Remote access control list generation and data packet processing method for CM
A control list and remote access technology, applied in the field of communication and network, can solve the problems of incapable network traffic, performance, flexible configuration of security policies, lack of CM interface performance, network security processing, etc., to reduce on-site maintenance costs and realize flexible configuration , Improve the effect of network performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0033] figure 1 It is a flow chart of the method for generating a remote access control list and processing a data packet for a CM provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes step S1 to step S, each step will be described in detail below.
[0034] Step S1: Write the ACL command and add the ACL command to the TLV43 field of the CM configuration file.
[0035] In step S1, write one or several ACL commands according to the preset ACL command format, and add the ACL commands to the TLV43 field of the CM configuration file through TLV encoding and binary encoding, wherein the CM configuration file is stored on the TFTP server corresponding to the CMTS .
[0036] In step S1, the ACL number of the standard ACL ranges from 1 to 99, and its format is:
[0037] {ip|ipv6}access-list{ACL number}{deny|permit}{source[source-wildcard]|any}, the content in curly brackets is mandatory, and the content in square brackets is optional, {ip...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap