Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing experimental system of firewall under multiple user's remote concurrency control in large scale

A technology for remote users and experimental systems, applied in the field of firewall experimental systems

Active Publication Date: 2006-04-19
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to address the shortcomings of the existing multi-user concurrent control firewall technology, and provide a method for realizing a remote large-scale multi-user concurrent control firewall experiment system, so that it adopts the WEB interface and overcomes the existing firewall experiment teaching The system can only support multi-user operations in the LAN, and cannot simultaneously provide practical restrictions to multiple remote users anywhere on the Internet, which significantly improves the efficiency of using a single firewall device in information security practice training, and effectively reduces information security. Cost of practical training

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In conjunction with the principles and methods of the present invention described above, the following embodiments are provided. The remote large-scale multi-user concurrent control firewall experiment system realized based on the present invention adopts B / S architecture, utilizes JSP, JavaBean and Linux C programming technology to realize, and supports multiple remote users at any position on the Internet to log in to the same firewall through a browser Systematic practice of firewall technology. The specific implementation content is as follows:

[0051] 1. The server side of the system includes at least two hosts, one is used as a firewall host, and the other is used as a virtual host server.

[0052] The host of the firewall adopts an X86 computer with three network cards installed. The internal network card is configured with an IP address of 192.168.1.254 / 16, the external network card is configured with a public network IP, and the DMZ network card is configured...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When user logs on system to start experiment, the method assigns the user an ID according to user ID allocation algorithm. When user starts up and shuts down own remote corresponding virtual machine, the method manages virtual machine system relevant to userí»s ID remotely according to virtual machine management algorithm. After user configures firewall rules, network command operation console embedded to WEB validates validity of firewall rules. Through network command proxy service program for remote user on firewall system, the network command operation console is connected to real network command operation terminal of virtual host to send out userí»s network command in real time, and display received result to user. The invention makes firewall system in multiple users provide experimentation for users so as to be applicable to practicing, training and popularizing technique of firewall.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to a method for realizing a remote large-scale multi-user concurrent control firewall experiment system. Background technique [0002] The research on information security practice technology is an important research direction in the field of information security. The rapid development and wide application of computer network technology make the Internet an important part of people's daily life, but it also brings various network security problems. Although the network protection technology has been deeply researched, especially the firewall technology, which has developed very maturely, the system that can provide people with information security practice training is still in the initial stage of research. [0003] Found through document retrieval to prior art, Chinese patent number: CN200410016710.X, title of invention is: the method for realizing virtual...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/00H04L29/06
Inventor 杨树堂李建华李铎锋马进陆松年
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products