KR101724922B1 - Apparatus and Method for controlling middleboxs - Google Patents
Apparatus and Method for controlling middleboxs Download PDFInfo
- Publication number
- KR101724922B1 KR101724922B1 KR1020150142294A KR20150142294A KR101724922B1 KR 101724922 B1 KR101724922 B1 KR 101724922B1 KR 1020150142294 A KR1020150142294 A KR 1020150142294A KR 20150142294 A KR20150142294 A KR 20150142294A KR 101724922 B1 KR101724922 B1 KR 101724922B1
- Authority
- KR
- South Korea
- Prior art keywords
- packet
- header
- management unit
- middle box
- flow
- Prior art date
Links
Images
Classifications
-
- H04L67/2852—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention discloses a middle box control apparatus and method. According to an embodiment of the present invention, there is provided a controller apparatus for controlling a plurality of middleboxes, the apparatus comprising: a policy managing unit that manages at least one of information on the arrangement and operation of the plurality of middleboxes, Management; And a rule manager for managing traffic of a connected middle box, distributing a header required in each middle box with reference to the policy manager, and mediating information required by each middle box.
Description
BACKGROUND OF THE
In the current network, various types of middleboxes are operated to maintain security and improve performance. These middleboxes must operate correctly according to the purpose / policy of the communication carrier.
The middle box is a device that performs service as an intermediary of a network having a certain intelligent function. However, many middlebox functions such as NAT, Firewall, IDS, and Proxy are difficult to change policy dynamically due to network changes. In other words, as networks become increasingly complex, there is a growing need to flexibly and dynamically manage a large number of middleboxes. However, existing middlebox management techniques require that the management manually pass policies to the middleboxes, There is a problem that it causes high complexity and management cost.
Also, since the current middleboxes are configured independently of each other and have unique policies, it is difficult to apply policies for the services provided in the middleboxes. Also, many types of middleboxes have more difficulties because of their different characteristics.
Software-based networking (SND) technology, which has been proposed in recent years, can solve this situation to some extent. However, the management of the middle box using SDN is still problematic.
In order to solve the problems of the prior art as described above, the present invention proposes a middle box control method and apparatus capable of controlling middle boxes and traffic by distributing packet headers based on an extended SDN structure.
Other objects of the invention will be apparent to those skilled in the art from the following examples.
According to a preferred embodiment of the present invention, there is provided a controller apparatus for controlling a plurality of middle boxes, the controller apparatus comprising: a plurality of middle boxes, A policy management unit for managing at least one of the information; And a rule manager for managing traffic of a connected middle box, distributing a header required in each middle box with reference to the policy manager, and mediating information required by each middle box.
Wherein the rule management unit receives a common header extracted from the first packet from the first middle box when a first packet is input to the first middle box, generates a flow ID corresponding to the common header, The first middle packet and the second intermediate packet are transmitted to the first middle packet and the second intermediate packet through the interaction with the policy management unit, To the second middle box.
The rule management unit refers to the policy management unit, forms a tunnel between the plurality of middle boxes, sets a group for a plurality of middle boxes related to each other, and transmits a group formation message to a plurality of middleboxes .
The plurality of middleboxes may include at least one of a Network Address Translation (NAT), a proxy, an Intrusion Detection System (IDS), and a firewall.
When the NAT changes the IP header for the first packet, the rule management unit receives the flow ID and the changed IP header for the first packet from the NAT, and transmits information about the changed IP header to the firewall Lt; / RTI >
When the proxy receives the first packet, the rule management unit receives a request to determine whether the packet is allowed from the proxy, inquires the firewall for a decision on whether to allow the packet, And may receive a determination as to whether or not the received packet is allowed to generate a final decision.
When the packet is received from the proxy, the firewall may integrate the entire header into the packet and transmit the header to the external network.
Wherein each of the plurality of middleboxes comprises: an upscreen manager for determining a policy and a flow for the packet through analysis of the received packet; Encapsulating the packets for which the policy and the flow have been determined, and transmitting the packet to the next middle box; An interface agent in communication with the policy management unit; A local policy management unit for determining the flow rules and operations; And a middlebox flow table storing rules for traffic flow.
According to another aspect of the present invention, there is provided a method of controlling a plurality of middleboxes, the method comprising: managing at least one of arrangement and operation of the plurality of middleboxes and information about a header required in each of the plurality of middleboxes; Receiving a common header extracted from the first packet from the first middle box when a first packet is input to the first middle box; Generating a flow ID corresponding to the common header; Identifying a header required in one or more second middleboxes receiving the first packet; And transmitting the generated flow ID and a header required in each middle box to the first middle box and the plurality of second middle boxes.
According to another aspect of the present invention, there is provided a computer-readable recording medium on which a program for performing the above-described method is recorded.
According to the present invention, when the first packet is received in the middle box, the common header is separated and transmitted to the controller. Since the controller distributes the packet headers required in each middle box, There are advantages.
1 is a diagram showing a system configuration according to a preferred embodiment of the present invention.
2 is a diagram showing a configuration of a
3 is a view showing a detailed configuration of a middle box according to a preferred embodiment of the present invention.
4 is a flowchart illustrating a middle box control process according to an exemplary embodiment of the present invention.
While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the invention is not intended to be limited to the particular embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. Like reference numerals are used for like elements in describing each drawing.
Hereinafter, embodiments according to the present invention will be described in detail with reference to the accompanying drawings.
1 is a diagram showing a system configuration according to a preferred embodiment of the present invention.
1, the system according to the present embodiment includes a
Preferably, the
The
2 is a diagram showing a configuration of a
2, the
The
Here, the policy may include routing, access control, traffic engineering, QoS management, power control, and the like.
The
More specifically, when a first packet is received in one middle box (first middle box), the
The reception of the common header and the distribution of the header required in each middle box will be described in detail with reference to FIG.
Through such header distribution, control is performed so that unnecessary headers are not included in the transmission / reception of packets between middle boxes.
The
In the current network, various types of middleboxes are operated to maintain security and improve performance. These middleboxes must operate correctly according to the purpose / policy of the communication carrier.
The
3 is a view showing a detailed configuration of a middle box according to a preferred embodiment of the present invention.
3, the middle box according to the present embodiment includes a middle
The middle
The
Here, a flow is defined as a set of packets passing through a specified point on the network for a specific time, which can be defined as data including the source and destination information of the packet.
The local
The
The
The middlebox flow table 304 stores rules for flows received from the
According to a preferred embodiment of the present invention, the
In addition, the
4 is a flowchart illustrating a middle box control process according to an exemplary embodiment of the present invention.
4 illustrates an example in which the
Referring to FIG. 4, upon receiving a first packet from an ingress switch (NAT) 102-1 (step 1), the NAT 102-1 separates a common header from the received packet and transmits it to the controller 100 (Step 2).
Here, the common header includes all of the headers required in each middle box.
4, the NAT 102-1 requires an IP layer packet header, the proxy 102-2 includes application layer packet headers, the firewall 102-3 includes IP and application layer packet headers .
When the common header is received, the
Thereafter, the
4, when a tunnel is formed between the NAT 102-1, the proxy 102-2, and the firewall 102-3, when the first packet is received in the proxy 102-2, the proxy 102-2 The local
The
Thus, the firewall 102-3 transmits its decision to the controller 100 (step 7).
The
The proxy 102-2 establishes a persistent rule and forwards the packet to the firewall 102-3. If the packet is allowed to pass, the firewall integrates the entire header into the packet and sends it to the external network (step 9).
According to one embodiment of the present invention, a tunnel may also be formed between the NAT 102-1 and the firewall 102-3, and if NAT 102-1 changes the IP layer packet header, the NAT 102 -1) recognizes that the firewall 102-3 needs a changed header, and transmits the flow ID and the changed header to the
At this time, the
The NAT 102-1 establishes a persistent rule and forwards the modified packet to the proxy 102-2 through the tunnel.
As described above, the present invention has been described with reference to particular embodiments, such as specific elements, and specific embodiments and drawings. However, it should be understood that the present invention is not limited to the above- And various modifications and changes may be made thereto by those skilled in the art to which the present invention pertains. Accordingly, the spirit of the present invention should not be construed as being limited to the embodiments described, and all of the equivalents or equivalents of the claims, as well as the following claims, belong to the scope of the present invention .
Claims (10)
A policy management unit for managing at least one of information about the arrangement and operation of the plurality of middle boxes and the header required for each of the plurality of middle boxes; And
And a rule management unit for managing traffic of the linked middle box, distributing a header required in each middle box with reference to the policy management unit, and mediating information required by each middle box,
The rule management unit,
Receiving a common header extracted from the first packet from the first middle box when a first packet is input to the first middle box,
And generates a flow ID corresponding to the common header, identifies a header required in one or more second middleboxes receiving the first packet through an interaction with the policy management unit,
Transmits the generated flow ID and a header required in each middle box to the first middle box and the plurality of second middle boxes,
Wherein the plurality of middle boxes include at least one of a Network Address Translation (NAT), a proxy, an Intrusion Detection System (IDS), and a firewall,
When the NAT changes the IP header for the first packet, the rule management unit receives the flow ID and the changed IP header for the first packet from the NAT, and transmits information about the changed IP header to the firewall Controller device to transmit.
The rule management unit,
A controller for referring to the policy management unit to form a tunnel between the plurality of middleboxes, a group for a plurality of middleboxes related to each other, and a group formation message to a plurality of middleboxes set in the group.
When the proxy receives the first packet, the rule management unit receives a request to determine whether the packet is allowed from the proxy, inquires the firewall for a decision on whether to allow the packet, Receiving a determination as to whether or not the received packet is acceptable, and generate a final determination.
Wherein the firewall integrates the entire header into the packet when the packet is received from the proxy and transmits the packet to the external network.
Wherein each of the plurality of middle boxes includes:
An upscreen management unit for determining a policy and a flow for the packet through analysis of the received packet;
Encapsulating the packets for which the policy and the flow have been determined, and transmitting the packet to the next middle box;
An interface agent in communication with the policy management unit;
A local policy management unit for determining the flow rules and operations; And
A controller device comprising a middlebox flow table storing rules for traffic flow.
Managing at least one of arrangement and operation of the plurality of middle boxes and information about a header required in each of the plurality of middle boxes; And
Receiving a common header extracted from the first packet from the first middle box when a first packet is input to the first middle box;
Generating a flow ID corresponding to the common header;
Identifying a header required in one or more second middleboxes receiving the first packet; And
And transmitting the generated flow ID and a header required in each middle box to the first middle box and the plurality of second middle boxes,
Wherein the plurality of middle boxes include at least one of a Network Address Translation (NAT), a proxy, an Intrusion Detection System (IDS), and a firewall,
When the NAT changes the IP header for the first packet, the controller device receives the flow ID for the first packet from the NAT and the modified IP header, and transmits information about the changed IP header to the firewall A middle box control method for transmitting.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20150018382 | 2015-02-06 | ||
KR1020150018382 | 2015-02-06 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20160097115A KR20160097115A (en) | 2016-08-17 |
KR101724922B1 true KR101724922B1 (en) | 2017-04-07 |
Family
ID=56873802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150142294A KR101724922B1 (en) | 2015-02-06 | 2015-10-12 | Apparatus and Method for controlling middleboxs |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101724922B1 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140119367A1 (en) * | 2012-10-30 | 2014-05-01 | Futurewei Technologies, Inc. | Encoding Packets for Transport Over SDN Networks |
-
2015
- 2015-10-12 KR KR1020150142294A patent/KR101724922B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140119367A1 (en) * | 2012-10-30 | 2014-05-01 | Futurewei Technologies, Inc. | Encoding Packets for Transport Over SDN Networks |
Also Published As
Publication number | Publication date |
---|---|
KR20160097115A (en) | 2016-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10715634B2 (en) | System and method for creating virtual interfaces based on network characteristics | |
US9948553B2 (en) | System and method for virtual network-based distributed multi-domain routing control | |
KR101473783B1 (en) | Method and apparatus for control of dynamic service chaining by using tunneling | |
RU2651149C2 (en) | Sdn-controller, data processing center system and the routed connection method | |
US20160301603A1 (en) | Integrated routing method based on software-defined network and system thereof | |
US8995266B2 (en) | Performing path-oriented systems management | |
US20160080263A1 (en) | Sdn-based service chaining system | |
US20170085462A1 (en) | Network Control Method and Apparatus | |
US10178017B2 (en) | Method and control node for handling data packets | |
WO2018036254A1 (en) | Packet forwarding method and device | |
JP2017533641A (en) | Service route generation method and apparatus | |
CN106789637B (en) | Cross-domain service intercommunication path establishment method, controller and system | |
US9311123B2 (en) | Distributed virtual security appliance and flow-based forwarding system using virtual machines | |
US10165092B2 (en) | Using a network service header to manage a network-as-a-system | |
CN106375355B (en) | Load balancing processing method and device | |
KR101746105B1 (en) | Openflow switch capable of service chaining | |
US9356876B1 (en) | System and method for classifying and managing applications over compressed or encrypted traffic | |
US8675669B2 (en) | Policy homomorphic network extension | |
CN104702505B (en) | A kind of message transmitting method and node | |
KR101724922B1 (en) | Apparatus and Method for controlling middleboxs | |
CN112910791B (en) | Diversion system and method thereof | |
KR101802037B1 (en) | Method and system of transmitting oam message for service function chaining in software defined network environment | |
CN105812274B (en) | Service data processing method and related equipment | |
CN105765903A (en) | Topology discovery method and device | |
US11258720B2 (en) | Flow-based isolation in a service network implemented over a software-defined network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |