WO2020042471A1 - Firewall policy verification method, system and device, and readable storage medium - Google Patents

Firewall policy verification method, system and device, and readable storage medium Download PDF

Info

Publication number
WO2020042471A1
WO2020042471A1 PCT/CN2018/122804 CN2018122804W WO2020042471A1 WO 2020042471 A1 WO2020042471 A1 WO 2020042471A1 CN 2018122804 W CN2018122804 W CN 2018122804W WO 2020042471 A1 WO2020042471 A1 WO 2020042471A1
Authority
WO
WIPO (PCT)
Prior art keywords
firewall policy
policy verification
source host
verification request
verification
Prior art date
Application number
PCT/CN2018/122804
Other languages
French (fr)
Chinese (zh)
Inventor
翟士才
马晓龙
朱皓
祁明远
李林鸽
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020042471A1 publication Critical patent/WO2020042471A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet

Definitions

  • This application provides a firewall policy verification method, system, device, and computer-readable storage medium.
  • the front end of this application verifies a monitored firewall policy verification request, and after the firewall policy verification request passes the verification, the firewall
  • the policy verification request is sent to the background server.
  • the background server performs remote login operations on each source host in the firewall policy verification request. After the remote login is successful, the firewall policy in the firewall policy verification request is sent to the corresponding source host for verification.
  • step S101 includes:
  • the firewall policy verification system of the present application is a virtual system, which is stored in the memory 1005 of the firewall policy verification device shown in FIG. 1 and is used to implement all functions of the readable instructions of the firewall policy verification.
  • the firewall policy verification request is verified, and when the firewall policy verification request passes the verification, the firewall policy verification request is sent to a background server; the firewall policy verification request sent by the front end is received, and the firewall policy is verified.
  • Each source host in the verification request performs a remote login operation; after each source host in the firewall policy verification request is successfully remotely logged in, the background server sends the firewall policy in the firewall policy verification request to the corresponding source host for verification.
  • remote login module 201 is further configured to:
  • front end further includes:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present application provides a firewall policy verification method, system and device, and a readable storage medium. The method comprises: when a front end monitors a firewall policy verification request, the front end checking the firewall policy verification request, and sending, when the firewall policy verification request passes the check, the firewall policy verification request to a background server; the background server receiving the firewall policy verification request sent by the front end, and executing a remote log-in operation on source hosts in the firewall policy verification request; and when the source hosts in the firewall policy verification request are successfully remotely logged into, the background server sending firewall policies in the firewall policy verification request to corresponding source hosts for verification. The present application can effectively improve the convenience of verifying a firewall policy and reduce wastage of background resources.

Description

防火墙策略验证方法、系统、设备及可读存储介质  Firewall policy verification method, system, device and readable storage medium Ranch
本申请要求于2018年8月31日提交中国专利局、申请号为201811008170.9、发明名称为“防火墙策略验证方法、系统、设备及可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on August 31, 2018, with an application number of 201811008170.9, and an invention name of "Firewall Policy Verification Method, System, Device, and Readable Storage Medium". Citations are incorporated in the application.
技术领域Technical field
本申请涉及信息网络安全的技术领域,尤其涉及一种防火墙策略验证方法、系统、设备及计算机可读存储介质。The present application relates to the technical field of information network security, and in particular, to a firewall policy verification method, system, device, and computer-readable storage medium.
背景技术Background technique
随着网络技术的快速发展,越来越多的企业利用网络实现人员管理、产品销售和业务咨询等,为实现上述功能,各公司需要搭建多个服务器,为提高企业内部的网络信息安全,需要对防火墙上的策略进行验证,即防火墙策略验证,具体指在企业系统生产环境中,不同服务间相互访问时,通过登陆服务器,输入验证指令验证被访问服务所设置的防火墙策略,然后返回防火墙是否验证通过的结果,确认两项服务间是否具备访问和被访问权限。With the rapid development of network technology, more and more enterprises use the network to implement personnel management, product sales, and business consulting. In order to achieve the above functions, companies need to build multiple servers. In order to improve the network information security within the enterprise, Verify the policies on the firewall, that is, firewall policy verification. Specifically, in the production environment of an enterprise system, when different services access each other, log in to the server and enter the verification instructions to verify the firewall policy set by the accessed service, and then return whether the firewall The result of the verification is to confirm whether the two services have access and access rights.
目前,现有的防火墙策略验证是验证人员通过测试工具手动输入待验证主机的IP,然而,当需要验证策略的主机较多时,需要手动登录不同的服务器,或者在同一服务器上逐一验证需要访问的多台主机或多个服务,十分繁琐,不便于防火墙策略的验证,此外,用户可在页面随意输入,并且调用后台程序,浪费后台资源。At present, the existing firewall policy verification is that the verifier manually enters the IP of the host to be verified through the test tool. However, when there are many hosts that need to be verified, they need to manually log in to different servers, or verify the access required on the same server one by one. Multiple hosts or multiple services are cumbersome and difficult to verify firewall policies. In addition, users can input on the page at will and call background programs, wasting background resources.
因此,如何提高防火墙策略验证的便利性和减少后台资源的浪费是目前亟待解决的问题。Therefore, how to improve the convenience of firewall policy verification and reduce the waste of background resources is an urgent problem to be solved.
发明内容Summary of the Invention
本申请的主要目的在于提供一种防火墙策略验证方法、系统、设备及计算机可读存储介质,旨在提高防火墙策略验证的便利性和避免后台资源的浪费。The main purpose of this application is to provide a firewall policy verification method, system, device, and computer-readable storage medium, which aims to improve the convenience of firewall policy verification and avoid waste of background resources.
为实现上述目的,本申请提供一种防火墙策略验证方法,所述防火墙策略验证方法包括以下步骤:To achieve the above object, the present application provides a firewall policy verification method. The firewall policy verification method includes the following steps:
当前端监测到防火墙策略验证请求时,所述前端对所述防火墙策略验证请求进行校验,并在所述防火墙策略验证请求通过校验时,将所述防火墙策略验证请求发送至后台服务器;When the front end detects a firewall policy verification request, the front end checks the firewall policy verification request, and sends the firewall policy verification request to a background server when the firewall policy verification request passes the verification;
所述后台服务器接收所述前端发送的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;Receiving, by the background server, a firewall policy verification request sent by the front end, and performing a remote login operation on each source host in the firewall policy verification request;
当所述防火墙策略验证请求中的各源主机远程登录成功后,所述后台服务器将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。After each source host in the firewall policy verification request is successfully logged in remotely, the background server sends the firewall policy in the firewall policy verification request to the corresponding source host for verification.
此外,为实现上述目的,本申请还提供一种防火墙策略验证系统,所述防火墙策略验证系统包括:前端和后台服务器,所述前端包括校验模块,所述后台服务器包括远程登录模块和策略验证模块,其中,In addition, in order to achieve the above purpose, the present application also provides a firewall policy verification system. The firewall policy verification system includes a front-end and a background server, the front-end includes a verification module, and the background server includes a remote login module and policy verification Module, where
所述校验模块,用于当前端监测到防火墙策略验证请求时,对所述防火墙策略验证请求进行校验,并在所述防火墙策略验证请求通过校验时,将所述防火墙策略验证请求发送至后台服务器;The verification module is configured to verify the firewall policy verification request when the front end detects a firewall policy verification request, and send the firewall policy verification request when the firewall policy verification request passes the verification. To the background server;
所述远程登录模块,用于所述接收所述前端发送的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;The remote login module is configured to receive the firewall policy verification request sent by the front end, and perform a remote login operation on each source host in the firewall policy verification request;
所述策略验证模块,用于当所述防火墙策略验证请求中的各源主机远程登录成功后,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。The policy verification module is configured to send a firewall policy in the firewall policy verification request to a corresponding source host for verification after each source host in the firewall policy verification request is successfully logged in remotely.
此外,为实现上述目的,本申请还提供一种防火墙策略验证设备,所述防火墙策略验证设备包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的防火墙策略验证可读指令,其中所述防火墙策略验证可读指令被所述处理器执行时,实现以下步骤:In addition, in order to achieve the above object, the present application also provides a firewall policy verification device, which includes a processor, a memory, and a firewall policy verification stored in the memory and executable by the processor. Read instructions, wherein when the firewall policy verifies that the readable instructions are executed by the processor, the following steps are implemented:
接收前端发送的通过校验的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;Receiving a verified firewall policy verification request sent by the front end, and performing a remote login operation on each source host in the firewall policy verification request;
当所述防火墙策略验证请求中的各源主机远程登录成功后,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。After each source host in the firewall policy verification request is successfully logged in remotely, the firewall policy in the firewall policy verification request is sent to the corresponding source host for verification.
此外,为实现上述目的,本申请还提供一种可读存储介质,所述可读存储介质上存储有防火墙策略验证可读指令,其中所述防火墙策略验证可读指令被处理器执行时,实现以下步骤:In addition, in order to achieve the above object, the present application further provides a readable storage medium, where the readable storage medium stores a firewall policy verification readable instruction, and when the firewall policy verification readable instruction is executed by a processor, The following steps:
接收前端发送的通过校验的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;Receiving a verified firewall policy verification request sent by the front end, and performing a remote login operation on each source host in the firewall policy verification request;
当所述防火墙策略验证请求中的各源主机远程登录成功后,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。After each source host in the firewall policy verification request is successfully logged in remotely, the firewall policy in the firewall policy verification request is sent to the corresponding source host for verification.
本申请提供一种防火墙策略验证方法、系统、设备及计算机可读存储介质,本申请前端对监测到的防火墙策略验证请求进行校验,并在该防火墙策略验证请求通过校验之后,将该防火墙策略验证请求发送至后台服务器,由后台服务器对防火墙策略验证请求中的各源主机执行远程登录操作,并在远程登录成功后,将防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证,由于前端将防火墙策略验证请求发送至后台服务器之前,对防火墙策略验证请求进行校验,且当防火墙策略验证请求通过校验,才能发送给后台服务器,有效的减少后台资源的浪费,同时后台服务器可对各源主机自动执行远程登录操作,不需要用户手动登录不同的服务器,也不需要在同一服务器上逐一验证需要访问的多台主机或多个服务,有效的提高防火墙策略验证的便利性。This application provides a firewall policy verification method, system, device, and computer-readable storage medium. The front end of this application verifies a monitored firewall policy verification request, and after the firewall policy verification request passes the verification, the firewall The policy verification request is sent to the background server. The background server performs remote login operations on each source host in the firewall policy verification request. After the remote login is successful, the firewall policy in the firewall policy verification request is sent to the corresponding source host for verification. Because the front-end sends a firewall policy verification request to the background server, the firewall policy verification request is verified, and only when the firewall policy verification request passes the verification can it be sent to the background server, which effectively reduces the waste of background resources, and the background server can Automatically perform remote login operations on each source host, eliminating the need for users to manually log in to different servers, or verifying multiple hosts or services that need to be accessed one by one on the same server, effectively improving the convenience of firewall policy verification
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为本申请各实施例涉及的防火墙策略验证设备的硬件结构示意图;FIG. 1 is a schematic diagram of a hardware structure of a firewall policy verification device according to embodiments of the present application;
图2为本申请防火墙策略验证方法第一实施例的流程示意图;2 is a schematic flowchart of a first embodiment of a firewall policy verification method of the present application;
图3为本申请第三实施例中步骤S101的细化流程示意图;3 is a detailed flowchart of step S101 in a third embodiment of the present application;
图4为本申请防火墙策略验证系统第一实施例的功能模块示意图。FIG. 4 is a functional module diagram of a first embodiment of a firewall policy verification system of the present application.
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The implementation, functional features and advantages of the purpose of this application will be further described with reference to the embodiments and the drawings.
具体实施方式detailed description
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。It should be understood that the specific embodiments described herein are only used to explain the application, and are not used to limit the application.
本申请实施例涉及的防火墙策略验证方法主要应用于防火墙策略验证设备,该防火墙策略验证设备可以是PC(个人计算机personal computer)、便携计算机、移动终端等具有显示和处理功能的设备。The firewall policy verification method according to the embodiment of the present application is mainly applied to a firewall policy verification device. The firewall policy verification device may be a PC (personal computer personal). computer), portable computers, mobile terminals and other devices with display and processing functions.
参照图1,图1为本申请实施例方案中涉及的防火墙策略验证设备的硬件结构示意图。本申请实施例中,防火墙策略验证设备可以包括处理器1001(例如中央处理器Central Processing Unit、CPU),通信总线1002,用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信;用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard);网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口);存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器,存储器1005可选的还可以是独立于前述处理器1001的存储系统。本领域技术人员可以理解,图1中示出的硬件结构并不构成对本申请的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Referring to FIG. 1, FIG. 1 is a schematic diagram of a hardware structure of a firewall policy verification device involved in a solution according to an embodiment of the present application. In the embodiment of the present application, the firewall policy verification device may include a processor 1001 (for example, a central processor Central Processing Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, and memory 1005. The communication bus 1002 is used to implement connection and communication between these components. The user interface 1003 may include a display and an input unit such as a keyboard. The network interface 1004 may optionally include a standard wired interface and a wireless interface. (Such as the WI-FI interface); the memory 1005 can be a high-speed RAM memory or a stable memory (non-volatile memory), for example, disk memory, the memory 1005 may optionally be a storage system independent of the foregoing processor 1001. Those skilled in the art can understand that the hardware structure shown in FIG. 1 does not constitute a limitation on the present application, and may include more or fewer components than shown in the figure, or combine some components, or arrange different components.
继续参照图1,图1中作为一种可读存储介质的存储器1005可以包括操作系统、网络通信模块以及防火墙策略验证可读指令。在图1中,网络通信模块主要用于连接服务器,与服务器进行数据通信;而处理器1001可以调用存储器1005中存储的防火墙策略验证可读指令,并执行本申请实施例提供的防火墙策略验证方法。With continued reference to FIG. 1, the memory 1005 as a readable storage medium in FIG. 1 may include an operating system, a network communication module, and a firewall policy verification readable instruction. In FIG. 1, the network communication module is mainly used to connect to a server and perform data communication with the server; and the processor 1001 can call the firewall policy verification readable instructions stored in the memory 1005 and execute the firewall policy verification method provided in the embodiment of the present application. .
本申请实施例提供了一种防火墙策略验证方法。The embodiment of the present application provides a method for verifying a firewall policy.
参照图2,图2为本申请防火墙策略验证方法第一实施例的流程示意图。Referring to FIG. 2, FIG. 2 is a schematic flowchart of a first embodiment of a firewall policy verification method of the present application.
本实施例中,该防火墙策略验证方法包括以下步骤:In this embodiment, the method for verifying a firewall policy includes the following steps:
步骤S101,当前端监测到防火墙策略验证请求时,前端对防火墙策略验证请求进行校验,并在防火墙策略验证请求通过校验时,将防火墙策略验证请求发送至后台服务器;Step S101: When the front end detects a firewall policy verification request, the front end checks the firewall policy verification request, and when the firewall policy verification request passes the verification, sends the firewall policy verification request to the background server;
步骤S102,后台服务器接收前端发送的防火墙策略验证请求,并对防火墙策略验证请求中的各源主机执行远程登录操作;Step S102: The background server receives the firewall policy verification request sent by the front end, and performs a remote login operation on each source host in the firewall policy verification request;
步骤S103,当防火墙策略验证请求中的各源主机远程登录成功后,后台服务器将防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。In step S103, after each source host in the firewall policy verification request is successfully logged in remotely, the background server sends the firewall policy in the firewall policy verification request to the corresponding source host for verification.
目前,现有的防火墙策略验证是验证人员通过测试工具手动输入待验证主机的IP,然而,当需要验证策略的主机较多时,需要手动登录不同的服务器,或者在同一服务器上逐一验证需要访问的多台主机或多个服务,十分繁琐,不便于防火墙策略的验证,此外,用户可在页面随意输入,并且调用后台程序,浪费后台资源。考虑到上述问题,本实施例中提出一种防火墙策略验证方法,以下详细介绍防火墙策略验证方法的具体步骤:At present, the existing firewall policy verification is that the verifier manually enters the IP of the host to be verified through the test tool. However, when there are many hosts that need to be verified, they need to manually log in to different servers, or verify the access to the same server one by one Multiple hosts or multiple services are cumbersome and difficult to verify firewall policies. In addition, users can input on the page at will and call background programs, wasting background resources. In view of the above problems, a firewall policy verification method is proposed in this embodiment. The specific steps of the firewall policy verification method are detailed below:
步骤S101,当前端监测到防火墙策略验证请求时,前端对防火墙策略验证请求进行校验,并在防火墙策略验证请求通过校验时,将防火墙策略验证请求发送至后台服务器;Step S101: When the front end detects a firewall policy verification request, the front end checks the firewall policy verification request, and when the firewall policy verification request passes the verification, sends the firewall policy verification request to the background server;
本实施例中,通过前端页面接收用户输入的主机信息,前端接收到用户输入的主机信息后,触发携带有该主机信息的防火墙策略验证请求,其中,该主机信息包括但不限于源主机IP、目标主机IP和端口。当前端监测到防火墙策略验证请求时,前端对该防火墙策略验证请求进行校验,并在该防火墙策略验证请求通过校验时,将该防火墙策略验证请求发送至后台服务器,而在该防火墙策略验证请求未通过校验时,前端显示提醒信息。具体实施中,可以利用上传附件的方式输入防火墙策略,即上传防火墙策略文件,对防火墙策略文件进行解析得到防火墙策略,利用附件上传的方式输入防火墙策略,可以避免手工输入较多的防火墙策略,提高防火墙策略的输入便利性。其中,校验对象包括但不限于该防火墙策略验证请求中的防火墙策略文件、防火墙策略文件中的主机信息,即源主机IP、目标主机IP和端口。In this embodiment, the host information input by the user is received through the front-end page. After receiving the host information input by the user, the front-end triggers a firewall policy verification request carrying the host information. The host information includes, but is not limited to, the source host IP, Target host IP and port. When the front end detects a firewall policy verification request, the front end verifies the firewall policy verification request, and when the firewall policy verification request passes the verification, sends the firewall policy verification request to a background server, and the firewall policy verification When the request fails the verification, the front end displays a reminder message. In specific implementation, the firewall policy can be input by uploading attachments, that is, uploading the firewall policy file, analyzing the firewall policy file to obtain the firewall policy, and entering the firewall policy by uploading the attachment, which can avoid manually entering more firewall policies and improve Ease of entering firewall policies. The verification object includes, but is not limited to, a firewall policy file in the firewall policy verification request, and host information in the firewall policy file, that is, a source host IP, a destination host IP, and a port.
具体地,如果该防火墙策略验证请求中不存在防火墙策略文件,则前端从该防火墙策略验证请求中直接获取主机信息,并对该主机信息进行分类,然后按照类别对应的校验规则对各类主机信息进行校验,具体为对源主机IP和目标主机IP的类型校验,即通过正则表达式校验输入的信息是否为IP,如果输入的信息不为IP,则校验不通过,如果输入的信息为IP,则校验通过;对端口进行非空校验和数字类型校验,即校验输入的端口的数据类型是否为数字,是否未输入端口,如果未输入端口,或者输入的端口的类型不为数字,则校验不通过,如果输入的端口为数字,则校验通过;物理主机和云主机校验,即校验用户是否至少选择物理主机防火墙验证和云主机防火墙验证中的一个,用户均为选择物理主机防火墙验证和云主机防火墙验证时,校验不通过。其中,用户可通过前端输入多个应用IP,即用户按照与后台服务器约定的分隔字符输入各应用IP,得到携带有多个应用IP的字符串,后台服务器接收到该字符串之后,通过约定的分隔字符将该字符串分割为单个IP,并通过正则表达式校验每个IP。Specifically, if there is no firewall policy file in the firewall policy verification request, the front end directly obtains the host information from the firewall policy verification request, classifies the host information, and then classifies various types of hosts according to the verification rules corresponding to the category. The information is verified, specifically the type verification of the source host IP and the destination host IP, that is, the regular information is used to verify whether the entered information is IP. If the entered information is not IP, the verification fails. If the information is IP, the check is passed; the port is checked for non-null and digital type check, that is, check whether the data type of the input port is digital, whether the port is not entered, if the port is not entered, or the port is entered If the type is not a number, the verification fails. If the input port is a number, the verification passes; the physical host and cloud host verification, that is, whether the user selects at least the physical host firewall verification and the cloud host firewall verification. One, when the user selects both physical host firewall verification and cloud host firewall verification, the verification fails. Among them, the user can input multiple application IPs through the front end, that is, the user enters each application IP according to the separated characters agreed with the background server to obtain a string carrying multiple application IPs. After the background server receives the string, The delimiter character splits the string into a single IP and verifies each IP with a regular expression.
进一步地,在校验的过程中,还可以对后台服务的防火墙策略验证过程进行校验,具体为前端读取预设存储区域中的后台服务器状态值,并依据该后台服务器状态值,确定后台服务器的状态,即当该后台服务器状态值为“0”时,后台服务器的状态为空闲状态,当该后台服务器状态值为“1”时,后台服务器的状态为防火墙验证状态;如果后台服务器的状态为防火墙策略验证状态,则锁定前端的页面提交按钮,并当监测到后台服务器的状态为由防火墙策略验证状态转变为空闲状态,则解锁前端的页面提交按钮。通过防火墙验证过程校验,防止用户重复提交防火墙策略,给后台服务器增加工作量的同时降低效率(由于需要验证的防火墙策略较多,后台服务器需要较长的处理时间)。Further, during the verification process, the firewall policy verification process of the background service can also be verified. Specifically, the front end reads the background server status value in a preset storage area, and determines the background based on the background server status value. The status of the server, that is, when the status value of the background server is "0", the status of the background server is idle. When the status value of the background server is "1", the status of the background server is the firewall verification status. When the status is the firewall policy verification status, the page submission button on the front end is locked, and when it is detected that the status of the background server changes from the firewall policy verification status to the idle status, the front page submission button is unlocked. The verification through the firewall verification process prevents users from repeatedly submitting firewall policies, which increases the workload on the background server and reduces efficiency (due to the many firewall policies that need to be verified, the background server requires longer processing time).
步骤S102,后台服务器接收前端发送的防火墙策略验证请求,并对防火墙策略验证请求中的各源主机执行远程登录操作;Step S102: The background server receives the firewall policy verification request sent by the front end, and performs a remote login operation on each source host in the firewall policy verification request;
本实施例中,该后台服务器接收前端发送的防火墙策略验证请求,并该对防火墙策略验证请求中的各源主机执行远程登录操作。其中,各源主机的远程登录操作的具体方式可以为远程免密登录和远程调用密码登录。In this embodiment, the background server receives a firewall policy verification request sent by the front end, and performs a remote login operation on each source host in the firewall policy verification request. The specific method of remote login operation of each source host may be remote password-free login and remote call password login.
远程免密登录为设置一服务主机,通过该服务主机管理所有主机和服务,实现对管理的所有主机和服务的远程免密登录,具体为获取服务主机的密钥信息,并调用云接口向各源主机推送预设脚本和该密钥信息,由各源主机执行预设脚本,检测各源主机的配置文件中是否存在该密钥信息,如果源主机的配置文件中存在该密钥信息,则删除预设脚本,如果源主机的配置文件中不存在该密钥信息,则将该密钥信息写入配置文件中,使得各源主机的信任列表中存在服务主机,通过该登录信息列表和服务主机的密钥信息即可远程免密登录各源主机,不需要手动登录不同的服务器,可有效的提高防火墙策略验证的便利性。Remote password-free login is to set up a service host, through which all hosts and services are managed, to achieve remote password-free login to all managed hosts and services, specifically to obtain the key information of the service host, and call the cloud interface to each The source host pushes the preset script and the key information, and each source host executes the preset script to detect whether the key information exists in the configuration file of each source host. If the key information exists in the configuration file of the source host, then Delete the preset script. If the key information does not exist in the configuration file of the source host, write the key information into the configuration file, so that the service host exists in the trust list of each source host. The key information of the host can remotely and secretly log in to each source host without the need to manually log in to different servers, which can effectively improve the convenience of firewall policy verification.
远程调用密码登录为各源主机在搭建注册时,均分配有对应的logop用户密码,即登录密码,后台服务器在接收到防火墙策略验证请求时,通过拼接URL的方式调用接口,获取各源主机的登录密码,并利用该登录密码通过指定密码的方式远程登录各源主机,即将携带有IP和登录密码的指令发送至对应的源主机,以远程登录各源主机,不需要手动登录不同的服务器,可有效的提高防火墙策略验证的便利性。When remote source password login is used, each source host is assigned the corresponding logop user password when it is set up for registration, that is, the login password. When the background server receives the firewall policy verification request, it calls the interface by splicing the URL to obtain the source host ’s Login password, and use the login password to remotely log in to each source host by specifying the password. That is, send the instruction carrying the IP and login password to the corresponding source host, and remotely log in to each source host without manually logging in to a different server. Can effectively improve the convenience of firewall policy verification.
步骤S103,当防火墙策略验证请求中的各源主机远程登录成功后,后台服务器将防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。In step S103, after each source host in the firewall policy verification request is successfully logged in remotely, the background server sends the firewall policy in the firewall policy verification request to the corresponding source host for verification.
本实施例中,当防火墙策略验证请求中的各源主机远程登录成功后,后台服务器将该防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证,即各源主机在接收到防火墙策略时,执行telnet验证指令,得到防火墙策略验证结果,即源主机到目标主机是否连通,且各源主机将防火墙策略验证结果返回给该后台服务器,如果防火墙策略验证请求中的各源主机远程登录失败,则向前端发送提醒信息,其中,防火墙策略验证结果包括但不限于连通和未连通,该后台服务器接收各源主机返回的防火墙策略验证结果,并将该防火墙策略验证结果发送至前端,由前端显示防火墙策略验证结果。In this embodiment, after each source host in the firewall policy verification request is successfully logged in remotely, the background server sends the firewall policy in the firewall policy verification request to the corresponding source host for verification, that is, when each source host receives the firewall policy, , Execute the telnet verification instruction to get the firewall policy verification result, that is, whether the source host is connected to the target host, and each source host returns the firewall policy verification result to the background server. If the remote login of each source host in the firewall policy verification request fails, Then send a reminder message to the front end, wherein the firewall policy verification result includes but is not limited to connected and unconnected, the background server receives the firewall policy verification result returned by each source host, and sends the firewall policy verification result to the front end, which is displayed by the front end Firewall policy verification results.
进一步地,该后台服务器接收该各源主机返回的防火墙策略验证结果,并将防火墙策略验证结果发送至前端,由该前端按照预设筛选条件,对防火墙策略验证结果进行筛选,并显示筛选后的防火墙策略验证结果。需要说明的是,上述预设筛选条件可由本领域技术人员基于实际情况进行设置,本实施例对此不作具体限定。本实施例提供防火墙策略验证结果筛选功能,有效的提高防火墙策略验证结果的利用率。具体实施中,对于element自带的分页和筛选标签来说,筛选结果只能对当前页的防火墙策略验证结果进行筛选,为此在筛选防火墙策略验证结果之前,备份全部防火墙策略验证结果,而在筛选防火墙策略验证结果的过程中,如果前端分页显示防火墙策略验证结果,则以备份的防火墙策略验证结果为筛选对象,执行筛选操作,可实现对全部防火墙策略验证结果的筛选。Further, the background server receives the firewall policy verification results returned by the source hosts, and sends the firewall policy verification results to the front end, and the front end filters the firewall policy verification results according to preset filtering conditions, and displays the filtered results. Firewall policy verification results. It should be noted that the foregoing preset screening conditions can be set by those skilled in the art based on actual conditions, and this embodiment does not specifically limit this. This embodiment provides a filtering function for firewall policy verification results, which effectively improves the utilization rate of firewall policy verification results. In specific implementation, for the paging and filtering labels that element comes with, the filtering result can only filter the firewall policy verification results of the current page. For this reason, before filtering the firewall policy verification results, back up all the firewall policy verification results. In the process of filtering the firewall policy verification results, if the front-end page displays the firewall policy verification results, the backup firewall policy verification results are used as the filtering object and the filtering operation is performed to realize the filtering of all firewall policy verification results.
本实施例中,本申请前端对监测到的防火墙策略验证请求进行校验,并在该防火墙策略验证请求通过校验之后,将该防火墙策略验证请求发送至后台服务器,由后台服务器对防火墙策略验证请求中的各源主机执行远程登录操作,并在远程登录成功后,将防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证,由于前端将防火墙策略验证请求发送至后台服务器之前,对防火墙策略验证请求进行校验,且当防火墙策略验证请求通过校验,才能发送给后台服务器,有效的减少后台资源的浪费,同时后台服务器可对各源主机自动执行远程登录操作,不需要用户手动登录不同的服务器,也不需要在同一服务器上逐一验证需要访问的多台主机或多个服务,有效的提高防火墙策略验证的便利性。In this embodiment, the front end of the present application verifies the monitored firewall policy verification request, and after the firewall policy verification request passes the verification, sends the firewall policy verification request to the background server, and the background server verifies the firewall policy. Each source host in the request performs a remote login operation, and after the remote login is successful, the firewall policy in the firewall policy verification request is sent to the corresponding source host for verification. Because the front end sends the firewall policy verification request to the background server, the firewall The policy verification request is verified, and when the firewall policy verification request passes the verification, it can be sent to the background server, which effectively reduces the waste of background resources. At the same time, the background server can automatically perform remote login operations on each source host, without the need for users to manually log in. Different servers do not need to authenticate multiple hosts or services that need to be accessed one by one on the same server, which effectively improves the convenience of firewall policy verification.
进一步地,基于上述第一实施例提出了本申请防火墙策略验证方法的第二实施例,与前述实施例的区别在于,该步骤S102包括:Further, a second embodiment of the firewall policy verification method of the present application is proposed based on the first embodiment. The difference from the foregoing embodiment is that this step S102 includes:
步骤a1,后台服务器获取服务主机的密钥信息,并将预设脚本和密钥信息推送至防火墙策略验证请求中的各源主机;Step a1: The background server obtains the key information of the service host, and pushes the preset script and key information to each source host in the firewall policy verification request;
本实施例中,设置一服务主机,通过该服务主机管理所有主机和服务,实现对管理的所有主机和服务的远程免密登录,当后台服务接收到前端发送的防火墙策略验证请求时,该后台服务器获取服务主机的密钥信息,并调用云接口将预设脚本和密钥信息推送至防火墙策略验证请求中的各源主机。其中,该预设脚本用于检测源主机的配置文件中是否已有服务主机的密钥信息,如果源主机的配置文件中已有该服务主机的密钥信息,则自动删除该预设脚本,如果源主机的配置文件中没有该服务主机的密钥信息,则将该服务主机的密钥信息写入源主机的配置文件中。In this embodiment, a service host is provided, and all hosts and services are managed by the service host, so as to achieve remote password-free login to all managed hosts and services. When the background service receives a firewall policy verification request sent by the front end, the background The server obtains the key information of the service host, and calls the cloud interface to push the preset script and key information to each source host in the firewall policy verification request. The preset script is used to detect whether the key information of the service host already exists in the configuration file of the source host. If the key information of the service host already exists in the configuration file of the source host, the preset script is automatically deleted. If the key information of the service host is not included in the configuration file of the source host, the key information of the service host is written into the configuration file of the source host.
步骤a2,由各源主机执行所述预设脚本,将所述密钥信息写入各源主机的配置文件中,并向后台服务器返回脚本执行结果;Step a2: Each source host executes the preset script, writes the key information into a configuration file of each source host, and returns a script execution result to a background server;
本实施例中,各源主机在接收到预设脚本之后,执行该预设脚本,将该服务主机的密钥信息写入各源主机的配置文件中,并向后台服务器返回脚本执行结果,即各源主机的配置文件中均已有服务主机的密钥信息。其中,各源主机的配置文件中均已有服务主机的密钥信息之后,各源主机的信任列表中存在服务主机,即后台服务端可通过服务主机的密钥信息免密远程登录各源主机。In this embodiment, after receiving the preset script, each source host executes the preset script, writes the key information of the service host into the configuration file of each source host, and returns the script execution result to the background server, that is, The key information of the service host already exists in the configuration file of each source host. After the source host's key information is included in the configuration file of each source host, the service host exists in the trust list of each source host, that is, the background server can remotely log in to each source host through the key information of the service host. .
步骤a3,当接收到各源主机返回的脚本执行结果时,对各源主机执行免密登录认证,并在各源主机的免密登录认证通过时,登录各源主机。Step a3: When receiving the script execution result returned by each source host, perform a password-free login authentication on each source host, and log in to each source host when the password-free login authentication of each source host passes.
本实施例中,当后台服务器接收到各源主机返回的脚本执行结果时,对各源主机执行免密登录认证,并在各源主机的免密登录认证通过时,登录各源主机,即后台服务器将服务主机的密钥信息发送至各源主机,各源主机将配置文件中的密钥信息与接收到的服务主机的密钥信息进行比较,如果两者相同,则免密登录认证通过,如果两者不相同,则免密登录认证未通过。In this embodiment, when the background server receives the script execution result returned by each source host, it performs a password-free login authentication on each source host, and when the password-free login authentication of each source host passes, it logs in to each source host, that is, the background The server sends the key information of the service host to each source host, and each source host compares the key information in the configuration file with the key information of the received service host. If the two are the same, the password-free login authentication passes. If the two are not the same, the password-free login authentication fails.
进一步地,远程登录操作还可以为后台服务器调用预设接口,获取防火墙策略验证请求中各源主机的登录密码,并将防火墙策略验证请求中各源主机的登录密码发送至对应的源主机,以远程登录各源主机,即各源主机接收后台服务器发送的登录密码,并对该登录密码进行验证,如果验证通过,则允许远程登录,如果验证未通过,则不允许远程登录,通过上述方式可有效的提高防火墙策略的验证效率。Further, the remote login operation can also call a preset interface for the background server to obtain the login password of each source host in the firewall policy verification request, and send the login password of each source host in the firewall policy verification request to the corresponding source host, Remotely log in to each source host, that is, each source host receives the login password sent by the background server and verifies the login password. If the verification is passed, remote login is allowed. If the verification fails, remote login is not allowed. Effectively improve the efficiency of firewall policy verification.
本实施例中,通过设置一服务主机管理所有主机和服务,实现对管理的所有主机和服务的免密远程登录,可对要测定的源主机的防火墙策略同时验证,有效的提高防火墙策略的验证便利性和效率。In this embodiment, by setting a service host to manage all hosts and services, a password-free remote login to all managed hosts and services can be achieved, and the firewall policies of the source hosts to be measured can be verified at the same time, effectively improving the firewall policy verification. Convenience and efficiency.
进一步地,参照图3,基于上述第一或第二实施例,提出了本申请防火墙策略验证方法的第三实施例,与前述实施例的区别在于,步骤S101包括:Further, referring to FIG. 3, based on the above first or second embodiment, a third embodiment of a firewall policy verification method of the present application is proposed. The difference from the foregoing embodiment is that step S101 includes:
步骤S1011,前端确定防火墙策略验证请求中是否存在防火墙策略文件;Step S1011, the front end determines whether a firewall policy file exists in the firewall policy verification request;
本实施例中,用户通过附件上传的方式输入防火墙策略,即通过前端页面上传防火墙策略文件,从而触发携带有防火墙策略文件的防火墙策略验证请求。在执行校验的过程中,前端可以先确定防火墙策略验证请求中是否存在防火墙策略文件,如果该防火墙策略验证请求不存在防火墙策略文件,则不需要执行防火墙策略文件的校验操作,即直接对防火墙策略验证请求中的防火墙策略进行校验。In this embodiment, a user enters a firewall policy by uploading an attachment, that is, uploading a firewall policy file through a front-end page, thereby triggering a firewall policy verification request carrying a firewall policy file. In the process of performing the verification, the front end may first determine whether a firewall policy file exists in the firewall policy verification request. If the firewall policy verification request does not exist, there is no need to perform a verification operation of the firewall policy file, that is, directly The firewall policy in the firewall policy verification request is verified.
步骤S1012,若防火墙策略验证请求中存在防火墙策略文件,则前端对防火墙策略验证请求中的防火墙策略文件进行校验;Step S1012: if a firewall policy file exists in the firewall policy verification request, the front end checks the firewall policy file in the firewall policy verification request;
本实施例中,如果防火墙策略验证请求中存在防火墙策略文件,则前端对防火墙策略验证请求中的防火墙策略文件进行校验,具体地,从该防火墙策略验证请求中获取该防火墙策略文件的属性信息,包括但不限于文件格式和文件字节数,并判断该属性信息中的文件格式是否为预设格式,即获取该属性信息中的文件名,并对该文件名进行分割,得到文件后缀类型,然后判断该文件后缀类型是否为预设类型,如果该文件后缀类型为预设类型,则确定该属性信息中的文件格式为预设格式,如果该文件后缀类型不为预设类型,则确定该属性信息中的文件格式不为预设格式,如果该属性信息中的文件格式为预设格式,则前端判断该属性信息中的文件字节数是否小于或等于预设阈值,如果属性信息中的文件字节数小于或等于预设阈值,则确定防火墙策略文件通过校验,否则确定防火墙策略文件未通过校验。如果该属性信息中的文件格式不为预设格式,则也可以确定防火墙策略文件未通过校验。需要说明的是,上述预设格式和预设后缀类型可由本领域技术人员基于实际情况进行设置,本实施例对此不作具体限定,可选地,预设格式为excel,预设后缀类型为.xls或者.xlsx。In this embodiment, if a firewall policy file exists in the firewall policy verification request, the front end checks the firewall policy file in the firewall policy verification request. Specifically, the attribute information of the firewall policy file is obtained from the firewall policy verification request. , Including but not limited to the file format and the number of file bytes, and determining whether the file format in the attribute information is a preset format, that is, obtaining the file name in the attribute information and dividing the file name to obtain the file suffix type And then determine whether the file suffix type is a preset type. If the file suffix type is a preset type, determine that the file format in the attribute information is a preset format. If the file suffix type is not a preset type, determine The file format in the attribute information is not a preset format. If the file format in the attribute information is a preset format, the front end determines whether the number of file bytes in the attribute information is less than or equal to a preset threshold. If the number of file bytes is less than or equal to a preset threshold, the firewall policy file is determined to be Check, otherwise it is determined firewall policy file fails verification. If the file format in the attribute information is not a preset format, it can also be determined that the firewall policy file fails the verification. It should be noted that the above preset format and preset suffix type can be set by those skilled in the art based on actual conditions, which is not specifically limited in this embodiment. Alternatively, the preset format is excel and the preset suffix type is. xls or .xlsx.
步骤S1013,当防火墙策略验证请求中的防火墙策略文件通过校验时,前端对防火墙策略文件进行解析,以获取防火墙策略,并对防火墙策略进行校验。Step S1013: When the firewall policy file in the firewall policy verification request passes the verification, the front end parses the firewall policy file to obtain a firewall policy and verifies the firewall policy.
本实施例中,当防火墙策略验证请求中的防火墙策略文件通过校验时,前端对该防火墙策略文件进行解析,以获取防火墙策略,并对防火墙策略进行校验,即对防火墙策略中的IP和端口进行校验,包括IP类型校验、端口非空校验、端口类型校验、物理主机与云主机校验,具体的校验过程参照上述第一实施例,此处不作赘述。需要说明的时,不同格式的防火策略文件的解析方式不同,防火策略文件的解析方式可由本领域技术人员依据实际情况进行设置,本实施例对此不作具体限定。In this embodiment, when the firewall policy file in the firewall policy verification request passes the verification, the front end parses the firewall policy file to obtain the firewall policy, and verifies the firewall policy, that is, the IP and The port verification includes IP type verification, port non-empty verification, port type verification, physical host and cloud host verification. For the specific verification process, refer to the first embodiment described above, and details are not described herein. It should be noted that the parsing method of the fire prevention policy file in different formats is different. The parsing method of the fire prevention policy file can be set by a person skilled in the art according to the actual situation, which is not specifically limited in this embodiment.
本实施例中,用户可通过附件上传的方式输入防火墙策略,不需要用户手动输入较多的防火墙策略,提高防火墙策略的输入便利性,前端可对上传的附件文件进行校验,仅当文件通过校验时,继续进行后续的校验操作,能够在全部校验通过之后,才将防火墙策略验证请求发送给后台服务器,有效的减少后台资源的浪费。In this embodiment, the user can enter the firewall policy by uploading the attachment. The user does not need to manually enter more firewall policies, which improves the convenience of entering the firewall policy. The front-end can verify the uploaded attachment file only when the file passes During the verification, the subsequent verification operation is continued. The firewall policy verification request can be sent to the background server after all the verification passes, which effectively reduces the waste of background resources.
此外,本申请实施例还提供一种防火墙策略验证系统。In addition, an embodiment of the present application further provides a firewall policy verification system.
参照图4,图4为本申请防火墙策略验证系统第一实施例的功能模块示意图。Referring to FIG. 4, FIG. 4 is a schematic diagram of functional modules of a first embodiment of a firewall policy verification system of the present application.
本申请防火墙策略验证系统为虚拟系统,存储于图1所示防火墙策略验证设备的存储器1005中,用于实现防火墙策略验证可读指令的所有功能;当监测到防火墙策略验证请求时,对所述防火墙策略验证请求进行校验,并在所述防火墙策略验证请求通过校验时,将所述防火墙策略验证请求发送至后台服务器;接收所述前端发送的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;当所述防火墙策略验证请求中的各源主机远程登录成功后,所述后台服务器将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。The firewall policy verification system of the present application is a virtual system, which is stored in the memory 1005 of the firewall policy verification device shown in FIG. 1 and is used to implement all functions of the readable instructions of the firewall policy verification. The firewall policy verification request is verified, and when the firewall policy verification request passes the verification, the firewall policy verification request is sent to a background server; the firewall policy verification request sent by the front end is received, and the firewall policy is verified. Each source host in the verification request performs a remote login operation; after each source host in the firewall policy verification request is successfully remotely logged in, the background server sends the firewall policy in the firewall policy verification request to the corresponding source host for verification.
具体的,本实施例中,所述防火墙策略验证系统包括:前端100和后台服务器200,所述前端100包括校验模块101,所述后台服务器200包括远程登录模块201和策略验证模块202,其中,Specifically, in this embodiment, the firewall policy verification system includes a front-end 100 and a background server 200. The front-end 100 includes a verification module 101. The background server 200 includes a remote login module 201 and a policy verification module 202. ,
所述校验模块101,用于当前端监测到防火墙策略验证请求时,对所述防火墙策略验证请求进行校验,并在所述防火墙策略验证请求通过校验时,将所述防火墙策略验证请求发送至后台服务器;The verification module 101 is configured to verify the firewall policy verification request when the front end detects a firewall policy verification request, and to verify the firewall policy verification request when the firewall policy verification request passes the verification. Send to background server;
所述远程登录模块201,用于所述接收所述前端发送的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;The remote login module 201 is configured to receive the firewall policy verification request sent by the front end, and perform a remote login operation on each source host in the firewall policy verification request;
所述策略验证模块202,用于当所述防火墙策略验证请求中的各源主机远程登录成功后,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。The policy verification module 202 is configured to send a firewall policy in the firewall policy verification request to a corresponding source host for verification after each source host in the firewall policy verification request is successfully logged in remotely.
进一步地,所述远程登录模块201还用于:Further, the remote login module 201 is further configured to:
获取服务主机的密钥信息,并将预设脚本和所述密钥信息推送至所述防火墙策略验证请求中的各源主机;Obtaining key information of a service host, and pushing a preset script and the key information to each source host in the firewall policy verification request;
所述各源主机执行所述预设脚本,将所述密钥信息写入所述各源主机的配置文件中,并向所述后台服务器返回脚本执行结果;Each source host executes the preset script, writes the key information into a configuration file of each source host, and returns a script execution result to the background server;
当接收到所述各源主机返回的脚本执行结果时,对所述各源主机执行免密登录认证,并在所述各源主机的免密登录认证通过时,登录所述各源主机。When receiving the script execution results returned by the source hosts, perform a password-free login authentication on the source hosts, and log in to the source hosts when the password-free login authentication of the source hosts passes.
进一步地,所述远程登录模块201还用于:Further, the remote login module 201 is further configured to:
调用预设接口,以获取所述防火墙策略验证请求中各源主机的登录密码;Calling a preset interface to obtain a login password of each source host in the firewall policy verification request;
将所述防火墙策略验证请求中各源主机的登录密码发送至对应的源主机,以远程登录所述各源主机。Sending the login password of each source host in the firewall policy verification request to the corresponding source host to remotely log in to the source hosts.
进一步地,所述校验模块101还用于:Further, the verification module 101 is further configured to:
确定所述防火墙策略验证请求中是否存在防火墙策略文件;Determining whether a firewall policy file exists in the firewall policy verification request;
若所述防火墙策略验证请求中存在防火墙策略文件,则对所述防火墙策略验证请求中的防火墙策略文件进行校验;If a firewall policy file exists in the firewall policy verification request, verifying the firewall policy file in the firewall policy verification request;
当所述防火墙策略验证请求中的防火墙策略文件通过校验时,对所述防火墙策略文件进行解析,以获取防火墙策略,并对所述防火墙策略进行校验。When the firewall policy file in the firewall policy verification request passes verification, the firewall policy file is parsed to obtain a firewall policy, and the firewall policy is verified.
进一步地,所述校验模块101还用于:Further, the verification module 101 is further configured to:
从所述防火墙策略验证请求中获取所述防火墙策略文件的属性信息,并判断所述属性信息中的文件格式是否为预设格式;Acquiring attribute information of the firewall policy file from the firewall policy verification request, and determining whether a file format in the attribute information is a preset format;
若所述属性信息中的文件格式为预设格式,则判断所述属性信息中的文件字节数是否小于或等于预设阈值;If the file format in the attribute information is a preset format, determining whether the number of file bytes in the attribute information is less than or equal to a preset threshold;
若所述属性信息中的文件字节数小于或等于预设阈值,则确定所述防火墙策略文件通过校验,否则所述前端确定所述防火墙策略文件未通过校验。If the number of file bytes in the attribute information is less than or equal to a preset threshold, it is determined that the firewall policy file passes verification, otherwise the front end determines that the firewall policy file fails verification.
进一步地,所述后台服务器还包括:Further, the background server further includes:
收发模块,用于接收所述各源主机返回的防火墙策略验证结果,并将所述防火墙策略验证结果发送至所述前端;A transceiver module, configured to receive a firewall policy verification result returned by each source host, and send the firewall policy verification result to the front end;
所述前端按照预设筛选条件,对所述防火墙策略验证结果进行筛选,并显示筛选后的防火墙策略验证结果。The front end filters the firewall policy verification result according to a preset filtering condition, and displays the filtered firewall policy verification result.
进一步地,所述前端还包括:Further, the front end further includes:
状态确定模块,用于读取预设存储区域中的后台服务器状态值,并依据所述后台服务器状态值,确定所述后台服务器的状态;A status determining module, configured to read a background server status value in a preset storage area, and determine a status of the background server according to the background server status value;
按钮控制模块,用于若所述后台服务器的状态为防火墙策略验证状态,则锁定当前页面提交按钮,并当监测到所述后台服务器的状态为由防火墙策略验证状态转变为空闲状态,则解锁当前页面提交按钮。A button control module for locking the current page submit button if the state of the background server is a firewall policy verification state, and unlocking the current state when it is detected that the state of the background server changes from a firewall policy verification state to an idle state Page submit button.
其中,上述防火墙策略验证系统中各个模块的功能实现与上述防火墙策略验证方法实施例中各步骤相对应,其功能和实现过程在此处不再一一赘述。The function implementation of each module in the foregoing firewall policy verification system corresponds to each step in the embodiment of the above-mentioned firewall policy verification method, and the functions and implementation processes thereof will not be described here one by one.
此外,本申请实施例还提供一种计算机可读存储介质。In addition, an embodiment of the present application further provides a computer-readable storage medium.
本申请计算机可读存储介质上存储有防火墙策略验证可读指令,其中所述防火墙策略验证可读指令被处理器执行时,实现如上述的防火墙策略验证方法中后台服务器执行的步骤。The computer-readable storage medium of the present application stores a firewall policy verification readable instruction. When the firewall policy verification readable instruction is executed by a processor, the steps performed by the background server in the firewall policy verification method described above are implemented.
其中,上述计算机可读存储介质可以为非易失性可读存储介质,上述计算机可读存储介质上存储的防火墙策略验证可读指令被执行时所实现的方法可参照本申请防火墙策略验证方法的各个实施例,此处不再赘述。The computer-readable storage medium may be a non-volatile readable storage medium. For the method implemented when the firewall policy verification readable instruction stored in the computer-readable storage medium is executed, refer to the method for firewall policy verification in this application. Various embodiments are not repeated here.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。It should be noted that, in this article, the terms "including", "including" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or system including a series of elements includes not only those elements, It also includes other elements not explicitly listed, or elements inherent to such a process, method, article, or system. Without more restrictions, an element limited by the sentence "including a ..." does not exclude the existence of other identical elements in the process, method, article, or system that includes the element.
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The above-mentioned serial numbers of the embodiments of the present application are merely for description, and do not represent the superiority or inferiority of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the methods in the above embodiments can be implemented by means of software plus a necessary universal hardware platform, and of course, also by hardware, but in many cases the former is better. Implementation. Based on such an understanding, the technical solution of this application that is essentially or contributes to the existing technology can be embodied in the form of a software product. The computer software product is stored in a storage medium (such as ROM / RAM) as described above. , Magnetic disk, optical disc), including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in the embodiments of the present application.
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。The above are only preferred embodiments of the present application, and thus do not limit the patent scope of the present application. Any equivalent structure or equivalent process transformation made by using the contents of the specification and drawings of the present application, or directly or indirectly used in other related technical fields Are included in the scope of patent protection of this application.

Claims (20)

  1. 一种防火墙策略验证方法,其特征在于,所述防火墙策略验证方法包括以下步骤: A firewall policy verification method is characterized in that the firewall policy verification method includes the following steps:
    当前端监测到防火墙策略验证请求时,所述前端对所述防火墙策略验证请求进行校验,并在所述防火墙策略验证请求通过校验时,将所述防火墙策略验证请求发送至后台服务器;When the front end detects a firewall policy verification request, the front end checks the firewall policy verification request, and sends the firewall policy verification request to a background server when the firewall policy verification request passes the verification;
    所述后台服务器接收所述前端发送的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;Receiving, by the background server, a firewall policy verification request sent by the front end, and performing a remote login operation on each source host in the firewall policy verification request;
    当所述防火墙策略验证请求中的各源主机远程登录成功后,所述后台服务器将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。After each source host in the firewall policy verification request is successfully logged in remotely, the background server sends the firewall policy in the firewall policy verification request to the corresponding source host for verification.
  2. 如权利要求1所述的防火墙策略验证方法,其特征在于,对所述防火墙策略验证请求中的各源主机执行远程登录操作的步骤包括:The firewall policy verification method according to claim 1, wherein the step of performing a remote login operation on each source host in the firewall policy verification request comprises:
    所述后台服务器获取服务主机的密钥信息,并将预设脚本和所述密钥信息推送至所述防火墙策略验证请求中的各源主机;The background server obtains key information of a service host, and pushes a preset script and the key information to each source host in the firewall policy verification request;
    所述各源主机执行所述预设脚本,将所述密钥信息写入所述各源主机的配置文件中,并向所述后台服务器返回脚本执行结果;Each source host executes the preset script, writes the key information into a configuration file of each source host, and returns a script execution result to the background server;
    当所述后台服务器接收到所述各源主机返回的脚本执行结果时,对所述各源主机执行免密登录认证,并在所述各源主机的免密登录认证通过时,登录所述各源主机。When the background server receives the script execution results returned by the source hosts, perform a password-free login authentication on the source hosts, and log in to each of the source hosts when the password-free login authentication passes. Source host.
  3. 如权利要求1所述的防火墙策略验证方法,其特征在于,对所述防火墙策略验证请求中的各源主机执行远程登录操作的步骤包括:The firewall policy verification method according to claim 1, wherein the step of performing a remote login operation on each source host in the firewall policy verification request comprises:
    所述后台服务器调用预设接口,以获取所述防火墙策略验证请求中各源主机的登录密码;The background server calls a preset interface to obtain a login password of each source host in the firewall policy verification request;
    所述后台服务器将所述防火墙策略验证请求中各源主机的登录密码发送至对应的源主机,以远程登录所述各源主机。The background server sends the login password of each source host in the firewall policy verification request to a corresponding source host to remotely log in to each source host.
  4. 如权利要求1所述的防火墙策略验证方法,其特征在于,所述前端对所述防火墙策略验证请求进行校验的步骤包括:The firewall policy verification method according to claim 1, wherein the step of verifying the firewall policy verification request by the front end comprises:
    所述前端确定所述防火墙策略验证请求中是否存在防火墙策略文件;Determining, by the front end, whether a firewall policy file exists in the firewall policy verification request;
    若所述防火墙策略验证请求中存在防火墙策略文件,则所述前端对所述防火墙策略验证请求中的防火墙策略文件进行校验;If a firewall policy file exists in the firewall policy verification request, the front end checks the firewall policy file in the firewall policy verification request;
    当所述防火墙策略验证请求中的防火墙策略文件通过校验时,所述前端对所述防火墙策略文件进行解析,以获取防火墙策略,并对所述防火墙策略进行校验。When the firewall policy file in the firewall policy verification request passes verification, the front end parses the firewall policy file to obtain a firewall policy, and verifies the firewall policy.
  5. 如权利要求4所述的防火墙策略验证方法,其特征在于,所述前端对所述防火墙策略验证请求中的防火墙策略文件进行校验的步骤包括:The firewall policy verification method according to claim 4, wherein the step of verifying the firewall policy file in the firewall policy verification request by the front end comprises:
    所述前端从所述防火墙策略验证请求中获取所述防火墙策略文件的属性信息,并判断所述属性信息中的文件格式是否为预设格式;The front end obtains attribute information of the firewall policy file from the firewall policy verification request, and determines whether a file format in the attribute information is a preset format;
    若所述属性信息中的文件格式为预设格式,则所述前端判断所述属性信息中的文件字节数是否小于或等于预设阈值;If the file format in the attribute information is a preset format, the front end judges whether the number of file bytes in the attribute information is less than or equal to a preset threshold;
    若所述属性信息中的文件字节数小于或等于预设阈值,则所述前端确定所述防火墙策略文件通过校验,否则所述前端确定所述防火墙策略文件未通过校验。If the number of file bytes in the attribute information is less than or equal to a preset threshold, the front end determines that the firewall policy file passes verification, otherwise the front end determines that the firewall policy file fails verification.
  6. 如权利要求1所述的防火墙策略验证方法,其特征在于,所述后台服务器将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证的步骤之后,还包括:The method for verifying a firewall policy according to claim 1, wherein after the background server sends the firewall policy in the firewall policy verification request to a corresponding source host for verification, further comprising:
    所述后台服务器接收所述各源主机返回的防火墙策略验证结果,并将所述防火墙策略验证结果发送至所述前端;The background server receives a firewall policy verification result returned by each source host, and sends the firewall policy verification result to the front end;
    所述前端按照预设筛选条件,对所述防火墙策略验证结果进行筛选,并显示筛选后的防火墙策略验证结果。The front end filters the firewall policy verification result according to a preset filtering condition, and displays the filtered firewall policy verification result.
  7. 如权利要求1所述的防火墙策略验证方法,其特征在于,所述防火墙策略验证方法还包括:The firewall policy verification method according to claim 1, wherein the firewall policy verification method further comprises:
    所述前端读取预设存储区域中的后台服务器状态值,并依据所述后台服务器状态值,确定所述后台服务器的状态;Reading, by the front end, a background server status value in a preset storage area, and determining the status of the background server according to the background server status value;
    若所述后台服务器的状态为防火墙策略验证状态,则所述前端锁定当前页面提交按钮,并当所述前端监测到所述后台服务器的状态为由防火墙策略验证状态转变为空闲状态,则所述前端解锁当前页面提交按钮。If the status of the background server is a firewall policy verification status, the front end locks the current page submit button, and when the front end detects that the status of the background server is transitioning from a firewall policy verification status to an idle status, the The front end unlocks the submit button for the current page.
  8. 一种防火墙策略验证系统,其特征在于,所述防火墙策略验证系统包括:前端和后台服务器,所述前端包括校验模块,所述后台服务器包括远程登录模块和策略验证模块,其中,A firewall policy verification system is characterized in that the firewall policy verification system includes a front-end and a background server, the front-end includes a verification module, and the background server includes a remote login module and a policy verification module, wherein:
    所述校验模块,用于当前端监测到防火墙策略验证请求时,对所述防火墙策略验证请求进行校验,并在所述防火墙策略验证请求通过校验时,将所述防火墙策略验证请求发送至后台服务器;The verification module is configured to verify the firewall policy verification request when the front end detects a firewall policy verification request, and send the firewall policy verification request when the firewall policy verification request passes the verification. To the background server;
    所述远程登录模块,用于所述接收所述前端发送的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;The remote login module is configured to receive the firewall policy verification request sent by the front end, and perform a remote login operation on each source host in the firewall policy verification request;
    所述策略验证模块,用于当所述防火墙策略验证请求中的各源主机远程登录成功后,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。The policy verification module is configured to send a firewall policy in the firewall policy verification request to a corresponding source host for verification after each source host in the firewall policy verification request is successfully logged in remotely.
  9. 如权利要求8所述的防火墙策略验证系统,其特征在于,所述远程登录模块还用于:The firewall policy verification system according to claim 8, wherein the remote login module is further configured to:
    获取服务主机的密钥信息,并将预设脚本和所述密钥信息推送至所述防火墙策略验证请求中的各源主机,其中,所述各源主机执行所述预设脚本,将所述密钥信息写入所述各源主机的配置文件中,并向所述后台服务器返回脚本执行结果;Obtain the key information of the service host, and push the preset script and the key information to each source host in the firewall policy verification request, wherein each source host executes the preset script to transfer the The key information is written into a configuration file of each source host, and a script execution result is returned to the background server;
    接收所述各源主机返回的脚本执行结果,并对所述各源主机执行免密登录认证,且在所述各源主机的免密登录认证通过时,登录所述各源主机。Receiving the script execution result returned by each source host, and performing a password-free login authentication on each source host, and logging in to each source host when the password-free login authentication of each source host passes.
  10. 如权利要求8所述的防火墙策略验证系统,其特征在于,所述远程登录模块还用于:The firewall policy verification system according to claim 8, wherein the remote login module is further configured to:
    调用预设接口,以获取所述防火墙策略验证请求中各源主机的登录密码;Calling a preset interface to obtain a login password of each source host in the firewall policy verification request;
    将所述防火墙策略验证请求中各源主机的登录密码发送至对应的源主机,以远程登录所述各源主机。Sending the login password of each source host in the firewall policy verification request to the corresponding source host to remotely log in to the source hosts.
  11. 如权利要求8所述的防火墙策略验证系统,其特征在于,所述校验模块还用于:The firewall policy verification system according to claim 8, wherein the verification module is further configured to:
    确定所述防火墙策略验证请求中是否存在防火墙策略文件;Determining whether a firewall policy file exists in the firewall policy verification request;
    若所述防火墙策略验证请求中存在防火墙策略文件,则对所述防火墙策略验证请求中的防火墙策略文件进行校验;If a firewall policy file exists in the firewall policy verification request, verifying the firewall policy file in the firewall policy verification request;
    当所述防火墙策略验证请求中的防火墙策略文件通过校验时,对所述防火墙策略文件进行解析,以获取防火墙策略,并对所述防火墙策略进行校验。When the firewall policy file in the firewall policy verification request passes verification, the firewall policy file is parsed to obtain a firewall policy, and the firewall policy is verified.
  12. 如权利要求11所述的防火墙策略验证系统,其特征在于,所述校验模块还用于:The firewall policy verification system according to claim 11, wherein the verification module is further configured to:
    从所述防火墙策略验证请求中获取所述防火墙策略文件的属性信息,并判断所述属性信息中的文件格式是否为预设格式;Acquiring attribute information of the firewall policy file from the firewall policy verification request, and determining whether a file format in the attribute information is a preset format;
    若所述属性信息中的文件格式为预设格式,则判断所述属性信息中的文件字节数是否小于或等于预设阈值;If the file format in the attribute information is a preset format, determining whether the number of file bytes in the attribute information is less than or equal to a preset threshold;
    若所述属性信息中的文件字节数小于或等于预设阈值,则确定所述防火墙策略文件通过校验,否则确定所述防火墙策略文件未通过校验。If the number of file bytes in the attribute information is less than or equal to a preset threshold, it is determined that the firewall policy file passes verification, otherwise it is determined that the firewall policy file fails verification.
  13. 一种防火墙策略验证设备,其特征在于,所述防火墙策略验证设备包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的防火墙策略验证可读指令,其中所述防火墙策略验证可读指令被所述处理器执行时,实现以下步骤:A firewall policy verification device, characterized in that the firewall policy verification device includes a processor, a memory, and a firewall policy verification readable instruction stored on the memory and executable by the processor, wherein the firewall When a policy verification readable instruction is executed by the processor, the following steps are implemented:
    接收前端发送的通过校验的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;Receiving a verified firewall policy verification request sent by the front end, and performing a remote login operation on each source host in the firewall policy verification request;
    当所述防火墙策略验证请求中的各源主机远程登录成功后,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。After each source host in the firewall policy verification request is successfully logged in remotely, the firewall policy in the firewall policy verification request is sent to the corresponding source host for verification.
  14. 如权利要求13所述的防火墙策略验证设备,其特征在于,对所述防火墙策略验证请求中的各源主机执行远程登录操作的步骤包括:The firewall policy verification device according to claim 13, wherein the step of performing a remote login operation on each source host in the firewall policy verification request comprises:
    获取服务主机的密钥信息,并将预设脚本和所述密钥信息推送至所述防火墙策略验证请求中的各源主机;Obtaining key information of a service host, and pushing a preset script and the key information to each source host in the firewall policy verification request;
    所述各源主机执行所述预设脚本,将所述密钥信息写入所述各源主机的配置文件中,并向所述后台服务器返回脚本执行结果;Each source host executes the preset script, writes the key information into a configuration file of each source host, and returns a script execution result to the background server;
    当所述后台服务器接收到所述各源主机返回的脚本执行结果时,对所述各源主机执行免密登录认证,并在所述各源主机的免密登录认证通过时,登录所述各源主机。When the background server receives the script execution results returned by the source hosts, perform a password-free login authentication on the source hosts, and log in to each of the source hosts when the password-free login authentication passes. Source host.
  15. 如权利要求13所述的防火墙策略验证设备,其特征在于,对所述防火墙策略验证请求中的各源主机执行远程登录操作的步骤包括:The firewall policy verification device according to claim 13, wherein the step of performing a remote login operation on each source host in the firewall policy verification request comprises:
    调用预设接口,以获取所述防火墙策略验证请求中各源主机的登录密码;Calling a preset interface to obtain a login password of each source host in the firewall policy verification request;
    所述后台服务器将所述防火墙策略验证请求中各源主机的登录密码发送至对应的源主机,以远程登录所述各源主机。The background server sends the login password of each source host in the firewall policy verification request to a corresponding source host to remotely log in to each source host.
  16. 如权利要求13所述的防火墙策略验证设备,其特征在于,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证的步骤之后,还包括:The firewall policy verification device according to claim 13, wherein after the step of sending the firewall policy in the firewall policy verification request to a corresponding source host for verification, further comprising:
    接收所述各源主机返回的防火墙策略验证结果,并将所述防火墙策略验证结果发送至所述前端,以供所述前端按照预设筛选条件,对所述防火墙策略验证结果进行筛选,并显示筛选后的防火墙策略验证结果。Receive the firewall policy verification result returned by each source host, and send the firewall policy verification result to the front end for the front end to filter the firewall policy verification result according to a preset filtering condition, and display Filtered firewall policy verification results.
  17. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有防火墙策略验证可读指令,其中所述防火墙策略验证可读指令被处理器执行时,实现以下步骤:A computer-readable storage medium is characterized in that a firewall policy verification readable instruction is stored on the computer-readable storage medium, and when the firewall policy verification readable instruction is executed by a processor, the following steps are implemented:
    接收前端发送的通过校验的防火墙策略验证请求,并对所述防火墙策略验证请求中的各源主机执行远程登录操作;Receiving a verified firewall policy verification request sent by the front end, and performing a remote login operation on each source host in the firewall policy verification request;
    当所述防火墙策略验证请求中的各源主机远程登录成功后,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证。After each source host in the firewall policy verification request is successfully logged in remotely, the firewall policy in the firewall policy verification request is sent to the corresponding source host for verification.
  18. 如权利要求17所述的计算机可读存储介质,其特征在于,对所述防火墙策略验证请求中的各源主机执行远程登录操作的步骤包括:The computer-readable storage medium of claim 17, wherein the step of performing a remote login operation on each source host in the firewall policy verification request comprises:
    获取服务主机的密钥信息,并将预设脚本和所述密钥信息推送至所述防火墙策略验证请求中的各源主机;Obtaining key information of a service host, and pushing a preset script and the key information to each source host in the firewall policy verification request;
    所述各源主机执行所述预设脚本,将所述密钥信息写入所述各源主机的配置文件中,并向所述后台服务器返回脚本执行结果;Each source host executes the preset script, writes the key information into a configuration file of each source host, and returns a script execution result to the background server;
    当所述后台服务器接收到所述各源主机返回的脚本执行结果时,对所述各源主机执行免密登录认证,并在所述各源主机的免密登录认证通过时,登录所述各源主机。When the background server receives the script execution results returned by the source hosts, perform a password-free login authentication on the source hosts, and log in to each of the source hosts when the password-free login authentication passes. Source host.
  19. 如权利要求17所述的计算机可读存储介质,其特征在于,对所述防火墙策略验证请求中的各源主机执行远程登录操作的步骤包括:The computer-readable storage medium of claim 17, wherein the step of performing a remote login operation on each source host in the firewall policy verification request comprises:
    调用预设接口,以获取所述防火墙策略验证请求中各源主机的登录密码;Calling a preset interface to obtain a login password of each source host in the firewall policy verification request;
    所述后台服务器将所述防火墙策略验证请求中各源主机的登录密码发送至对应的源主机,以远程登录所述各源主机。The background server sends the login password of each source host in the firewall policy verification request to a corresponding source host to remotely log in to each source host.
  20. 如权利要求17所述的计算机可读存储介质,其特征在于,将所述防火墙策略验证请求中的防火墙策略发送至对应源主机进行验证的步骤之后,还包括:The computer-readable storage medium of claim 17, wherein after the step of sending the firewall policy in the firewall policy verification request to a corresponding source host for verification, further comprising:
    接收所述各源主机返回的防火墙策略验证结果,并将所述防火墙策略验证结果发送至所述前端,以供所述前端按照预设筛选条件,对所述防火墙策略验证结果进行筛选,并显示筛选后的防火墙策略验证结果。 Receive the firewall policy verification result returned by each source host, and send the firewall policy verification result to the front end for the front end to filter the firewall policy verification result according to a preset filtering condition, and display Filtered firewall policy verification results. Ranch
PCT/CN2018/122804 2018-08-31 2018-12-21 Firewall policy verification method, system and device, and readable storage medium WO2020042471A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811008170.9 2018-08-31
CN201811008170.9A CN109688093B (en) 2018-08-31 2018-08-31 Firewall policy verification method, system, device and readable storage medium

Publications (1)

Publication Number Publication Date
WO2020042471A1 true WO2020042471A1 (en) 2020-03-05

Family

ID=66184595

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/122804 WO2020042471A1 (en) 2018-08-31 2018-12-21 Firewall policy verification method, system and device, and readable storage medium

Country Status (2)

Country Link
CN (1) CN109688093B (en)
WO (1) WO2020042471A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132200A (en) * 2023-04-18 2023-05-16 北京云澈科技有限公司 Processing method, device, processor and computer storage medium for monitoring firewall policy quality based on network space dynamic data

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110677383B (en) * 2019-08-22 2023-02-24 平安科技(深圳)有限公司 Firewall wall opening method and device, storage medium and computer equipment
CN111083011A (en) * 2019-12-18 2020-04-28 北京网太科技发展有限公司 Automatic testing method and device for routing security firewall and management platform
CN113572733B (en) * 2021-06-23 2024-04-12 北京思特奇信息技术股份有限公司 Safety control method and safety control system based on front-end module
CN114297068A (en) * 2021-12-29 2022-04-08 武汉思普崚技术有限公司 Firewall equipment audit function test method and system based on graphical application

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072101A (en) * 2006-05-12 2007-11-14 梁国恩 Firewall-penetrating terminal machine system and method
CN101789947A (en) * 2010-02-21 2010-07-28 成都市华为赛门铁克科技有限公司 Method and firewall for preventing HTTP POST flooding attacks
CN101820414A (en) * 2010-01-29 2010-09-01 蓝盾信息安全技术股份有限公司 Host access control system and method
CN102088453A (en) * 2010-01-29 2011-06-08 蓝盾信息安全技术股份有限公司 Method, system and method for controlling access of host computer

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100544292C (en) * 2007-07-03 2009-09-23 中兴通讯股份有限公司 A kind of method of BAS Broadband Access Server automatic test
CN101447898B (en) * 2008-11-19 2012-12-05 中国人民解放军信息安全测评认证中心 Test system used for network safety product and test method thereof
CN102467442B (en) * 2010-11-02 2015-04-29 腾讯科技(深圳)有限公司 Software testing method, system and equipment
CN102163173B (en) * 2011-04-06 2013-03-27 北京航空航天大学 Automated testing method for distributed information system interface
CN105824726A (en) * 2015-01-07 2016-08-03 展讯通信(上海)有限公司 Remote automatic test system and method of mobile terminals
CN105183649A (en) * 2015-09-08 2015-12-23 武汉虹信通信技术有限责任公司 Automatic telnet method and system used for automatic testing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072101A (en) * 2006-05-12 2007-11-14 梁国恩 Firewall-penetrating terminal machine system and method
CN101820414A (en) * 2010-01-29 2010-09-01 蓝盾信息安全技术股份有限公司 Host access control system and method
CN102088453A (en) * 2010-01-29 2011-06-08 蓝盾信息安全技术股份有限公司 Method, system and method for controlling access of host computer
CN101789947A (en) * 2010-02-21 2010-07-28 成都市华为赛门铁克科技有限公司 Method and firewall for preventing HTTP POST flooding attacks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132200A (en) * 2023-04-18 2023-05-16 北京云澈科技有限公司 Processing method, device, processor and computer storage medium for monitoring firewall policy quality based on network space dynamic data

Also Published As

Publication number Publication date
CN109688093A (en) 2019-04-26
CN109688093B (en) 2021-06-04

Similar Documents

Publication Publication Date Title
WO2020042471A1 (en) Firewall policy verification method, system and device, and readable storage medium
WO2019109957A1 (en) Esb-based service providing method, apparatus and device, and readable storage medium
US9374353B2 (en) Enabling dynamic authentication with different protocols on the same port for a switch
WO2021003975A1 (en) Gateway interface test method, terminal device, storage medium and apparatus
WO2020042464A1 (en) Data interaction method, apparatus and device, and readable storage medium
WO2019127973A1 (en) Authority authentication method, system and device for mirror repository, and storage medium
WO2013062352A1 (en) Method and system for access control in cloud computing service
WO2021072881A1 (en) Object storage-based request processing method, apparatus and device, and storage medium
WO2020224250A1 (en) Method, apparatus, and device for smart contract triggering, and storage medium
WO2020220413A1 (en) Zero knowledge proving method and system for personal information, and storage medium
WO2014094300A1 (en) Server and method for remotely controlling working of communication terminal, and communication terminal
WO2019174090A1 (en) Screenshot file sharing control method, apparatus and device, and computer storage medium
WO2020077832A1 (en) Cloud desktop access method, apparatus and device, and storage medium
WO2015069018A1 (en) System for secure login, and method and apparatus for same
WO2020019405A1 (en) Database monitoring method, device and apparatus, and computer storage medium
WO2020062658A1 (en) Contract generation method and apparatus, and device and storage medium
WO2014185594A1 (en) Single sign-on system and method in vdi environment
WO2019205288A1 (en) Connection establishment method, system, and device, and computer readable storage medium
WO2018035929A1 (en) Method and apparatus for processing verification code
US20150200926A1 (en) Information processing system and authentication method
WO2012060479A1 (en) System for providing location information certification management service, and method for providing same
WO2014112754A1 (en) Web service push method and web service push server and web service providing server performing same
WO2020224251A1 (en) Block chain transaction processing method, device, apparatus and storage medium
WO2019024485A1 (en) Data sharing method and device and computer readable storage medium
WO2020042482A1 (en) Agent service processing method, apparatus and device, and computer-readable storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18931892

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18931892

Country of ref document: EP

Kind code of ref document: A1