An encryption level automatic deployment method and device
An automatic deployment and high-level technology, applied in the field of communication, can solve problems such as heavy workload, high complexity, unfavorable management and maintenance, and achieve the effects of ensuring security, reducing user operations, and facilitating management and maintenance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0058]The method for automatically deploying encryption levels described in this embodiment may, but is not limited to, be applied to an IPSec VPN multi-user access scenario. For example, in this embodiment, the gateway device may send an extended authentication request to the access device, and the access device may return a corresponding extended authentication response message after receiving the extended authentication request. Further, the gateway device may parse the received extended authentication response message to generate an authentication request; then, send the authentication request to the authentication server. Finally, the access device can automatically deploy the encryption level of th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


