Proxy access method, control network equipment and proxy access system

A technology for controlling network and access method, applied in the field of network communication, can solve problems such as strong networking limitations and inability to achieve normal communication, and achieve the effects of ensuring interoperability, reducing the probability of being stolen, and improving security

Inactive Publication Date: 2009-12-23
NEW H3C TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then, when networking, if you choose devices with different network protocols, the above-mentioned proxy access system cannot achieve normal communication, which leads to strong limitations in networking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy access method, control network equipment and proxy access system
  • Proxy access method, control network equipment and proxy access system
  • Proxy access method, control network equipment and proxy access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] This embodiment is aimed at a proxy access system in which a management device actively initiates an access type. image 3 A schematic structural diagram of the proxy access system in this embodiment is shown. see image 3 , the system includes: management equipment, control network equipment, intermediate network equipment and terminal equipment. The management device and the control network device have fixed IP addresses; the management device indicates the identity of the terminal device to be accessed when initiating access, and the control network device converts the information of the management device to the intermediate network device before forwarding the information to The format of the network protocol that the intermediate network device and the terminal device can recognize, and modify the source IP address to its own IP address. In this way, in this embodiment, in addition to ensuring the normal communication between the management device, the intermedia...

Embodiment 2

[0115] This embodiment is aimed at a proxy access system in which a terminal device actively initiates an access type. This embodiment can still use image 3 The structure of the proxy access system is shown. see image 3 , the system includes: management equipment, control network equipment, intermediate network equipment and terminal equipment. The management device and the control network device have fixed IP addresses; the terminal device first initiates access through the intermediate network device, and the control network device converts the information into a network protocol that the management device can recognize before forwarding the information from the intermediate network device Change the source IP address to its own IP address. In this way, this embodiment can not only ensure the normal communication of each device, but also improve the security of the access process.

[0116] Correspondingly, when performing access in this embodiment, after the control ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a proxy access method. A control network device is set between an access initiator and an accessed terminal. The method includes: the control network equipment receives an access request from the access initiator, and according to the accessed The network protocol recognizable by the terminal performs protocol conversion on the access request, modifies the source address of the access request to its own network address, and then sends the access request to the accessed terminal. The invention also discloses a control network device including a communication module and a control module, and a proxy access system including an access initiation terminal, a control network device and an access terminal. By adopting the technical solution of the present invention, the control network device performs protocol conversion on the information from the access initiator, so that the information from the access initiator can be identified by the accessed terminal, thereby ensuring the connection between the access initiator and the accessed terminal. To achieve normal and smooth intercommunication.

Description

technical field [0001] The invention relates to network communication technology, in particular to an agent access method and an agent access system. Background technique [0002] The rapid development of network communication technology and computer technology enables people to connect terminal devices scattered in various places to form various networks to exchange information with each other. In order to effectively manage the terminal devices in the network, a management device is usually provided to perform unified planning and scheduling for the terminal devices under its jurisdiction. Since there are a large number of terminal devices that need to be networked, and the management device has only a limited number of interfaces, an intermediate network device that acts as a proxy is set between the management device and the terminal device. At present, the above-mentioned network system composed of management equipment, intermediate network equipment and terminal equip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04L29/06H04L12/46
Inventor 董辉
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products