Method for preventing rule-violating external connection through IPsec policy
A technology of outreach and strategy, applied in the direction of electrical components, transmission systems, etc., can solve problems that cannot be applied in a wide range
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0006] A method to prevent illegal outreach through IPsec policies, ①Input gpedit.msc in the running window to open the group policy window and create an IP security policy named "IPsec"; (Chinese cannot be used here, and using Chinese names will make it unusable The command line is activated, and the Chinese name "anti-outreach" is used for easy understanding.) ②Double-click the created IP security policy (anti-outreach) to configure, and fill in the IP addresses that are not allowed to be accessed in the Not Allowed Screening list.
[0007] The specific operation steps that the present invention is implemented on the computer are:
[0008] 1. "Master Key Perfect Forward Secrecy": Select to ensure that no previously used key material or keys are reused to generate other master keys.
[0009] 2. "Authentication and new key generation interval (A)": Determine the time interval after which new keys will be generated.
[0010] 3. "Authentication and new key generation interval ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com