摘要:
A method and system for remotely managing a bridge device, such as a modem, are disclosed. Management traffic from a service provider can be communicated to a bridge device which lacks a public IP address by sending the management traffic through the bridge device to a router of a LAN. The router then sends the management traffic back to the bridge device. Thus, the service provider can perform management tasks such as troubleshooting, health monitoring, accounting, provisioning, security and firmware upgrades in a manner that is transparent to the user.
摘要:
A network device and a method of configuring a network device are provided. The method includes: receiving an e-mail message at the network device; parsing the e-mail message to retrieve configuration instructions; and executing a configuration action according to the configuration instructions contained in the e-mail message. The network device includes: a first upstream network interface; control logic configured to: receive an e-mail message; parse the e-mail message to retrieve configuration instructions; and execute a configuration action according to the configuration instructions contained in the e-mail message.
摘要:
A method and system facilitates enhanced communication between a LAN and a WAN by determining which IP device of the LAN is a gateway and then restricting communication between the LAN and the WAN such that the communication is routed through the gateway. Determining which IP device of the LAN is a gateway can comprise using DHCP protocol to implement a provisioning and setup flow between a WAN bridge and gateway. By restricting communication between the LAN and the WAN such that it is routed through the gateway, features of the gateway such as a firewall and/or parental controls, can be advantageously utilized.
摘要:
In one embodiment, a network device is provided that includes a DHCP server; a NAT/NAPT facility; and a logic engine configured to detect a presence of an upstream NAT/NAPT service, the logic engine being further configured to disable the DHCP server and the NAT/NAPT facility in response to detecting the presence of the upstream NAT/NAPT service.
摘要:
VoIP verification is initiated by subscriber-side test VoIP appliance, or VoIP proxy agent. Test VoIP appliance is coupled to test node over a communications internetwork by upstream and downstream datapaths. VoIP verification request is transmitted to test node. Responsively, test node transmits VoIP verification signal to test VoIP appliance. Perceivable indication of verification signal received by VoIP appliance is effected by visual display, audible indication, or both. Operational state verifier apparatus is disposed in a digital telephony device, a computer terminal, or with an ATA interface coupled to analog telephony device used in VoIP communications system.
摘要:
A multi-use adapter configured to provide network connectivity for a serial bus client is provided. The adapter includes: a serial interface for coupling with the serial bus client; a network interface for interfacing the adapter with a network; and host control logic configured to interface a plurality of types of serial bus clients with a utilizing device over the network. The host control logic may be configured to detect a USB client coupled to the USB interface, to determine a corresponding driver for the detected USB client, and to retrieve the corresponding driver via the network interface.
摘要:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
摘要:
Systems and techniques for detecting rogue access points. A wireless signal may be received from a wireless device. The wireless device may be determined to be a candidate device based on network identification information. Additional information associated with the wireless device may be acquired, and the wireless device may be determined to be a rogue device based on the additional information. Notification information indicative of the determination may be transmitted.
摘要:
Methods and systems for deterring spam on a communication medium are disclosed. Call traffic on the communication medium includes IP telephone calls, IM™ messages and other IP calls. The method includes detecting a call with a user device for accessing the communication medium, such as an IP telephone, a computer, etc. A signaling message associated with the call is accessed and compared with information relating to identities that correspond to originators of spam calls sent over said communication medium, which is stored in a repository associated with the communication medium, such as a dynamically updatable database. Where no match is found between the signaling message and the stored spam call identity information, the call is routed to the user. Where the signaling message matches any said spam call originator identity information however, the call is deterred from being routed to the user.
摘要:
A gateway device is provided, wherein the device is configured to initiate communication with a client device to notify the client device of detected network events and to query the user for action. A method of managing a gateway device is provided. The method includes: detecting an unauthorized network event, transmitting from the gateway device to a client device over a local area network (LAN) a message indicating the detection of the unauthorized or unexpected network event and requesting a response from a user of the client device, receiving the response from the client device, and handling the unauthorized or unexpected network event pursuant to the response from the client device.