A network management centralized management method and server
A centralized management and server-side technology, which is applied in the network management centralized management method and the server-side field, can solve problems such as poor disaster tolerance, failure to meet the requirements of the operator's technical specifications, and network elements that cannot be operated and maintained, so as to improve disaster tolerance and smooth network management. The effect of expansion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] The network management centralized management server needs to authenticate the user accounts and newly added user accounts that log in to the network management centralized management server in the centralized network management, and use the input user names and passwords to multiple sets of physical network management systems according to the subnet management mapping relationship. Polling authentication, if no matching account can be found or the password does not match, login is prohibited.
[0051] Specific as Figure 4 As shown, the centralized network management method after implementation is described as follows:
[0052] a: After the network management centralized management server receives the user name and password, verify whether they are correct. If the verification is passed, the subsequent authentication process will continue, and if the verification is not passed, the login will be directly refused.
[0053] b: According to the predetermined network man...
Embodiment 2
[0057] Batch processing functions such as performance management, alarm management, and topology management of the network management system need to be isolated through subnets, that is, when batch processing selects areas or network elements, it must be limited to one subnet, and it is not allowed to select networks within different subnet ranges. Units or regions perform batch operations. If the user performs this type of operation, it should be validated before sending and a prohibition prompt will be given.
[0058] Specific as Figure 5 As shown, the centralized network management method after implementation is described as follows:
[0059] a: After the network management centralized management server receives the user name and password, verify whether they are correct. If the verification is passed, the subsequent authentication process will continue, and if the verification is not passed, the login will be directly refused.
[0060] b: According to the predetermined ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


