摘要:
According to an example, to access a surveillance network through a Layer 2 Tunnel Protocol (L2TP) includes a private network IP address is assigned to a public network user device, and a route of a surveillance segment is transmitted to the public network user device, such that, after the route of the surveillance segment is received by the public network user device, an IP address of the L2TP virtual interface of the public network user device is configured as a next-hop of the route. When an access request to a surveillance device in the private network is initiated, a routing table of the public network user device is searched to find a matching route of the surveillance segment according to an IP address of the surveillance device. The access request is transmitted to an L2TP server through the L2TP virtual interface, and forwarded to the surveillance device.
摘要:
According to an example, to load balance a group of servers, a service access request message is sent by a client terminal and is received at a load balancing device, wherein a source Internet Protocol address of the request message is an Internet Protocol address of the client terminal of a first protocol version. A server is selected from the group of servers to send the request message. A determination is made as to whether the first protocol version is same as a second protocol version of an IP address of the selected server. If the versions are the same, the request message is sent to the selected server. Otherwise, network address translation is performed to replace the source Internet Protocol address of the request message with an Internet Protocol address of the second protocol version to send the request message.
摘要:
The present disclosure provides a method for backing up a link state advertisement (LSA) for use in a distributed device comprising a main control board and an interface board. The main control board comprises a primary board and a standby board. The method comprises: receiving by the standby board LSA related information sent by the primary board; and generating by the standby board an LSA according to the LSA related information.
摘要:
A method for detecting an IP address. An access router releases the routes of a detected IP address via a first interface and a second interface, and sets the priority of the route released via said first interface lower than that of the route released via said second interface. After having received by said access router a WEB request by the user via said first interface, the method comprises searching a session record corresponding to said WEB request; establishing by said access router the session record corresponding to said WEB request when the corresponding session record is not found, and returning a redirecting message taking said detected IP address as the re-directed destination IP address; and after having received by said access router via said second interface the message taking said detected IP address as the destination IP address, determining that the user who sent said message is an illegal user.
摘要:
A verification method or apparatus applied in a Wireless Local Area Network (WLAN) includes learning an Internet Protocol (IP) address assigned to a station; sending the IP address to a managing device that is managing the access device and receiving, from the managing device, a determination of whether the IP address is used by another station; and verifying a data packet sent by the station by using an IP address that is not used by another station as reported by the managing device.
摘要:
A method and device for preventing a roaming user terminal from re-authentication are provided. The method includes: when Virtual Local Area Network (VLAN) of a roaming user terminal changes, change information of the roaming user terminal is reported to a Broadband Remote Access Server (BRAS) via an Access Controller (AC) and the BRAS reports modified information of the roaming user terminal to an Authentication, Authorization, Accounting server (AAA server).
摘要:
In a method for 802.1X authentication, used in a network which comprises an access device and an access control device, a WLAN security template and a 802.1X client template is enabled at the access device, a 802.1X client template is enabled at the access device, and a 802.1X device template is enabled at a tunnel port of the access control device. The access control device establishes a 802.1X authentication tunnel with the access device, receive a packet transmitted by a client at the access control device through the 802.1X authentication tunnel, authenticates the client after receiving the packet, and assists the access device through the 802.1X authentication tunnel to obtain a session key.
摘要:
A method and device of link aggregation in computer networking, wherein data originally scheduled for forwarding by a scheduled data port are diverted for forwarding by a backup data port assigned to the scheduled data port upon detection that the scheduled data port is connected to a data link which is not capable of data traffic even though the data port is still a selected port.
摘要:
A method for acquiring station information is disclosed. The method is for use in a system comprising an access controller (AC), a Fit Access Point (Fit AP), a station and a network management device. The method comprises: the network management device reading the station information under the AC when it is initialized, the network management device determining a new online duration of the station according to the recorded online duration of the station and the time interval since the last time the online duration was updated, and the network management device displaying and/or recording the new online duration of the station.
摘要:
A network access apparatus comprising a tunneling interface to collect device access information of network devices of a first computer network having a first network gateway device and device access information of network devices of a second computer network having a second network gateway device, wherein the apparatus is to send device access information of network devices of said first computer network to said second computer network upon receipt of an inquiry for request of device access information from said second computer network, and vice versa.