Method and concentrator for implementing network security isolation by using concentrator
A network security and concentrator technology, applied in the field of intelligent power consumption, can solve the problems of increasing system cost and construction difficulty, high cost, complicated installation and debugging, etc., and achieve the effect of reducing system cost and construction difficulty, simple operation and low cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0019] A method for implementing network security isolation using a concentrator in an embodiment, the concentrator is provided with at least two network ports. Specifically, the at least two network ports include a public network port used to connect to a public network (public network, i.e. external network) server and a network port used to connect to a private network (internal network) server (i.e. power supply intranet master station) Private network port. Both the public network port and the private network port are independently equipped with a physical (PHY) chip and a routing (MAC) chip ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

