Bypass authentication and audit method
A bypass and router technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as network paralysis, high cost, and manpower consumption, and achieve the goal of reducing transformation costs, reducing equipment performance requirements, and reducing costs Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0022] The technical scheme of the present invention is described further below:
[0023] A bypass authentication and audit method is characterized in that it comprises the following steps:
[0024] Step (1), connecting the WAN port of the authentication and auditing equipment to a Layer 3 switch or router, and isolating it from the user terminal network;
[0025] Step (2), using the port mirroring function of the layer-3 switch or router, the user's Internet access data is mirrored to the LAN port of the authentication and auditing equipment;
[0026] Step (3), authentication and audit equipment judge the direction of data according to the MAC address of user's gateway;
[0027] Step (4), analyzing the user's network access request at the authentication and auditing device, and performing auditing and authentication functions on user data.
[0028] The direction of the data includes two directions, namely the data sent by the user and the data sent to the user.
[0029] Th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com