Monitoring system and method for illegal access of network terminal to local area network
A technology for illegal access and network terminals, which is applied in the field of monitoring systems for network terminals illegally accessing LANs. It can solve problems such as occupying large port information and chaotic asset management of operation and maintenance personnel, and achieve accurate alarms, timely maintenance of the LAN network environment, and The effect of ensuring high efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] Such as figure 1 As shown, a monitoring method for illegally accessing a local area network by a network terminal, the specific steps are:
[0032] Build a syslog log server and configure the IP address of the syslog log server;
[0033] The terminal device is connected to the LAN switch, and the switch generates corresponding log information and pushes the log information to the syslog log server;
[0034] The syslog log server saves the received log information to the MySQL database;
[0035] Configure the device information keywords that need to extract terminal devices in the syslog log server. The device information keywords include physical addresses, IP addresses and other related information;
[0036] Perform data cleaning and analysis on the log information according to the configured device information. The specific steps are:
[0037] According to the configured device information keywords, retrieve the entire log information, and extract the corresponding...
Embodiment 2
[0047] A monitoring system for network terminals illegally accessing a local area network, using a distributed deployment architecture, deploying different services on multiple servers, using a reverse proxy mechanism to ensure load balancing between servers, and effectively improving performance.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
