Method for preventing rule-violating external connection through IPsec policy

A technology of outreach and strategy, applied in the direction of electrical components, transmission systems, etc., can solve problems that cannot be applied in a wide range

Inactive Publication Date: 2015-01-21
XINJIANG INFORMATION IND
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Registered desktop terminals can also prohibit illegal outreach blocking through the desktop management system, but this method of proh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0006] A method to prevent illegal outreach through IPsec policies, ①Input gpedit.msc in the running window to open the group policy window and create an IP security policy named "IPsec"; (Chinese cannot be used here, and using Chinese names will make it unusable The command line is activated, and the Chinese name "anti-outreach" is used for easy understanding.) ②Double-click the created IP security policy (anti-outreach) to configure, and fill in the IP addresses that are not allowed to be accessed in the Not Allowed Screening list.

[0007] The specific operation steps that the present invention is implemented on the computer are:

[0008] 1. "Master Key Perfect Forward Secrecy": Select to ensure that no previously used key material or keys are reused to generate other master keys.

[0009] 2. "Authentication and new key generation interval (A)": Determine the time interval after which new keys will be generated.

[0010] 3. "Authentication and new key generation interval ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing rule-violating external connection through an IPsec policy. The method includes the following steps: 1) entering gpedit.msc in operation so as to open a group policy window and establish an IP security policy which is named as IPsec; and 2) carrying out double clicks on the established IP security policy (preventing external connection) for configuration and filling IP addresses, which are not allowed to be accessed, into a screening-not-allowed list. The method for preventing the rule-violating external connection through the IPsec policy is capable of effectively preventing rule-violating external-connection behaviors in a rule-complying manner, is widely implementable and is high in universality.

Description

technical field [0001] The invention relates to a communication defense technology, in particular to a method for preventing illegal outreach through IPsec policies. Background technique [0002] The access control capability based on IP address is very fragile, because attackers can easily use disguised IP addresses to send IP packets. Many attackers use IP address-based trust between machines to spoof IP addresses. Registered desktop terminals can also prohibit illegal outreach blocking through the desktop management system, but this method of prohibiting illegal outreach blocking through the desktop management system is restricted by rules and regulations and cannot be widely used. Contents of the invention [0003] The purpose of the present invention is to provide a method for preventing illegal outreach through IPsec policies, which can effectively and compliantly prevent illegal outreach behaviors, can be widely implemented, and has strong versatility. [0004] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 周晓宁
Owner XINJIANG INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products