CN113676390B - VXLAN-based trigger type dynamic security channel method, user side and central console - Google Patents

VXLAN-based trigger type dynamic security channel method, user side and central console Download PDF

Info

Publication number
CN113676390B
CN113676390B CN202110822373.7A CN202110822373A CN113676390B CN 113676390 B CN113676390 B CN 113676390B CN 202110822373 A CN202110822373 A CN 202110822373A CN 113676390 B CN113676390 B CN 113676390B
Authority
CN
China
Prior art keywords
access request
access
user side
analysis result
control information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110822373.7A
Other languages
Chinese (zh)
Other versions
CN113676390A (en
Inventor
余端敏
王林
潘胜
武志鹏
杨柳
张驰欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Netju Yunlian Technology Co.,Ltd.
Original Assignee
Beijing Wangju Yunlian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wangju Yunlian Technology Co ltd filed Critical Beijing Wangju Yunlian Technology Co ltd
Priority to CN202110822373.7A priority Critical patent/CN113676390B/en
Publication of CN113676390A publication Critical patent/CN113676390A/en
Application granted granted Critical
Publication of CN113676390B publication Critical patent/CN113676390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Abstract

The embodiment of the application discloses a VXLAN-based method for triggering a dynamic security channel, a user side and a central console, which are used for transmitting data in an established temporary channel, and can avoid security problems such as intranet data leakage, tampering, attack and the like to a great extent. The method in the embodiment of the application comprises the following steps: a user side sends a first access request to a central console, wherein the first access request is a Domain Name System (DNS) resolution request for accessing a target service; the user side receives an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer point of network; the user side sends a second access request to the transfer access point according to the analysis result, the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transfer access point and a target node; and the user side performs data transmission with the target node through the temporary channel.

Description

VXLAN-based trigger type dynamic security channel method, user side and central console
Technical Field
The present application relates to the field of clusters, and in particular, to a method, a user side, a central console, and a storage medium for a triggered dynamic security channel based on VXLAN.
Background
The Virtual channel establishment of the existing VXLAN (Virtual eXtensible Local Area Network ) is static, and when a user does not transmit data, the Virtual channel still occupies resources of a VXLAN Network Identifier (VNI). From the perspective of zero trust, the static tunnel identifier still faces security problems such as being cracked, tampered, attacked and the like.
Disclosure of Invention
The embodiment of the application provides a VXLAN-based method for triggering a dynamic security channel, a user side, a central console and a storage medium, which are used for establishing a temporary channel between a target node and the user side, performing data transmission in the temporary channel, wherein the whole communication process is performed in the temporary virtual channel, and thus the security problems of intranet data leakage, tampering, attack and the like can be avoided to a great extent.
A first aspect of the present application provides a method for triggering a dynamic security channel based on VXLAN, which may include: a user side sends a first access request to a central console, wherein the first access request is a Domain Name System (DNS) resolution request for accessing a target service; the user side receives an analysis result sent by the central control console, wherein the analysis result comprises an address of a transfer point of network; the user side sends a second access request to the transit point-of-presence according to the analysis result, the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transit point-of-presence and a target node; and the user side performs data transmission with the target node through the temporary channel.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user end.
Optionally, the access control information of the second access request includes user side information and target service information; or the like, or a combination thereof,
the quintuple information of the user side comprises: source internet protocol IP address, source port, destination IP address, destination port, transport layer protocol.
A second aspect of the present application provides a VXLAN-based triggered dynamic security channel method, which may include: the method comprises the steps that a central control console receives a first access request sent by a user side, wherein the first access request is a Domain Name System (DNS) resolution request for accessing a target service; the central console sends an analysis result to the user side according to the first access request, wherein the analysis result comprises an address of a transfer point of network; the central console receives access control information of a second access request sent by the transit access network node, wherein the access control information of the second access request comprises quintuple information; and the central console issues a control instruction to a target node and the transit access network node according to the access control information of the second access request, wherein the control instruction is used for establishing a temporary channel between the target node and the transit access network node.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user end.
A third aspect of the present application provides a user terminal, which may include:
the system comprises a receiving and sending module, a sending and receiving module and a sending and receiving module, wherein the receiving and sending module is used for sending a first access request to a central console, and the first access request is a Domain Name System (DNS) resolution request for accessing a target service; receiving an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer point of network; sending a second access request to the transit point-of-entry according to the analysis result, wherein the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transit point-of-entry and a target node;
and the processing module is used for carrying out data transmission with the target node through the temporary channel.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user side.
Optionally, the access control information of the second access request further includes user side information and target service information; or the like, or a combination thereof,
the quintuple information of the user side comprises: source internet protocol IP address, source port, destination IP address, destination port, transport layer protocol.
A fourth aspect of the present application provides a center console, which may include:
the system comprises a receiving and sending module, a sending and receiving module and a sending and receiving module, wherein the receiving and sending module is used for receiving a first access request sent by a user side, and the first access request is a domain name DNS analysis request for accessing a target service; sending an analysis result to the user side according to the first access request, wherein the analysis result comprises an address of a transfer-in point; receiving access control information of a second access request sent by the transit access network node, wherein the access control information of the second access request comprises quintuple information; and issuing a control instruction to a target node and the transit access network node according to the access control information of the second access request, wherein the control instruction is used for establishing a temporary channel between the target node and the transit access network node.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user end.
A fifth aspect of the present application provides a user terminal, which may include:
a memory storing executable program code;
a processor and transceiver coupled with the memory;
the processor invokes the executable program code stored in the memory for the processor and the transceiver to perform the method according to the first aspect of the application.
A sixth aspect of the present application provides a center console, which may include:
a memory storing executable program code;
a transceiver coupled with the memory;
the memory is to store executable program code;
the transceiver performs a method as described in the second aspect of the application.
A further aspect of the application provides a computer readable storage medium comprising instructions which, when executed on a processor, cause the processor to perform a method as described in the first or second aspect of the application.
In a further aspect of the invention, a computer program product is disclosed, which, when run on a computer, causes the computer to perform the method of the first or second aspect of the application.
In a further aspect, the present invention discloses an application publishing platform for publishing a computer program product, wherein the computer program product, when run on a computer, causes the computer to perform the method of the first or second aspect of the present application.
According to the technical scheme, the embodiment of the application has the following advantages:
in the embodiment of the application, a user side sends a first access request to a central console, wherein the first access request is a Domain Name System (DNS) resolution request for accessing a target service; the user side receives an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer point of network; the user side sends a second access request to the transit point-of-presence according to the analysis result, the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transit point-of-presence and a target node; and the user side performs data transmission with the target node through the temporary channel. Namely, a temporary channel is established between the target node and the user side, data transmission is carried out in the temporary channel, the whole communication process is carried out in the temporary virtual channel, and safety problems such as intranet data leakage, tampering, attack and the like can be avoided to a great extent.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments and the prior art will be briefly described below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and other drawings can be obtained according to the drawings.
Fig. 1 is a schematic diagram of an embodiment of a method for triggered dynamic secure channel based on VXLAN in the embodiment of the present application;
fig. 2 is a schematic diagram illustrating that a target node and a client need to transit a POP once in the embodiment of the present application;
fig. 3 is a schematic diagram illustrating that a target node and a client need to transit a POP multiple times in the embodiment of the present application;
fig. 4 is a schematic diagram of an embodiment of a user side in the embodiment of the present application;
FIG. 5 is a schematic diagram of one embodiment of a center console in an embodiment of the present application;
fig. 6 is a schematic diagram of another embodiment of a user side in the embodiment of the present application;
fig. 7 is a schematic diagram of another embodiment of the center console in the embodiment of the present application.
Detailed Description
The embodiment of the application provides a VXLAN-based method for triggering a dynamic security channel, a user side, a central console and a storage medium, which are used for establishing a temporary channel between a target node and the user side, performing data transmission in the temporary channel, wherein the whole communication process is performed in the temporary virtual channel, and thus the security problems of intranet data leakage, tampering, attack and the like can be avoided to a great extent.
For a person skilled in the art to better understand the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. The embodiments in the present application shall fall within the protection scope of the present application.
With the development of network communication Technology, cloud computing has become a new trend of enterprise IT (Information Technology) construction at present by virtue of ITs advantages of high system utilization rate, low manpower/management cost, strong flexibility/extensibility, and the like. Server virtualization is one of the core technologies of cloud computing, and is applied more and more widely. The wide deployment of server virtualization technologies has greatly increased the computational density of data centers. However, as a currently mainstream Network isolation technology, a conventional VLAN (Virtual Local Area Network) has only 12 bits in a standard definition, and thus the number of available VLANs is only 4096. For a scenario of tens of thousands or even more tenants, such as a public cloud or other large virtualized cloud computing service, the isolation capability of the VLAN cannot be satisfied.
A VLAN expansion scheme VXLAN (Virtual eXtensible Local Area Network) is gradually emerging. VXLAN encapsulates an original message sent by a VM in the same area planned by an administrator into a new UDP (User Datagram Protocol) message, and uses an IP (Internet Protocol) and a MAC (media Access Control) address of a physical network as an outer header, thereby greatly reducing the requirement of the network on the MAC address specification.
Compared with VLAN technology, VXLAN technology has the following advantages:
(1) The VXLAN Network Identifier (VNI) field value with the length of 24 bits can support up to 16M VXLAN segments, and the problem of limitation that the number of VLANs is limited to 4094 is solved.
(2) The VXLAN technology virtualizes a two-layer network in a physical three-layer network through a tunnel technology, and a terminal in the VXLAN network cannot perceive the communication process of the VXLAN, so that the logical network topology and the physical network topology are decoupled to a certain degree, the dependence degree of the network topology configuration on the physical equipment configuration is reduced, and the configuration is more flexible and convenient.
However, there are still some problems with existing VXLAN channel technology.
The problems of the existing VXLAN technology are as follows:
the virtual channel setup of VXLAN is static, and when the user does not transmit data, the virtual channel still occupies the resources identified by the VNI. From the perspective of zero trust, the static tunnel identifier still faces security problems such as being cracked, tampered, attacked and the like.
In order to solve the problem, the application provides a triggered dynamic secure channel technology based on VXLAN technology. When a user side initiates a DNS analysis request for accessing a target service to a central control console, the central control console returns an analysis result: generally speaking, the address of the POP (Point-of-Presence) nearest to the user end, the user end accesses the POP, the POP forwards the access control information of the access request to the central console, the central console sends a control instruction to the POP Network connection Point between the target node and the user end by collecting the node and POP information in advance, a Temporary VXLAN virtual channel (if the node and POP information are identified as T-VNI, a temporal VXLAN Network Identifier) is established, data transmission is performed in the Temporary channel, the T-VNI is destroyed when the data transmission is completed, the channel resource identified by the T-VNI is not occupied, the whole communication process is performed in the Temporary virtual channel, and the safety problems of intranet data leakage, tampering, attack and the like can be avoided to a great extent.
The following further describes the technical solution of the present application by way of an embodiment, as shown in fig. 1, which is a schematic diagram of an embodiment of a method for triggering a dynamic secure channel based on VXLAN in the embodiment of the present application, and the method may include:
101. the user side initiates a first access request to the central control console, wherein the first access request is a Domain Name System (DNS) resolution request for accessing a target service.
The method comprises the steps that a central console receives a first access request sent by a user side, wherein the first access request is a domain name DNS analysis request for accessing a target service.
102. And the central console sends an analysis result to the user side according to the first access request, wherein the analysis result comprises the address of the transfer point of network.
And the user side receives an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer-in point.
Optionally, the number of transit transfer points is at least one. It is to be understood that a transit point of mesh may also be referred to as a transit node.
Optionally, the transit point of presence includes a point of presence closest to the user end (i.e., transit POP).
Optionally, the sending, by the central console, the analysis result to the user side according to the first access request may include: and the central console selects the transit point of access by acquiring the network card and routing data information of each transit point of access according to the first access request, and sends an analysis result to the user side.
103. And the user side sends a second access request to the transfer access point according to the analysis result, the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transfer access point and the target node.
Optionally, the access control information of the second access request may further include, but is not limited to, user side information, target service information (also referred to as target resource information); or the like, or a combination thereof,
optionally, the quintuple information of the user side includes: source internet protocol IP address, source port, destination IP address, destination port, transport layer protocol.
Optionally, the user side establishes a connection with the transit point according to the analysis result.
104. And the transit point of transfer sends the access control information of the second access request to the central console.
And the central console receives the access control information of the second access request sent by the transit network node.
105. And the central console issues a control instruction to a target node and the transit access network node according to the access control information of the second access request, wherein the control instruction is used for establishing a temporary channel between the target node and the transit access network node.
Optionally, the issuing, by the central console, a control instruction to a target node and the transit network-accessing node according to the access control information of the second access request, where the control instruction is used for the target node and the transit network-accessing node to establish a temporary channel, and the issuing may include: and the central console selects an exit node of the target service according to the access control information of the second access request, and issues a control instruction to the exit node of the target service and the transit network-accessing node, wherein the control instruction is used for establishing a temporary channel between the exit node of the target service and the transit network-accessing node.
106. And the target node and the transit network-accessing node establish a temporary channel according to the control instruction.
Optionally, the target node and the transit point of access each generate their own NAT tables.
Optionally, the NAT table includes a channel identifier and access control information of the second access request, and the control information of the second access request may include quintuple information. Optionally, the information may also include, but is not limited to, user side information and target service information.
107. And the user side performs data transmission with the target node through the temporary channel.
Optionally, after the temporary tunnel is established, the transit transfer point performs data transmission in the temporary tunnel corresponding to the quintuple information by querying its own NAT table.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
For example, (1) as shown in fig. 2, it is a schematic diagram that a target node and a user side need to transit POP once in this embodiment of the present application. When the target node and the user side need to transit the POP once, the following is shown:
step 1: the user terminal initiates an access request (i.e., a first access request) for accessing the target service.
And 2, step: the user terminal requests DNS resolution from the central console.
And 3, step 3: the central control station selects the transfer POP nearest to the user side by collecting the network card, route and other data information of the transfer network point. If the POP1 is preferred, the IP address of the POP1 is returned to the user side.
And 4, step 4: the user side sends a second access request to the POP1, and establishes connection with the POP1, and the POP1 acquires the access control information of the second access request at the moment, wherein the access control information can comprise quintuple information; optionally, the information may also include, but is not limited to, user side information and target service information.
And 5: the POP1 uploads the access control information of the second access request to the central console.
And 6: the central console selects an egress node of the target service (where the egress node may be in an intranet of the target service) according to the access control information of the second access request, and issues a control instruction for establishing a temporary channel to the egress node and the POP1 node.
And 7: and the exit node A and the transfer POP1 of the target service establish a temporary T-VNI1 channel according to the control instruction and generate a self NAT table (comprising channel identification and quintuple information).
And 8: after the temporary T-VNI1 channel is established, the POP1 inquires the NAT table of the POP1 and transmits data in the T-VNI corresponding to the access control information.
And step 9: and carrying out data transmission on the target service of the enterprise intranet and the user side through the exit node A, closing the T-VNI1 channel by the exit node A and the POP1 when the data transmission is finished, and destroying the temporary T-VNI1 identification.
Step 10: and (6) ending.
(2) Fig. 3 is a schematic diagram illustrating that a target node and a user terminal need to transit a POP multiple times in the embodiment of the present application. When the target node and the user terminal only need to transfer the POPs for multiple times, the following steps are performed:
step 1: the user terminal initiates a request (i.e., a first access request) to access the target service.
And 2, step: the user side requests DNS resolution from the central console.
And 3, step 3: the central control station collects the network card of the transit point of presence and the data information such as route, and if the transit POP is closest to the user terminal. And if the POP1 is preferred, returning the IP address of the POP1 to the user side.
And 4, step 4: the user side sends a second access request to the POP1, and establishes connection with the POP1, and the POP1 acquires access control information of the second access request at the moment, wherein the access control information can comprise quintuple information; optionally, the information may also include, but is not limited to, user side information and target service information.
And 5: the POP1 uploads the access control information of the second access request to the central console.
Step 6: the central console selects an optimal path (if the optimal user side is the client side, the POP1, the POP2 and the node A) according to the access control information, the POP and the routing information of each node of the second access request, and issues a control instruction for establishing a temporary channel to the exit nodes A, the POP2 and the POP 1.
And 7: a temporary T-VNI1 channel is established between the POP1 and the POP2, a temporary T-VNI2 channel is established between the exit node A and the POP2, and NAT tables (comprising channel identification and quintuple information) of the exit node A and the POP2 are respectively generated.
And 8: after the temporary T-VNI1 and T-VNI2 channels are established, the POP1 inquires the NAT table of the POP1 and transmits data in the T-VNI1 channel corresponding to the access control information, and the POP2 inquires the NAT table of the POP1 and transmits data in the T-VNI2 channel after receiving the data of the POP 1.
And step 9: and carrying out data transmission on a target service of the enterprise intranet and a user side through the exit node A, closing the T-VNI1 channel by using POP1 and POP2, destroying the temporary T-VNI1 identifier, closing the T-VNI2 channel by using the exit node A and POP2, and destroying the temporary T-VNI2 identifier when the data transmission is finished.
Step 10: and (6) ending.
In the embodiment of the present application, a triggered dynamic secure channel technology based on VXLAN technology is provided. When a user side initiates a first access request, requesting DNS resolution of a domain name from a central console; the central console returns the analysis result, namely the central console returns the IP (Internet Protocol) address of the preferred transit POP (generally selected to be nearest to the user terminal) to the user terminal by acquiring the network cards and routing information of the edge node and the transit POP node in real time; and the client accesses the transfer POP, the transfer POP receives a second access request of the client, uploads access control information of the second access request to the central control console, the central control console finds out an exit node of the target service, sends an instruction for establishing a temporary channel to the exit node and the transfer POP node, the exit node and the POP node establish the temporary T-VNI channel after receiving the instruction, respectively establish a Network Address Translation (NAT) table (containing the access control information and virtual channel identification information), subsequently transmits data of the target service to the client through the T-VNI channel, and the exit node and the transfer POP destroy the T-VNI channel after the data transmission is finished.
In the embodiment of the application, a user side initiates a first access request to a central console, namely a Domain Name System (DNS) resolution request for accessing a target service; the user side receives an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer point of network; the user side sends a second access request to the transfer access point according to the analysis result, the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transfer access point and the target node; and the user side performs data transmission with the target node through the temporary channel. Namely, a temporary channel can be dynamically established between the target node and the user side, data transmission is carried out in the temporary channel, the whole communication process is carried out in the temporary virtual channel, the safety problems of intranet data leakage, tampering, attack and the like can be avoided to a great extent, and the data safety is improved. Moreover, the temporary virtual tunnel is established in a triggering mode, namely the temporary virtual tunnel is used as a sale, and resources are not occupied.
As shown in fig. 4, a schematic diagram of an embodiment of a user side in the embodiment of the present application may include:
a transceiver module 401, configured to send a first access request to a central console, where the first access request is a domain name DNS resolution request for accessing a target service; receiving an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer point of network; sending a second access request to the transit point-of-presence according to the analysis result, wherein access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transit point-of-presence and a target node;
a processing module 402, configured to perform data transmission with the target node through the temporary channel.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user side.
Optionally, the access control information of the second access request further includes user side information and target service information; or the like, or, alternatively,
the quintuple information of the user side comprises: source internet protocol IP address, source port, destination IP address, destination port, transport layer protocol.
As shown in fig. 5, which is a schematic diagram of an embodiment of a center console in the embodiment of the present application, the center console may include:
a transceiver module 501, configured to receive a first access request sent by a user, where the first access request is a domain name DNS resolution request for accessing a target service; sending an analysis result to the user side according to the first access request, wherein the analysis result comprises an address of a transfer-in point; receiving access control information of a second access request sent by the transit access network node; and issuing a control instruction to a target node and the transit access network node according to the access control information of the second access request, wherein the control instruction is used for establishing a temporary channel between the target node and the transit access network node.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user end.
As shown in fig. 6, a schematic view of another embodiment of the user side in the embodiment of the present application may include:
a memory 601 in which executable program code is stored;
a processor 602 and transceiver 603 coupled to memory 601;
a transceiver 603, configured to send a first access request to a central console, where the first access request is a domain name DNS resolution request for accessing a target service; receiving an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer point of network; sending a second access request to the transit point-of-presence according to the analysis result, wherein access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transit point-of-presence and a target node;
processor 602 invokes the executable program code stored in memory 601 for data transfer with the target node over the temporary channel.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user end.
Optionally, the access control information of the second access request further includes user side information and target service information; or the like, or, alternatively,
the quintuple information of the user side comprises: source internet protocol IP address, source port, destination IP address, destination port, transport layer protocol.
As shown in fig. 7, which is a schematic diagram of another embodiment of the center console in the embodiment of the present application, the center console may include:
a memory 701 in which executable program code is stored;
a transceiver 702 coupled with the memory 701;
the memory 701 is used for storing executable program codes;
a transceiver 702, configured to receive a first access request sent by a user, where the first access request is a domain name DNS resolution request for accessing a target service; sending an analysis result to the user side according to the first access request, wherein the analysis result comprises an address of a transfer-in point; receiving access control information of a second access request sent by the transit access network node; and issuing a control instruction to a target node and the transit access network node according to the access control information of the second access request, wherein the control instruction is used for establishing a temporary channel between the target node and the transit access network node.
Optionally, after the data transmission is completed, the temporary channel is in a closed state.
Optionally, the number of the transit point of presence is at least one, or the transit point of presence includes a point of presence closest to the user side.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method for triggering dynamic security channels based on VXLAN, comprising:
a user side sends a first access request to a central console, wherein the first access request is a Domain Name System (DNS) resolution request for accessing a target service;
the user side receives an analysis result sent by the central control console, wherein the analysis result comprises an address of a transfer point of network;
the user side sends a second access request to the transfer access point according to the analysis result, the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transfer access point and a target node;
and the user side performs data transmission with the target node through the temporary channel.
2. The method of claim 1, wherein the temporary channel is closed after the data transfer is completed.
3. The method according to claim 1 or 2, wherein the number of said transit point is at least one, or said transit point comprises the point closest to said user terminal.
4. The method according to claim 1 or 2, wherein the access control information of the second access request further comprises user side information, target service information; or the like, or, alternatively,
the quintuple information of the user side comprises: source internet protocol IP address, source port, destination IP address, destination port, transport layer protocol.
5. A method for triggering dynamic security channels based on VXLAN, comprising:
a central console receives a first access request sent by a user side, wherein the first access request is a Domain Name System (DNS) resolution request for accessing a target service;
the central console sends an analysis result to the user side according to the first access request, wherein the analysis result comprises an address of a transit point of Internet;
the central console receives access control information of a second access request sent by the transit point of access, wherein the access control information of the second access request comprises quintuple information;
and the central console issues a control instruction to a target node and the transit point-of-entry according to the access control information of the second access request, wherein the control instruction is used for establishing a temporary channel between the target node and the transit point-of-entry.
6. The method of claim 5, wherein the temporary channel is closed after the data transfer is completed.
7. The method according to claim 5 or 6, wherein the number of transit point-of-presence is at least one, or wherein the transit point-of-presence comprises the point-of-presence closest to the user terminal.
8. A user terminal, comprising:
the system comprises a receiving and sending module, a sending and receiving module and a sending and receiving module, wherein the receiving and sending module is used for sending a first access request to a central console, and the first access request is a Domain Name System (DNS) resolution request for accessing a target service; receiving an analysis result sent by the central console, wherein the analysis result comprises an address of a transfer point of network; sending a second access request to the transit point-of-entry according to the analysis result, wherein the access control information of the second access request comprises quintuple information, and the access control information of the second access request is used for establishing a temporary channel between the transit point-of-entry and a target node;
and the processing module is used for carrying out data transmission with the target node through the temporary channel.
9. A center console, comprising:
the system comprises a receiving and sending module, a sending and receiving module and a sending and receiving module, wherein the receiving and sending module is used for receiving a first access request sent by a user side, and the first access request is a domain name DNS analysis request for accessing a target service; sending an analysis result to the user side according to the first access request, wherein the analysis result comprises an address of a transfer-in point; receiving access control information of a second access request sent by the transit point-of-entry, wherein the access control information of the second access request comprises quintuple information; and issuing a control instruction to a target node and the transit point-of-presence according to the access control information of the second access request, wherein the control instruction is used for establishing a temporary channel between the target node and the transit point-of-presence.
10. A computer-readable storage medium comprising instructions that, when executed on a processor, cause the processor to perform the method of any one of claims 1-4, or any one of claims 5-7.
CN202110822373.7A 2021-07-21 2021-07-21 VXLAN-based trigger type dynamic security channel method, user side and central console Active CN113676390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110822373.7A CN113676390B (en) 2021-07-21 2021-07-21 VXLAN-based trigger type dynamic security channel method, user side and central console

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110822373.7A CN113676390B (en) 2021-07-21 2021-07-21 VXLAN-based trigger type dynamic security channel method, user side and central console

Publications (2)

Publication Number Publication Date
CN113676390A CN113676390A (en) 2021-11-19
CN113676390B true CN113676390B (en) 2022-10-25

Family

ID=78539663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110822373.7A Active CN113676390B (en) 2021-07-21 2021-07-21 VXLAN-based trigger type dynamic security channel method, user side and central console

Country Status (1)

Country Link
CN (1) CN113676390B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114500450B (en) * 2021-12-22 2023-10-10 天翼云科技有限公司 Domain name resolution method, device and computer readable storage medium
CN115379016A (en) * 2022-08-22 2022-11-22 深信服科技股份有限公司 Resource access method, access service platform, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043475A (en) * 2006-06-30 2007-09-26 华为技术有限公司 Process and system for media flow transverse network address conversion
CN102917042A (en) * 2012-10-12 2013-02-06 中兴通讯股份有限公司 Method and device for realizing internet services based on convergence of CDN (content distribution network) and network
CN107294711A (en) * 2017-07-11 2017-10-24 国网辽宁省电力有限公司 A kind of power information Intranet message encryption dissemination method based on VXLAN technologies
EP3247082A1 (en) * 2016-05-18 2017-11-22 Zscaler, Inc. Cloud-based virtual private access systems and methods
CN110430288A (en) * 2019-09-16 2019-11-08 腾讯科技(深圳)有限公司 Node visit method, apparatus, computer equipment and storage medium
WO2020155491A1 (en) * 2019-01-31 2020-08-06 平安科技(深圳)有限公司 Geographical location-based intelligent domain name resolution method and device
CN111885036A (en) * 2020-07-16 2020-11-03 武汉秒开网络科技有限公司 Method and system for realizing multi-device access by router penetrating intranet

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9420003B2 (en) * 2013-06-24 2016-08-16 Cisco Technology, Inc. Dynamic communication between secure endpoints
CN107493297B (en) * 2017-09-08 2020-11-27 安徽皖通邮电股份有限公司 VxLAN tunnel access authentication method
CN111092863B (en) * 2019-11-29 2022-12-23 视联动力信息技术股份有限公司 Method, client, server, device and medium for accessing internet website

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043475A (en) * 2006-06-30 2007-09-26 华为技术有限公司 Process and system for media flow transverse network address conversion
CN102917042A (en) * 2012-10-12 2013-02-06 中兴通讯股份有限公司 Method and device for realizing internet services based on convergence of CDN (content distribution network) and network
EP3247082A1 (en) * 2016-05-18 2017-11-22 Zscaler, Inc. Cloud-based virtual private access systems and methods
CN107294711A (en) * 2017-07-11 2017-10-24 国网辽宁省电力有限公司 A kind of power information Intranet message encryption dissemination method based on VXLAN technologies
WO2020155491A1 (en) * 2019-01-31 2020-08-06 平安科技(深圳)有限公司 Geographical location-based intelligent domain name resolution method and device
CN110430288A (en) * 2019-09-16 2019-11-08 腾讯科技(深圳)有限公司 Node visit method, apparatus, computer equipment and storage medium
CN111885036A (en) * 2020-07-16 2020-11-03 武汉秒开网络科技有限公司 Method and system for realizing multi-device access by router penetrating intranet

Also Published As

Publication number Publication date
CN113676390A (en) 2021-11-19

Similar Documents

Publication Publication Date Title
US11895154B2 (en) Method and system for virtual machine aware policy management
US8954992B2 (en) Distributed and scaled-out network switch and packet processing
CN116057910B (en) Virtual private cloud communication and configuration method and related device
US20130024553A1 (en) Location independent dynamic IP address assignment
US20140230044A1 (en) Method and Related Apparatus for Authenticating Access of Virtual Private Cloud
EP2922246B1 (en) Method and data center network for cross-service zone communication
US20140226664A1 (en) Method, apparatus, and system for implementing private network traversal
CN113676390B (en) VXLAN-based trigger type dynamic security channel method, user side and central console
EP3720100A1 (en) Service request processing method and device
US10454880B2 (en) IP packet processing method and apparatus, and network system
US20150006737A1 (en) Method, apparatus, and system for providing network traversing service
CN112583618B (en) Method, device and computing equipment for providing network service for business
US20180069787A1 (en) Exposing a subset of hosts on an overlay network to components external to the overlay network without exposing another subset of hosts on the overlay network
JP2015095894A (en) Management server and management method thereof for managing cloud appliances in virtual local area networks
CN107147580B (en) Tunnel establishment method and communication system
CN113364741A (en) Application access method and proxy server
US9716688B1 (en) VPN for containers and virtual machines in local area networks
US20230283589A1 (en) Synchronizing dynamic host configuration protocol snoop information
CN112968965B (en) Metadata service method, server and storage medium for NFV network node
WO2023186109A1 (en) Node access method and data transmission system
CN112994928B (en) Virtual machine management method, device and system
US20070147376A1 (en) Router-assisted DDoS protection by tunneling replicas
CN111800340B (en) Data packet forwarding method and device
CN109462609B (en) ARP (Address resolution protocol) inhibition table entry generation method and device
CN113973101A (en) Method and device for processing table item information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231229

Address after: 518000, B-1503, Zhongdian Changcheng Building, No.3 Kefa Road, Science and Technology Park Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province

Patentee after: Shenzhen Netju Yunlian Technology Co.,Ltd.

Address before: 101199 3091, floor 3, No. 64, Xinhua South Road, Tongzhou District, Beijing

Patentee before: Beijing Wangju Yunlian Technology Co.,Ltd.

TR01 Transfer of patent right