Port protection method of PSE and PSE

A port and port status technology, applied in the field of PSE and PSE port protection, can solve data security problems, data leakage and other problems, and achieve the effect of strengthening port security, avoiding data leakage, and avoiding data security

Active Publication Date: 2014-11-26
NEW H3C TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, since PDs such as IP phones and network security cameras can transmit data in multicast mode, any illegal user can obtain data of other PDs such as IP phones and network security cameras after accessing the PSE, resulting in Data leaks, causing data security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port protection method of PSE and PSE
  • Port protection method of PSE and PSE
  • Port protection method of PSE and PSE

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Aiming at the problems existing in the prior art, an embodiment of the present invention provides a PSE port protection method, which is applied to a PoE system including a PSE and a PD. by figure 2 It is a schematic diagram of the application scenario of the embodiment of the present invention. The P1 port of the PSE is an uplink port, and the P1 port is connected to a data server. The data server is the object of communication with the PD. For example, when the PD is a network security camera, the data server can be The video server, when the PD is an IP phone, the data server may be a SIP (Session Initiation Protocol, Session Initiation Protocol) server).

[0025] The P2 port, P3 port, P4 port, P5 port, and P6 port of the PSE are downlink ports. The P2 port is connected to the network security camera. The P3 port is connected to the network security camera of user A. The P4 port is connected to user B's PC. The P5 port is connected to a PoE switch, and user C uses...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a port protection method of power sourcing equipment (PSE) and a PSE. The method comprises: the PSE detects port state information of a port; the PSE uses the port state information to determine a security level of the port; the PSE determines a port protection strategy corresponding to the security level; and the PSE uses the port protection strategy to carry out security protection on the port. According to the embodiment of the invention, the port data can be effectively protected; the port security is enhanced; and a phenomenon that an illegal user obtains legal powered device (PD) data can be prevented.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a PSE port protection method and the PSE. Background technique [0002] Such as figure 1 As shown, a PoE (Power Over Ethernet, active Ethernet) system includes two parts: PSE (Power Sourcing Equipment, power supply device) and PD (Powered Device, power receiving device). Wherein, the PD may be an Ethernet device such as an IP phone, a network security camera, and a wireless AP (Access Point, access point). PoE technology allows power supply through Ethernet cables, and its technical advantages are: improved reliability, centralized power supply, PD does not need an external power supply, only one network cable is required. [0003] In the prior art, since PDs such as IP phones and network security cameras can transmit data in multicast mode, any illegal user can obtain data of other PDs such as IP phones and network security cameras after accessing the PSE, resulting in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/10H04L29/06
Inventor 王祝勋唐小虎
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products