CN101179439A - Method and equipment for controlling login - Google Patents

Method and equipment for controlling login Download PDF

Info

Publication number
CN101179439A
CN101179439A CNA2007101780918A CN200710178091A CN101179439A CN 101179439 A CN101179439 A CN 101179439A CN A2007101780918 A CNA2007101780918 A CN A2007101780918A CN 200710178091 A CN200710178091 A CN 200710178091A CN 101179439 A CN101179439 A CN 101179439A
Authority
CN
China
Prior art keywords
equipment
agent
login
command window
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101780918A
Other languages
Chinese (zh)
Inventor
李海波
崔宏庆
郭峰
杨斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNA2007101780918A priority Critical patent/CN101179439A/en
Publication of CN101179439A publication Critical patent/CN101179439A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method and a equipment for controlling the login, which belong to the field of the communications. The method comprises the processes that: a first intermediate proxy equipment is connected, a command window is started and the first intermediate proxy equipment is logged in; the next intermediate proxy equipment is logged in according to the equipment identification information of the next intermediate proxy equipment that the user inputs in the command window; after the last intermediate proxy equipment connected with a destination equipment is logged in, the destination equipment is logged through the last intermediate proxy equipment. The equipment comprises a first login module, a second login module and a third login module. The invention starts the command window so as to acquire the identification information of the proxy equipment that the user inputs, finds and logs in the intermediate proxy equipment through the identification information of the proxy equipment, can support a plurality of proxy equipment types in the network, delivers flexibility in the process of login and has good scalability.

Description

A kind of method and apparatus of controlling login
Technical field
The present invention relates to the communications field, particularly a kind of method and apparatus of controlling login.
Background technology
Universal day by day along with the communication technology uses the number of users of various communication services constantly to increase, and the communication equipment of disposing in network is more and more.With the broadband IP metropolitan area network is example, referring to Fig. 1, provides the network diagram of broadband IP metropolitan area network, mainly is made of three network layers: User Access Layer, IP convergence-level and IP backbone layer.User Access Layer is by LAN (LocalArea Network, local area network (LAN)) finishes SHDSL (Symmetrical High bite Digital Subscriber Line, the symmetry HDSL High-Speed Digital Subscriber Line), ADSL2+ (Asymmetrical Digital Subscriber Line, Asymmetric Digital Subscriber Loop (ADSL)) and the access of FE (Fast Ethernet, Fast Ethernet) terminal; By DSLAM (Digital SubscriberLine Access Multiplexer, digital subscriber line access multiplex), finish equipment, PSTN (Public Switched Telephone Network that User Access Layer inserts, public switch telephone network) IP converges, and forms the IP convergence-level; Finish being connected of DSLAM, server and IP backbone by BRAS (Broadband Remote Access Server, Broadband Remote Access Server).
Most equipment in the network (Ethernet Layer 2 switch, three-tier switch, DSLAM, BRAS, router etc.) all provide CLI (Command Line Interface, command line interface) uses for the user, for example, the monitoring software that is installed on the watch-dog can be connected to destination device by network interface or serial ports, and utilize CLI and destination device to carry out automatic interaction, to reach purposes such as automatically-monitored, maintenance to destination device.But, usually in network, be provided with the multi-layer fireproofing wall, the watch-dog at monitoring software place need penetrate the multi-layer fireproofing wall, could arrive destination device and carry out sign-on access, watch-dog can't directly be connected to destination device by network interface or serial ports, therefore, login destination device process need is finished by the intermediate equipment agency.But, because the producer of production intermediate equipment is numerous at present, and there is not unified standard convention at intermediate equipment between the producer, cause the intermediate equipment type used in the network various, as sun, equipment such as cisco, the order line form of while equipment is various and the order line format conversion is uncontrollable, at above-mentioned reason, the solution that prior art provides is that the intermediate equipment (hereinafter referred to as middle-agent's equipment) that will be used to act on behalf of is redefined for fixing several types, the scope that is about to middle-agent's equipment narrows down to modal several device type, by the fixing middle-agent's equipment of pre-configured type on watch-dog and the log-on message of destination device, as Device IP, the equipment end slogan, the user name that is used to login, password etc., thus realize that watch-dog is by the connection of middle-agent's device logs to destination device.
The inventor finds in realizing process of the present invention, though the scheme that prior art provides can solve the purpose by intermediate equipment agent logs destination device, has following shortcoming and defect at least:
Owing to define the type of middle-agent's equipment, cause the agent equipment type of in login process, supporting few, the login process underaction, autgmentability is poor.
Summary of the invention
In order to login middle-agent's equipment neatly, the embodiment of the invention provides a kind of method and apparatus of controlling login.Described technical scheme is as follows:
On the one hand, a kind of method of controlling login, described method comprises:
Connect first middle-agent's equipment, the starting command window is logined described first middle-agent's equipment;
The equipment identification information of next middle-agent's equipment of importing in described command window according to the user is logined described next middle-agent's equipment;
After signing in to last the middle-agent's equipment that is connected with destination device, by the described destination device of described last middle-agent's device logs.
On the other hand, a kind of equipment of controlling login, described equipment comprises:
First login module is used to connect first middle-agent's equipment, and the starting command window is logined described first middle-agent's equipment;
Second login module, the equipment identification information that is used for next middle-agent's equipment of importing in described command window according to the user is logined described next middle-agent's equipment;
The 3rd login module is used for after described second login module signs in to last the middle-agent's equipment that is connected with destination device, by the described destination device of described last middle-agent's device logs.
The beneficial effect of the technical scheme that the embodiment of the invention provides is:
Multiple agent equipment type in can network enabled makes that the device type of supporting is many in login process, login process is flexible, has good autgmentability.
Description of drawings
Fig. 1 is the networking schematic diagram of the broadband IP metropolitan area network that provides of prior art;
Fig. 2 is the networking schematic diagram of the login destination device that provides of the embodiment of the invention 1;
Fig. 3 is the method flow diagram of the control login that provides of the embodiment of the invention 1;
Fig. 4 is the equipment schematic diagram of the control login that provides of the embodiment of the invention 2.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
The technical scheme of control that the embodiment of the invention provides login can support the mode of multiple agent equipment type in the logging in network, and login process is insensitive to network environment, thereby is realized the mode of middle-agent's login neatly.The method that the embodiment of the invention provides is as follows:
Connect first middle-agent's equipment, the starting command window is logined first middle-agent's equipment; The equipment identification information of next middle-agent's equipment of importing in command window according to the user is logined next middle-agent's equipment; After signing in to last the middle-agent's equipment that is connected with destination device, by last middle-agent's device logs destination device.
Embodiment 1
Referring to Fig. 2, be the networking schematic diagram of watch-dog login destination device, the method that the embodiment of the invention adopts the embodiment of the invention to provide with watch-dog realizes that the login destination device is that example describes.Watch-dog X wishes by middle-agent's monitoring of tools destination device Y1 as shown in Figure 2, and correspondingly, referring to Fig. 3, the embodiment of the invention provides a kind of method of controlling login, and method step is as follows:
Step 101: watch-dog X sends connection request message by the interface that the user selects to middle-agent's device A, and the starting command window.
Usually, the interface type of watch-dog X comprises network interface and serial ports.
1) if when the user selects to initiate the monitoring visit of login destination device Y1 by the network interface of watch-dog X, the user is according to the middle-agent's choice of equipment table that obtains in advance, search middle-agent's choice of equipment table, select the middle-agent's device A that links to each other with watch-dog X logic, watch-dog X sends connection request message according to the IP address information of middle-agent's device A of user's selection and the port numbers of connection (port numbers of acquiescence selection is 23 usually) to middle-agent's device A.
Wherein, middle-agent's choice of equipment table is pre-configured according to the configuration information of the resource in the network, middle-agent's equipment and networking relation in advance, in the table content comprise middle-agent's equipment IP address information, port numbers, login username, password, act on behalf of networking relation between rank, performance and the middle-agent's equipment etc.The user only need search middle-agent's choice of equipment table, knows by which middle-agent's equipment according to the relation of the networking between the middle-agent's equipment that provides in middle-agent's choice of equipment table and can login and have access to destination device Y1;
2) if when the user selects to initiate the monitoring visit of login destination device Y1 by the serial ports of watch-dog X, the serial ports of watch-dog X generally includes COM1 and COM2, if this moment, the COM2 physics of middle-agent's device A and watch-dog X linked to each other, watch-dog can only send connection request message to middle-agent's device A by COM2 so.
When specific implementation, watch-dog X can adopt the form of dialog box that network interface, serial ports option are provided, and selects for the user.Further, when the user has determined selection, can also dispose corresponding information by dialog box, for example, at the selection of network interface, the user can dispose the IP address information of middle-agent's device A etc.; At the selection of serial ports, information such as the baud rate of transfer of data, data bit, flow control bit, parity check bit, the position of rest when user can dispose connection.
Step 102: middle-agent's device A is returned connection response message to watch-dog X, and this connection response message is presented in the command window with the form of echo message.
Wherein, middle-agent's device A is according to pre-configured, and X returns connection response message to watch-dog, and this connection response message is used to point out the user to import the log-on message of login middle-agent device A, as login username and password.
Step 103: watch-dog X receives connection response message, obtains the log-on message of user's input in the command window, sends login request message to middle-agent's device A, carries the log-on message of user's input in this login request message.
Step 104: after middle-agent's device A was received login request message, the checking login request message was correct, returns login response message, and this login response message is presented in the command window with the form of echo message, and watch-dog X successfully logins middle-agent's device A.
When middle agent equipment A checking login request message was incorrect, the login response message of returning was used to point out user's input error, does not meet registration conditions.Further, login interface again can also be set.
Wherein, at above-mentioned steps, when middle agent equipment A was set to not need to verify log-on message self, then watch-dog X received that connection response message promptly represents successfully to have logined middle-agent's device A.
Step 105: watch-dog X keeps the connection status with middle-agent's device A, obtains the equipment identification information by middle-agent's equipment B of command window input according to the user, sends login request message to middle-agent's equipment B.
After watch-dog X successfully logins middle-agent's device A, can in command window, adopt TELNET or SSH agreements such as (SecureShell Protocol, safety shell protocols) to carry out Telnet.At this moment, the user searches middle-agent's choice of equipment table, if find out same middle-agent's equipment of acting on behalf of rank middle-agent's equipment B is arranged, middle-agent's equipment B 1 and middle-agent's equipment B 2, the user can be as the case may be, and (as the factors such as service pressure according to middle-agent's equipment of current time) selects middle-agent's equipment B, the equipment identification information of input middle-agent equipment B in the command window of watch-dog X, this equipment identification information is specifically as follows address information or the name information of equipment or the combined information of device address information and equipment end slogan etc. of equipment.
When watch-dog X receives the equipment identification information of middle-agent's equipment B of user input by command window, just can send login request message to middle-agent's equipment B.
Step 106: middle-agent's equipment B is returned login response message after receiving the login request message that watch-dog X sends, and is presented in the command window with the form of echo message, and the prompting user inputs the login username and the password of login middle-agent equipment B.
Step 107: watch-dog X receives login response message, obtains the correct log-on message of user's input in the command window, login middle-agent equipment B.
Similarly, adopt above-mentioned steps 105 can login middle-agent's equipment C to step 107 watch-dog X, up to signing in to last the middle-agent's equipment D that is connected with destination device Y.
Step 108: behind the watch-dog X login middle-agent equipment D, by the information such as IP address information, login username, password, port numbers of middle-agent's equipment D according to pre-configured destination device Y1 on watch-dog X, login destination device Y1, and destination device Y1 is monitored visit.
Wherein, can also the shutdown command window behind watch-dog X login middle-agent equipment D.Further, the method that the embodiment of the invention provides, when the user wishes by login and monitoring visit with destination device Y2 that middle-agent's equipment D is connected, only need the information such as IP address information, login username, password, port numbers of pre-configured destination device Y2 on watch-dog X, just can be by middle-agent's equipment D login and monitoring visit destination device Y2, in like manner, can monitor and have access to the destination device Y3 that links to each other with middle-agent's equipment D.
Adopt method that the embodiment of the invention provides when watch-dog by middle-agent's device logs behind destination device, just can realize the monitoring of destination device and visited.The method that the invention described above embodiment provides is not limited in and is used for the situation of watch-dog by middle-agent's device logs destination device, is equally applicable to the environment that other need be logined by middle-agent's equipment.
The multiple agent equipment type of the method for control that the invention described above embodiment provides login in can network enabled, insensitive to network environment, realize the mode of middle-agent's login flexibly.
Embodiment 2
Referring to Fig. 4, the embodiment of the invention provides a kind of equipment of controlling login, and equipment comprises:
First login module is used to connect first middle-agent's equipment, and the starting command window is logined first middle-agent's equipment;
Second login module, the equipment identification information that is used for next middle-agent's equipment of importing in command window according to the user, search next middle-agent's equipment of equipment identification information correspondence, send log messages to the next middle-agent's equipment that finds, login next middle-agent's equipment;
The 3rd login module is used for after second login module signs in to last the middle-agent's equipment that is connected with destination device, by last middle-agent's device logs destination device.
Wherein, first login module specifically comprises:
Linkage unit is used for connecting with first middle-agent's equipment;
Start unit is used for after linkage unit and first middle-agent's equipment connect the starting command window;
The login unit is used for the log-on message imported according to the command window that the user starts at start unit, logins first middle-agent's equipment.
Further, when the equipment of this control login wished to login other equipment when last middle-agent's equipment links to each other, the 3rd login module also was used for by last middle-agent's equipment, logins other equipment that are connected with last middle-agent's equipment.
A kind of equipment of controlling login that the invention described above embodiment provides is supported the multiple agent equipment type in the logging in network, and insensitive to network environment, login process is flexible, has good autgmentability.
The technical scheme that the embodiment of the invention provides can be supported the multiple agent equipment type in the logging in network, insensitive to network environment, login process is flexible, has good autgmentability, the technical scheme that adopts the embodiment of the invention to provide is passed through middle-agent's device logs behind destination device when the equipment of control login, just can realize the visit to destination device.
Part steps in the embodiment of the invention can utilize software to realize that corresponding software programs can be stored in the storage medium that can read, as CD or hard disk etc.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. a method of controlling login is characterized in that, described method comprises:
Connect first middle-agent's equipment, the starting command window is logined described first middle-agent's equipment;
The equipment identification information of next middle-agent's equipment of importing in described command window according to the user is logined described next middle-agent's equipment;
After signing in to last the middle-agent's equipment that is connected with destination device, by the described destination device of described last middle-agent's device logs.
2. the method for control login as claimed in claim 1 is characterized in that, first middle-agent's equipment of described connection, and the starting command window, the step of logining described first middle-agent's equipment comprises:
Connect with first middle-agent's equipment, the starting command window according to the log-on message that the user imports, is logined described first middle-agent's equipment in described command window.
3. the method for control login as claimed in claim 1 is characterized in that, first middle-agent's equipment of described connection, and the starting command window, the step of logining described first middle-agent's equipment comprises:
The equipment of control login sends connection request message, starting command window according to the interface that the user selects to first middle-agent's equipment;
Described first middle-agent's equipment is received described connection request message, and the equipment of logining to described control returns connection response message;
The equipment of described control login is received described connection response message, described connection response message is presented in the described command window, the prompting user imports log-on message, send login request message to described first middle-agent's equipment, carry the log-on message of user's input in the described login request message;
Described first middle-agent's equipment receives described login request message, after verifying that the log-on message of the user input of carrying in the described login request message is correct, equipment to described control login returns login response message, allows the device logs of described control login.
4. the method for control login as claimed in claim 1 is characterized in that the step of first middle-agent's equipment of described connection is:
The address information of first middle-agent's equipment of selecting according to the user is searched the network interface of described address information correspondence, connects described first middle-agent's equipment by described network interface.
5. the method for control login as claimed in claim 1 is characterized in that the step of first middle-agent's equipment of described connection is:
By the serial ports that is connected with first middle-agent's equipment, connect described first middle-agent's equipment.
6. the method for control as claimed in claim 1 login is characterized in that, the step that the equipment identification information of described next middle-agent's equipment of importing in described command window according to the user is logined described next middle-agent's equipment specifically comprises:
The equipment identification information of next middle-agent's equipment of in described command window, importing according to the user, search next middle-agent's equipment of described equipment identification information correspondence, send log messages to the next middle-agent's equipment that finds, login described next middle-agent's equipment.
7. the method for control as claimed in claim 1 login is characterized in that, the step that the equipment identification information of described next middle-agent's equipment of importing in described command window according to the user is logined described next middle-agent's equipment comprises:
The equipment identification information of next middle-agent's equipment that the equipment of control login is imported in described command window according to the user, search next middle-agent's equipment of described equipment identification information correspondence, send login request message to the next middle-agent's equipment that finds;
Described next middle-agent's equipment receives described login request message, and the equipment of logining to described control returns login response message;
The equipment of described control login is received described login response message, and described login response message is presented in the described command window, logins described next middle-agent's equipment.
8. the method for control login as claimed in claim 1 is characterized in that, also comprises after the described step by the described destination device of described last middle-agent's device logs:
By described last middle-agent's equipment, login other equipment that described last middle-agent's equipment connects.
9. the method for control login as claimed in claim 1 is characterized in that, the equipment identification information of described user's input is specially address information or the name information of equipment or the combined information of device address information and equipment end slogan of equipment.
10. an equipment of controlling login is characterized in that, described equipment comprises:
First login module is used to connect first middle-agent's equipment, and the starting command window is logined described first middle-agent's equipment;
Second login module, the equipment identification information that is used for next middle-agent's equipment of importing in described command window according to the user, search next middle-agent's equipment of described equipment identification information correspondence, send log messages to the next middle-agent's equipment that finds, login described next middle-agent's equipment;
The 3rd login module is used for after described second login module signs in to last the middle-agent's equipment that is connected with destination device, by the described destination device of described last middle-agent's device logs.
11. the equipment of control login as claimed in claim 10 is characterized in that described first login module comprises:
Linkage unit is used for connecting with first middle-agent's equipment;
Start unit is used for after described linkage unit and described first middle-agent's equipment connect the starting command window;
The login unit is used for the log-on message imported according to the command window that the user starts at described start unit, logins described first middle-agent's equipment.
12. the equipment of control login as claimed in claim 10 is characterized in that described the 3rd login module also is used for by described last middle-agent's equipment, other equipment that login is connected with described last middle-agent's equipment.
CNA2007101780918A 2007-11-26 2007-11-26 Method and equipment for controlling login Pending CN101179439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101780918A CN101179439A (en) 2007-11-26 2007-11-26 Method and equipment for controlling login

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101780918A CN101179439A (en) 2007-11-26 2007-11-26 Method and equipment for controlling login

Publications (1)

Publication Number Publication Date
CN101179439A true CN101179439A (en) 2008-05-14

Family

ID=39405539

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101780918A Pending CN101179439A (en) 2007-11-26 2007-11-26 Method and equipment for controlling login

Country Status (1)

Country Link
CN (1) CN101179439A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824726A (en) * 2015-01-07 2016-08-03 展讯通信(上海)有限公司 Remote automatic test system and method of mobile terminals
CN108810124A (en) * 2018-06-02 2018-11-13 上海清鹤科技股份有限公司 The remote access control system of a large amount of multimedia terminals under a kind of environment to public network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824726A (en) * 2015-01-07 2016-08-03 展讯通信(上海)有限公司 Remote automatic test system and method of mobile terminals
CN108810124A (en) * 2018-06-02 2018-11-13 上海清鹤科技股份有限公司 The remote access control system of a large amount of multimedia terminals under a kind of environment to public network
CN108810124B (en) * 2018-06-02 2020-07-31 北京清鹤科技有限公司 Remote access control system for large number of multimedia terminals in public network environment

Similar Documents

Publication Publication Date Title
US6920502B2 (en) Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities
US7127049B2 (en) System and method for enhancing the activation of DSL service
CN102726069B (en) The dynamic Service group of dialogue-based attribute
EP0953248B1 (en) Automatic configuration for internet access device
CN102449978B (en) Dynamically configuring attributes of a parent circuit on a network element
US20080225749A1 (en) Auto-configuration of a network device
CN102143233A (en) Customer premise equipment and network accessing method
CN102136977B (en) Dialing equipment and method for realizing virtual dialing according to user needs
CN101179439A (en) Method and equipment for controlling login
CN100407658C (en) Method for implementing user loop terminal to support multiple managing channels
Cisco Release Note for Catalyst 5000 Series ATM Dual PHY DS--3 Module with PVC Traffic-Shaping Software Release 51.1(1)
Cisco Release Note for Catalyst 5000 Series ATM Dual PHY DS--3 Module with PVC Traffic-Shaping Software Release 51.1(1)
Cisco Release Note for Catalyst 5000 Series ATM Dual PHY DS--3 Module with PVC Traffic-Shaping Software Release 51.1(1)
Cisco Release Note for Catalyst 5000 Series ATM Dual PHY DS--3 Module with PVC Traffic-Shaping Software Release 51.1(1)
Cisco Cisco Remote Access to MPLS VPN Integration 2.0 FOA1 Release Notes
Cisco Software Enhancements for the Cisco 800 Routers and SOHO Routers
Cisco Cisco IOS Dial Technologies Configuration Guide Release 12.2
Cisco Cisco IOS Dial Services Command Reference Release 12.1
Cisco Release Note for Catalyst 5000 Series ATM PVC Traffic-Shaping Software Release 50.1(1)
Cisco Release Note for Catalyst 5000 Series ATM PVC Traffic-Shaping Software Release 50.1(1)
Cisco Release Note for Catalyst 5000 Series ATM PVC Traffic-Shaping Software Release 50.1(1)
Cisco Release Note for Catalyst 5000 Series ATM PVC Traffic-Shaping Software Release 50.1(1)
Cisco Catalyst 5000 Series Release Notes for ATM Sofware Rel 51.1(1)
Cisco Configuring Modem Support and Asynchronous Devices
Cisco Release Notes for Cisco CallManager Release 3.0(2d)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080514