TW201911101A - Server and firewall rule management therefof - Google Patents

Server and firewall rule management therefof Download PDF

Info

Publication number
TW201911101A
TW201911101A TW106126620A TW106126620A TW201911101A TW 201911101 A TW201911101 A TW 201911101A TW 106126620 A TW106126620 A TW 106126620A TW 106126620 A TW106126620 A TW 106126620A TW 201911101 A TW201911101 A TW 201911101A
Authority
TW
Taiwan
Prior art keywords
client device
firewall
firewall rule
server
network service
Prior art date
Application number
TW106126620A
Other languages
Chinese (zh)
Other versions
TWI666567B (en
Inventor
顏朝鈞
許世俊
林淳皓
Original Assignee
中華電信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中華電信股份有限公司 filed Critical 中華電信股份有限公司
Priority to TW106126620A priority Critical patent/TWI666567B/en
Publication of TW201911101A publication Critical patent/TW201911101A/en
Application granted granted Critical
Publication of TWI666567B publication Critical patent/TWI666567B/en

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A server and a firewall rule management method, which is adapted for managing that a user end equipment to access network services by the server according to a firewall rule, are provided. In the method, a login status that the user end equipment accesses the network services is obtain, where the user end equipment access the network services through the server. The firewall rule is modified dynamically according to the login status. When the user end equipment logs in, the firewall is enabled. When the user end equipment logs out, the firewall is disabled. Therefore, firewall access security would be improved, the complexity for managing the firewall rule can be reduced, and the usage efficiency can be improved.

Description

伺服器及其防火牆規則管理方法Server and its firewall rule management method

本發明是關於一種防火牆,且特別是有關於一種伺服器及其防火牆規則管理方法。The present invention relates to a firewall, and more particularly to a server and a firewall rule management method thereof.

防火牆(Firewall)是一種安全機制,用來隔離兩個安全信任度不同的網路。現有的防火牆是透過封包過濾的方法,提供網路層封包篩選的基本功能。將已定義的存取規則應用到每個流入或流出的網際網路協定(IP)封包上,以決定是否允許或阻止封包的進出。然而,現有機制常只檢查IP、傳輸控制協定(TCP)、用戶資料報協定(UDP)、網際網路控制訊息協定(ICMP)等封包的標頭(Header)資訊。此外,目前一般的防火牆系統僅提供IP封包規則的建立,並依據封包標頭的來源/目的IP位址、協定(TCP, UDP,…)、來源/目的埠號(TCP, UDP)等等欄位來進行檢查。符合規則的封包便受允許通過,反之則阻擋封包。這樣的運作模式很單純,但缺乏彈性,更令防火牆規則可能開放得過於寬鬆。甚至,可能因為資安的考量,防火牆規會固定在特定來源與目的IP,從而導致實際應用、管理上的不便。Firewall is a security mechanism used to isolate two networks with different security trusts. The existing firewall is a packet filtering method that provides basic functions for network layer packet filtering. Apply defined access rules to each incoming or outgoing Internet Protocol (IP) packet to determine whether to allow or block the entry and exit of packets. However, existing mechanisms often only check header information for packets such as IP, Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP). In addition, the current general firewall system only provides the establishment of IP packet rules, and according to the source/destination IP address of the packet header, the protocol (TCP, UDP, ...), the source/destination nickname (TCP, UDP), etc. Bit to check. Packets that conform to the rules are allowed to pass, and conversely block the packets. This mode of operation is simple, but lacks flexibility, and the firewall rules may be too open. Even, due to the consideration of security, the firewall rules will be fixed at specific sources and destination IPs, resulting in inconvenience in practical application and management.

再者,通常一部防火牆設備會提供給許多不同使用者來使用,但防火牆規則表僅僅一份,當使用者數量愈來愈多,且防火牆規則隨之增加時,防火牆管理的複雜度也會愈來愈大。此外,防火牆規則的新增刪除、維護管理工作也會愈來愈繁瑣,長久下來,防火牆將會累積巨量的規則設定,甚至成為防火牆與網路設備管理維護者的燙手山芋。In addition, usually a firewall device will be provided to many different users, but the firewall rule table is only one. When the number of users is more and more, and the firewall rules increase, the complexity of firewall management will also be It is getting bigger and bigger. In addition, the new deletion and maintenance management of firewall rules will become more and more cumbersome. In the long run, the firewall will accumulate huge rules and regulations, and even become the hot potato of firewall and network equipment management and maintenance.

現有的防火牆應用有很多,例如:There are many existing firewall applications, such as:

先前技術一(台灣專利名稱:啓發性防火牆之方法及裝置發現,公告號:550921)與先前技術二(專利名稱:在一動態電腦網路中過濾通信之防火牆,公開號:201407405)已被提出。而雖然此二先前技術都克服了習知用以提供防火牆安全方法的缺點,且能夠從流經網路之資料學習以進行過濾,從而提供額外的網路安全。Prior art 1 (Taiwan patent name: method and device for inspiring firewall discovery, bulletin number: 550921) and prior art 2 (patent name: firewall for filtering communication in a dynamic computer network, publication number: 201407405) have been proposed . While both prior art techniques overcome the shortcomings of conventional firewall security methods and are capable of learning from the data flowing through the network for filtering, providing additional network security.

先前技術三(美國專利名稱:防火牆裝置(FIREWALL DEVICE),公開號: US 2006/0143699 A1),此專利雖然也是採用使用端設備認證機制,但其利用用戶識別碼(ID)與虛擬防火牆ID之關連性,來管理用戶防火牆,用戶終端依此關連性可以透過虛擬防火牆存取後端資訊服務。Prior art 3 (US Patent Name: Firewall Device (FIREWALL DEVICE), publication number: US 2006/0143699 A1), although this patent also uses the end device authentication mechanism, but it uses the user identification code (ID) and the virtual firewall ID Correlation, to manage the user firewall, the user terminal can access the back-end information service through the virtual firewall.

先前技術四(台灣專利名稱:防火牆控制系統(FIREWALL CONTROL SYSTEM),公開號:200915093)係提供使用者對後端伺服器的驗證計畫,並根據不同的標的物伺服器,讓使用者存取特定伺服器或活動時使用特定之驗證計劃。Prior Art 4 (Taiwan Patent Name: Firewall Control System (FIREWALL CONTROL SYSTEM), publication number: 200915093) provides users with a verification plan for the backend server, and allows users to access according to different target servers. Use a specific verification plan for a specific server or activity.

先前技術五(台灣專利名稱:客戶輔助防火牆配置CLIENT ASSISTED FIREWALL CONFIGURATION,公開號:200640206)係提供使用者與防火牆間的溝通機制並可以動態進行防火牆規則變更的方法。Prior Art 5 (Taiwan Patent Name: Customer Assisted Firewall Configuration CLIENT ASSISTED FIREWALL CONFIGURATION, publication number: 200640206) is a method for providing a communication mechanism between a user and a firewall and dynamically changing firewall rules.

然而,前述習知的防火牆管理都缺乏彈性度及效率,甚至不符合實際使用。However, the aforementioned conventional firewall management lacks flexibility and efficiency, and is even not in practical use.

有鑑於此,本發明提供一種伺服器及其防火牆規則管理方法,使防火牆規則能動態且適時地變動。In view of this, the present invention provides a server and a firewall rule management method thereof, which enable firewall rules to be dynamically and timely changed.

本發明提供一種防火牆規則管理方法,適用於伺服器依據防火牆規則管理用戶端設備存取網路服務,此防火牆規則管理方法包括下列步驟。取得用戶端設備存取伺服器的登入狀態。用戶端設備係透過伺服器存取網路服務。依據用戶端設備的登入狀態動態調整防火牆規則。The invention provides a firewall rule management method, which is suitable for a server to manage a client device to access a network service according to a firewall rule. The firewall rule management method includes the following steps. Get the login status of the client device access server. The client device accesses the network service through the server. The firewall rules are dynamically adjusted according to the login status of the client device.

本發明另提供一種伺服器,其依據防火牆規則管理用戶端設備存取網路服務。此伺服器包括儲存單元、通訊模組及處理單元。儲存單元用以紀錄防火牆規則及數個模組。通訊模組用以存取網路。處理單元耦接儲存單元及通訊模組,且存取並執行儲存單元所儲存的模組,那些模組包括防火牆連線模組及防火牆功能模組。防火牆連線模組取得用戶端設備存取該伺服器的登入狀態。用戶端設備係透過伺服器存取網路服務。防火牆功能模組依據用戶端設備的登入狀態動態調整防火牆規則。The present invention further provides a server that manages a client device to access a network service according to a firewall rule. The server includes a storage unit, a communication module, and a processing unit. The storage unit is used to record firewall rules and several modules. The communication module is used to access the network. The processing unit is coupled to the storage unit and the communication module, and accesses and executes the modules stored in the storage unit, and the modules include a firewall connection module and a firewall function module. The firewall connection module obtains the login status of the client device to access the server. The client device accesses the network service through the server. The firewall function module dynamically adjusts firewall rules according to the login status of the client device.

基於上述,防火牆規則管理方法會依據用戶端設備的登入狀態動態增加或刪除用戶端設備相關的防火牆規則內容。藉此,可大幅提昇防火牆系統安全性、防火牆規則使用效率和使用者之使用便利性。Based on the above, the firewall rule management method dynamically adds or deletes the firewall rule content related to the client device according to the login status of the client device. In this way, the security of the firewall system, the efficiency of the use of firewall rules, and the ease of use of the user can be greatly improved.

為讓本發明的上述特徵和優點能更明顯易懂,下文特舉實施例,並配合所附圖式作詳細說明如下。The above described features and advantages of the invention will be apparent from the following description.

請參閱圖1所示係依據本發明一實施例的通訊系統之網路架構圖,通訊系統1至少包括但不僅限於用戶端設備100及伺服器。1 is a network architecture diagram of a communication system according to an embodiment of the present invention. The communication system 1 includes at least but not limited to a client device 100 and a server.

本實施例之用戶端設備100可以是桌上型電腦、筆記型電腦、個人數位助理(PDA)、智慧型手機、精簡型終端(Thin Client)等具備IP位址連網功能的設備。用戶端設備100包括儲存單元101、通訊模組103、顯示單元105及處理單元107。The client device 100 of this embodiment may be a device with an IP address networking function such as a desktop computer, a notebook computer, a personal digital assistant (PDA), a smart phone, or a thin client. The client device 100 includes a storage unit 101, a communication module 103, a display unit 105, and a processing unit 107.

儲存單元可以是任何型態的固定或可移動隨機存取記憶體(RAM)、唯讀記憶體(ROM)、快閃記憶體(flash memory)或類似元件或上述元件的組合。在本實施例中,儲存單元101係用以記錄用戶端連線模組101_3、使用者界面模組101_5等用戶端軟體101_1相關程式、網路服務資訊等用戶端設備100的相關資訊及各類型資料檔案等。The storage unit can be any type of fixed or removable random access memory (RAM), read only memory (ROM), flash memory or the like or a combination of the above. In this embodiment, the storage unit 101 is used to record related information and various types of the client device 100 such as the client terminal 101_3, the user interface module 101_5, and the client software 101_1 related programs and network service information. Data files, etc.

通訊模組103可以是支援WiFi標準、第三代無線通訊(3G)、第四代無線通訊(4G)或其他具備無線傳輸功能的任何類型無線網路介面模組,亦可以是支援乙太網路(Ethernet)、光纖(optical fiber)或其他具備有線傳輸功能的任何類型的有線網路介面模組,或是前述之組合。通訊模組103用以存取網路A 11。The communication module 103 can be a WiFi standard, a third generation wireless communication (3G), a fourth generation wireless communication (4G) or other wireless network interface module with wireless transmission function, or can support the Ethernet network. Ethernet, optical fiber, or any other type of wired network interface module with wired transmission capability, or a combination of the foregoing. The communication module 103 is used to access the network A 11.

顯示單元105例如是液晶顯示器(LCD)、發光二極體(LED)顯示器、場發射顯示器(FED)或其他種類顯示器的螢幕,並可選地具有觸控功能(電容式、電阻式以及光學式)等種類的觸控技術,或是具備滑鼠、鍵盤等輸入裝置。顯示單元105用以顯示任何類型之使用者介面(UI)。The display unit 105 is, for example, a liquid crystal display (LCD), a light emitting diode (LED) display, a field emission display (FED) or other type of display screen, and optionally has a touch function (capacitive, resistive, and optical). ), such as touch technology, or with input devices such as a mouse and keyboard. The display unit 105 is used to display any type of user interface (UI).

處理單元107與儲存單元101、通訊模組103及顯示單元105連接,處理單元107可以是中央處理單元(CPU),或是其他可程式化之一般用途或特殊用途的微處理器(Microprocessor)、數位信號處理器(DSP)、可程式化控制器、特殊應用積體電路(ASIC)或其他類似元件或上述元件的組合。在本發明實施例中,處理單元107用以執行用戶端設備100的所有作業,且可存取並執行上述儲存單元101中記錄的模組。The processing unit 107 is connected to the storage unit 101, the communication module 103, and the display unit 105. The processing unit 107 can be a central processing unit (CPU) or other programmable general purpose or special purpose microprocessor (Microprocessor). A digital signal processor (DSP), a programmable controller, an application specific integrated circuit (ASIC) or other similar component or a combination of the above. In the embodiment of the present invention, the processing unit 107 is configured to execute all the operations of the client device 100, and can access and execute the modules recorded in the storage unit 101.

需說明的是,為了方便說明,本實施例僅列舉一用戶端設備100,然於其他實施例中通訊系統1可能包括更多用戶端設備100,但不以此為限。It should be noted that, for convenience of description, only one client device 100 is listed in this embodiment. However, in other embodiments, the communication system 1 may include more client devices 100, but not limited thereto.

伺服器200是伺服器設備包括儲存單元201、通訊模組203及處理單元207。伺服器200與用戶端設備100相同或相似的元件可參照前述說明,於此不再贅述。此外,儲存單元201紀錄防火牆連線模組201_1、防火牆功能模組201_2、資料庫模組201_3等部分、使用者資訊、用戶端IP等身份認證相關資訊等。資料庫模組203儲存網路服務資訊204,網路服務資訊204是指防火牆系統(即,伺服器200)中屬於特定用戶端設備100的網路防火牆規則,且與用戶端設備100及其使用者有相關性。The server 200 is a server device including a storage unit 201, a communication module 203, and a processing unit 207. For the same or similar components of the server 200 and the client device 100, reference may be made to the foregoing description, and details are not described herein again. In addition, the storage unit 201 records the firewall connection module 201_1, the firewall function module 201_2, the database module 201_3 and the like, user information, user IP and other identity authentication related information. The database module 203 stores the network service information 204, and the network service information 204 refers to the network firewall rule belonging to the specific client device 100 in the firewall system (ie, the server 200), and the user equipment 100 and the use thereof Relevant.

伺服器200可存取網路A 11與網路B 12,而用戶端設備100處於網路A 11,且用戶端設備100需透過伺服器200存取網路B 12。值得注意的是,通訊系統1更包括處於網路B 12的一或更多個服務伺服器(圖未示)來提供網路服務300(例如,網路服務A~D分別代表人事差勤系統、圖書管理系統、公文處理系或某一子網段的服務存取等等。The server 200 can access the network A 11 and the network B 12 , and the client device 100 is on the network A 11 , and the client device 100 needs to access the network B 12 through the server 200 . It should be noted that the communication system 1 further includes one or more service servers (not shown) at the network B 12 to provide the network service 300 (for example, the network services A~D respectively represent the personnel service system). , library management system, document processing system or service access of a subnet segment, and so on.

請參閱圖2係本發明一實施例說明動態防火牆規則管理方法之流程圖,假設TCP/IP網路環境下:Please refer to FIG. 2, which is a flowchart illustrating a dynamic firewall rule management method according to an embodiment of the present invention, which is assumed to be in a TCP/IP network environment:

步驟S21:用戶端設備100之處理單元107載入並執行用戶端軟體101_1。Step S21: The processing unit 107 of the client device 100 loads and executes the client software 101_1.

步驟S22:啟動使用者介面模組101_5。例如,圖3係一範例說明使用者介面模組101_5透過顯示單元105呈現的主圖形化使用者介面(GUI) 301,此主GUI 301包括使用者認證GUI 304及網路服務顯示GUI 305。Step S22: The user interface module 101_5 is activated. For example, FIG. 3 is a diagram illustrating a main graphical user interface (GUI) 301 presented by the user interface module 101_5 through the display unit 105. The main GUI 301 includes a user authentication GUI 304 and a web service display GUI 305.

步驟S23:使用者可透過使用者認證GUI 304輸入使用者帳號及密碼,以進行身分認證程序之操作動作。需說明的是,身分認證所需資訊不限於帳號密碼,其他諸如憑證PIN碼快速響應(QR)碼、特殊代碼等皆可應用。Step S23: The user can input the user account and password through the user authentication GUI 304 to perform an operation of the identity authentication program. It should be noted that the information required for identity authentication is not limited to the account password, and other such as the PIN code quick response (QR) code, special code, etc. can be applied.

步驟S24:用戶端連線模組101_3透過通訊模組103而經由伺服器200之通訊模組203與防火牆連線模組201_1進行身分程序認證之連線動作。伺服器200之防火牆連線模組201_1即確認用戶端設備100是否通過身分認證程序。若認證結果正確(通過或符合儲存單元201所紀錄的使用者資訊) ,則防火牆連線模組201_1設定用戶端設備100的登入狀態係登入。若認證錯誤(未通過或不符合儲存單元201所紀錄的使用者資訊)情況下,防火牆連線模組201_1會透過通訊模組203而經由通訊模組103回覆認證錯誤訊息給用戶端連線模組101_5,並設定用戶端設備100的登入狀態係未登入。此時,程序返回到步驟S23,用戶端設備100可要求使用者重新提出認證資訊(例如,使用者帳號及密碼)。Step S24: The user terminal connection module 101_3 performs the connection operation of the identity program authentication via the communication module 103 via the communication module 203 of the server 200 and the firewall connection module 201_1. The firewall connection module 201_1 of the server 200 confirms whether the client device 100 passes the identity authentication program. If the authentication result is correct (passes or matches the user information recorded by the storage unit 201), the firewall connection module 201_1 sets the login status of the client device 100 to log in. If the authentication error (failed or does not match the user information recorded by the storage unit 201), the firewall connection module 201_1 will reply the authentication error message to the client connection mode via the communication module 203 via the communication module 203. Group 101_5, and setting the login status of the client device 100 is not logged in. At this time, the program returns to step S23, and the client device 100 may request the user to re-submit the authentication information (for example, the user account and password).

步驟S25:若登入狀態係登入,則防火牆連線模組201_1根據使用者ID(即對應於用戶端設備100的識別碼)向資料庫模組201_3取得用戶端設備100所屬的網路服務資訊204。Step S25: If the login status is logged in, the firewall connection module 201_1 obtains the network service information 204 to which the user equipment 100 belongs according to the user ID (ie, the identification code corresponding to the user equipment 100) to the database module 201_3. .

例如,表(1)係一範例說明網路服務資訊204之內容,網路服務資訊204是一種防火牆規則加上使用者資訊的集合,單一條(列)子規則之內容包含有(但不僅限於)使用者ID、來源端、目的端、來源埠號、目的埠號、服務協議、服務動作。來源端、目的端可以是單一IP,也可以是一個網段。服務協議是TCP、UDP、ICMP等等網路協議。服務動作是接受(ACCEPT)或是拒絕(DENY)。 表(1) For example, Table (1) is an example of the contents of the network service information 204. The network service information 204 is a collection of firewall rules plus user information. The content of a single (column) sub-rule includes (but is not limited to User ID, source, destination, source nickname, destination nickname, service agreement, service action. The source and destination can be a single IP or a network segment. Service protocols are TCP, UDP, ICMP, etc. network protocols. The service action is either ACCEPT or DENY. Table 1)

步驟S26: 防火牆功能模組201_2開啟(或啟用)針對用戶端設備100所屬的網路服務資訊204(防火牆規則對應之子規則)。防火牆功能模組201_2係將用戶端設備100的位址資訊及網路服務資訊新增至防火牆規則。Step S26: The firewall function module 201_2 turns on (or enables) the network service information 204 (the sub-rule corresponding to the firewall rule) to which the client device 100 belongs. The firewall function module 201_2 adds the address information and network service information of the client device 100 to the firewall rule.

例如,表(2)係一範例說明防火牆規則。 表(2) For example, Table (2) is an example of a firewall rule. Table 2)

當用戶端設備100之登入狀態係登入時,防火牆功能模組201_2將用戶端設備100的位址資訊(例如,IP位址)填入(置換)表(1)中使用者IP欄位,再將此用戶端設備100相關對應的網路服務資訊204寫入防火牆功能模組201_2之防火牆規則 (表(2)),從而形成表(3)。 表(3) When the login status of the client device 100 is logged in, the firewall function module 201_2 fills (replaces) the address information (for example, the IP address) of the client device 100 into the user IP field in the table (1), and then The network service information 204 corresponding to the client device 100 is written into the firewall rule (Table (2)) of the firewall function module 201_2, thereby forming a table (3). table 3)

步驟S27:防火牆連線模組201_1透過通訊模組203而經由通訊模組103將用戶端設備100所屬的(加密)網路服務資訊204傳給用戶端連線模組101_3。Step S27: The firewall connection module 201_1 transmits the (encrypted) network service information 204 to which the client device 100 belongs to the client connection module 101_3 via the communication module 103 via the communication module 203.

例如,表(4)係一範例說明調整後且送至用戶端設備100之網路服務資訊204,其包括服務名稱、服務動作為接受之服務,並為單一服務的內容,內容中包含來源端IP、目的端IP、來源埠號、目的埠號與服務協議。 表(4) For example, Table (4) is an example of the network service information 204 that is adjusted and sent to the client device 100, which includes the service name, the service action as the accepted service, and the content of the single service, and the content includes the source end. IP, destination IP, source nickname, destination nickname and service agreement. Table 4)

步驟S28:用戶端連線模組101_3收到網路服務資訊204後,(解密後,)使用者介面模組101_5透過顯示單元105將網路服務資訊204顯示在例如是圖3之網路服務顯示GUI 305上。Step S28: After the client connection module 101_3 receives the network service information 204, the user interface module 101_5 displays the network service information 204 on the network service, for example, in FIG. 3 through the display unit 105 (after decryption). Display on GUI 305.

步驟S29:用戶端設備100即可依據網路服務資訊204上的防火牆規則連線並存取防火牆後端(即,網路B 12端)的網路服務300。換言之,若登入狀態係登出或未登入,則用戶端設備100無法透過伺服器200存取網路服務(防火牆規則未允許用戶端設備100存取)。Step S29: The client device 100 can connect and access the network service 300 of the firewall backend (ie, the network B 12 end) according to the firewall rule on the network service information 204. In other words, if the login status is logged out or not logged in, the client device 100 cannot access the network service through the server 200 (the firewall rule does not allow the client device 100 to access).

此外,用戶端軟體101_1更可提供網路服務資訊204對應的功能,以存取網路服務300。例如,依據網路服務300內容產生相對應的GUI超連結(Hyperlink)提供使用者點選。用戶端軟體101_1亦可依據服務型態啟動相對應的應用程式(如80/443埠(port)服務使用瀏覽器),並根據服務網址IP與服務埠號決定應用程式要連線的網址URL(Uniform Resource Locator)。In addition, the client software 101_1 can further provide a function corresponding to the network service information 204 to access the network service 300. For example, a corresponding GUI hyperlink (Hyperlink) is generated according to the content of the network service 300 to provide a user click. The client software 101_1 can also launch a corresponding application according to the service type (for example, the 80/443 port service browser), and determine the URL of the URL to be connected by the application according to the service URL IP and the service nickname ( Uniform Resource Locator).

然登入狀態不限於用戶端設備100登入的前述情境,以下接續說明登出情境。請參閱圖4所係本發明另一實施例說明動態防火牆規則管理方法之流程圖,此情境係用戶端設備100請求登出伺服器200防火牆系統之運作流程圖:However, the login status is not limited to the foregoing scenario in which the client device 100 logs in. The following describes the logout scenario. Please refer to FIG. 4 for a flowchart of a method for managing a dynamic firewall rule according to another embodiment of the present invention. The scenario is a flowchart for operating the client device 100 to log out of the firewall system of the server 200:

步驟S41:用戶端設備100執行用戶端軟體101_1,此時登入狀態係登入。Step S41: The client device 100 executes the client software 101_1, and the login state is the login.

步驟S42:用戶端軟體101_1執行登出動作,並透過通訊模組103傳送登出訊息。Step S42: The client software 101_1 performs a logout operation and transmits the logout message through the communication module 103.

步驟S43:伺服器200之防火牆連線模組201_1接收來自用戶端設備100的登出訊息。Step S43: The firewall connection module 201_1 of the server 200 receives the logout message from the client device 100.

步驟S44:防火牆功能模組201_3關閉(或禁能)用戶端設備100所屬的網路服務資訊204(防火牆規則對應之子規則)。Step S44: The firewall function module 201_3 closes (or disables) the network service information 204 (sub-rule corresponding to the firewall rule) to which the client device 100 belongs.

步驟S45:防火牆連線模組201_1修改資料庫模組201_3中用戶端設備100的登入狀態為登出(或未登入)。防火牆功能模組201_3自防火牆規則中移除用戶端設備100相關的子規則。Step S45: The firewall connection module 201_1 modifies the login status of the client device 100 in the database module 201_3 to log out (or not log in). The firewall function module 201_3 removes the sub-rules related to the client device 100 from the firewall rules.

步驟S46:用戶端連線模組101_3更改登入狀態為登出(或未登入)並透過使用者介面模組101_5在顯示單元105上呈現更改之登入狀態。Step S46: The client connection module 101_3 changes the login status to logout (or not logged in) and presents the changed login status on the display unit 105 through the user interface module 101_5.

以上所述,僅為本發明其中的較佳實施例而已,並非用來限定本發明的實施範圍;即凡依本發明申請專利範圍所作的均等變化與修飾,皆為本發明專利範圍所涵蓋。The above is only the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention; that is, the equivalent variations and modifications made by the scope of the present invention are covered by the scope of the present invention.

特點及功效Features and effects

其他習用技術相互比較時,更具備下列優點:When other conventional technologies are compared with each other, they have the following advantages:

1.本發明可針對現有固定防火牆規則進行改進,令使用者經認證登入後才開啟防火牆規則。當使用者為登出的狀態時,使用者的防火牆規則是關閉的,可大幅提升防火牆網路的安全性。1. The present invention can be improved for existing fixed firewall rules, so that the user can open the firewall rule after being authenticated and logged in. When the user is in the logout state, the user's firewall rules are turned off, which can greatly improve the security of the firewall network.

2.本發明可提供防火牆服務的使用管理與調度能力,可達到防火牆規則彈性調度、提升網路服務品質之功效。2. The invention can provide the use management and scheduling capability of the firewall service, and can achieve the effect of elastic scheduling of the firewall rules and improving the quality of the network service.

3.本發明可提供使用者防火牆服務列表顯示功能,使用者可清楚其使用服務權限,達到使用者服務之管控功能。3. The invention can provide a user firewall service list display function, and the user can clearly understand the use of the service authority to achieve the control function of the user service.

上列詳細說明乃針對本發明之一可行實施例進行具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。The detailed description of the present invention is intended to be illustrative of a preferred embodiment of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.

1‧‧‧通訊系統1‧‧‧Communication system

11‧‧‧網路A11‧‧‧Network A

12‧‧‧網路B12‧‧‧Network B

100‧‧‧用戶端設備100‧‧‧Customer equipment

101‧‧‧儲存單元101‧‧‧ storage unit

101_1‧‧‧用戶端軟體101_1‧‧‧User software

101_3‧‧‧用戶端連線模組101_3‧‧‧Customer connection module

101_5‧‧‧使用者介面模組101_5‧‧‧User Interface Module

103, 203‧‧‧通訊模組103, 203‧‧‧Communication Module

105‧‧‧顯示單元105‧‧‧Display unit

107, 207‧‧‧處理單元107, 207‧‧‧Processing unit

200‧‧‧防火牆伺服器200‧‧‧Firewall server

201_1‧‧‧防火牆連線模組201_1‧‧‧Firewall connection module

201_2‧‧‧防火牆功能模組201_2‧‧‧Firewall function module

201_3‧‧‧資料庫模組201_3‧‧‧Database Module

204‧‧‧網路服務資訊204‧‧‧Internet Service Information

300‧‧‧網路服務300‧‧‧Internet services

S21~S29‧‧‧步驟S21~S29‧‧‧Steps

301‧‧‧主圖形化使用者介面301‧‧‧Main graphical user interface

304‧‧‧使用者認證圖形化使用者介面304‧‧‧User authentication graphical user interface

305‧‧‧網路服務顯示圖形化使用者介面305‧‧‧Web service display graphical user interface

S41~S46‧‧‧步驟S41~S46‧‧‧Steps

圖1係依據本發明一實施例說明之通訊系統之網路架構圖; 圖2係依據本發明一實施例說明防火牆規則管理方法之流程圖; 圖3係一範例說明主圖形化使用者界面; 圖4係本發明另一實施例說明防火牆規則管理方法之流程圖。1 is a network architecture diagram of a communication system according to an embodiment of the invention; FIG. 2 is a flowchart illustrating a firewall rule management method according to an embodiment of the invention; FIG. 3 is a diagram illustrating a main graphical user interface; FIG. 4 is a flowchart of a method for managing a firewall rule according to another embodiment of the present invention.

Claims (10)

一種防火牆規則管理方法,適用於一伺服器依據一防火牆規則管理至少一用戶端設備存取至少一網路服務,該防火牆規則管理方法包括: 取得該至少一用戶端設備存取該伺服器登入狀態,其中該至少一用戶端設備係透過該伺服器存取該至少一網路服務;以及 依據該至少一用戶端設備的登入狀態動態調整該防火牆規則。A firewall rule management method is applicable to a server managing at least one client device to access at least one network service according to a firewall rule. The firewall rule management method includes: obtaining the at least one client device to access the server login state. The at least one client device accesses the at least one network service through the server; and dynamically adjusts the firewall rule according to the login status of the at least one client device. 如申請專利範圍第1項所述之防火牆規則管理方法,其中依據該至少一用戶端設備的登入狀態動態調整該防火牆規則的步驟包括: 若該登入狀態係登入,則取得該至少一用戶端設備對應的網路服務資訊;以及 依據該網路服務資訊設定該防火牆規則。The method for managing a firewall rule according to claim 1, wherein the step of dynamically adjusting the firewall rule according to the login status of the at least one client device comprises: obtaining the at least one client device if the login status is logged in Corresponding network service information; and setting the firewall rule according to the network service information. 如申請專利範圍第1項所述之防火牆規則管理方法,其中取得該至少一用戶端設備存取該伺服器的登入狀態的步驟包括: 判斷該至少一用戶端設備是否通過一身份認證程序; 若該至少一用戶端設備通過該身份認證程序,則該登入狀態係登入;以及 若該至少一用戶端設備未通過該身份認證程序,則該登入狀態係未登入。The method for managing a firewall rule according to claim 1, wherein the step of obtaining the login status of the at least one client device to access the server comprises: determining whether the at least one client device passes an identity authentication procedure; The at least one user equipment passes the identity authentication procedure, and the login status is logged in; and if the at least one client device fails the identity authentication procedure, the login status is not logged in. 如申請專利範圍第2項所述之防火牆規則管理方法,其中依據該網路服務資訊設定該防火牆規則的步驟包括: 將該至少一用戶端設備的位址資訊及該網路服務資訊新增至該防火牆規則,並開啟該至少一用戶端設備所屬的防火牆規則。The firewall rule management method of claim 2, wherein the step of setting the firewall rule according to the network service information comprises: adding the address information of the at least one user equipment and the network service information to The firewall rule, and the firewall rule to which the at least one client device belongs is enabled. 如申請專利範圍第2項所述之防火牆規則管理方法,其中依據該至少一用戶端設備的登入狀態動態調整該防火牆規則的步驟包括: 若該登入狀態係登出,則自該防火牆規則中移除該至少一用戶端設備相關的子規則,並關閉該至少一用戶端設備所屬的防火牆規則。The method for managing a firewall rule according to claim 2, wherein the step of dynamically adjusting the firewall rule according to the login status of the at least one client device comprises: moving the firewall rule if the login status is logged out In addition to the sub-rule associated with the at least one client device, and turning off the firewall rule to which the at least one client device belongs. 如申請專利範圍第1項所述之防火牆規則管理方法,其中該防火牆規則包括至少一子規則,而每一該子規則包括一使用者識別碼欄位,該使用者識別碼欄位對應的內容指示該子規則是專屬於一該用戶端設備;若使用者識別碼欄位內容是對應於所有用戶端設備,則表示該子規則適用於所有用戶端設備。The firewall rule management method according to claim 1, wherein the firewall rule includes at least one sub-rule, and each of the sub-rules includes a user identification code field, and the content corresponding to the user identification code field. The sub-rule is specified to be specific to the user equipment; if the user identifier field content corresponds to all the client devices, it indicates that the sub-rule is applicable to all the client devices. 如申請專利範圍第2項所述之防火牆規則管理方法,其中取得該至少一用戶端設備對應的網路服務資訊的步驟之後,更包括: 傳送該網路服務資訊;以及 該用戶端設備提供該網路服務資訊對應的功能,以存取該至少一網路服務。The method for managing a firewall rule according to claim 2, wherein after the step of obtaining the network service information corresponding to the at least one user equipment, the method further comprises: transmitting the network service information; and the user equipment provides the The function corresponding to the network service information to access the at least one network service. 如申請專利範圍第1項所述之防火牆規則管理方法,其中依據該至少一用戶端設備的登入狀態動態調整該防火牆規則的步驟之後,更包括: 若該登入狀態為登入時,則該至少一用戶端設備可透過該伺服器存取防火牆對應之網路服務;以及 若該登入狀態不為登入時,則該至少一用戶端設備無法透過該伺服器存取防火牆該至少一網路服務。The method for managing a firewall rule according to claim 1, wherein the step of dynamically adjusting the firewall rule according to the login status of the at least one client device further comprises: if the login status is a login, the at least one The client device can access the network service corresponding to the firewall through the server; and if the login status is not the login, the at least one client device cannot access the firewall to access the at least one network service through the server. 一種伺服器,依據一防火牆規則管理至少一用戶端設備存取至少一網路服務,該伺服器並包括: 一儲存單元,紀錄該防火牆規則及多個模組; 一通訊模組,存取網路;以及 一處理單元,耦接該儲存單元及該通訊模組,且存取並執行該儲存單元所儲存的該些模組,該些模組包括: 一防火牆連線模組,取得該至少一用戶端設備存取該伺服器的登入狀態,其中該至少一用戶端設備係透過該伺服器存取該至少一網路服務;以及 一防火牆功能模組,依據該至少一用戶端設備的登入狀態動態調整該防火牆規則。A server for managing at least one client device to access at least one network service according to a firewall rule, the server further comprising: a storage unit, recording the firewall rule and the plurality of modules; a communication module, accessing the network And a processing unit coupled to the storage unit and the communication module, and accessing and executing the modules stored in the storage unit, the modules comprising: a firewall connection module, obtaining the at least a client device accessing a login status of the server, wherein the at least one client device accesses the at least one network service through the server; and a firewall function module, according to the login of the at least one client device The state dynamically adjusts the firewall rules. 如申請專利範圍第9項所述之伺服器,其中 若該登入狀態為登入,則該至少一用戶端設備可透過該伺服器存取對應之網路服務;以及 若該登入狀態不為登入,則該至少一用戶端設備無法透過該伺服器存取該至少一網路服務。The server of claim 9, wherein if the login status is login, the at least one client device can access the corresponding network service through the server; and if the login status is not the login, The at least one client device cannot access the at least one network service through the server.
TW106126620A 2017-08-07 2017-08-07 Server and firewall rule management therefof TWI666567B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW106126620A TWI666567B (en) 2017-08-07 2017-08-07 Server and firewall rule management therefof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW106126620A TWI666567B (en) 2017-08-07 2017-08-07 Server and firewall rule management therefof

Publications (2)

Publication Number Publication Date
TW201911101A true TW201911101A (en) 2019-03-16
TWI666567B TWI666567B (en) 2019-07-21

Family

ID=66590471

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106126620A TWI666567B (en) 2017-08-07 2017-08-07 Server and firewall rule management therefof

Country Status (1)

Country Link
TW (1) TWI666567B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356841B2 (en) * 2000-05-12 2008-04-08 Solutioninc Limited Server and method for providing specific network services
US7343626B1 (en) * 2002-11-12 2008-03-11 Microsoft Corporation Automated detection of cross site scripting vulnerabilities
CN104104652B (en) * 2013-04-03 2017-08-18 阿里巴巴集团控股有限公司 A kind of man-machine recognition methods, network service cut-in method and corresponding equipment
TW201728124A (en) * 2014-09-16 2017-08-01 科勞簡尼克斯股份有限公司 Flexibly defined communication network controller based control, operations and management of networks

Also Published As

Publication number Publication date
TWI666567B (en) 2019-07-21

Similar Documents

Publication Publication Date Title
US10581827B2 (en) Using application level authentication for network login
CN112913208B (en) Multi-tenant identity cloud service with in-house deployed authentication integration and bridge high availability
CN106716404B (en) Proxy server in computer subnet
EP2856702B1 (en) Policy service authorization and authentication
US8528058B2 (en) Native use of web service protocols and claims in server authentication
US8769128B2 (en) Method for extranet security
US8713665B2 (en) Systems, methods, and media for firewall control via remote system information
JP5296726B2 (en) Web content providing system, web server, content providing method, and programs thereof
JP5743786B2 (en) Server apparatus, information processing method, and program
CN101841537A (en) Method and system for realizing file sharing access control based on protocol proxy
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
US10484433B2 (en) Virtual communication endpoint services
KR101556619B1 (en) System and method for sharing login status between an application platform and an application
US9325685B2 (en) Authentication switch and network system
JP2007310512A (en) Communication system, service providing server, and user authentication server
JP2018502394A (en) Computer-readable storage medium for legacy integration and method and system for using the same
CN111049946A (en) Portal authentication method, Portal authentication system, electronic equipment and storage medium
JP2008015733A (en) Log management computer
US10158624B2 (en) System, device and method for monitoring network
US9590990B2 (en) Assigning user requests of different types or protocols to a user by trust association interceptors
JP2015505626A (en) Integrate server applications with many authentication providers
TW201911101A (en) Server and firewall rule management therefof
JP2007272689A (en) Online storage authentication system, online storage authentication method, and online storage authentication program
US9231930B1 (en) Virtual endpoints for request authentication
US9159078B2 (en) Managing identifiers