A security policy management method and device
A technology of security policy and management method, applied in the field of security policy management method and equipment, can solve the problems of bad user experience, time-consuming, long time, etc., and achieve the effect of improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] An embodiment of the present invention provides a security policy management method, which is applied to a network including an AP, user equipment and a management server. by figure 1 It is a schematic diagram of the application scenario of the embodiment of the present invention. The network also includes an AC, the management server can be an iMC server, and the user equipment can be a Telephone (telephone), a PC (personal computer), a Printer (printer), a Notebook (notebook computer) ), Fax (fax machine), TV (television), Cell phone (mobile phone), DC (digital camera), etc.
[0050] In the above application scenarios, such as figure 2 As shown, the method includes the following steps:
[0051] Step 201, the user equipment obtains the equipment information of the user equipment, adds the equipment information of the user equipment to the LLDP packet, and sends the LLDP packet carrying the equipment information of the user equipment to the AP.
[0052] In a specifi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


