Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security policy configuration method and device, electronic equipment and storage medium

A security policy and configuration method technology, applied in the field of network security, can solve the problems of low security policy configuration efficiency, improve configuration efficiency and execution efficiency, reduce memory pressure, and improve security

Pending Publication Date: 2022-03-11
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF19 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiments of the present application is to provide a security policy configuration method, device, electronic equipment and storage medium, so as to improve the problem of low security policy configuration existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy configuration method and device, electronic equipment and storage medium
  • Security policy configuration method and device, electronic equipment and storage medium
  • Security policy configuration method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments of the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of the embodiments of the present application.

[0053] When using VFW (Virtualization Security Firewall) for virtual security processing, virtual machines are usually allocated relatively fixed addresses or dynamically allocated in fixed address segments, and the static IP (Internet Protocol, Internet Protocol) of virtual machines is interconnected Protocol) or the virtual machine IP synchronized from the virtualization cloud platform is configured as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security policy configuration method and device, electronic equipment and a storage medium, and relates to the technical field of network security. The method comprises the steps of determining a flow communication topology corresponding to a virtual firewall based on flow information in the virtual firewall; based on the traffic communication topology, a circulation information table between the virtual firewall and the virtual machine is obtained, and the circulation information table comprises circulation information of the multiple pieces of traffic information when the multiple pieces of traffic information circulate between the virtual firewall and the virtual machine; and configuring the plurality of security policies based on the circulation information table so as to send each security policy to the corresponding virtual firewall. According to the method and the device, the flow communication topology of the virtual firewall is drawn, and the circulation information table between the virtual firewall and the virtual machine is obtained on the basis of the flow communication topology, so that a plurality of security policies can be configured according to the circulation information table, and each security policy can be sent to the corresponding virtual firewall; and the configuration efficiency and execution efficiency of the security policy are effectively improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a security policy configuration method, device, electronic equipment and storage medium. Background technique [0002] In virtualized security products, there are two mainstream implementation methods: one is to deploy an agent (a software or hardware entity that can act autonomously) in a virtual machine, and the agent communicates with the security management platform to obtain security policies and configurations. And upload the information related to the virtual machine network; the other is to guide all the traffic on the current host (physical server) to the VFW (virtualized security firewall) by installing the drainage driver in the hardware server where the protected virtual machine is located , the VFW communicates with the security management platform to obtain security policies, configure and upload virtual machine network-related information. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0209H04L63/205
Inventor 王洋
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products