[go: up one dir, main page]

CN119299197A - A data processing method, device and equipment - Google Patents

A data processing method, device and equipment Download PDF

Info

Publication number
CN119299197A
CN119299197A CN202411463465.0A CN202411463465A CN119299197A CN 119299197 A CN119299197 A CN 119299197A CN 202411463465 A CN202411463465 A CN 202411463465A CN 119299197 A CN119299197 A CN 119299197A
Authority
CN
China
Prior art keywords
firewall
configuration request
access policy
configuration
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411463465.0A
Other languages
Chinese (zh)
Inventor
王乾
李原
李晔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peoples Insurance Company of China
Original Assignee
Peoples Insurance Company of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peoples Insurance Company of China filed Critical Peoples Insurance Company of China
Priority to CN202411463465.0A priority Critical patent/CN119299197A/en
Publication of CN119299197A publication Critical patent/CN119299197A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the specification discloses a data processing method, a device and equipment, wherein the method comprises the steps of receiving a configuration request of firewall policies, responding to the configuration request, determining a first firewall of source address equipment and a second firewall of destination address equipment corresponding to the configuration request, determining whether access policies are added in the first firewall and the second firewall according to the relation between a security area of the first firewall and a security area of the second firewall, judging whether target access policies corresponding to the configuration request exist in the first firewall and the second firewall if the access policies are added in the first firewall and the second firewall, and configuring the target access policies corresponding to the configuration request in the first firewall and the second firewall if the access policies corresponding to the configuration request do not exist in the first firewall and the second firewall.

Description

一种数据处理方法、装置及设备A data processing method, device and equipment

技术领域Technical Field

本文件涉及计算机技术领域,尤其涉及一种数据处理方法、装置及设备。This document relates to the field of computer technology, and in particular to a data processing method, device and equipment.

背景技术Background Art

随着计算机技术的飞速发展,为提高数据安全,网络架构和防火墙的部署越来越复杂,防火墙管理员需要根据不同的访问需求,在对应防火墙上配置访问策略。With the rapid development of computer technology, in order to improve data security, network architecture and firewall deployment are becoming more and more complex. Firewall administrators need to configure access policies on the corresponding firewall according to different access requirements.

但是,由于防火墙数量较多,需要配置的访问策略的数量以及类型也较为复杂,因而人工配置访问策略的方式的配置效率和配置准确性低下。为此,本说明书实施例提供一种提高防火墙中访问策略的配置效率和配置准确性效率的技术方案。However, due to the large number of firewalls, the number and types of access policies that need to be configured are also relatively complex, so the configuration efficiency and configuration accuracy of the manual configuration of access policies are low. To this end, the embodiments of this specification provide a technical solution to improve the configuration efficiency and configuration accuracy of access policies in firewalls.

发明内容Summary of the invention

本说明书实施例的目的是提供一种提高防火墙中访问策略的配置效率和配置准确性效率的技术方案。The purpose of the embodiments of this specification is to provide a technical solution for improving the configuration efficiency and configuration accuracy of access policies in a firewall.

为了实现上述技术方案,本说明书实施例是这样实现的:In order to implement the above technical solution, the embodiments of this specification are implemented as follows:

本说明书实施例提供的一种数据处理方法,所述方法包括:接收防火墙策略的配置请求;响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。A data processing method provided by an embodiment of the present specification includes: receiving a configuration request for a firewall policy; in response to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request; determining whether to add an access policy to the first firewall and the second firewall according to a relationship between a security zone of the first firewall and a security zone of the second firewall; if it is determined to add an access policy to the first firewall and the second firewall, determining whether a target access policy corresponding to the configuration request exists in the first firewall and the second firewall; if the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall, configuring the target access policy corresponding to the configuration request in the first firewall and the second firewall.

本说明书实施例提供的一种数据处理装置,所述装置包括:请求接收模块,用于接收防火墙策略的配置请求;防火墙确定模块,用于响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;第一判断模块,用于根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;第二判断模块,用于若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;策略配置模块,用于若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。An embodiment of the present specification provides a data processing device, the device comprising: a request receiving module, used to receive a configuration request for a firewall policy; a firewall determining module, used to determine, in response to the configuration request, a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request; a first judgment module, used to determine whether to add an access policy to the first firewall and the second firewall according to the relationship between the security area of the first firewall and the security area of the second firewall; a second judgment module, used to determine whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall if it is determined to add an access policy to the first firewall and the second firewall; and a policy configuration module, used to configure the target access policy corresponding to the configuration request in the first firewall and the second firewall if there is no access policy corresponding to the configuration request in the first firewall and the second firewall.

本说明书实施例提供的一种数据处理设备,所述数据处理设备包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:接收防火墙策略的配置请求;响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。An embodiment of the present specification provides a data processing device, the data processing device comprising: a processor; and a memory arranged to store computer executable instructions, wherein when the executable instructions are executed, the processor: receives a configuration request for a firewall policy; in response to the configuration request, determines a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request; determines whether to add an access policy to the first firewall and the second firewall according to a relationship between a security zone of the first firewall and a security zone of the second firewall; if it is determined to add an access policy to the first firewall and the second firewall, determines whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall; if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configures the target access policy corresponding to the configuration request in the first firewall and the second firewall.

本说明书实施例还提供了一种存储介质,所述存储介质用于存储计算机可执行指令,所述可执行指令在被处理器执行时实现以下流程:接收防火墙策略的配置请求;响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。The embodiments of the present specification also provide a storage medium, which is used to store computer-executable instructions. When the executable instructions are executed by a processor, they implement the following process: receiving a configuration request for a firewall policy; in response to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request; determining whether to add an access policy to the first firewall and the second firewall based on the relationship between the security area of the first firewall and the security area of the second firewall; if it is determined to add an access policy to the first firewall and the second firewall, determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall; if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configuring the target access policy corresponding to the configuration request in the first firewall and the second firewall.

本说明书实施例还提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现以下流程:接收防火墙策略的配置请求;响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。The embodiments of the present specification also provide a computer program product, including a computer program, which implements the following process when executed by a processor: receiving a configuration request for a firewall policy; in response to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request; determining whether to add an access policy to the first firewall and the second firewall based on the relationship between the security area of the first firewall and the security area of the second firewall; if it is determined to add an access policy to the first firewall and the second firewall, determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall; if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configuring the target access policy corresponding to the configuration request in the first firewall and the second firewall.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图;In order to more clearly illustrate the technical solutions in the embodiments of this specification or the prior art, the drawings required for use in the embodiments or the prior art description will be briefly introduced below. Obviously, the drawings described below are only some embodiments recorded in this specification. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative labor.

图1为本说明书一种数据处理方法实施例;FIG1 is an embodiment of a data processing method of the present specification;

图2为本说明书一种数据处理过程的示意图;FIG2 is a schematic diagram of a data processing process of this specification;

图3为本说明书一种数据处理过程的示意图;FIG3 is a schematic diagram of a data processing process of this specification;

图4为本说明书一种数据处理装置实施例;FIG4 is a data processing device embodiment of the present specification;

图5为本说明书一种数据处理设备实施例。FIG. 5 is a data processing device embodiment of the present specification.

具体实施方式DETAILED DESCRIPTION

本说明书实施例提供一种数据处理方法、装置及设备。The embodiments of this specification provide a data processing method, device and equipment.

为了使本技术领域的人员更好地理解本说明书中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书保护的范围。In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described embodiments are only part of the embodiments of this specification, not all of the embodiments. Based on the embodiments in this specification, all other embodiments obtained by ordinary technicians in this field without creative work should fall within the scope of protection of this specification.

本说明书实施例提供一种提高防火墙中访问策略的配置效率和配置准确性效率的技术方案,随着计算机技术的飞速发展,为提高数据安全,网络架构和防火墙的部署越来越复杂,防火墙管理员需要根据不同的访问需求,在对应防火墙上配置访问策略。但是,由于防火墙数量较多,需要配置的访问策略的数量以及类型也较为复杂,因而人工配置访问策略的方式的配置效率和配置准确性低下。为此,本说明书实施例提供一种提高防火墙中访问策略的配置效率和配置准确性效率的技术方案。该方案中,通过接收防火墙策略的配置请求,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。这样,通过对是否在第一防火墙和第二防火墙中增加访问策略,以及对第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的双重判断,可以减少冗余策略、无效策略的下发,从而避免防火墙性能消耗的增加,以及防火墙可用策略条目数的减少,提高了防火墙中访问策略的配置效率和配置准确性。具体处理可以参见下述实施例中的具体内容。The embodiment of this specification provides a technical solution for improving the configuration efficiency and configuration accuracy of access policies in firewalls. With the rapid development of computer technology, in order to improve data security, the deployment of network architecture and firewalls is becoming more and more complex. Firewall administrators need to configure access policies on corresponding firewalls according to different access requirements. However, due to the large number of firewalls, the number and types of access policies that need to be configured are also relatively complex, so the configuration efficiency and configuration accuracy of the manual configuration of access policies are low. To this end, the embodiment of this specification provides a technical solution for improving the configuration efficiency and configuration accuracy of access policies in firewalls. In this solution, by receiving a configuration request of a firewall policy, responding to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request, and determining whether to add access policies to the first firewall and the second firewall according to the relationship between the security area of the first firewall and the security area of the second firewall. If it is determined to add access policies to the first firewall and the second firewall, it is determined whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall. If there is no access policy corresponding to the configuration request in the first firewall and the second firewall, the target access policy corresponding to the configuration request is configured in the first firewall and the second firewall. In this way, by making a double judgment on whether to add access policies in the first firewall and the second firewall, and whether there are target access policies corresponding to the configuration request in the first firewall and the second firewall, the issuance of redundant policies and invalid policies can be reduced, thereby avoiding an increase in firewall performance consumption and a reduction in the number of available firewall policy entries, thereby improving the configuration efficiency and configuration accuracy of the access policies in the firewalls. For specific processing, please refer to the specific content in the following embodiments.

如图1所示,本说明书实施例提供一种数据处理方法,该方法的执行主体可以为服务器,其中的服务器可以是独立的一个服务器,还可以是由多个服务器构成的服务器集群等。本实施例中以执行主体为服务器为例进行详细说明,该方法具体可以包括以下步骤:As shown in FIG1 , an embodiment of this specification provides a data processing method, and the execution subject of the method may be a server, wherein the server may be an independent server, or a server cluster composed of multiple servers, etc. In this embodiment, the execution subject is taken as an example to be described in detail, and the method may specifically include the following steps:

在步骤S102中,接收防火墙策略的配置请求。In step S102, a configuration request for a firewall policy is received.

其中,防火墙策略可以为允许访问策略等,配置请求中可以携带有配置需求信息,配置需求信息可以包含源地址设备的源地址(Source address,src)信息、目的地址设备的目的地址(Destination address,dst)信息、源地址设备和目的地址设备的端口(post)信息和安全区域信息等。Among them, the firewall policy can be an access permission policy, etc. The configuration request can carry configuration requirement information, and the configuration requirement information can include the source address (Source address, src) information of the source address device, the destination address (Destination address, dst) information of the destination address device, the port (post) information of the source address device and the destination address device, and the security zone information, etc.

在实施中,用户可以在工单系统中提交开墙工单,开墙工单被审批会签通过后,运维系统可以通过API接口推送该开墙工单的工单数据至策略下发系统。During implementation, users can submit wall-breaking work orders in the work order system. After the wall-breaking work order is approved, the operation and maintenance system can push the work order data of the wall-breaking work order to the policy delivery system through the API interface.

由于用户提交的工单数据中可能存在数据格式不符合预设格式规范的数据,因此,策略下发系统在接收到开墙工单的工单数据后,可以对该开墙工单的工单数据进行数据校验处理,以将不符合预设格式规范的数据转换为符合预设格式规范的数据。Since the work order data submitted by the user may contain data whose format does not conform to the preset format specifications, the policy issuance system can perform data verification processing on the work order data of the wall opening work order after receiving the work order data of the wall opening work order, so as to convert the data that does not conform to the preset format specifications into data that conforms to the preset format specifications.

其中,预设格式规范可以包括IP地址规范、掩码地址规范等预设数据格式规范。The preset format specifications may include preset data format specifications such as IP address specifications and mask address specifications.

服务器可以根据转换后的工单数据触发防火墙策略的配置请求,其中,服务器可以根据转换后的工单数据确定配置需求信息,并将配置需求信息携带在配置请求中。The server may trigger a configuration request for a firewall policy based on the converted work order data, wherein the server may determine configuration requirement information based on the converted work order data and carry the configuration requirement information in the configuration request.

另外,由于同一设备可以对应多个不同的防火墙,因而服务器接收到的工单数据可以为针对多个不同防火墙的策略配置请求,因此,为提高数据处理效率,服务器还可以根据防火墙管控网段对工单数据对应的需求表进行拆分处理,并根据拆分得到的需求子表,确定配置需求信息。In addition, since the same device can correspond to multiple different firewalls, the work order data received by the server can be policy configuration requests for multiple different firewalls. Therefore, in order to improve data processing efficiency, the server can also split the demand table corresponding to the work order data according to the firewall management and control network segment, and determine the configuration requirement information based on the demand sub-table obtained by the split.

例如,工单数据对应的需求表可以如下表1所示。For example, the demand table corresponding to the work order data may be shown in Table 1 below.

表1Table 1

服务器可以对上述表1所示的需求表进行拆分处理,得到多个需求子表,再根据每个需求子表,确定对应的配置需求信息,以及触发对应的防火墙策略的配置请求。The server may split the requirement table shown in Table 1 above to obtain multiple requirement sub-tables, and then determine the corresponding configuration requirement information and trigger the configuration request of the corresponding firewall policy according to each requirement sub-table.

例如,服务器可以根据上述表1中每条需求构建需求子表,或者,服务器还可以以防火墙为主,筛选出需求表中包含同一防火墙的需求信息,并根据筛选出的需求信息构建需求子表等。For example, the server may construct a requirement sub-table according to each requirement in Table 1 above, or the server may filter out requirement information containing the same firewall in the requirement table based on firewalls, and construct a requirement sub-table according to the filtered requirement information.

此外,上述防火墙策略的配置请求的生成方法是一种可选地、可实现的生成方法,在实际应用场景中,还可以有多种不同的生成方法,可以根据实际应用场景的不同选取不同的生成方法,本说明书实施例对此不做具体限定。In addition, the method for generating the configuration request of the above-mentioned firewall policy is an optional and feasible generation method. In actual application scenarios, there may be a variety of different generation methods. Different generation methods can be selected according to different actual application scenarios. The embodiments of this specification do not make specific limitations on this.

在步骤S104中,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙。In step S104, in response to the configuration request, a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request are determined.

在步骤S106中,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在第一防火墙和第二防火墙中增加访问策略。In step S106, according to the relationship between the security zone of the first firewall and the security zone of the second firewall, it is determined whether to add access policies in the first firewall and the second firewall.

其中,安全区域(zone)可以是防火墙若干接口所连网络的集合,一个安全区域内的用户可以具有相同的安全属性。A security zone can be a collection of networks connected to several interfaces of a firewall. Users within a security zone can have the same security attributes.

在实施中,服务器可以根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系(如预先设定的信任关系、非信任关系等),确定第一防火墙和第二防火墙之间的访问是否需要过墙,以确定是否需要在第一防火墙和第二防火墙中增加访问策略。During implementation, the server can determine whether access between the first firewall and the second firewall needs to go through the wall based on the relationship between the security area of the first firewall and the security area of the second firewall (such as a pre-set trust relationship, non-trust relationship, etc.), so as to determine whether it is necessary to add access policies in the first firewall and the second firewall.

在步骤S108中,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略。In step S108, if it is determined to add access policies in the first firewall and the second firewall, it is determined whether there are target access policies corresponding to the configuration request in the first firewall and the second firewall.

在实施中,服务器在确定在第一防火墙和第二防火墙中需要增加访问策略的情况下,可以根据第一防火墙和第二防火墙中是否存在访问策略,以及访问策略的类型,判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略。During implementation, when the server determines that an access policy needs to be added in the first firewall and the second firewall, it can determine whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall based on whether there is an access policy in the first firewall and the second firewall and the type of the access policy.

其中,访问策略的类型可以包含允许访问策略、非默认拒绝策略、访问流量不受防火墙管控无需下发策略、默认访问策略等。Among them, the types of access policies can include allow access policy, non-default deny policy, access traffic is not subject to firewall control and no policy needs to be issued, default access policy, etc.

在步骤S110中,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。In step S110, if the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall, a target access policy corresponding to the configuration request is configured in the first firewall and the second firewall.

在实施中,服务器在确定第一防火墙和第二防火墙中不存在与配置请求对应的访问策略的情况下,可以生成与配置请求对应的脚本,并将脚本下发至第一防火墙和第二防火墙,以在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。In implementation, when the server determines that there is no access policy corresponding to the configuration request in the first firewall and the second firewall, it can generate a script corresponding to the configuration request and send the script to the first firewall and the second firewall to configure the target access policy corresponding to the configuration request in the first firewall and the second firewall.

其中,由于配置请求可能有多个,因此,服务器可以在生成脚本后,根据预设下发周期(如3分钟、10分钟等),将预设下发周期内生成的脚本下发至对应的防火墙。Among them, since there may be multiple configuration requests, after generating the script, the server can send the script generated within the preset sending period (such as 3 minutes, 10 minutes, etc.) to the corresponding firewall according to the preset sending period.

本说明书实施例提供一种数据处理方法,通过接收防火墙策略的配置请求,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。这样,通过对是否在第一防火墙和第二防火墙中增加访问策略,以及对第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的双重判断,可以减少冗余策略、无效策略的下发,从而避免防火墙性能消耗的增加,以及防火墙可用策略条目数的减少,提高了防火墙中访问策略的配置效率和配置准确性。The embodiment of the specification provides a data processing method, which receives a configuration request of a firewall policy, responds to the configuration request, determines a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request, determines whether to add an access policy in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall, and if it is determined to add an access policy in the first firewall and the second firewall, determines whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, and if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configures the target access policy corresponding to the configuration request in the first firewall and the second firewall. In this way, by making a double judgment on whether to add an access policy in the first firewall and the second firewall, and whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, the issuance of redundant policies and invalid policies can be reduced, thereby avoiding an increase in firewall performance consumption and a reduction in the number of available firewall policy entries, and improving the configuration efficiency and configuration accuracy of the access policy in the firewall.

在实际应用中,上述步骤S106中根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在第一防火墙和第二防火墙中增加访问策略,的具体处理方式可以有多种多样,以下提供一种可选的处理方式,如图2所示,具体可以包括以下步骤S1062的处理。In practical applications, in the above step S106, based on the relationship between the security zone of the first firewall and the security zone of the second firewall, it is determined whether to add access policies in the first firewall and the second firewall. There may be various specific processing methods. An optional processing method is provided below, as shown in FIG. 2, which may specifically include the processing of the following step S1062.

在步骤S1062中,根据第一防火墙与第二防火墙的分组信息,以及第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在第一防火墙和第二防火墙中增加访问策略。In step S1062, it is determined whether to add access policies in the first firewall and the second firewall according to the grouping information of the first firewall and the second firewall and the relationship between the security zone of the first firewall and the security zone of the second firewall.

在实际应用中,上述步骤S1062中根据第一防火墙与第二防火墙的分组信息,以及第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在第一防火墙和第二防火墙中增加访问策略的具体处理方式可以多种多样,以下提供一种可选的处理方式,具体可以包括以下步骤A1~步骤A2的处理。In practical applications, there are various specific processing methods for determining whether to add access policies to the first firewall and the second firewall based on the grouping information of the first firewall and the second firewall and the relationship between the security areas of the first firewall and the second firewall in the above step S1062. An optional processing method is provided below, which may specifically include the processing of the following steps A1 to A2.

在步骤A1中,在根据第一防火墙和第二防火墙的分组信息确定第一防火墙和第二防火墙不属于同一分组,且第一防火墙和第二防火墙之间存在预设关联关系的情况下,获取第一防火墙的安全区域中的逻辑安全区域,以及第二防火墙的安全区域中的逻辑安全区域。In step A1, when it is determined based on the grouping information of the first firewall and the second firewall that the first firewall and the second firewall do not belong to the same group and there is a preset association relationship between the first firewall and the second firewall, the logical security area in the security area of the first firewall and the logical security area in the security area of the second firewall are obtained.

其中,逻辑安全区域可以为安全区域中根据业务处理逻辑划分的安全子区域,安全区域中可以包含一个或多个逻辑安全区域。The logical security area may be a security sub-area divided according to business processing logic in the security area, and the security area may include one or more logical security areas.

在步骤A2中,在第一防火墙的安全区域中的逻辑安全区域与第二防火墙的安全区域中的逻辑安全区域不相同的情况下,确定在第一防火墙和第二防火墙中增加访问策略。In step A2, when the logical security zone in the security zone of the first firewall is different from the logical security zone in the security zone of the second firewall, it is determined to add access policies in the first firewall and the second firewall.

在实施中,如图3所示,若根据第一防火墙和第二防火墙的分组信息确定第一防火墙和第二防火墙不属于同一分组,可以继续判断第一防火墙和第二防火墙是否为关联防火墙(即第一防火墙和第二防火墙之间是否存在预设关联关系)。In implementation, as shown in FIG3 , if it is determined according to the grouping information of the first firewall and the second firewall that the first firewall and the second firewall do not belong to the same group, it may be further determined whether the first firewall and the second firewall are associated firewalls (i.e., whether there is a preset association relationship between the first firewall and the second firewall).

若第一防火墙和第二防火墙为关联防火墙,则可以继续判断第一防火墙的安全区域中的逻辑安全区域与第二防火墙的安全区域中的逻辑安全区域是否相同,若相同,则不需要开墙,若不同,则需求开墙(即需要增加访问策略)。If the first firewall and the second firewall are associated firewalls, you can continue to determine whether the logical security area in the security area of the first firewall is the same as the logical security area in the security area of the second firewall. If they are the same, there is no need to open the wall. If they are different, it is necessary to open the wall (that is, it is necessary to add access policies).

此外,上述步骤S1062中根据第一防火墙与第二防火墙的分组信息,以及第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在第一防火墙和第二防火墙中增加访问策略的具体处理方式可以多种多样,以下再提供一种可选的处理方式,具体可以包括以下步骤B1的处理。In addition, in the above step S1062, according to the grouping information of the first firewall and the second firewall, and the relationship between the security area of the first firewall and the security area of the second firewall, the specific processing method for determining whether to add access policies in the first firewall and the second firewall can be varied. An optional processing method is provided below, which can specifically include the processing of the following step B1.

在步骤B1中,在根据第一防火墙和第二防火墙的分组信息确定第一防火墙和第二防火墙属于同一分组,且第一防火墙的安全区域与第二防火墙的安全区域不相同的情况下,确定在第一防火墙和第二防火墙中增加访问策略。In step B1, when it is determined based on the grouping information of the first firewall and the second firewall that the first firewall and the second firewall belong to the same group and the security area of the first firewall is different from the security area of the second firewall, it is determined to add access policies in the first firewall and the second firewall.

另外,上述步骤S1062中根据第一防火墙与第二防火墙的分组信息,以及第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在第一防火墙和第二防火墙中增加访问策略的具体处理方式可以多种多样,以下再提供一种可选的处理方式,具体可以包括以下步骤C1~步骤C2的处理。In addition, in the above step S1062, according to the grouping information of the first firewall and the second firewall, and the relationship between the security area of the first firewall and the security area of the second firewall, the specific processing method for determining whether to add access policies in the first firewall and the second firewall can be various. An optional processing method is provided below, which can specifically include the processing of the following steps C1 to C2.

在步骤C1中,在根据第一防火墙和所述第二防火墙的分组信息确定第一防火墙和第二防火墙属于同一分组,且第一防火墙的安全区域与第二防火墙的安全区域相同的情况下,获取第一防火墙的安全区域中的逻辑安全区域,以及第二防火墙的安全区域中的逻辑安全区域。In step C1, when it is determined based on the grouping information of the first firewall and the second firewall that the first firewall and the second firewall belong to the same group, and the security area of the first firewall is the same as the security area of the second firewall, the logical security area in the security area of the first firewall and the logical security area in the security area of the second firewall are obtained.

在步骤C2中,在第一防火墙的安全区域中的逻辑安全区域与第二防火墙的安全区域中的逻辑安全区域不相同的情况下,确定在第一防火墙和所述第二防火墙中增加访问策略。In step C2, when the logical security zone in the security zone of the first firewall is different from the logical security zone in the security zone of the second firewall, it is determined to add access policies in the first firewall and the second firewall.

在实施中,如图3所示,若根据第一防火墙和所述第二防火墙的分组信息确定第一防火墙和第二防火墙属于同一分组,则可以继续判断第一防火墙的安全区域与第二防火墙的安全区域是否相同,若不同,则需要开墙,若相同,则可以继续判断第一防火墙的安全区域中的逻辑安全区域与第二防火墙的安全区域中的逻辑安全区域是否相同,若相同,则不需要开墙,若不同则需要开墙。In implementation, as shown in Figure 3, if it is determined based on the grouping information of the first firewall and the second firewall that the first firewall and the second firewall belong to the same group, it is possible to continue to determine whether the security area of the first firewall is the same as the security area of the second firewall. If they are different, it is necessary to open the wall. If they are the same, it is possible to continue to determine whether the logical security area in the security area of the first firewall is the same as the logical security area in the security area of the second firewall. If they are the same, it is not necessary to open the wall. If they are different, it is necessary to open the wall.

在实际应用中,上述步骤S108中判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的具体处理方式可以多种多样,以下再提供一种可选的处理方式,如图2所示,具体可以包括以下步骤S1082的处理。In actual applications, there may be various specific processing methods for determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall in the above step S108. An optional processing method is provided below, as shown in FIG. 2, which may specifically include the processing of the following step S1082.

在步骤S1082中,若确定在第一防火墙和第二防火墙中增加访问策略,则若第一防火墙和第二防火墙中不包含访问策略,则确定第一防火墙和第二防火墙中不存在与配置请求对应的目标访问策略。In step S1082, if it is determined to add access policies in the first firewall and the second firewall, if the first firewall and the second firewall do not contain access policies, it is determined that there are no target access policies corresponding to the configuration request in the first firewall and the second firewall.

在实施中,如图3所示,在确定在第一防火墙和第二防火墙中增加访问策略的情况下,服务器可以查询第一防火墙和第二防火墙中是否存在目标访问策略,例如,服务器可以匹配第一防火墙和第二防火墙,并查找这两个防火墙中是否存在访问策略,若不存在,则可以确定需要开墙,即可以确定第一防火墙和第二防火墙中不存在与配置请求对应的目标访问策略。In implementation, as shown in FIG3 , when it is determined to add access policies in the first firewall and the second firewall, the server can query whether the target access policies exist in the first firewall and the second firewall. For example, the server can match the first firewall and the second firewall and find out whether the access policies exist in the two firewalls. If not, it can be determined that the wall needs to be opened, that is, it can be determined that the target access policy corresponding to the configuration request does not exist in the first firewall and the second firewall.

在实际应用中,上述步骤S108中判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的具体处理方式可以多种多样,以下再提供一种可选的处理方式,如图2所示,具体可以包括以下步骤S1084的处理。In actual applications, there may be various specific processing methods for determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall in the above step S108. An optional processing method is provided below, as shown in FIG. 2 , which may specifically include the processing of the following step S1084.

在步骤S1084中,若确定在第一防火墙和第二防火墙中增加访问策略,则若第一防火墙和第二防火墙中包含访问策略,且访问策略为默认拒绝策略,则确定第一防火墙和第二防火墙中不存在与配置请求对应的目标访问策略。In step S1084, if it is determined to add access policies in the first firewall and the second firewall, if the first firewall and the second firewall contain access policies and the access policies are default deny policies, it is determined that there are no target access policies corresponding to the configuration request in the first firewall and the second firewall.

在实施中,如图3所示,服务器在根据查询结果确定第一防火墙和第二防火墙中包含访问策略的情况下,可以对存在的访问策略是否为默认拒绝策略进行判断,若访问策略不是默认拒绝策略,即访问策略为与配置请求对应的目标访问策略,那么,可以确定第一防火墙和第二防火墙中已经存在目标访问策略,不需要进行开墙处理,In implementation, as shown in FIG3 , when the server determines that the first firewall and the second firewall contain access policies according to the query results, it can determine whether the existing access policy is a default deny policy. If the access policy is not a default deny policy, that is, the access policy is a target access policy corresponding to the configuration request, then it can be determined that the target access policy already exists in the first firewall and the second firewall, and no wall opening processing is required.

若访问策略为默认拒绝策略,那么,服务器可以确定需要开墙,即确定第一防火墙和第二防火墙中不存在与配置请求对应的目标访问策略。If the access policy is a default deny policy, the server can determine that the firewall needs to be opened, that is, determine that there is no target access policy corresponding to the configuration request in the first firewall and the second firewall.

在实际应用中,在目标访问策略配置完成后,为避免由于存在默认拒绝策略导致用户无法访问的情况,还可以对目标访问策略在访问策略中的策略顺序进行调整处理,调整处理的具体处理方式可以多种多样,以下再提供一种可选的处理方式,如图2所示,具体可以包括以下步骤S202~S204的处理。In actual applications, after the target access policy is configured, in order to avoid the situation where users are unable to access due to the existence of a default deny policy, the policy order of the target access policy in the access policy can also be adjusted. The specific processing methods for the adjustment processing can be varied. An optional processing method is provided below, as shown in Figure 2, which can specifically include the processing of the following steps S202~S204.

在步骤S202中,获取第一防火墙和第二防火墙中的访问策略。In step S202, access policies in the first firewall and the second firewall are obtained.

在步骤S204中,在访问策略中包括除目标访问策略外的其他访问策略,且其他访问策略不包含默认拒绝策略的情况下,对目标访问策略在访问策略中的策略顺序进行调整处理。In step S204, when the access policies include other access policies except the target access policy, and the other access policies do not include a default deny policy, the policy order of the target access policy in the access policies is adjusted.

在实施中,服务器可以访问策略中包括除目标访问策略外的其他访问策略,且其他访问策略不包含默认拒绝策略的情况下,服务器可以记录目标访问策略的策略标识,并根据目标访问策略的策略标识,将目标访问策略在访问策略中的策略顺序调整至默认拒绝策略之前,以避免产生用户无法访问的情况。In implementation, if the server's access policy includes other access policies besides the target access policy, and other access policies do not contain a default deny policy, the server can record the policy identifier of the target access policy and, based on the policy identifier of the target access policy, adjust the policy order of the target access policy in the access policy to before the default deny policy to avoid a situation where users are unable to access.

在实际应用中,在目标访问策略配置完成后,还可以对目标访问策略的配置过程进行核验处理,核验处理的具体处理方式可以多种多样,以下再提供一种可选的处理方式,如图2所示,具体可以包括以下步骤S206~S208的处理。In actual applications, after the target access policy configuration is completed, the configuration process of the target access policy can also be verified. The specific processing methods of the verification process can be varied. An optional processing method is provided below, as shown in Figure 2, which can specifically include the following steps S206~S208.

在步骤S206中,获取目标访问策略对应的配置数据。In step S206, configuration data corresponding to the target access policy is obtained.

在步骤S208中,根据配置数据与配置请求对应的配置需求信息之间的匹配情况,对目标访问策略的配置过程进行核验处理,得到针对目标访问策略的配置核验结果。In step S208, based on the matching between the configuration data and the configuration requirement information corresponding to the configuration request, the configuration process of the target access policy is verified to obtain a configuration verification result for the target access policy.

在实施中,如图3所示,在目标访问策略下发后,服务器可以对目标访问策略的配置过程进行核验处理。具体如,服务器可以获取策略下发日志,并记录已下发的目标访问策略在对应防火墙上的策略标识(如策略ID或策略名称)。服务器可以根据策略标识,查找对应的目标访问策略,并将目标访问策略对应的配置数据(如策略脚本)转换为表格文件。服务器可以根据转换得到的表格文件和配置需求信息进行匹配处理,得到针对目标访问策略的配置核验结果。In implementation, as shown in FIG3 , after the target access policy is issued, the server can verify the configuration process of the target access policy. Specifically, the server can obtain the policy issuance log and record the policy identifier (such as policy ID or policy name) of the issued target access policy on the corresponding firewall. The server can find the corresponding target access policy according to the policy identifier and convert the configuration data (such as policy script) corresponding to the target access policy into a table file. The server can match the converted table file with the configuration requirement information to obtain the configuration verification result for the target access policy.

其中,若根据配置核验结果确定配置数据与配置请求对应的配置需求信息相匹配,则表面核验成功,若不匹配,则表明核验失败,此时,服务器可以生成核验失败的工单数据,并将该工单数据提交至工程师进行手动调整。Among them, if it is determined according to the configuration verification result that the configuration data matches the configuration requirement information corresponding to the configuration request, then the surface verification is successful. If it does not match, it indicates that the verification has failed. At this time, the server can generate work order data for failed verification and submit the work order data to the engineer for manual adjustment.

这样,通过识别非默认拒绝策略并进行策略顺序的调整,以及对已下发的访问策略进行核验处理,防火墙管理员可以掌握策略下发情况,并针对下发失败的策略进行调整,可以有效提高工作效率,有效提升用户体验。In this way, by identifying non-default deny policies and adjusting the policy order, as well as verifying the access policies that have been issued, firewall administrators can understand the policy issuance situation and adjust the policies that failed to be issued, which can effectively improve work efficiency and user experience.

另外,通过先查询、再配置、后校验的处理过程,可以将策略下发与防火墙策略现状结合,减少冗余策略,提升策略变更成功率。In addition, through the process of querying first, configuring second, and verifying last, the policy issuance can be combined with the current status of the firewall policy, reducing redundant policies and improving the success rate of policy changes.

本说明书实施例提供一种数据处理方法,通过接收防火墙策略的配置请求,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。这样,通过对是否在第一防火墙和第二防火墙中增加访问策略,以及对第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的双重判断,可以减少冗余策略、无效策略的下发,从而避免防火墙性能消耗的增加,以及防火墙可用策略条目数的减少,提高了防火墙中访问策略的配置效率和配置准确性。The embodiment of the specification provides a data processing method, which receives a configuration request of a firewall policy, responds to the configuration request, determines a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request, determines whether to add an access policy in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall, and if it is determined to add an access policy in the first firewall and the second firewall, determines whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, and if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configures the target access policy corresponding to the configuration request in the first firewall and the second firewall. In this way, by making a double judgment on whether to add an access policy in the first firewall and the second firewall, and whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, the issuance of redundant policies and invalid policies can be reduced, thereby avoiding an increase in firewall performance consumption and a reduction in the number of available firewall policy entries, and improving the configuration efficiency and configuration accuracy of the access policy in the firewall.

以上为本说明书实施例提供的数据处理方法,基于同样的思路,本说明书实施例还提供一种数据处理装置,如图4所示。The above is the data processing method provided in the embodiment of this specification. Based on the same idea, the embodiment of this specification also provides a data processing device, as shown in FIG4 .

该数据处理装置包括:请求接收模块401、防火墙确定模块402、第一判断模块403、第二判断模块404和策略配置模块405,其中,The data processing device includes: a request receiving module 401, a firewall determination module 402, a first judgment module 403, a second judgment module 404 and a policy configuration module 405, wherein:

请求接收模块401,用于接收防火墙策略的配置请求;The request receiving module 401 is used to receive a configuration request of a firewall policy;

防火墙确定模块402,用于响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;A firewall determination module 402, configured to determine, in response to the configuration request, a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request;

第一判断模块403,用于根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;A first judgment module 403, used to determine whether to add access policies in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall;

第二判断模块404,用于若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;A second determination module 404 is configured to determine whether a target access policy corresponding to the configuration request exists in the first firewall and the second firewall if it is determined to add an access policy in the first firewall and the second firewall;

策略配置模块405,用于若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。The policy configuration module 405 is used to configure a target access policy corresponding to the configuration request in the first firewall and the second firewall if the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall.

本说明书实施例中,所述第一判断模块403,用于:In the embodiment of this specification, the first determination module 403 is used to:

根据所述第一防火墙与所述第二防火墙的分组信息,以及所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略。According to the grouping information of the first firewall and the second firewall, and the relationship between the security zone of the first firewall and the security zone of the second firewall, it is determined whether to add access policies in the first firewall and the second firewall.

本说明书实施例中,所述第一判断模块403,用于:In the embodiment of this specification, the first determination module 403 is used to:

在根据所述第一防火墙和所述第二防火墙的分组信息确定所述第一防火墙和所述第二防火墙不属于同一分组,且所述第一防火墙和所述第二防火墙之间存在预设关联关系的情况下,获取所述第一防火墙的安全区域中的逻辑安全区域,以及所述第二防火墙的安全区域中的逻辑安全区域;When it is determined according to the grouping information of the first firewall and the second firewall that the first firewall and the second firewall do not belong to the same group and there is a preset association relationship between the first firewall and the second firewall, obtaining a logical security area in the security area of the first firewall and a logical security area in the security area of the second firewall;

在所述第一防火墙的安全区域中的逻辑安全区域与所述第二防火墙的安全区域中的逻辑安全区域不相同的情况下,确定在所述第一防火墙和所述第二防火墙中增加访问策略。When the logical security zone in the security zone of the first firewall is different from the logical security zone in the security zone of the second firewall, it is determined to add access policies in the first firewall and the second firewall.

本说明书实施例中,所述第一判断模块403,用于:In the embodiment of this specification, the first determination module 403 is used to:

在根据所述第一防火墙和所述第二防火墙的分组信息确定所述第一防火墙和所述第二防火墙属于同一分组,且所述第一防火墙的安全区域与所述第二防火墙的安全区域不相同的情况下,确定在所述第一防火墙和所述第二防火墙中增加访问策略。When it is determined according to the grouping information of the first firewall and the second firewall that the first firewall and the second firewall belong to the same group and the security area of the first firewall is different from the security area of the second firewall, it is determined to add access policies in the first firewall and the second firewall.

本说明书实施例中,所述第一判断模块403,用于:In the embodiment of this specification, the first determination module 403 is used to:

在根据所述第一防火墙和所述第二防火墙的分组信息确定所述第一防火墙和所述第二防火墙属于同一分组,且所述第一防火墙的安全区域与所述第二防火墙的安全区域相同的情况下,获取所述第一防火墙的安全区域中的逻辑安全区域,以及所述第二防火墙的安全区域中的逻辑安全区域;When it is determined according to the grouping information of the first firewall and the second firewall that the first firewall and the second firewall belong to the same group and the security area of the first firewall is the same as the security area of the second firewall, obtaining a logical security area in the security area of the first firewall and a logical security area in the security area of the second firewall;

在所述第一防火墙的安全区域中的逻辑安全区域与所述第二防火墙的安全区域中的逻辑安全区域不相同的情况下,确定在所述第一防火墙和所述第二防火墙中增加访问策略。When the logical security zone in the security zone of the first firewall is different from the logical security zone in the security zone of the second firewall, it is determined to add access policies in the first firewall and the second firewall.

本说明书实施例中,所述第二判断模块404,用于:In the embodiment of this specification, the second determination module 404 is used to:

若所述第一防火墙和所述第二防火墙中不包含访问策略,则确定所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的目标访问策略。If the first firewall and the second firewall do not include an access policy, it is determined that the first firewall and the second firewall do not have a target access policy corresponding to the configuration request.

本说明书实施例中,所述第二判断模块404,用于:In the embodiment of this specification, the second determination module 404 is used to:

若所述第一防火墙和所述第二防火墙中包含访问策略,且所述访问策略为默认拒绝策略,则确定所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的目标访问策略。If the first firewall and the second firewall include access policies, and the access policies are default deny policies, it is determined that the target access policy corresponding to the configuration request does not exist in the first firewall and the second firewall.

本说明书实施例中,所述装置还包括:In the embodiment of this specification, the device further includes:

策略获取模块,用于获取所述第一防火墙和所述第二防火墙中的访问策略;A policy acquisition module, used to acquire access policies in the first firewall and the second firewall;

顺序调整模块,用于在所述访问策略中包括除所述目标访问策略外的其他访问策略,且所述其他访问策略不包含默认拒绝策略的情况下,对所述目标访问策略在所述访问策略中的策略顺序进行调整处理。The order adjustment module is used to adjust the policy order of the target access policy in the access policy when the access policy includes other access policies except the target access policy and the other access policies do not include a default deny policy.

本说明书实施例中,所述装置还包括:In the embodiment of this specification, the device further includes:

数据获取模块,用于获取所述目标访问策略对应的配置数据;A data acquisition module, used to acquire configuration data corresponding to the target access policy;

配置核验模块,用于根据所述配置数据与所述配置请求对应的配置需求信息之间的匹配情况,对所述目标访问策略的配置过程进行核验处理,得到针对所述目标访问策略的配置核验结果。The configuration verification module is used to verify the configuration process of the target access policy according to the matching between the configuration data and the configuration requirement information corresponding to the configuration request, and obtain the configuration verification result for the target access policy.

本说明书实施例提供一种数据处理装置,通过接收防火墙策略的配置请求,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。这样,通过对是否在第一防火墙和第二防火墙中增加访问策略,以及对第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的双重判断,可以减少冗余策略、无效策略的下发,从而避免防火墙性能消耗的增加,以及防火墙可用策略条目数的减少,提高了防火墙中访问策略的配置效率和配置准确性。The embodiment of the present specification provides a data processing device, which receives a configuration request of a firewall policy, responds to the configuration request, determines a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request, determines whether to add an access policy in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall, and if it is determined to add an access policy in the first firewall and the second firewall, determines whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, and if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configures the target access policy corresponding to the configuration request in the first firewall and the second firewall. In this way, by making a double judgment on whether to add an access policy in the first firewall and the second firewall, and whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, the issuance of redundant policies and invalid policies can be reduced, thereby avoiding an increase in firewall performance consumption and a reduction in the number of available firewall policy entries, and improving the configuration efficiency and configuration accuracy of the access policy in the firewall.

以上为本说明书实施例提供的数据处理装置,基于同样的思路,本说明书实施例还提供一种数据处理设备,如图5所示。The above is a data processing device provided in the embodiment of this specification. Based on the same idea, the embodiment of this specification also provides a data processing device, as shown in FIG5 .

所述数据处理设备可以为上述实施例提供终端设备或服务器等。The data processing device may provide a terminal device or a server, etc. for the above-mentioned embodiments.

数据处理设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器501和存储器502,存储器502中可以存储有一个或一个以上存储应用程序或数据。其中,存储器502可以是短暂存储或持久存储。存储在存储器502的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对数据处理设备中的一系列计算机可执行指令。更进一步地,处理器501可以设置为与存储器502通信,在数据处理设备上执行存储器502中的一系列计算机可执行指令。数据处理设备还可以包括一个或一个以上电源503,一个或一个以上有线或无线网络接口504,一个或一个以上输入输出接口505,一个或一个以上键盘506。The data processing device may have relatively large differences due to different configurations or performances, and may include one or more processors 501 and memory 502, and the memory 502 may store one or more storage applications or data. Among them, the memory 502 may be a short-term storage or a persistent storage. The application stored in the memory 502 may include one or more modules (not shown in the figure), and each module may include a series of computer executable instructions in the data processing device. Furthermore, the processor 501 may be configured to communicate with the memory 502 and execute a series of computer executable instructions in the memory 502 on the data processing device. The data processing device may also include one or more power supplies 503, one or more wired or wireless network interfaces 504, one or more input and output interfaces 505, and one or more keyboards 506.

具体在本实施例中,数据处理设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对数据处理设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:Specifically in this embodiment, the data processing device includes a memory and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer executable instructions in the data processing device, and the one or more programs are configured to be executed by one or more processors, including computer executable instructions for performing the following:

接收防火墙策略的配置请求;Receive configuration requests for firewall policies;

响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;In response to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request;

根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;Determining whether to add access policies in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall;

若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;If it is determined to add access policies in the first firewall and the second firewall, determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall;

若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。If the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall, a target access policy corresponding to the configuration request is configured in the first firewall and the second firewall.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于数据处理设备实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, and the same or similar parts between the embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the data processing device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the partial description of the method embodiment.

本说明书实施例提供一种数据处理设备,通过接收防火墙策略的配置请求,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。这样,通过对是否在第一防火墙和第二防火墙中增加访问策略,以及对第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的双重判断,可以减少冗余策略、无效策略的下发,从而避免防火墙性能消耗的增加,以及防火墙可用策略条目数的减少,提高了防火墙中访问策略的配置效率和配置准确性。The embodiment of the present specification provides a data processing device, which receives a configuration request of a firewall policy, responds to the configuration request, determines a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request, determines whether to add an access policy in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall, and if it is determined to add an access policy in the first firewall and the second firewall, determines whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, and if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configures the target access policy corresponding to the configuration request in the first firewall and the second firewall. In this way, by making a double judgment on whether to add an access policy in the first firewall and the second firewall, and whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, the issuance of redundant policies and invalid policies can be reduced, thereby avoiding an increase in firewall performance consumption and a reduction in the number of available firewall policy entries, and improving the configuration efficiency and configuration accuracy of the access policy in the firewall.

进一步地,基于上述图1到图3所示的方法,本说明书一个或多个实施例还提供了一种存储介质,用于存储计算机可执行指令信息,一种具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令信息在被处理器执行时,能实现以下流程:Further, based on the methods shown in FIG. 1 to FIG. 3 above, one or more embodiments of the present specification further provide a storage medium for storing computer executable instruction information. In a specific embodiment, the storage medium may be a USB flash drive, an optical disk, a hard disk, etc. When the computer executable instruction information stored in the storage medium is executed by a processor, the following process can be implemented:

接收防火墙策略的配置请求;Receive configuration requests for firewall policies;

响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;In response to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request;

根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;Determining whether to add access policies in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall;

若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;If it is determined to add access policies in the first firewall and the second firewall, determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall;

若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。If the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall, a target access policy corresponding to the configuration request is configured in the first firewall and the second firewall.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于上述一种存储介质实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, and the same or similar parts between the embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the above-mentioned storage medium embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the partial description of the method embodiment.

本说明书实施例提供一种存储介质,通过接收防火墙策略的配置请求,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。这样,通过对是否在第一防火墙和第二防火墙中增加访问策略,以及对第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的双重判断,可以减少冗余策略、无效策略的下发,从而避免防火墙性能消耗的增加,以及防火墙可用策略条目数的减少,提高了防火墙中访问策略的配置效率和配置准确性。The embodiment of the present specification provides a storage medium, which receives a configuration request of a firewall policy, responds to the configuration request, determines a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request, determines whether to add an access policy in the first firewall and the second firewall according to the relationship between the security area of the first firewall and the security area of the second firewall, and if it is determined to add an access policy in the first firewall and the second firewall, determines whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, and if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configures the target access policy corresponding to the configuration request in the first firewall and the second firewall. In this way, by making a double judgment on whether to add an access policy in the first firewall and the second firewall, and whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, the issuance of redundant policies and invalid policies can be reduced, thereby avoiding an increase in firewall performance consumption and a reduction in the number of available firewall policy entries, and improving the configuration efficiency and configuration accuracy of the access policy in the firewall.

进一步地,基于上述图1到图3所示的方法,本说明书一个或多个实施例还提供了一种计算机程序产品,包括计算机程序,该计算机程序产品中的计算机程序在被处理器执行时,能实现以下流程:Further, based on the methods shown in FIG. 1 to FIG. 3 above, one or more embodiments of this specification further provide a computer program product, including a computer program. When the computer program in the computer program product is executed by a processor, the following process can be implemented:

接收防火墙策略的配置请求;Receive configuration requests for firewall policies;

响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;In response to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request;

根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;Determining whether to add access policies in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall;

若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;If it is determined to add access policies in the first firewall and the second firewall, determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall;

若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。If the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall, a target access policy corresponding to the configuration request is configured in the first firewall and the second firewall.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于上述一种计算机程序产品实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, and the same or similar parts between the embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the above-mentioned computer program product embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the partial description of the method embodiment.

本说明书实施例提供一种计算机程序产品,通过接收防火墙策略的配置请求,响应于配置请求,确定配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙,根据第一防火墙的安全区域与第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,若确定在第一防火墙和第二防火墙中增加访问策略,则判断第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略,若第一防火墙和第二防火墙中不存在与配置请求对应的访问策略,则在第一防火墙和第二防火墙中配置与配置请求对应的目标访问策略。这样,通过对是否在第一防火墙和第二防火墙中增加访问策略,以及对第一防火墙和第二防火墙中是否存在与配置请求对应的目标访问策略的双重判断,可以减少冗余策略、无效策略的下发,从而避免防火墙性能消耗的增加,以及防火墙可用策略条目数的减少,提高了防火墙中访问策略的配置效率和配置准确性。The embodiment of the present specification provides a computer program product, which receives a configuration request of a firewall policy, responds to the configuration request, determines a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request, determines whether to add an access policy in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall, and if it is determined to add an access policy in the first firewall and the second firewall, determines whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, and if there is no access policy corresponding to the configuration request in the first firewall and the second firewall, configures the target access policy corresponding to the configuration request in the first firewall and the second firewall. In this way, by making a double judgment on whether to add an access policy in the first firewall and the second firewall, and whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall, the issuance of redundant policies and invalid policies can be reduced, thereby avoiding an increase in firewall performance consumption and a reduction in the number of available firewall policy entries, and improving the configuration efficiency and configuration accuracy of the access policy in the firewall.

上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。The above is a description of a specific embodiment of the specification. Other embodiments are within the scope of the appended claims. In some cases, the actions or steps recorded in the claims can be performed in an order different from that in the embodiments and still achieve the desired results. In addition, the processes depicted in the drawings do not necessarily require the specific order or continuous order shown to achieve the desired results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.

在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable GateArray,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware DescriptionLanguage)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(RubyHardware Description Language)等,目前最普遍使用的是VHDL(Very-High-SpeedIntegrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, it was very clear whether the improvement of a technology was hardware improvement (for example, improvement of the circuit structure of diodes, transistors, switches, etc.) or software improvement (improvement of the method flow). However, with the development of technology, many improvements of the method flow today can be regarded as direct improvements of the hardware circuit structure. Designers almost always obtain the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be implemented with a hardware entity module. For example, a programmable logic device (PLD) (such as a field programmable gate array (FPGA)) is such an integrated circuit whose logical function is determined by the user's programming of the device. Designers can "integrate" a digital system on a PLD by programming themselves, without having to ask chip manufacturers to design and make dedicated integrated circuit chips. Moreover, nowadays, instead of manually making integrated circuit chips, this kind of programming is mostly implemented by "logic compiler" software, which is similar to the software compiler used when developing and writing programs, and the original code before compilation must also be written in a specific programming language, which is called hardware description language (HDL). There is not only one kind of HDL, but many kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc. The most commonly used ones are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. Those skilled in the art should also know that it is only necessary to program the method flow slightly in the above-mentioned hardware description languages and program it into the integrated circuit, and then it is easy to obtain the hardware circuit that implements the logic method flow.

控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20 以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of a microprocessor or processor and a computer-readable medium storing a computer-readable program code (e.g., software or firmware) executable by the (micro)processor, a logic gate, a switch, an application-specific integrated circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, and the memory controller may also be implemented as part of the control logic of the memory. It is also known to those skilled in the art that, in addition to implementing the controller in a purely computer-readable program code manner, the controller may be implemented in the form of a logic gate, a switch, an application-specific integrated circuit, a programmable logic controller, and an embedded microcontroller by logically programming the method steps. Therefore, such a controller may be considered as a hardware component, and the devices for implementing various functions included therein may also be considered as structures within the hardware component. Or even, the devices for implementing various functions may be considered as both software modules for implementing the method and structures within the hardware component.

上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules or units described in the above embodiments may be implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.

为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, the above devices are described in terms of functions and are divided into various units. Of course, when implementing one or more embodiments of this specification, the functions of each unit can be implemented in the same or multiple software and/or hardware.

本领域内的技术人员应明白,本说明书的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that the embodiments of this specification may be provided as methods, systems, or computer program products. Therefore, one or more embodiments of this specification may take the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.

本说明书的实施例是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程欺诈案例的串并设备的处理器以产生一个机器,使得通过计算机或其他可编程欺诈案例的串并设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The embodiments of this specification are described with reference to the flowcharts and/or block diagrams of the methods, devices (systems), and computer program products according to the embodiments of this specification. It should be understood that each process and/or box in the flowchart and/or block diagram, as well as the combination of the processes and/or boxes in the flowchart and/or block diagram, can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general-purpose computer, a special-purpose computer, an embedded processor, or other programmable fraud case serial and parallel device to produce a machine, so that the instructions executed by the processor of the computer or other programmable fraud case serial and parallel device produce a device for implementing the functions specified in one or more processes of the flowchart and/or one or more boxes of the block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程欺诈案例的串并设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable serial and parallel device to work in a specific manner, so that the instructions stored in the computer-readable memory produce a product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.

这些计算机程序指令也可装载到计算机或其他可编程欺诈案例的串并设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable fraud case serial and parallel device so that a series of operating steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more flows in the flowchart and/or one or more blocks in the block diagram.

在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.

内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-permanent storage in a computer-readable medium, random access memory (RAM) and/or non-volatile memory in the form of read-only memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.

计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer readable media include permanent and non-permanent, removable and non-removable media that can be implemented by any method or technology to store information. Information can be computer readable instructions, data structures, program modules or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disk read-only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by a computing device. As defined in this article, computer readable media does not include temporary computer readable media (transitory media), such as modulated data signals and carrier waves.

还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "include", "comprises" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or device including a series of elements includes not only those elements, but also other elements not explicitly listed, or also includes elements inherent to such process, method, commodity or device. In the absence of more restrictions, the elements defined by the sentence "comprises a ..." do not exclude the existence of other identical elements in the process, method, commodity or device including the elements.

本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that the embodiments of the present specification may be provided as methods, systems or computer program products. Therefore, one or more embodiments of the present specification may be in the form of a complete hardware embodiment, a complete software embodiment or an embodiment combining software and hardware. Furthermore, one or more embodiments of the present specification may be in the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.

本说明书一个或多个实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书一个或多个实施例,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。One or more embodiments of the present specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. One or more embodiments of the present specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules may be located in local and remote computer storage media, including storage devices.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, and the same or similar parts between the embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the partial description of the method embodiment.

以上所述仅为本说明书的实施例而已,并不用于限制本文件。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。The above description is only an embodiment of this specification and is not intended to limit this document. For those skilled in the art, this specification may have various changes and variations. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this specification should be included in the scope of the claims of this specification.

Claims (13)

1.一种数据处理方法,所述方法包括:1. A data processing method, the method comprising: 接收防火墙策略的配置请求;Receive configuration requests for firewall policies; 响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;In response to the configuration request, determining a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request; 根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;Determining whether to add access policies in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall; 若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;If it is determined to add access policies in the first firewall and the second firewall, determining whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall; 若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。If the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall, a target access policy corresponding to the configuration request is configured in the first firewall and the second firewall. 2.根据权利要求1所述的方法,所述根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,包括:2. The method according to claim 1, wherein determining whether to add access policies in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall comprises: 根据所述第一防火墙与所述第二防火墙的分组信息,以及所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略。Whether to add access policies in the first firewall and the second firewall is determined according to the grouping information of the first firewall and the second firewall and the relationship between the security zone of the first firewall and the security zone of the second firewall. 3.根据权利要求2所述的方法,所述根据所述第一防火墙与所述第二防火墙的分组信息,以及所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,包括:3. The method according to claim 2, wherein determining whether to add access policies in the first firewall and the second firewall according to the grouping information of the first firewall and the second firewall and the relationship between the security zone of the first firewall and the security zone of the second firewall comprises: 在根据所述第一防火墙和所述第二防火墙的分组信息确定所述第一防火墙和所述第二防火墙不属于同一分组,且所述第一防火墙和所述第二防火墙之间存在预设关联关系的情况下,获取所述第一防火墙的安全区域中的逻辑安全区域,以及所述第二防火墙的安全区域中的逻辑安全区域;When it is determined according to the grouping information of the first firewall and the second firewall that the first firewall and the second firewall do not belong to the same group and there is a preset association relationship between the first firewall and the second firewall, obtaining a logical security area in the security area of the first firewall and a logical security area in the security area of the second firewall; 在所述第一防火墙的安全区域中的逻辑安全区域与所述第二防火墙的安全区域中的逻辑安全区域不相同的情况下,确定在所述第一防火墙和所述第二防火墙中增加访问策略。When the logical security zone in the security zone of the first firewall is different from the logical security zone in the security zone of the second firewall, it is determined to add access policies in the first firewall and the second firewall. 4.根据权利要求2所述的方法,所述根据所述第一防火墙与所述第二防火墙的分组信息,以及所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,包括:4. The method according to claim 2, wherein determining whether to add access policies in the first firewall and the second firewall according to the grouping information of the first firewall and the second firewall and the relationship between the security zone of the first firewall and the security zone of the second firewall comprises: 在根据所述第一防火墙和所述第二防火墙的分组信息确定所述第一防火墙和所述第二防火墙属于同一分组,且所述第一防火墙的安全区域与所述第二防火墙的安全区域不相同的情况下,确定在所述第一防火墙和所述第二防火墙中增加访问策略。When it is determined according to the grouping information of the first firewall and the second firewall that the first firewall and the second firewall belong to the same group and the security area of the first firewall is different from the security area of the second firewall, it is determined to add access policies in the first firewall and the second firewall. 5.根据权利要求2所述的方法,所述根据所述第一防火墙与所述第二防火墙的分组信息,以及所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略,包括:5. The method according to claim 2, wherein determining whether to add access policies to the first firewall and the second firewall according to the grouping information of the first firewall and the second firewall and the relationship between the security zone of the first firewall and the security zone of the second firewall comprises: 在根据所述第一防火墙和所述第二防火墙的分组信息确定所述第一防火墙和所述第二防火墙属于同一分组,且所述第一防火墙的安全区域与所述第二防火墙的安全区域相同的情况下,获取所述第一防火墙的安全区域中的逻辑安全区域,以及所述第二防火墙的安全区域中的逻辑安全区域;When it is determined according to the grouping information of the first firewall and the second firewall that the first firewall and the second firewall belong to the same group and the security area of the first firewall is the same as the security area of the second firewall, obtaining a logical security area in the security area of the first firewall and a logical security area in the security area of the second firewall; 在所述第一防火墙的安全区域中的逻辑安全区域与所述第二防火墙的安全区域中的逻辑安全区域不相同的情况下,确定在所述第一防火墙和所述第二防火墙中增加访问策略。When the logical security zone in the security zone of the first firewall is different from the logical security zone in the security zone of the second firewall, it is determined to add access policies in the first firewall and the second firewall. 6.根据权利要求2所述的方法,所述判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略,包括:6. The method according to claim 2, wherein determining whether a target access policy corresponding to the configuration request exists in the first firewall and the second firewall comprises: 若所述第一防火墙和所述第二防火墙中不包含访问策略,则确定所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的目标访问策略。If the first firewall and the second firewall do not include an access policy, it is determined that the first firewall and the second firewall do not have a target access policy corresponding to the configuration request. 7.根据权利要求2所述的方法,所述判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略,包括:7. The method according to claim 2, wherein determining whether a target access policy corresponding to the configuration request exists in the first firewall and the second firewall comprises: 若所述第一防火墙和所述第二防火墙中包含访问策略,且所述访问策略为默认拒绝策略,则确定所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的目标访问策略。If the first firewall and the second firewall include access policies, and the access policies are default deny policies, it is determined that the target access policy corresponding to the configuration request does not exist in the first firewall and the second firewall. 8.根据权利要求2所述的方法,所述方法还包括:8. The method according to claim 2, further comprising: 获取所述第一防火墙和所述第二防火墙中的访问策略;Obtaining access policies in the first firewall and the second firewall; 在所述访问策略中包括除所述目标访问策略外的其他访问策略,且所述其他访问策略不包含默认拒绝策略的情况下,对所述目标访问策略在所述访问策略中的策略顺序进行调整处理。When the access policy includes other access policies except the target access policy, and the other access policies do not include a default deny policy, the policy order of the target access policy in the access policy is adjusted. 9.根据权利要求2所述的方法,所述方法还包括:9. The method according to claim 2, further comprising: 获取所述目标访问策略对应的配置数据;Obtaining configuration data corresponding to the target access policy; 根据所述配置数据与所述配置请求对应的配置需求信息之间的匹配情况,对所述目标访问策略的配置过程进行核验处理,得到针对所述目标访问策略的配置核验结果。According to the matching condition between the configuration data and the configuration requirement information corresponding to the configuration request, the configuration process of the target access policy is verified to obtain a configuration verification result for the target access policy. 10.一种数据处理装置,所述装置包括:10. A data processing device, comprising: 请求接收模块,用于接收防火墙策略的配置请求;A request receiving module, used for receiving a configuration request of a firewall policy; 防火墙确定模块,用于响应于所述配置请求,确定所述配置请求对应的源地址设备的第一防火墙以及目的地址设备的第二防火墙;A firewall determination module, configured to determine, in response to the configuration request, a first firewall of a source address device and a second firewall of a destination address device corresponding to the configuration request; 第一判断模块,用于根据所述第一防火墙的安全区域与所述第二防火墙的安全区域之间的关系,确定是否在所述第一防火墙和所述第二防火墙中增加访问策略;A first judgment module, used to determine whether to add access policies in the first firewall and the second firewall according to the relationship between the security zone of the first firewall and the security zone of the second firewall; 第二判断模块,用于若确定在所述第一防火墙和所述第二防火墙中增加访问策略,则判断所述第一防火墙和所述第二防火墙中是否存在与所述配置请求对应的目标访问策略;A second judgment module is used to judge whether there is a target access policy corresponding to the configuration request in the first firewall and the second firewall if it is determined to add an access policy in the first firewall and the second firewall; 策略配置模块,用于若所述第一防火墙和所述第二防火墙中不存在与所述配置请求对应的访问策略,则在所述第一防火墙和所述第二防火墙中配置与所述配置请求对应的目标访问策略。A policy configuration module is used to configure a target access policy corresponding to the configuration request in the first firewall and the second firewall if the access policy corresponding to the configuration request does not exist in the first firewall and the second firewall. 11.一种电子设备,其特征在于,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至9中任一项所述的数据处理方法的步骤。11. An electronic device, characterized in that it comprises a processor, a memory, and a computer program stored in the memory and executable on the processor, wherein when the computer program is executed by the processor, the steps of the data processing method according to any one of claims 1 to 9 are implemented. 12.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如权利要求1至9中任一项所述的数据处理方法的步骤。12. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the data processing method according to any one of claims 1 to 9 are implemented. 13.一种计算机程序产品,其特征在于,包括计算机程序,该计算机程序被处理器执行时实现权利要求1至9任一项所述的数据处理方法的步骤。13. A computer program product, characterized in that it comprises a computer program, which implements the steps of the data processing method according to any one of claims 1 to 9 when executed by a processor.
CN202411463465.0A 2024-10-18 2024-10-18 A data processing method, device and equipment Pending CN119299197A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411463465.0A CN119299197A (en) 2024-10-18 2024-10-18 A data processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411463465.0A CN119299197A (en) 2024-10-18 2024-10-18 A data processing method, device and equipment

Publications (1)

Publication Number Publication Date
CN119299197A true CN119299197A (en) 2025-01-10

Family

ID=94161007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411463465.0A Pending CN119299197A (en) 2024-10-18 2024-10-18 A data processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN119299197A (en)

Similar Documents

Publication Publication Date Title
US11314754B2 (en) Data processing method, apparatus, and device
CN113282659B (en) Data processing method and device based on block chain
TWI682652B (en) Data processing method and device
JP6804668B2 (en) Block data validation method and equipment
WO2020119264A1 (en) Block chain-based screen recording evidence collection method and system, and electronic device
KR20190136053A (en) Method and device for writing service data to blockchain system
CN107451175A (en) A kind of data processing method and equipment based on block chain
CN107395665A (en) A kind of block chain service handling and business common recognition method and device
TW201837735A (en) Block chain consensus method and device
WO2024139312A1 (en) Model training method and apparatus, storage medium, and electronic device
CN108881120A (en) A kind of data processing method and equipment based on block chain
CN106681891A (en) Method and device for adjusting log level in Java application system
EP3779692B1 (en) Blockchain data processing
CN111767144A (en) Transaction routing determination method, device, equipment and system for transaction data
WO2024082787A1 (en) Method and apparatus for creating tablespace, storage medium, and electronic device
CN116305298B (en) Method and device for managing computing power resources, storage medium and electronic equipment
WO2024187902A1 (en) Model training method and apparatus, and storage medium and electronic device
WO2024164540A1 (en) Access rule deployment method and apparatus, device, nonvolatile readable storage medium, and cloud platform
WO2024046015A1 (en) Data query method and apparatus, storage medium, and electronic device
CN111163060B (en) Application group-based forwarding method, device and system
CN112612849B (en) Data processing method, device, equipment and medium
CN119299197A (en) A data processing method, device and equipment
CN116150627A (en) Asynchronous federal learning method and device, storage medium and electronic equipment
CN109976769A (en) Method, device and device for determining server identifier corresponding to application installation package
CN111931797B (en) Method, device and equipment for identifying network to which service belongs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination