Method, equipment and system for collocating access control list
An access control list and equipment technology, applied in transmission systems, digital transmission systems, error prevention/detection using return channels, etc., can solve the problems of time-consuming, labor-intensive, and high cost of ACL, and achieve the effect of avoiding huge costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Embodiments of the present invention provide a method, device and system for configuring an access control list, which can automatically generate and delete an ACL without manual intervention, and avoid the huge cost of manually configuring the ACL.
[0029] In this specification, the binding table refers to a Dynamic Host Configuration Protocol (DHCP) binding table or a Dynamic Host Configuration Protocol snooping (DHCP Snooping) binding table.
[0030] Taking the DHCP binding table as an example below, it will be described in detail in Embodiment 1 of the method of the present invention.
[0031] figure 1 It is a schematic diagram of an application scenario of Embodiment 1 of the method of the present invention, in which a DHCP Server (server) and DHCP Clients (clients) are included, both of which are directly connected and are in the same network. figure 2 It is a schematic diagram of the process in which the DHCP Server directly assigns the IP address to the DHCP ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 