A network management model of network forensics equipment based on udt reverse penetration technology
A network and equipment technology, applied in the field of network management model of network forensics equipment, can solve problems such as failure of forensics tasks, inability to manage access to forensics equipment, and no external network IP address, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The network management model of network forensics equipment based on UDT reverse traversal technology of the present invention will be described in more detail below in conjunction with schematic diagrams, wherein a preferred embodiment of the present invention is shown, and it should be understood that those skilled in the art can modify the present invention described here , while still realizing the advantageous effects of the present invention. Therefore, the following description should be understood as the broad knowledge of those skilled in the art, but not as a limitation of the present invention.
[0020] Such as figure 1 As shown, the present invention proposes a network management model of network forensics equipment based on UDT reverse penetration technology, comprising the following steps:
[0021] In the first step, the network forensics device 2 establishes a UDT connection with the network management server 3 through a fixed port number by means of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
