CN1192310C - Fireproof wall for interconnecting network - Google Patents

Fireproof wall for interconnecting network Download PDF

Info

Publication number
CN1192310C
CN1192310C CNB991184033A CN99118403A CN1192310C CN 1192310 C CN1192310 C CN 1192310C CN B991184033 A CNB991184033 A CN B991184033A CN 99118403 A CN99118403 A CN 99118403A CN 1192310 C CN1192310 C CN 1192310C
Authority
CN
China
Prior art keywords
information
network
policy table
packets
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB991184033A
Other languages
Chinese (zh)
Other versions
CN1286430A (en
Inventor
M·谢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NETSPECT TECHNOLOGY (CANADA) Inc
Original Assignee
NETSPECT TECHNOLOGY (CANADA) Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NETSPECT TECHNOLOGY (CANADA) Inc filed Critical NETSPECT TECHNOLOGY (CANADA) Inc
Priority to CNB991184033A priority Critical patent/CN1192310C/en
Publication of CN1286430A publication Critical patent/CN1286430A/en
Application granted granted Critical
Publication of CN1192310C publication Critical patent/CN1192310C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a network firewall which comprises an inner network interface, an outer network interface, a firewall strategy table memory, an information packet processor and a network node table memory, wherein the network node table memory is used for storing corresponding tables of internet protocol (IP) addresses and media access control (MAC) addresses. After receiving network information, the information packet processor lookups the firewall strategy table memory and decides to forward or discard information packets according to the strategy settings of the firewall. The firewall self does not have an IP address and can directly collect all information packets which are connected with networks which are connected to the firewall, and the information packet processor processes the information packets.

Description

Fireproof wall for interconnecting network
Technical field
The present invention relates generally to fireproof wall for interconnecting network, relates to a fireproof wall for interconnecting network that does not need to be provided with the IP address especially, hides the existence of fireproof wall for interconnecting network according to this.
Background technology
As everyone knows, fire wall generally is connected between dedicated network and the public network, to play the effect of control and protection dedicated network.The shortcoming of known firewall product is that its inside and outside port all need be provided with the IP address, can be connected with corresponding network.As U.S. 3COM Corp. fire wall, before using, need elder generation's external network interface to be set to a certain and the IP address common network compatibility, internal network interface is set to a certain and the IP address dedicated network compatibility again, and right Hou can be carried out firewall functionality.Known fire wall receives only the IP packets of information of giving MAC Address own or broadcast address, and handles according to the IP information of packets of information, as transmitting or abandoning.Therefore, need provide a fire wall that does not need to be provided with inside and outside IP address, make being provided with of fire wall simple, and the existence that can hide fire wall.
Summary of the invention
The object of the present invention is to provide a fire wall that does not need to be provided with the IP address, be used to connect two computer networks.
Fireproof wall for interconnecting network of the present invention comprises: internal network interface is used for reception/transmission internal network information; External network interface is used for reception/transmission internal network information; Firewall policy table storer is used to store the firewall policy table; Packet processor, connect internal network interface and external network interface, be used to analyze inside and the received contents of packet of external interface, according to holding within the firewall policy table storer, packets of information is handled, result is sent to outside or internal network interface respectively; With a network node table storer, be used for the corresponding tables of IP address and MAC Address is stored in wherein; When packet processor receives any interface when receiving the quantity of information bag, do following processing:
(1) extract network node information from packets of information, promptly IP address and MAC Address are stored in the network node on public and the dedicated network respectively in this table;
(2) whether comparison information bag content conforms to the content of network node table storage; Determine packet stream to, when the flow direction of packets of information belongs to same type in network node table storer, packet processor is not done any processing, otherwise, change next step processing;
(3) firewall policy table storer is consulted in judgment processing packets of information action, and according to the strategy setting of fire wall, packets of information is transmitted or abandoned in decision.
Therefore fire wall of the present invention can be placed arbitrary node of network dynamically, need not to carry out any reconfiguring, and just can network information bag be handled and filter according to the firewall policy of importing in advance.
Description of drawings
Fig. 1 is the structural representation of fire wall of the present invention.
Fig. 2 is the connection diagram of fire wall of the present invention.
Embodiment
As shown in Figure 1, fire wall 1 of the present invention comprises: packet processor 2 is connected to network node table storer 3 respectively, firewall policy table storer 4, external network interface 5 and internal network interface 6.After network information bag was by internal network interface 6 or external network interface 5 receptions, the treatment step of packet processor 2 was as follows:
(1) extract network node information from packets of information, promptly IP and MAC Address are stored in the network node on public and the dedicated network respectively in the network node table storer 3;
(2) determine packet stream to, when the flow direction of packets of information belongs to same type in network node table storer 3, for example from the common network to the common network, or from the dedicated network to the dedicated network, packet processor is not done any processing, otherwise, change next step processing;
(3) consult firewall policy table storer 4, and according to the setting of this IP address among the Policy Table of fire wall and the package informatin that receives, it is source IP address, purpose IP address, protocol types etc. are taken action to the packets of information that meets feature is required, as are forwarded to internal network interface 6, be forwarded to external network interface 5, or abandon etc.
Fire wall 1 also can comprise Policy Table's processor 7, connect firewall policy table storer 4 and internal network interface 6 or external network interface 5, by www server or ad hoc network agreement, receive the network information, and, the firewall policy table in the firewall policy table storer 4 is set according to the information that receives.
Fire wall 1 also can comprise one interface 8 is set, as RS232, and keyboard terminal etc., this is provided with interface 8 and is connected to Policy Table's processor 7, and Policy Table's processor receives the signal that interface is set, and the firewall policy in the firewall policy table storer 4 is set.
Connected mode when Fig. 2 example goes out fire wall of the present invention and is connected between dedicated network and the common network, fire wall of the present invention also can be used for connecting dedicated network and dedicated network or common network and common network.

Claims (4)

1. fireproof wall for interconnecting network comprises:
Internal network interface is used for reception/transmission internal network information;
External network interface is used for reception/transmission external network information;
Firewall policy table storer is used to store the firewall policy table;
Packet processor, connect internal network interface and external network interface, be used to analyze inside and the received contents of packet of external interface, according to holding within the firewall policy table storer, packets of information is handled, result is sent to outside or internal network interface respectively;
It is characterized in that:
Also comprise a network node table storer, be used for the corresponding tables of IP address and MAC Address is stored in wherein;
When packet processor receives any interface when receiving packets of information, this packet processor is done following processing:
(1) extract network node information on the public and dedicated network from packets of information, promptly IP address and MAC Address will be stored in respectively in the network node table storer;
(2) whether comparison information bag content conforms to the content of network node table storage; Determine packet stream to, when the flow direction of packets of information belongs to same type in network node table storer, packet processor is not done any processing, otherwise, change next step processing;
(3) consult firewall policy table storer, and according to the strategy setting of fire wall, packets of information is transmitted or is abandoned in decision.
2. fire wall as claimed in claim 1, it is characterized in that, packet processor is according to source IP address, purpose IP address, the protocol type of the packets of information that receives, the packets of information that meets the feature of IP address described in the firewall policy table storer is taked required action, promptly be forwarded to internal network interface, be forwarded to external network interface, or abandon etc.
3. fire wall according to claim 1 is characterized in that, also comprises Policy Table's processor, is used to connect inside or external network interface, by www server or ad hoc network agreement, the firewall policy table in the firewall policy table storer is set.
4. as fire wall as described in the claim 3, it is characterized in that this fire wall also can comprise one interface is set that Policy Table's processor receives the signal that interface is set, and the firewall policy table of firewall policy table storer is set.
CNB991184033A 1999-08-26 1999-08-26 Fireproof wall for interconnecting network Expired - Fee Related CN1192310C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB991184033A CN1192310C (en) 1999-08-26 1999-08-26 Fireproof wall for interconnecting network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB991184033A CN1192310C (en) 1999-08-26 1999-08-26 Fireproof wall for interconnecting network

Publications (2)

Publication Number Publication Date
CN1286430A CN1286430A (en) 2001-03-07
CN1192310C true CN1192310C (en) 2005-03-09

Family

ID=5280440

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB991184033A Expired - Fee Related CN1192310C (en) 1999-08-26 1999-08-26 Fireproof wall for interconnecting network

Country Status (1)

Country Link
CN (1) CN1192310C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7987503B2 (en) 2005-07-30 2011-07-26 Huawei Technologies Co., Ltd. Firewall control system based on a next generation network service and method thereof

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100530205C (en) * 2003-07-05 2009-08-19 鸿富锦精密工业(深圳)有限公司 Firewall device and setting method thereof
CN100337222C (en) * 2004-07-15 2007-09-12 联想网御科技(北京)有限公司 A firewall and access restriction method thereof
ES2285379T3 (en) * 2004-07-16 2007-11-16 Alcatel Lucent METHOD TO ENSURE COMMUNICATION IN AN LCAL AREA NETWORK SWITCH.
US8239930B2 (en) * 2006-10-25 2012-08-07 Nokia Corporation Method for controlling access to a network in a communication system
CN101296222B (en) * 2007-04-25 2011-02-02 北京天融信网络安全技术有限公司 Method for improving hardware acceleration performance of fire wall chip
CN101355415B (en) * 2007-07-26 2010-12-01 万能 Method and system for implementing safety access public network of network terminal as well as special network access controller thereof
CN101662368A (en) * 2008-08-28 2010-03-03 黄金富 Network data filtering device capable of fighting against Trojan horse programs and corresponding method
DE102013216501A1 (en) * 2013-08-20 2015-02-26 Vega Grieshaber Kg Instrument access device, field device and method for controlling access to a meter
CN104717205A (en) * 2015-02-04 2015-06-17 上海展湾信息科技有限公司 Industrial control firewall control method based on message reconstitution

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7987503B2 (en) 2005-07-30 2011-07-26 Huawei Technologies Co., Ltd. Firewall control system based on a next generation network service and method thereof

Also Published As

Publication number Publication date
CN1286430A (en) 2001-03-07

Similar Documents

Publication Publication Date Title
US6006272A (en) Method for network address translation
US8238336B2 (en) Method for forwarding data packet, system, and device
CN101087296B (en) Method for utilizing network processor to translate the IPv4/IPv6 network protocol
US20070060147A1 (en) Apparatus for transmitting data packets between wireless sensor networks over internet, wireless sensor network domain name server, and data packet transmission method using the same
US20020026528A1 (en) System and method for selectively bridging and routing data packets between multiple networks
KR101028138B1 (en) A method for assigning address to the intelligent information household appliance and the sub-equipment in the household network
EP2274897A1 (en) Technique for address resolution in a data transmission network
CN1192310C (en) Fireproof wall for interconnecting network
TW200409500A (en) Dynamic network address translation system and method of transparent private network device
CN101072138A (en) Method and device for providing multi public network service for small networks
KR100587560B1 (en) Method and apparatus for communicating with outer system in link local address system
CN113923186A (en) IPV6 network communication method, device and system
US6976054B1 (en) Method and system for accessing low-level resources in a network device
WO2005114431A2 (en) Data communication system, router and method for routeing data
US6845397B1 (en) Interface method and system for accessing inner layers of a network protocol
CN108040132A (en) System for realizing conversion from RapidIO to gigabit gateway protocol
Cisco IP Commands
Cisco Configuring Network Address Translation
Cisco IP Commands
Cisco IP Commands
Cisco IP Commands
Cisco IP Commands
Cisco IP Commands
Cisco IP Commands
Cisco IP Commands

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee