白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Firewall control device, method and firewall device

專利號
US10097515B2
公開日期
2018-10-09
申請人
FUJITSU LIMITED(JP Kawasaki)
發(fā)明人
Dai Suzuki
IPC分類
H04L29/06; G06F9/455
技術領域
fw,fwc,fws,entry,in,discarded,discarding,packets,address,packet
地域: Kawasaki-shi, Kanagawa

摘要

A firewall control device controls a plurality of firewall devices provided between a core network and a plurality of sub-networks respectively, the firewall control device is configured to receive, from the plurality of firewall devices, data amount information indicating an amount of the data discarded in the plurality of firewall devices respectively and node information indicating a transmission source node of the discarded data, identify, based on the data amount information and the node information, a data flow including the discarded data which is transmitted from an information processing device indicated by the node information and of which total amount of the discarded data exceeds a threshold value, and set, in a first firewall device which is included in the plurality of firewall devices and which is coupled to the information processing device, a first discarding flow entry defining discarding of data of the identified data flow.

說明書

As described in FIG. 6, for the identified transmission source FW #2, the FWC 7 performs a setting of a new entry corresponding to the new entry set in the reception FW 5.

As described above, even if the flow entry specifying the transmission source address is set for the reception FW 5, the FWC 7 is able to identify, based on the specified transmission source address, an adequate transmission source FW 5 and to set an adequate new entry for the identified transmission source FW 5.

(Example of Operation of FW System 1)

Next, an example of an operation of the FW system 1 in which flow entries are set for the individual FWs #x will be described with reference to FIG. 8 to FIG. 11. Based on the example of an operation described later, it is possible to reduce undesired traffics to flow through the core network 2.

A situation in which, as exemplified in FIG. 8, a flow A, addressed to a node #4 belonging to the sub-network #4, flows, via the FW #1, from a node #1 belonging to the sub-network #1 and the relevant flow A is discarded by the FW #4 is assumed.

In addition, a situation in which a flow B, addressed to the node #4 belonging to the sub-network #4, flows, via the FW #2, from a node #2 belonging to the sub-network #2 and the relevant flow B is discarded by the FW #4 is assumed.

權利要求

1
微信群二維碼
意見反饋