Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing high-usability of network security equipment under cluster mode

A technology for network security and security equipment, which is applied in the field of high availability of network security equipment in cluster mode, can solve problems such as failure to guarantee the reliability of network security equipment, reduce the availability of network security equipment, and the failure of network card services to work normally, so as to avoid network Session Loss, High Availability, Effect of Improved Availability

Inactive Publication Date: 2009-07-29
BEIJING LEADSEC TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the master-slave hot standby mode, load balancing mode or dual-machine mutual backup mode, the network security device may be processed by the network security device due to the failure of the network security device itself, such as abnormal network card operation, exhaustion of memory or CPU resources, etc. The business cannot work normally, which will reduce the availability of network security devices in cluster mode
Moreover, other reasons such as poor connection of network cables, connection failure between network security equipment and surrounding key equipment or servers will also cause the business processed by the network security equipment to fail to work normally, thus reducing the availability of network security equipment in cluster mode
Moreover, if the network security device is offline or fails, all network sessions being processed by the network security device will be lost, which cannot guarantee the reliability of the network security device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing high-usability of network security equipment under cluster mode
  • Method for realizing high-usability of network security equipment under cluster mode
  • Method for realizing high-usability of network security equipment under cluster mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] Generally, a network security device cluster system (hereinafter referred to as the cluster system) is composed of no less than one network security device node (hereinafter referred to as the node), including a master network security device node (hereinafter referred to as the master node) and no less than One slave network security device node (hereinafter referred to as slave node). In the cluster system, each node is provided with a node status table, which includes unique identifiers of all nodes in the cluster system, priority levels of all nodes, and synchronization status of all nodes. In the cluster system, each node has a priority. The master node started first has the highest priority. The priority of other nodes is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing high availability (HA) of network security equipment in a cluster mode, comprising steps: the main network security equipment node monitors the network security equipment nodes in the cluster system; when the online state of any network security equipment node changes, the cluster The system redistributes the network load. The main network security device node monitors the working link of the network security device node in the cluster system; when the working link of a network security device node fails, the cluster system redistributes the network load. It avoids the situation that the services processed by the failed network security device and the link fault network security device cannot be processed, greatly improves the availability of the network security device, and realizes the high availability of the network security device. Provides network session protection for network security devices, realizes smooth takeover of network sessions, avoids loss of network sessions caused by network security devices being offline or invalid, and greatly improves the reliability of network security devices.

Description

technical field [0001] The invention relates to the technical field of network and information security, in particular to a method for realizing high availability (HA) of network security equipment in a cluster mode. Background technique [0002] With the continuous expansion of computer application fields and the rapid development of network communication technology, network and information security technology has been paid more and more attention, and the requirements for the overall performance of network security equipment to ensure network information security are also getting higher and higher. Currently, the commonly used network security devices include firewall, virtual personal network (VPN), network intrusion detection system (NIDS) and secure socket layer (SSL) accelerator, etc. [0003] Network security devices are gateway devices. Generally, all inbound and outbound network data packets must pass through network security devices. Network security devices are in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/00H04L12/24
Inventor 刘永锋王刚刘春梅雷永成刘天荣肖为剑
Owner BEIJING LEADSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products