[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107483341B - Method and device for rapidly forwarding firewall-crossing messages - Google Patents

Method and device for rapidly forwarding firewall-crossing messages Download PDF

Info

Publication number
CN107483341B
CN107483341B CN201710755205.4A CN201710755205A CN107483341B CN 107483341 B CN107483341 B CN 107483341B CN 201710755205 A CN201710755205 A CN 201710755205A CN 107483341 B CN107483341 B CN 107483341B
Authority
CN
China
Prior art keywords
message
tuple
virtual
virtual firewall
forwarding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710755205.4A
Other languages
Chinese (zh)
Other versions
CN107483341A (en
Inventor
杜剑锋
胡军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201710755205.4A priority Critical patent/CN107483341B/en
Publication of CN107483341A publication Critical patent/CN107483341A/en
Application granted granted Critical
Publication of CN107483341B publication Critical patent/CN107483341B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a method for rapidly forwarding a cross-firewall message, which comprises the following steps: analyzing the received message by a quintuple; acquiring a virtual firewall identifier according to a preset corresponding relation between a message input interface and the virtual firewall identifier; forming a six-tuple group by the five-tuple group analysis result and the virtual firewall identifier; searching a forwarding table item according to the six-tuple; and forwarding the message according to the search result. Compared with the prior art, the method supports cross-virtual firewall forwarding on the original fast forwarding process, and the virtual firewall can simplify networking and facilitate management.

Description

Method and device for rapidly forwarding firewall-crossing messages
Technical Field
The present application relates to the field of computer communications, and in particular, to a method and an apparatus for fast forwarding a packet across firewalls.
Background
With the continuous development of network technologies, on one hand, the processing performance requirements on network devices such as firewalls, switches and the like are higher and higher, and on the other hand, various new applications and new services such as audio, video, cloud computing and the like are developed endlessly, so that the security protection service integrated by the network devices is more and more complex, and the forwarding performance of the whole machine is sharply reduced. In view of this, a concept of fast forwarding is proposed, that is, data stream features are recorded in a fast forwarding table, which aims to simplify and optimize a processing flow of a packet, so as to improve the forwarding performance of network equipment. The fast forwarding technology uses a five-tuple matching router forwarding table entry to realize message forwarding. The so-called five-tuple typically includes a source IP address, a destination IP address, a source port number, a destination port number, and a protocol type.
The prior technical scheme is that networking is realized by using a plurality of physical firewalls, and messages are quickly forwarded in the networking, wherein the prior quick forwarding process comprises the following steps: when a message is received, matching a router forwarding table item by analyzing a quintuple in the message; processing the message by using the information in the forwarding table entry of the router; and forwarding the message according to an output interface in the router forwarding table entry.
The defects of the prior art are that the networking realized by using the physical firewall is complicated, a plurality of network devices need to be configured, and more manpower, material resources and financial resources are consumed. And subsequent regular routine checks on the network devices are required to ensure the security of the physical firewall, and daily management is complicated.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for fast forwarding a packet across a firewall.
Specifically, the method is realized through the following technical scheme:
a method for rapidly forwarding a packet across firewalls, the method comprising:
analyzing the received message by a quintuple;
acquiring a virtual firewall identifier according to a preset corresponding relation between a message input interface and the virtual firewall identifier;
forming a six-tuple group by the five-tuple group analysis result and the virtual firewall identifier;
searching a forwarding table item according to the six-tuple;
and forwarding the message according to the search result.
An apparatus for fast forwarding of packets across a firewall, the apparatus comprising:
a quintuple parsing unit, configured to perform quintuple parsing on a received packet;
the identifier acquisition unit is used for acquiring a virtual firewall identifier according to the corresponding relation between a preset message input interface and the virtual firewall identifier;
the six-tuple forming unit is used for forming a six-tuple by the five-tuple analysis result and the virtual firewall identifier;
a forwarding table item searching unit, configured to search a forwarding table item according to the six-tuple;
and the message forwarding unit is used for forwarding the message according to the search result.
The scheme adopts six-tuple to match forwarding table items, namely, a one-tuple virtual firewall identifier is added on the basis of the original five-tuple, and the virtual firewall identifier is in one-to-one correspondence with the message input interface. Compared with the prior art, the method supports cross-virtual firewall forwarding on the original fast forwarding process, and the virtual firewall can simplify networking and facilitate management.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required in the description of the embodiments will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart illustrating an implementation of a method for fast forwarding a packet across a firewall according to an exemplary embodiment of the present application;
fig. 2 is a schematic structural diagram of a cross-firewall packet fast forwarding apparatus according to an exemplary embodiment of the present application.
Detailed Description
First, a method for quickly forwarding a packet across a firewall provided in an embodiment of the present invention is described, where the method includes the following steps:
analyzing the received message by a quintuple;
acquiring a virtual firewall identifier according to a preset corresponding relation between a message input interface and the virtual firewall identifier;
forming a six-tuple group by the five-tuple group analysis result and the virtual firewall identifier;
searching a forwarding table item according to the six-tuple;
and forwarding the message according to the search result.
The quintuple usually comprises a source IP address, a destination IP address, a source port number, a destination port number and a protocol type, and the scheme adds a unary virtual firewall identifier on the basis of the original quintuple, namely, the message is rapidly forwarded in the virtual firewall by adopting a hexatomic group matched forwarding table entry. The virtual firewall is a firewall that can logically divide a firewall into multiple virtual firewalls, and each virtual firewall system can be regarded as a completely independent firewall device and can have independent system resources, administrators, security policies, user authentication databases, and the like.
In the process of fast forwarding the message, analyzing the received message by five tuples; acquiring a virtual firewall identifier according to the one-to-one correspondence relationship between the message input interface and the virtual firewall identifier, wherein the message input interface can be a message physical input interface or a message virtual input interface; forming a six-tuple according to the quintuple analysis result and the virtual firewall identifier, wherein the quintuple analysis result can be in one-to-one correspondence with the virtual firewall identifier to form the six-tuple, the quintuple analysis result can be in correspondence with a plurality of virtual firewall identifiers to form the six-tuple, the six-tuple can be a combination of the two situations, namely, the six-tuple analysis result and the virtual firewall identifier are simultaneously contained in one-to-one correspondence to form the six-tuple, and the quintuple analysis result can be in correspondence with the six-tuple formed by the virtual firewall identifiers; searching a forwarding table item according to the hexahydric group for forwarding; and forwarding the message according to the searched forwarding table item information.
In order that those skilled in the art will better understand the technical solutions of the present invention, exemplary embodiments will be described herein in detail, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims. All other embodiments that can be derived from the embodiments of the present invention by a person of ordinary skill in the art are intended to fall within the scope of the present invention.
As shown in fig. 1, an implementation flowchart of a method for quickly forwarding a packet across firewalls according to the present invention specifically includes the following steps:
s101, analyzing a received message by a quintuple;
the aforementioned five-tuple generally includes a source IP address, a destination IP address, a source port number, a destination port number, and a protocol type, for example: 192.168.1.110000 TCP 121.14.88.7680 forms a quintuple. The meaning is that a terminal with an IP address of 192.168.1.1 is connected to a terminal with an IP address of 121.14.88.76 and a port of 80 by using the TCP protocol through a port 10000. The quintuple can distinguish different messages, and the corresponding message is unique. Generally, a message carries information such as a source IP address, a destination IP address, a source port number, a destination port number, and a protocol type, and a result of five-tuple analysis is obtained by performing five-tuple analysis on a received message, so that a terminal of the source IP address can be known to be connected with a terminal of the destination port number and a certain protocol through the source port number. The received message information is shown in table 1 below, and the table listed here is merely exemplary.
Source IP address Source port number Destination IP address Destination port number Type of protocol
192.168.1.10 10000 121.17.88.76 80 TCP
192.168.1.10 53 121.17.88.80 69 UDP
TABLE 1
The five-tuple analysis is performed on the message information, and it can be known that the source IP addresses are 192.168.1.10 and 192.168.1.10, the source port numbers are 10000 and 53, the destination IP addresses are 121.17.88.76 and 121.17.88.80, the destination port numbers are 80 and 69, and the protocol types are TCP and UDP (user datagram protocol). Then, in one message, the terminal with the IP address of 192.168.1.10 is connected with the terminal with the IP address of 121.17.88.76 and the port of 80 through the port 10000 by using the TCP protocol; in the other message, the terminal with the IP address of 192.168.1.10 is connected with the terminal with the IP address of 121.17.88.80 and the port of 69 by using the UDP protocol through the port 53.
S102, acquiring a virtual firewall identifier according to a corresponding relation between a preset message input interface and the virtual firewall identifier;
the virtual firewall is actually a firewall that can logically divide a firewall into multiple virtual firewalls, and each virtual firewall system can be regarded as a completely independent firewall device and can have independent system resources, administrators, security policies, a user authentication database, and the like. Here, each virtual firewall is labeled, meaning that each virtual firewall has its own unique identification. The virtual firewall identification is preset to be in one-to-one correspondence with the message input interface, namely one message input interface corresponds to one virtual firewall identification. Assuming that the virtual interface 1_0 is the packet input interface of the virtual firewall 1, and the packet input interface corresponds to the virtual firewall identifier one to one, the virtual firewall identifier of the virtual firewall 1, for example, the virtual firewall identifier 1_0, can be found according to the packet input interface virtual 1_ 0.
It should be particularly noted here that the firewall is divided into a physical firewall and a virtual firewall, and the corresponding message input interface may be a message physical input interface or a message virtual input interface. Under the condition that the message input interface is a message physical input interface, the method can be used for realizing the fast forwarding of the message across the physical firewall, namely, only one-time fast forwarding process is carried out, of course, the message physical input interface can also be used for realizing the fast forwarding of the message across the virtual firewall, in the fast forwarding process across the virtual firewall, only the message input interface of the first-time fast forwarding process is the message physical input interface, if the message needs to be forwarded across a plurality of virtual firewalls in one device and is sent to the virtual firewall 2 from the virtual firewall 1, the message input interface of the virtual firewall 1 is the message physical input interface, the message is received through the message physical input interface, the message input interface of the virtual firewall 2 is the message virtual input interface, and the message is received through the message virtual input interface. Meanwhile, as can be seen from the above, in the case that the message input interface is the message virtual input interface, in the fast forwarding flow across the virtual firewall, the message input interfaces of the other fast forwarding flows except the first one are the message virtual input interfaces,
s103, forming a six-tuple by the quintuple analysis result and the virtual firewall identifier;
according to the one-to-one correspondence relationship between the packet-in interface and the virtual firewall, a plurality of virtual firewall identifications are obtained, and it is assumed here that the virtual firewall identifications may be 1_0, 2_0, 3_0, and 4_0 … …. According to the aforementioned quintuple analysis result, a quintuple can be formed with the obtained virtual firewall identifier. Each group of quintuple analysis results and each virtual firewall identifier form a six-tuple, namely the quintuple analysis results correspond to the virtual firewall identifiers one to one; each group of quintuple analysis result can form a plurality of groups of six tuples with a plurality of virtual firewall identifiers, which means that even if the quintuple analysis results in the six tuples are the same, the virtual firewall identifiers are different, and each group of six tuples has a unique virtual firewall identifier, namely the quintuple analysis result corresponds to a plurality of virtual firewall identifiers; wherein, part of the quintuple analysis results and the virtual firewall identifications are in one-to-one correspondence to form six tuples, and the other part of the quintuple analysis results can form a plurality of groups of six tuples with a plurality of virtual firewall identifications. The above three different cases are that the quintuple parsing result and the virtual firewall identifier form a six-tuple, and the following three cases are respectively illustrated:
each group of quintuple parsing results corresponds to each virtual firewall identifier one by one, the quintuple parsing results parsed from table 1 are applied, the quintuple parsing results correspond to the virtual firewall identifiers one by one to form a six-tuple, the message quintuple parsing results 192.168.1.1010000121.17.88.7680 TCP and the virtual firewall identifier 1_0 form a six-tuple, and the message quintuple parsing results 192.168.1.1053121.17.88.8069 UDP and the virtual firewall identifier 2_0 form a six-tuple, as shown in table 2 below, the listed tables are only exemplary.
Figure BDA0001392015100000061
TABLE 2
Each group of quintuple parsing results corresponds to a plurality of virtual firewall identifications, the quintuple parsing results parsed from table 1 are applied, the quintuple parsing results form a six-tuple by using a plurality of virtual firewalls, the message quintuple parsing result 192.168.1.1010000121.17.88.7680 TCP and the virtual firewall identification 1_0 form a six-tuple, and the message quintuple parsing result 192.168.1.1010000121.17.88.7680 TCP and the virtual firewall identification 3_0 also form a six-tuple, as shown in table 3 below, the listed table is only exemplary.
Figure BDA0001392015100000071
TABLE 3
Wherein, part of the quintuple analysis results and the virtual firewall identifications are in one-to-one correspondence to form a quintuple; in addition, each quintuple parsing result and the virtual firewall identifications can form a plurality of groups of six tuples. The packet quintuple parsing result 192.168.1.1010000121.17.88.7680 TCP and the virtual firewall id 1_0 form a six-tuple, the packet quintuple parsing result 192.168.1.1010000121.17.88.7680 TCP also forms a six-tuple with the virtual firewall id 3_0, and the packet quintuple parsing result 192.168.1.1523121.17.88.1080 TCP and the virtual firewall id 2_0 form a six-tuple, as shown in table 4 below, which is only exemplary.
Figure BDA0001392015100000072
TABLE 4
S104, searching a forwarding table item according to the six-tuple;
and forming a six-tuple based on the five-tuple analysis result and the virtual firewall identifier, searching a forwarding table item according to the six-tuple, and indicating that the current forwarding table item is the forwarding table item required by message forwarding when the information contained in the searched forwarding table item is consistent with the information of the six-tuple. A message fast forwarding table is preset and established, and the forwarding table is stored in firewall equipment. Assuming that the fast forwarding table pre-stored in the firewall device is as shown in table 5 above, the omitted part of the table is other information, which is not shown one by one here.
Figure BDA0001392015100000081
TABLE 5
For example, the result of the quintuple analysis is 192.168.1.1523121.17.88.1080, the identifier of the virtual firewall is 2_0, and according to the quintuple 192.168.1.1523121.17.88.10802 _0 composed of the result of the quintuple analysis and the identifier of the virtual firewall, the forwarding table entry is searched in the fast forwarding table, which may be first screened according to the identifier of the virtual firewall and then screened according to the destination IP, or the forwarding table entry may be searched according to the source IP address, the source port number, the destination IP address, the destination port number, the protocol type, and the identifier of the virtual firewall in the quintuple in advance, that is, the forwarding table entry is searched according to the priority, which is not limited to this, the searching method is not described here any more, and the third forwarding table entry in the fast forwarding table.
And S105, forwarding the message according to the search result.
And according to the forwarding table entry searched by the hexahydric group, the forwarding table entry information comprises message output interface information. And the message is rapidly forwarded through the message output interface.
The aforementioned message input interface may be a message physical input interface or a message virtual input interface, and the corresponding message output interface may be a message physical output interface or a message virtual output interface. The physical message output interface can directly forward the message, and the virtual message output interface obtains the next message virtual input interface reentry message fast forwarding flow by searching the virtual interface relation table. Assuming that there is a pair of virtual interfaces between the virtual firewall 1 and the virtual firewall 1, virtuallif1_1 is a packet virtual out-interface of the virtual firewall 1, and virtuallif2_0 is a packet virtual in-interface of the virtual firewall 2. If the outlet is the message virtual outlet interface during message forwarding, searching a virtual interface connection relation table to obtain a message virtual outlet interface virtualallif 1_1 of the virtual firewall 1 corresponding to a message inlet interface virtualallif 2_0 of the virtual firewall 2, using virtualallif 2_0 as a new message inlet interface reentry fast forwarding flow, using the new message inlet interface to obtain a virtual firewall identifier of the virtual firewall 2, and searching a forwarding table item according to a new six-element group for forwarding.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Corresponding to the foregoing embodiment of the method for quickly forwarding a firewall-crossing message, the present application further provides an embodiment of a device for quickly forwarding a firewall-crossing message, which, as shown in fig. 2, includes a quintuple parsing unit 210, an identifier obtaining unit 220, a hexahtuple forming unit 230, a forwarding table entry searching unit 240, and a message forwarding unit 250.
The quintuple parsing unit 210 is configured to perform quintuple parsing on the received packet, and send a quintuple parsing result to the six-tuple composing unit 230;
an identifier obtaining unit 220, configured to obtain a virtual firewall identifier according to a correspondence between a preset packet ingress interface and the virtual firewall identifier, and send the obtained virtual firewall identifier to a six-tuple forming unit 230;
a hexahedron forming unit 230, configured to form a hexahedron by the quintuple analysis result and the virtual firewall identifier, and send the formed hexahydric group to the forwarding table entry searching unit 240;
a forwarding table item searching unit 240, configured to search a forwarding table item according to the hexahydric group, and send the searched forwarding table item to the message forwarding unit 250;
a message forwarding unit 250, configured to forward the message according to the search result.
The implementation process of the functions of each unit in the system is specifically described in the implementation process of the corresponding step in the method, and is not described herein again.
For the system embodiment, since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment for relevant points. The above-described system embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The foregoing is directed to embodiments of the present invention, and it is understood that various modifications and improvements can be made by those skilled in the art without departing from the spirit of the invention.

Claims (6)

1. A method for fast forwarding a packet across firewalls is characterized in that the method comprises the following steps:
analyzing the received message by a quintuple;
acquiring a virtual firewall identifier according to a preset corresponding relation between a message input interface and the virtual firewall identifier, wherein the message input interface comprises a message virtual input interface of the virtual firewall;
forming a six-tuple group by the five-tuple group analysis result and the virtual firewall identifier;
searching a forwarding table entry containing information consistent with the hexahydric group in a preset fast forwarding table, wherein the forwarding table entry contains message virtual outgoing interface information;
and forwarding the message according to the message virtual output interface in the search result.
2. The method according to claim 1, wherein the obtaining of the firewall identifier according to the correspondence between the preset message input interface and the virtual firewall identifier comprises:
and acquiring the virtual firewall identification according to the one-to-one correspondence relationship between the message input interface and the virtual firewall identification.
3. The method according to claim 1, wherein the forming the five-tuple parsing result and the virtual firewall identifier into a six-tuple comprises:
the five-tuple analysis result corresponds to the virtual firewall identification one by one to form a six-tuple;
and/or
And the five-tuple analysis result corresponds to a plurality of virtual firewall identifications to form a six-tuple.
4. A device for fast forwarding packets across firewalls, the device comprising:
a quintuple parsing unit, configured to perform quintuple parsing on a received packet;
the identification obtaining unit is used for obtaining a virtual firewall identification according to a preset corresponding relation between a message input interface and a virtual firewall identification, wherein the message input interface comprises a message virtual input interface of a virtual firewall;
the six-tuple forming unit is used for forming a six-tuple by the five-tuple analysis result and the virtual firewall identifier;
a forwarding table item searching unit, configured to search a forwarding table item that includes information consistent with the hexahydric group in a preset fast forwarding table, where the forwarding table item includes information of a virtual outgoing interface of a packet;
and the message forwarding unit is used for forwarding the message according to the virtual message output interface in the search result.
5. The apparatus according to claim 4, wherein the identifier obtaining unit is specifically configured to:
and acquiring the virtual firewall identification according to the one-to-one correspondence relationship between the message input interface and the virtual firewall identification.
6. The apparatus of claim 4, wherein the six-tuple comprises units, and is specifically configured to:
the five-tuple analysis result is in one-to-one correspondence with the virtual firewall identification to form a six-tuple;
and/or
And corresponding the five-tuple analysis result to a plurality of virtual firewall identifications to form a six-tuple.
CN201710755205.4A 2017-08-29 2017-08-29 Method and device for rapidly forwarding firewall-crossing messages Active CN107483341B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710755205.4A CN107483341B (en) 2017-08-29 2017-08-29 Method and device for rapidly forwarding firewall-crossing messages

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710755205.4A CN107483341B (en) 2017-08-29 2017-08-29 Method and device for rapidly forwarding firewall-crossing messages

Publications (2)

Publication Number Publication Date
CN107483341A CN107483341A (en) 2017-12-15
CN107483341B true CN107483341B (en) 2020-10-02

Family

ID=60602785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710755205.4A Active CN107483341B (en) 2017-08-29 2017-08-29 Method and device for rapidly forwarding firewall-crossing messages

Country Status (1)

Country Link
CN (1) CN107483341B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311866B (en) * 2019-06-28 2021-11-02 杭州迪普科技股份有限公司 Method and device for rapidly forwarding message
CN111132170A (en) * 2019-12-31 2020-05-08 奇安信科技集团股份有限公司 Communication method and device of virtual firewall, virtual firewall and topological structure
CN112511439B (en) * 2020-11-25 2023-03-14 杭州迪普科技股份有限公司 Data forwarding method, device, equipment and computer readable storage medium
CN112866245B (en) * 2021-01-18 2022-09-09 中国工商银行股份有限公司 Message routing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577628A (en) * 2014-11-11 2016-05-11 中兴通讯股份有限公司 Method and device for realizing virtual firewall
CN105939356A (en) * 2016-06-13 2016-09-14 北京网康科技有限公司 Virtual firewall dividing method and device
CN105939274A (en) * 2016-05-17 2016-09-14 杭州迪普科技有限公司 Message forwarding method and apparatus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100426794C (en) * 2005-10-11 2008-10-15 华为技术有限公司 Method for processing data stream between different fire-proof walls
US8127347B2 (en) * 2006-12-29 2012-02-28 02Micro International Limited Virtual firewall
CN101478533B (en) * 2008-11-29 2012-05-23 成都市华为赛门铁克科技有限公司 Method and system for transmitting and receiving data across virtual firewall
CN101834783B (en) * 2010-03-29 2012-01-25 北京星网锐捷网络技术有限公司 Method and device for forwarding messages and network equipment
US8904511B1 (en) * 2010-08-23 2014-12-02 Amazon Technologies, Inc. Virtual firewalls for multi-tenant distributed services

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577628A (en) * 2014-11-11 2016-05-11 中兴通讯股份有限公司 Method and device for realizing virtual firewall
CN105939274A (en) * 2016-05-17 2016-09-14 杭州迪普科技有限公司 Message forwarding method and apparatus
CN105939356A (en) * 2016-06-13 2016-09-14 北京网康科技有限公司 Virtual firewall dividing method and device

Also Published As

Publication number Publication date
CN107483341A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
CN107483341B (en) Method and device for rapidly forwarding firewall-crossing messages
US10069764B2 (en) Ruled-based network traffic interception and distribution scheme
US20190238410A1 (en) Verifying network intents
CA2947325C (en) Protocol type identification method and apparatus
CN105591973B (en) Application identification method and device
CN106921578B (en) Method and device for generating forwarding table item
US20140365634A1 (en) Programmable Network Analytics Processing via an Inspect/Apply-Action Applied to Physical and Virtual Entities
US11743206B2 (en) Systems and methods for intelligent application grouping
CN111953552B (en) Data flow classification method and message forwarding equipment
CN106878181A (en) A kind of message transmitting method and device
CN103475746A (en) Terminal service method and apparatus
CN105939324A (en) Message forwarding method and device
Kulkarni et al. Neo-NSH: Towards scalable and efficient dynamic service function chaining of elastic network functions
CN104994016A (en) Method and apparatus for packet classification
CN103441927A (en) Message processing method and device
CN113746654A (en) IPv6 address management and flow analysis method and device
CN105743687B (en) Method and device for judging node fault
CN109474713B (en) Message forwarding method and device
CN111131041B (en) VPN flow obtaining method and device based on NetFlow and BGP
CN109510821B (en) Message processing method and device
CN105207904A (en) Message processing method, device and router
WO2022237879A1 (en) Routing obtaining method and apparatus, storage medium, and electronic apparatus
CN110035010A (en) The matching process and relevant apparatus of matching domain
CN115514579B (en) Method and system for realizing service identification based on IPv6 address mapping flow label
CN102763376B (en) Method and system for common group action filtering in telecom network environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant