摘要:
According to an example, to access a surveillance network through a Layer 2 Tunnel Protocol (L2TP) includes a private network IP address is assigned to a public network user device, and a route of a surveillance segment is transmitted to the public network user device, such that, after the route of the surveillance segment is received by the public network user device, an IP address of the L2TP virtual interface of the public network user device is configured as a next-hop of the route. When an access request to a surveillance device in the private network is initiated, a routing table of the public network user device is searched to find a matching route of the surveillance segment according to an IP address of the surveillance device. The access request is transmitted to an L2TP server through the L2TP virtual interface, and forwarded to the surveillance device.
摘要:
According to an example, to access a network through a Layer 2 Tunnel Protocol (L2TP) includes assigning a private network IP address to a public network user device, and transmitting a route of a surveillance segment to the public network user device, such that, after the route of the surveillance segment is received by the public network user device, an IP address of the L2TP virtual interface of the public network user device is configured as a next-hop of the route. When an access request to a surveillance device in the private network is initiated, a routing table of the public network user device is searched to find a matching route of the surveillance segment according to an IP address of the surveillance device. The access request is transmitted to an L2TP server through the L2TP virtual interface, and forwarded to the surveillance device.