Method of terminal exchange access and control device thereof
A control device and terminal technology, applied in the field of communication, can solve problems such as relatively high requirements, unable to work normally, and information security, etc., and achieve the effect of reducing information security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] Such as figure 2 As shown, it is a flowchart of a method for terminal mutual access according to an embodiment of the present invention. The above method includes:
[0034] Step 201, obtain a preset screening configuration from a server.
[0035] Optionally, the above-mentioned screening configuration may include IP security policy screening parameters, and passwords used for IP protocol security negotiation and verification between trusted terminals; after obtaining the above-mentioned screening configuration from the server, the above-mentioned IP security policy screening parameters and the The password for IP protocol security negotiation and verification between trusted terminals is written into the IP security policy module of the security agent of the terminal, and the above IP security policy module is enabled.
[0036] Step 202, use the above screening configuration to screen the terminals within the range of the local area network, and generate a screening r...
Embodiment 2
[0058] The first embodiment above can be applied not only to the access control scheme of the access control gateway, but also applicable to the absence of the access control gateway. The following aims at the defects existing in the existing technology based on the access control gateway scheme, and the embodiment of the present invention Second, it is used to reduce the potential information security risks of mutual visits of LAN terminals. Specifically, it can solve the following problems based on the access control gateway access control scheme: 1) Within the scope of the LAN, prevent untrusted terminals from accessing trusted terminals and Repair terminal access to reduce information security risks; 2) Within the scope of the local area network, prevent the repair terminal from accessing trusted terminals, and prevent the security defects of the repair terminal from spreading within the local area network. Embodiments of the present invention include: defining a plurality ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 