Authentication method, device, access equipment and controllable equipment of network equipment
A technology for accessing equipment and network equipment, applied in the field of communication, can solve problems such as low network security, and achieve the effect of improving network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] figure 1 It is a flowchart of an embodiment of the authentication method of the network equipment of the present invention, such as figure 1 As shown, the authentication method of the network device may include:
[0047]Step 101, after the access device is connected to the controllable device, the controllable device sets the port connected to the access device in the controllable device as a controlled port, and the filtering rule of the controlled port is to exclude All packets other than those used for authentication are filtered and blocked.
[0048] Wherein, the above-mentioned controllable device is a device successfully authenticated and connected to the network.
[0049] Specifically, in this embodiment, after the controllable device finds that an access device is connected to the controllable device, it sets the port connected to the access device in the controllable device as a controlled port, and the filtering of the controlled port The rule is to filter ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 