Network security equipment based on NAT method

A technology of network security and conversion method, applied in the field of network security equipment, can solve the problems of large size of the security router, no dustproof, anti-collision, damage to the security router, etc.

Pending Publication Date: 2021-07-27
江苏趣牛智能科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The security router used by the company is relatively large in size, so it needs to be placed and installed layer by layer on a shelf. Will cause damage to the security router installed in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security equipment based on NAT method
  • Network security equipment based on NAT method
  • Network security equipment based on NAT method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following is attached Figure 1-4 The principles and features of the present invention are described, and the examples given are only used to explain the present invention, and are not used to limit the scope of the present invention. In the following paragraphs the invention is described more specifically by way of example with reference to the accompanying drawings. Advantages and features of the present invention will be apparent from the following description and claims. It should be noted that all the drawings are in a very simplified form and use imprecise scales, and are only used to facilitate and clearly assist the purpose of illustrating the embodiments of the present invention.

[0033] It should be noted that when a component is said to be "fixed" to another component, it can be directly on the other component or there can also be an intervening component. When a component is said to be "connected" to another component, it may be directly connected to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to network security equipment based on an NAT method, which comprises a box body, a moving rod and a sleeve rod, third shaft seats are fixedly mounted on two sides of the middle in the box body, a rotating shaft is connected and mounted in the third shaft seats, the sleeve rod is connected and mounted on the surface of the rotating shaft, and an inner rod is inserted into the sleeve rod; one end of the inner rod is connected and mounted in a second shaft seat, the second shaft seat is fixedly mounted on the middle surface of a moving rod, one end of the moving rod is rotatably connected in a fourth shaft seat, the fourth shaft seat is fixedly mounted on the surface of one side of a clamping plate, and a cushion is fixedly mounted on the surface of the other side of the clamping plate; a network safety equipment body is attached to the surface of the cushion and placed on the surface of the partition plate, and hollow holes are formed in the partition plate in a penetrating mode. According to the invention, the box body is used for installing the network security equipment in the box body, and the telescopic clamping plates are used for clamping and fixing the network security equipment, so that the network security equipment with different sizes can be fixedly installed and protected.

Description

technical field [0001] The invention relates to the technical field of network security equipment, in particular to a network security equipment based on a NAT conversion method. Background technique [0002] Network security equipment includes IP protocol cipher machines, security routers, line cipher machines, firewalls, etc. In addition to the above-mentioned equipment, information security equipment in a broad sense also includes cryptographic chips, encryption cards, identification cards, telephone cipher machines, fax cipher machines, Asynchronous data encryption machine, security server, security encryption suite, financial encryption machine / card, security middleware, public key infrastructure (PKI) system, certificate of authority (CA) system, security operating system, anti-virus software, network / system Scanning system, intrusion detection system, network security early warning and auditing system, etc. [0003] The security router used by the company is relative...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H05K5/02H05K7/12H05K7/20
CPCH05K7/20136H05K5/0217H05K5/023H05K7/12
Inventor 柏德安张治陈逸群胡泽林
Owner 江苏趣牛智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products