Computer and Modernization ›› 2022, Vol. 0 ›› Issue (09): 106-110.

Previous Articles     Next Articles

Virtualization of Secure Access Device Based on Container

  

  1. (1. NARI Group Corporation(State Grid Electric Power Research Institute Co., Ltd.), Nanjing 210003, China;
    2. Nanjing NARI Information & Communication Technology Co., Ltd., Nanjing 210003, China)
  • Online:2022-09-22 Published:2022-09-22

Abstract: Facing the access requirements of massive power Internet of Things terminals at the information network and Internet boundary in power system, aiming at the problems of uneven resource allocation, poor compatibility, poor scalability and performance bottleneck of various devices at the traditional secure access boundary, a secure access virtualization model based on container is proposed, which adopts DPDK high-performance packet processing framework, mature container cluster management framework, service computing node arrangement and other key technologies completely separate the data plane from the control plane, build an independent data virtualization forwarding plane, and use SR-IOV technology to realize the virtualization of hardware resources and unified scheduling management, and service the security access capability. The security access device cluster based on this model has high performance, high availability, flexible arrangement and strong scalability. The experimental results show that the model can make efficient and rational use of hardware resources and greatly improve the efficiency of power system boundary security access.

Key words: virtualization, container, compute node, forwarding plane, secure access