Security policy management and control method and device
A security strategy and purpose technology, applied in the field of communication, can solve problems such as low efficiency and difficult network operation and maintenance, and achieve the effect of improving operation and maintenance efficiency and reducing operation and maintenance difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] Aiming at the problems of difficulty in network operation and maintenance and low efficiency in the prior art, an embodiment of the present invention provides a security policy management and control method, which is applied to a security policy unified management and control device, and the security policy unified management and control device can be set in such as figure 1 shown in the core device, it can also be set in such as figure 1 On any of the NAS devices shown, the execution method is the same regardless of the scenario. The procedure of this method is as follows figure 2 As shown, the execution steps are as follows:
[0044] S21: After sniffing the RADIUS authentication request message sent by the first terminal, record the first Media Access Control (Media Access Control Address, MAC) address and the first Packet identification information.
[0045]When a terminal wants to perform RADIUS authentication, it will send a RADIUS authentication request messa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


