User non-inductive VPN access method based on container technology
A container technology and access method technology, which is applied in the field of user non-sensing VPN access based on container technology, can solve the problems of reduced work efficiency, failure to succeed, and complicated connection process, so as to improve work efficiency, simplify the connection process, strengthen the safety effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0047] In this solution, the key problem to be solved is: when users are in the public network, they can access the internal network of the enterprise in a non-conscious and safe manner. To achieve this goal, no additional networking operations are required on mobile terminals such as notebooks and mobile phones, and all VPN-related software deployment and parameter configuration are automatically completed on the network access device at the user end.
[0048] In this example, if figure 1 As shown, the complete user-insensitive VPN access system consists of three parts, which are: user equipment software and hardware feature extraction subsystem, cloud VPN management subsystem, and containerized public network access equipment.
[0049] Among them, the user equipment software and hardware feature extraction subsystem is composed of an enterprise network administrator terminal and a mobile user terminal. The enterprise network administrator is responsible for collecting the s...
example
[0078] Enterprise B registers enterprise information with the service provider, applies for this service, and provides information to the management platform as B-1.1.110.1 / 16. And register the type of VPN used by the enterprise as SSL VPN, and the SSL VPN address as https: / / gateway.b.com .
[0079] User A holds a XIAOMI 5S mobile phone, the system MIUI 10.1.1.0stable, baseband version TH20c1.9-0926_1622_3a7bd2d, kernel version 3.18.31-perf-g0bf156d-01143-g2d4873d, WLAN MAC address 34:80:b3:f8:65: a0. The device is newly purchased and has not been connected to the work unit network, so the employee identity authentication is performed through the client software, and after passing, the above information is sent to the enterprise network administrator.
[0080] After the network administrator receives the above information, the administrator software calculates the fingerprint of the user device: 966634ebf2fc135707d6753692bf4b1e. Then, the administrator assigns a certific...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


