managing and controlling policy execution and electronic equipment
US10454896B2 (en) * 2017-07-04 2019-10-22 Is5 Communications Inc Critical infrastructure security framework
US10909010B2 (en) * 2018-04-10 2021-02-02 Nutanix, Inc. Efficient data restoration
US10681091B2 (en) * 2018-07-31 2020-06-09 Juniper Networks, Inc. N:1 stateful application gateway redundancy model

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2296989C (en) * 1999-01-29 2005-10-25 Lucent Technologies Inc. A method and apparatus for managing a firewall
US7657926B1 (en) * 2004-03-19 2010-02-02 3Com Corporation Enabling network communication from role based authentication
CN101714997A (en) * 2010-01-15 2010-05-26 中国工商银行股份有限公司 Firewall strategy-generating method, device and system
CN102394885A (en) * 2011-11-09 2012-03-28 中国人民解放军信息工程大学 Information classification protection automatic verification method based on data stream
CN103281333A (en) * 2013-06-17 2013-09-04 苏州山石网络有限公司 Forwarding method and device of data flow
CN105959331A (en) * 2016-07-19 2016-09-21 上海携程商务有限公司 Firewall policy optimization method and device
CN106254379A (en) * 2016-09-09 2016-12-21 上海携程商务有限公司 The processing system of network security policy and processing method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于下一代防火墙技术的网络应用识别控制系统设计与实现;刘萌;《中国优秀硕士学位论文全文数据库信息科技辑》;20150315;全文 *
基于角色访问控制策略的防火墙技术研究与实现;唐怡;《中国优秀博硕士学位论文全文数据库 (硕士)》;20051015;全文 *

Also Published As

Publication number Publication date
CN111147528A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN111147528B (en) Method for managing network security policy
US20200327145A1 (en) Cooperative naming for configuration items in a distributed configuration management database environment
US11394689B2 (en) Application based network traffic management
US11646940B2 (en) Intent driven network policy platform
DE69829383T2 (en) METHOD AND DEVICE FOR PRESENTING AND USING NETWORK OPOLOGY DATA
DE102015102871B4 (en) Distributed routing table lookup technologies
US20190116111A1 (en) Systems and methods for controlling switches to record network packets using a traffic monitoring network
US20080120362A1 (en) Single virtual client for multiple client access and equivalency
US20150006555A1 (en) Message Publishing and Subscribing Method and Apparatus
CN105592052A (en) Method and device for configuring firewall rules
CN103064960A (en) Method and equipment for database query
CN108572991A (en) Data base processing method, device and storage medium
CN111506602B (en) Data query method, device, equipment and storage medium
WO2005074228A1 (en) System and method for a directory secured user account
EP3376403A1 (en) Method of accessing distributed database and device providing distributed data service
US20080270413A1 (en) Client-Specific Transformation of Distributed Data
US20220046058A1 (en) Zero-trust dynamic discovery
US11146464B2 (en) Systems and methods for enabling inter-agent multicast domain name system client roaming in wide area network
US20120233220A1 (en) Controlling Access To A Computer System
CN108777723A (en) ARL list management systems
US20060253658A1 (en) Provisioning or de-provisioning shared or reusable storage volumes
CN114244768A (en) Forwarding method, device, equipment and storage medium for two-layer unknown multicast
US10541872B2 (en) Network policy distribution
US20130174138A1 (en) Software catalog information management
US11451514B2 (en) Optimizing rules for configuring a firewall in a segmented computer network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant