An internal network protection method and system

An internal network and protection system technology, applied in the field of network communication, can solve the problem of unable to effectively prevent clients from communicating with each other, achieve the effect of filtering network attacks and saving costs

Active Publication Date: 2022-07-26
NANTONG FUJITSU MICROELECTRONICS
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, by configuring port protection on the switch, a specific address can only communicate with clients on the same switch in the same virtual LAN
[0004] However, the inventors of the present application have discovered in the long-term research and development process that when the devices in the internal network attack each other, the firewall deployed between the internal network and the external network cannot effectively identify the network attack behavior between the internal devices, and cannot Cannot effectively prevent clients in the same VLAN on different switches from communicating with each other

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An internal network protection method and system
  • An internal network protection method and system
  • An internal network protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0027] see figure 1 , figure 1 It is a schematic flowchart of an implementation manner of an internal network protection method of the present application. This internal network protection method includes:

[0028] S101: After receiving the first data packet sent by the first switch, the firewall filters the first data packet, and sends the filtered first data packet to the aggregation switch.

[0029]Specifically, a switch is a netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an internal network protection method and system. The protection method includes: after a firewall receives a first data packet sent by a first switch, filtering the first data packet, and filtering the filtered first data packet sending the data packet to the aggregation switch; after receiving the second data packet sent by the aggregation switch, the firewall filters the second data packet, and sends the filtered second data packet to the second switch; Wherein, the first switch, the second switch and the aggregation switch are in the same virtual local area network. Through the above method, the attack behavior between internal network devices can be intercepted, and the mutual communication between clients in the same VLAN on different switches can be effectively prevented.

Description

technical field [0001] The present application relates to the technical field of network communication, and in particular, to an internal network protection method and system. Background technique [0002] Network security means that the hardware, software and data in the network system are protected from being damaged, altered or leaked due to accidental or malicious reasons, the system operates continuously, reliably and normally, and network services are not interrupted. With the development of Internet technology, an independent local area network is usually established in large enterprises for internal network communication. The local area network basically adopts the Ethernet based on broadcast technology. The communication packets between any two nodes are not only for The data received by the network cards of the two nodes is also intercepted by the network card of any node on the same Ethernet. Therefore, it is very necessary to protect the security of the internal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/0663H04L12/46
CPCH04L63/0227H04L63/1441H04L41/0663H04L12/4641
Inventor 石锋张渌冯迎春
Owner NANTONG FUJITSU MICROELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products