Security operation-maintenance gateway and operation-maintenance method thereof
An operation and maintenance network, operation and maintenance technology, applied in the field of network communication, can solve the problems of users' unauthorized access to information and video recording leakage, failure to find the root cause, waste of manpower, etc., to solve the problem of security access control and facilitate unified security management , the effect of saving operation and maintenance costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] Such as figure 1 As shown, the operation and maintenance method of a security operation and maintenance gateway of the present invention comprises the following steps:
[0041] S101, verify whether the USB-KEY used by the operation and maintenance personnel is the USB-KEY specified by the centralized operation and maintenance management platform through the USB-KEY national secret SM2 method, if so, proceed to the next step; if not, close the operation and maintenance gateway port;
[0042] S102. Verify whether the USB-KEY has management capabilities for accessing the operation and maintenance gateway. If so, open the corresponding control port of the USB-KEY, connect the terminal device, record the IP and MAC address of the terminal device, and enter the operation and maintenance mode; if not , the operation and maintenance gateway port is closed;
[0043] S103. Turn on the temporary WLAN in the operation and maintenance management mode;
[0044] S104. The operation an...
Embodiment 2
[0055] On the basis of Embodiment 1, an operation and maintenance method of a security operation and maintenance gateway of the present invention further includes the following steps:
[0056] S101, verify whether the USB-KEY used by the operation and maintenance personnel is the USB-KEY specified by the centralized operation and maintenance management platform through the USB-KEY national secret SM2 method, if so, proceed to the next step; if not, close the operation and maintenance gateway port;
[0057] S102. Verify whether the USB-KEY has the ability to manage access to the operation and maintenance gateway, if so, go to the next step; if not, close the operation and maintenance gateway port;
[0058] S103, the operation and maintenance gateway identifies the message sent by the terminal device through the DPI deep recognition technology, and judges whether the type of device connected to the operation and maintenance gateway port is in the white list issued by the centrali...
Embodiment 3
[0065] On the other hand, if image 3 As shown, the present invention provides a security operation and maintenance gateway, which includes a main control unit, and is characterized in that it also includes an identity verification unit, a device verification unit, a temporary WLAN unit, a log unit, an environment detection unit and a WiFi unit.
[0066] The control unit controls the sending and receiving of messages, detects the PPS, traffic and bandwidth information of the terminal equipment connection port through DPI deep recognition technology, judges the basic operation status of the terminal equipment according to the detection information, and sends it to the centralized operation and maintenance management platform, through centralized operation and maintenance management The platform conducts a comprehensive analysis of the above detection information, graphically displays the advanced operating status of the equipment, and stores the environmental parameters, basic o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


