Proxy access method, control network equipment and proxy access system

A technology for controlling network and intermediate network equipment, applied in the field of proxy access method and proxy access system, which can solve the problems of strong networking limitations and failure to realize normal communication, so as to improve security and reduce the risk of being stolen chance, effect of removing barriers

Inactive Publication Date: 2007-10-24
NEW H3C TECH CO LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then, when networking, if you choose devices with different network protocols, the above-mentioned pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy access method, control network equipment and proxy access system
  • Proxy access method, control network equipment and proxy access system
  • Proxy access method, control network equipment and proxy access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] This embodiment is aimed at a proxy access system in which a management device actively initiates an access type. Fig. 3 shows a schematic structural diagram of the proxy access system in this embodiment. Referring to Fig. 3, the system includes: a management device, a control network device, an intermediate network device and a terminal device. The management device and the control network device have fixed IP addresses; the management device indicates the identity of the terminal device to be accessed when initiating access, and the control network device converts the information of the management device to the intermediate network device before forwarding the information to The format of the network protocol that the intermediate network device and the terminal device can recognize, and modify the source IP address to its own IP address. In this way, in this embodiment, in addition to ensuring the normal communication between the management device, the intermediate ...

Embodiment 2

[0114] This embodiment is aimed at a proxy access system in which a terminal device actively initiates an access type. This embodiment can still adopt the structure of the proxy access system shown in FIG. 3 . Referring to Fig. 3, the system includes: a management device, a control network device, an intermediate network device and a terminal device. The management device and the control network device have fixed IP addresses; the terminal device first initiates access through the intermediate network device, and the control network device converts the information into a network protocol that the management device can recognize before forwarding the information from the intermediate network device Change the source IP address to its own IP address. In this way, this embodiment can not only ensure the normal communication of each device, but also improve the security of the access process.

[0115] Correspondingly, when performing access in this embodiment, after the control ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed agent access method comprises: a network control device set between the initial end and objective end receives access request to transform protocol and modify the original address into self network address, and sends the access request to the accessed end. This invention ensures the interconnection between two ends efficiently.

Description

technical field [0001] The invention relates to network communication technology, in particular to an agent access method and an agent access system. Background technique [0002] The rapid development of network communication technology and computer technology enables people to connect terminal devices scattered in various places to form various networks to exchange information with each other. In order to effectively manage the terminal devices in the network, a management device is usually provided to perform unified planning and scheduling for the terminal devices under its jurisdiction. Since there are a large number of terminal devices that need to be networked, and the management device has only a limited number of interfaces, an intermediate network device that acts as a proxy is set between the management device and the terminal device. At present, the above-mentioned network system composed of management equipment, intermediate network equipment and terminal equip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L29/06H04L12/46
Inventor 董辉
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products