Network security protection method, system and device, security switch and storage medium

A technology of network security and switches, applied in network security access control, devices, network security protection methods, security switches and storage media, and system fields, can solve the problems of security policy retention, security policies that cannot be safely protected, and discrete, etc., to achieve improved The effect of efficiency and effectiveness

Pending Publication Date: 2022-04-19
BEIJING VRV SOFTWARE CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, most of the current enterprise security policies remain on paper, or are discretely distributed in different network security devices
Paper-based security policies and discrete security policies cannot play the role of security protection in essence. When encountering security threats or attacks, security policies cannot find a unified starting point for unified and rapid formulation and execution, resulting in Poor efficiency and effectiveness of security emergency response

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method, system and device, security switch and storage medium
  • Network security protection method, system and device, security switch and storage medium
  • Network security protection method, system and device, security switch and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although certain embodiments of the present disclosure are shown in the drawings, it should be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein; A more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for exemplary purposes only, and are not intended to limit the protection scope of the present disclosure.

[0032] It should be understood that the various steps described in the method implementations of the present disclosure may be executed in different orders, and / or executed in parallel. Additionally, method embodiments may include additional steps and / or omit performing illustrated steps. The scope of the present disclosure is not limited in this regard. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security protection method, system and device, a security switch and a storage medium, and the method comprises the steps: obtaining a first identity label of an access terminal from management platform equipment according to the MAC address of the access terminal when the access of the terminal is monitored, and carrying out the identity authentication of the access terminal, and under the condition that authentication of the access terminal succeeds, a security policy request is sent to the management platform equipment, and the security policy request carries the IP address and the first identity identifier of the access terminal, so that the management platform equipment sends the security policy to the access terminal when determining that a security policy issued for the access terminal exists according to the first identity identifier. And replacing a preset placeholder in the security policy with the IP address to obtain a target security policy, and issuing the target security policy to the security switch accessed by the access terminal, so that the security switch executes the target security policy after receiving the target security policy. According to the invention, unified formulation of security policies can be realized, and the efficiency and effect of security protection are improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network security protection method, system, device, security switch and storage medium, which can be applied to network security access control in the field of network security. Background technique [0002] Communication between information points and communication between internal and external networks is an essential business requirement in an enterprise network. In the existing enterprise network security protection work, there are various security protection requirements. These security protection requirements need to be implemented through security policies. to fulfill. [0003] However, most of the current enterprise security policies remain on paper, or are discretely distributed in different network security devices. Paper-based security policies and discrete security policies cannot play the role of security protection in essence. When encountering...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L101/622
CPCH04L63/0876H04L63/10H04L63/1441
Inventor 林皓刘建兵王振欣杨泳
Owner BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products