Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network device access control list management method and network device access control list management device

A technology for access control lists and network equipment, which is applied in data exchange networks, electrical digital data processing, special data processing applications, etc.

Inactive Publication Date: 2016-05-11
ZTE CORP
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, ACL management in network devices mainly achieves the purpose of configuring, querying, modifying or deleting ACLs by inputting access control list commands to network devices. errors; and once an ACL rule is accidentally configured incorrectly, it can lead to abnormal or even interruption of important services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network device access control list management method and network device access control list management device
  • Network device access control list management method and network device access control list management device
  • Network device access control list management method and network device access control list management device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to illustrate the embodiments and technical solutions of the present invention more clearly, the technical solutions of the present invention will be described in more detail below in conjunction with the accompanying drawings and embodiments. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without any creative effort fall within the protection scope of the present invention.

[0039] In this embodiment of the present invention, the access control policy of a network device refers to the set of access control rules of the device, including the access control rules of the network device that the developer of the network device wishes to implement through the internal ACL and the user of the network device that wishes to pass the user Access control rules for network devices ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network device access control list management method. The network device access control list management method is characterized in that an access control strategy can be described by adopting a set of XML data nodes according to a preset extensible markup language XML mark language dictionary; an XML file corresponding to an access control list can be generated by using the set of the XML data nodes; and the XML file can be stored as the configuration file of the network device. The invention also discloses a network device access control list management device.

Description

technical field [0001] The invention relates to the field of network data transmission, in particular to an access control list (AccessControlList, ACL) management method and device of network equipment. Background technique [0002] With the rapid development of network technology today, the scale of the network continues to expand, and the requirements for various functions on the network are also increasing. The increase in these functional requirements will inevitably put forward higher requirements for the realization and management of network equipment. [0003] ACL is used as an instruction list of router and switch interface to control the data packets entering and leaving the port. These command lists are used to tell routers or switches which data packets to accept and which data packets to reject. As for whether the data packet is accepted or rejected, it may be determined by specific indication conditions such as source address, destination address, port number,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24G06F17/30
CPCH04L41/0266
Inventor 孙伟强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products