Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing rule-violating external connection through IPsec strategy

A technology of outreach and strategy, applied in the direction of electrical components, transmission systems, etc., can solve problems that cannot be applied on a large scale

Inactive Publication Date: 2014-10-08
STATE GRID CORP OF CHINA +1
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Registered desktop terminals can also prohibit illegal outreach blocking through the desktop management system, but this method of prohibiting illegal outreach blocking through the desktop management system is restricted by rules and regulations and cannot be widely used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0006] A method to prevent illegal outreach through IPsec policies, ①Input gpedit.msc in the running window to open the group policy window and create an IP security policy named "IPsec"; (Chinese cannot be used here, and using Chinese names will make it unusable The command line is activated, and the Chinese name "anti-outreach" is used for easy understanding.) ②Double-click the created IP security policy (anti-outreach) to configure, and fill in the IP addresses that are not allowed to be accessed in the Not Allowed Screening list.

[0007] The specific operation steps that the present invention is implemented on the computer are:

[0008] 1. "Master Key Perfect Forward Secrecy": Select to ensure that no previously used key material or keys are reused to generate other master keys.

[0009] 2. "Authentication and new key generation interval (A)": Determine the time interval after which new keys will be generated.

[0010] 3. "Authentication and new key generation interval ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for preventing rule-violating external connection through an IPsec strategy. The method includes the following steps: 1) entering gpedit.msc in operation so as to open a strategy window and establish an IP safety strategy which is named as IPsec; 2) carrying out double clicks on the established IP safety strategy (preventing external connection) for configuration and filling IP addresses, which are not allowed to be accessed, into a screening-not-allowed list. The method for preventing the rule-violating external connection through the IPsec strategy is capable of effectively preventing rule-violating external-connection behaviors in a rule-complying manner, widely implementable and high in universality.

Description

technical field [0001] The invention relates to a communication defense technology, in particular to a method for preventing illegal outreach through IPsec policies. Background technique [0002] The access control capability based on IP address is very fragile, because attackers can easily use disguised IP addresses to send IP packets. Many attackers use IP address-based trust between machines to spoof IP addresses. Registered desktop terminals can also prohibit illegal outreach blocking through the desktop management system, but this method of prohibiting illegal outreach blocking through the desktop management system is restricted by rules and regulations and cannot be widely used. Contents of the invention [0003] The purpose of the present invention is to provide a method for preventing illegal outreach through IPsec policies, which can effectively and compliantly prevent illegal outreach behaviors, can be widely implemented, and has strong versatility. [0004] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 尼加提王晓磊马天福周晓宁皮晓东
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products