Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network equipment security management method

A technology for network equipment and security management, applied in electrical components, transmission systems, etc., can solve the problems of increasing user resources, increasing the difficulty of network equipment management, leakage, etc., and reducing the risk of leakage

Inactive Publication Date: 2020-12-18
安徽盛世华科电子科技有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the wide use of various network devices, there are more and more different types of network devices produced by manufacturers. Managers need to understand and master the management methods of each type of network device in order to effectively manage network devices, which increases the The difficulty of network device management also increases the risk of user resource leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network equipment security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the technical solutions of the present invention clearer and clearer to those skilled in the art, the present invention will be further described in detail below in conjunction with the examples and accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0021] Such as figure 1 As shown, the network device security management method provided by this embodiment includes decomposing the management mode by creating multiple management protocol ports in the network device group, and logically isolating multiple users based on the role grouping of the user domain, creating multiple The first management protocol ports include adding system management protocol ports, security management protocol ports and log management protocol ports in the management domain. System management is used to manage virtual resources and complete operations of creating, accessing and allocating virtual machine resources; Authorization and con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network equipment security management method, which belongs to the technical field of network communication, and comprises the following steps of: decomposing a management mode by creating a plurality of management protocol ports in a network equipment group, and logically isolating a plurality of users based on role groups of a user domain, creating the plurality of management protocol ports, including: adding a system management protocol port, a security management protocol port, and a log management protocol port in a management domain. According to the network equipment safety management method, the arbitration monitor is used for monitoring resource sharing among the virtual machines and communication among the virtual machines according to a user isolation rule accessing the network equipment group, so that logic isolation based on a user domain is realized, and a manager is limited to check private data of the user domain; whether malicious software exists in the virtual machine or not is monitored through multi-view comparison, and when the malicious software needs to be repaired, a manager sends an operation instruction to the virtual machine in the trusted environment virtual machine to prevent the action of attacking other users from occurring in the virtual machine.

Description

technical field [0001] The invention relates to a safety management method, in particular to a network equipment safety management method, which belongs to the technical field of network communication. Background technique [0002] With the wide use of various network devices, there are more and more different types of network devices produced by manufacturers. Managers need to understand and master the management methods of each type of network device in order to effectively manage network devices, which increases the The difficulty of network device management also increases the risk of user resource leakage. Contents of the invention [0003] The main purpose of the present invention is to provide a network equipment security management method in order to solve the deficiencies of the prior art. [0004] The purpose of the present invention can be achieved by adopting the following technical solutions: [0005] A network device security management method, including de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1425H04L63/1441
Inventor 吴朋朱来斌张瑾瑾吴凡郭朝
Owner 安徽盛世华科电子科技有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More