Control method for network access based on proxy mode in network equipment
A network equipment, access network technology, applied in data exchange networks, data exchange details, digital transmission systems, etc., can solve the problem of inability to identify legitimate users, the rationality and efficiency of network resource use, and the inability to control user agent behavior. and other problems to achieve the effect of improving rationality and effectiveness and preventing access to services
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0030] The present invention can be applied to various network access systems, refer to figure 2 . User 1 to user N in the figure are connected to the MAN or the backbone network through the access server, and then connected to the Internet through the MAN or the backbone network. When a user accesses the network, the access server controls the user's access. When an access user's access device acts as an illegal proxy device to act as an illegal proxy device for other user devices connected to it to access the network, the access server restricts it. .
[0031] In the data access system, the transmission of information between the user equipment and the network access equipment, such as the access server, usually does not directly send "naked" IP packets, but is based on TCP (TransferControl Protocol, Transmission Control Protocol) or UDP ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 