Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security-based mirror method and system

A network security and mirroring technology, applied in the field of network communication security, can solve the problem of no traffic being mirrored, and achieve the effect of preventing traffic from being mirrored and ensuring network communication security.

Active Publication Date: 2012-06-06
ZTE CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no implementation to prevent traffic from being mirrored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security-based mirror method and system
  • Network security-based mirror method and system
  • Network security-based mirror method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The basic thought of the present invention is: the NO-MIRROR option that the user enables setting; Write the NO-MIRROR table of user's identification information into setting; When the mode matches the different results of the NO-MIRROR table, the operation of denying the user's traffic to be mirrored is executed respectively.

[0042] The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0043] A mirroring method based on network security, the method comprises the following steps:

[0044] Step 201, the user enables the set NO-MIRROR option.

[0045] Here, the user who enables the NO-MIRROR option in the present invention is the user who refuses to be mirrored, and will not be described in detail below. Different from the prior art, the user of the present invention can add a NO-MIRROR option on its client, if the user does not want the user data traffic to be mirrored in the subsequent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security-based mirror method and a system. The method comprises the steps: enabling set NO-MIRROR options by a user; writing identification information of the user into a set NO-MIRROR list; and examining the NO-MIRROR list before executing mirror operations, and respectively executing the rejection to the operation to be mirrored on the flow of the user according to different results matched with the NO-MIRROR list when adopting a flow mirror mode or a port mirror mode. The invention also discloses a network security-based mirror system. In the system, a rejection to be mirrored executing unit is used for examining the NO-MIRROR list before executing the mirror operations, and respectively executing the rejection to the operation to be mirrored on the flow of the user according to different results matched with the NO-MIRROR list when adopting the flow mirror mode or the port mirror mode. The adoption of the method and the system can effectively prevent the flow from being mirrored.

Description

technical field [0001] The invention relates to network communication security technology, in particular to a network security-based mirroring method and system for protecting important data flow during transmission. Background technique [0002] Mirroring is to copy the traffic on the network that meets the preset matching conditions to the destination port, so as to monitor and detect the network. There are two specific implementation methods: port mirroring and flow mirroring. [0003] When port mirroring is used, the mirrored source port and destination port need to be configured. When implemented, all traffic received by the source port is copied to the destination port to monitor all traffic on the source port. This mirroring method is relatively simple and direct, easy to implement, and more suitable for large-scale network monitoring. The disadvantage is that there is no selectivity for traffic, and it belongs to non-selective copying of all traffic from the source...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L29/06H04L29/08
Inventor 张洁周炎金
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products