Policy enforcement method, system, policy enforcement device, and control device
A technology for policy execution and control of equipment, applied in the field of network communication, can solve the problems of poor scalability of network architecture and easy consumption of large network transmission resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0095] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the following describes the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings For further detailed explanation.
[0096] see Figure 1A , which is a schematic diagram of the network architecture applying the embodiment of the present invention:
[0097] Figure 1A, user device A accesses the authentication device through the intranet (also called the private network), the authentication device connects to the NAT device, the NAT device connects to the policy enforcement device, and the policy enforcement device connects to the Internet (also called the external network) Internet , where the authentication device, the NAT device, and the po...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


