CN102255920A - Method and device for sending VPN (Virtual Private Network) configuration information - Google Patents
Method and device for sending VPN (Virtual Private Network) configuration information Download PDFInfo
- Publication number
- CN102255920A CN102255920A CN2011102439240A CN201110243924A CN102255920A CN 102255920 A CN102255920 A CN 102255920A CN 2011102439240 A CN2011102439240 A CN 2011102439240A CN 201110243924 A CN201110243924 A CN 201110243924A CN 102255920 A CN102255920 A CN 102255920A
- Authority
- CN
- China
- Prior art keywords
- vpn
- configuration information
- client
- vpn client
- certificate server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method and a device for sending VPN (Virtual Private Network) configuration information. The method comprises the following steps: an authentication server acquires an identity authentication request focused on a VPN client; the authentication server acquires VPN configuration information corresponding to the VPN client when the authentication server confirms that the VPN client passes the identity authentication according to the identity authentication request; and the authentication server sends the VPN configuration information to the VPN client and the VPN client accesses network according to the VPN configuration information. According to the invention, user operation is simplified, and the phenomenon that a channel cannot be established because of the fault of user configuration can be avoided.
Description
Technical field
The present invention relates to communication technical field, particularly relate to a kind of sending method and equipment of VPN configuration information.
Background technology
Mobile VPN (Virtual Private Network, VPN (virtual private network)) is called long-range access VPN (Remote Access VPN) again, and the ability of the long-range access enterprises of streaming node private network can be provided; Therefore, mobile VPN has solved the problem of employee on business trip at strange land visit enterprises private network, has very application prospects.The networking schematic diagram of mobile VPN as shown in Figure 1, mobile VPN is made up of following three parts: the VPN client (is PC, for the user provides information input interface, and mutual with the VPN IAD, finish the authentication of identity and access protocol by network access protocol), VPN IAD and certificate server.
Based on networking shown in Figure 1, the operation principle of mobile VPN comprises: configuration such as the vpn tunneling that (1) user provides according to webmaster and encryption parameter configures connection on the dialer software of VPN client; (2) after inserting Internet, initiate the tunnel by the connection that configures on the VPN client to the VPN IAD and set up request; (3) VPN client and VPN IAD are finished key agreement, and after setting up the tunnel, initiate authentication request, and after authentication is passed through, distribute an Intranet IP address by the VPN IAD for the VPN client, make the flow of VPN client-access Intranet all arrive the VPN IAD, reach the purpose of secure access Intranet by encryption tunnel.
In the prior art, based on the above-mentioned networking shown in Figure 1 and the operation principle of mobile VPN, the VPN client adopts IPSec (Internet protocol safety), L2TP (Layer 2 Tunneling Protocol usually, Level 2 Tunnel Protocol) and PPP (Point to Point Protocol, point-to-point protocol) technology realizes, promptly at first sets up ipsec tunnel, finishes authentication by L2TP carrying ppp protocol afterwards, as shown in Figure 2, be handling process schematic diagram of the prior art.
Step 201, the VPN client is initiated ipsec encryption tunnel to the VPN IAD and is set up process.
Concrete, the user needs at first to configure the relevant parameter of IPSec and L2TP agreement on the VPN client, comprise tunnel name, password, verification method, security protocol, verification algorithm, cryptographic algorithm, encapsulation mode, safety coalition existence period etc.Afterwards, the VPN client utilizes the relevant parameter of IPSec to initiate ipsec tunnel negotiation, comprises that IKE (Internet Key Exchange) consults, and AH (Authenticaton Header, authentication header) or ESP (encapsulating safe and effective load) consult and the tunnel is set up.
Step 202, the VPN client is initiated L2TP Tunnel to the VPN IAD and is set up process.Wherein, the VPN client can utilize the relevant parameter of the L2TP agreement of configuration to initiate the L2TP Tunnel negotiations process.
Step 203, the VPN client is initiated ID authentication request by ppp protocol to the VPN IAD.
Step 204, VPN IAD send the request message that the VPN client is carried out authentication to certificate server.
Step 205, after the authentication of VPN client identity was passed through, certificate server returned the back message using that is proved to be successful to the VPN IAD.
Step 206, the VPN IAD returns PPP authentication success message to the VPN client.
Step 207, the VPN client is distributed private network IP address by PPP sub-protocol ipcp request VPN IAD.
Step 208, the VPN IAD distributes private network IP address for the VPN client, and private network IP address is returned to the VPN client.
Afterwards, on the Microsoft Loopback Adapter of PC, the flow that makes PC go up the visit Intranet all passes through ipsec encryption tunnel to the VPN client, is ensured the fail safe of Intranet visit with private network IP address applications.
In the prior art, IPSec can provide safety guarantee, but the configuration of IPSec bothers very much, and the parameter of IPSec is a static configuration at present, is responsible for being distributed to the user by webmaster, and is configured on the VPN client by the user.Wherein, IPSec is a protocol suite, contains a plurality of agreements such as IKE, AH, ESP, needs the parameter of configuration to have more than 20, in case configuration makes mistakes then the tunnel can't be set up.
Therefore, for domestic consumer, this layoutprocedure is very complicated loaded down with trivial details, and if network adjustment has appearred, then for outside mobile VPN user always, can not be in time synchronous, cause configuration to go wrong then, can't set up the tunnel.
Summary of the invention
The invention provides a kind of sending method and equipment of VPN configuration information, dynamically issuing the VPN configuration information, and the VPN of the Unsupervised complexity of user configuration.
In order to achieve the above object, the invention provides a kind of sending method of VPN configuration information, be applied to comprise that this method may further comprise the steps in the system of VPN client and certificate server:
Described certificate server obtains the ID authentication request at described VPN client;
When described certificate server was determined described VPN client by authentication according to described ID authentication request, described certificate server obtained the VPN configuration information of described VPN client correspondence;
Described certificate server sends to described VPN client with described VPN configuration information, by described VPN client according to described VPN configuration information accesses network.
Also comprise the WEB server in the described system, described certificate server obtains the ID authentication request at described VPN client, specifically comprises:
Described WEB server receives the HTTP logging request of carrying out authentication from described VPN client, and obtains the ID authentication request of described VPN client based on described HTTP logging request;
Described WEB server sends to described certificate server with described ID authentication request, by the ID authentication request of described certificate server reception at described VPN client.
Described certificate server obtains the VPN configuration information of described VPN client correspondence, specifically comprises:
Described certificate server is determined the VPN configuration information of described VPN client correspondence according to the authority information of described VPN client.
Also comprise the WEB server in the described system, described certificate server sends to described VPN client with described VPN configuration information, specifically comprises:
Described certificate server sends to described WEB server with described VPN configuration information, by described WEB server described VPN configuration information is sent to described VPN client.
Also comprise the VPN IAD in the described system, described VPN configuration information comprises the address and the VPN parameter of described VPN IAD;
Described VPN client specifically comprises according to described VPN configuration information accesses network:
Described VPN client is utilized the address of described VPN parameter and described VPN IAD to set up VPN with described VPN IAD to be connected, and VPN connect set up successfully after, by described VPN IAD accesses network.
Described method further comprises: when described VPN configuration information being sent to described VPN client, described WEB server sends to described VPN client with the Intranet IP address of described VPN client; Perhaps,
After the VPN connection was set up successfully, described VPN IAD sent to described VPN client with the Intranet IP address of described VPN client.
The invention provides a kind of certificate server, be applied to comprise that described certificate server comprises in the system of VPN client and described certificate server:
Obtain module, be used to obtain ID authentication request, and when determining described VPN client by authentication, obtain the VPN configuration information of described VPN client correspondence according to described ID authentication request at described VPN client;
Sending module is used for described VPN configuration information is sent to described VPN client, by described VPN client according to described VPN configuration information accesses network.
Also comprise the WEB server in the described system;
Described acquisition module specifically is used to receive the ID authentication request at described VPN client from described WEB server.
Also comprise the VPN IAD in the described system, described VPN configuration information comprises the address and the VPN parameter of described VPN IAD;
Described acquisition module specifically is used for determining according to the authority information of described VPN client the VPN configuration information of described VPN client correspondence.
Also comprise the WEB server in the described system;
Described sending module specifically is used for described VPN configuration information is sent to described WEB server, by described WEB server described VPN configuration information is sent to described VPN client.
Compared with prior art, the present invention has the following advantages at least: by dynamically issue the VPN configuration information in the authentication process, make the user need not again the VPN configuration of complex management, simplified user's operation, avoid the user to dispose makeing mistakes causing to set up the situation in tunnel.
Description of drawings
Fig. 1 is the networking schematic diagram of mobile VPN in the prior art;
Fig. 2 is the handling process schematic diagram of mobile VPN in the prior art;
Fig. 3 is the sending method flow chart of a kind of VPN configuration information provided by the invention;
Fig. 4 is the sending method flow chart of the VPN configuration information that provides under a kind of application scenarios of the present invention;
Fig. 5 is the structural representation of a kind of certificate server of proposing of the present invention.
Embodiment
The present invention proposes a kind of sending method of VPN configuration information, and this method is applied to comprise at least in the system of VPN client, VPN IAD and certificate server.Among the present invention, the VPN client need be set up process with authentication process and vpn tunneling and separately carries out, and at first carries out the authentication process.As shown in Figure 3, the sending method of this VPN configuration information may further comprise the steps:
For example, also can comprise the WEB server in this system, the VPN client is sent the HTTP logging request to carry out authentication, afterwards as the HTTP client earlier, the WEB server obtains the ID authentication request of client based on the HTTP logging request, and this ID authentication request is sent to certificate server.
Again for example, also can comprise PPPoE (Point to Point Protocol over Ethernet in this system, PPP on the Ethernet) server, the VPN client is sent the PPPoE ID authentication request and is given the PPPoE server, afterwards, the PPPoE server sends to certificate server with the PPPoE ID authentication request.
It should be noted that, the authentication process is not limited to HTTP logging request (based on http protocol), PPPoE ID authentication request, other agreements with public network authentication function all can be used, for example, based on the authentication process of HTTPs, based on authentication process of SSL (Secure Sockets Layer, SSL) etc.
Also comprise the VPN IAD in the system that said method is used, this VPN configuration information comprises the address and the VPN parameter of VPN IAD, and this VPN parameter includes but not limited to the relevant parameter (as verification method, security protocol, verification algorithm, cryptographic algorithm, encapsulation mode, safety coalition existence period etc.) of IPSec and L2TP agreement.
Among the present invention, safeguarding on certificate server has the VPN configuration information, based on the pairing VPN configuration information of each user of this maintenance, can determine the VPN configuration information of VPN client, and the VPN configuration information is sent to the VPN client.
Further, on certificate server, can be the user and safeguard identical VPN configuration information, directly the VPN configuration information is sent to the VPN client under this situation; Can also be on certificate server based on user role (as domestic consumer, advanced level user, sensitive users etc.) the VPN configuration information different (as the VPN configuration information of the corresponding high strength encrypting mode of sensitive users etc.) for the user safeguards, need authority information (as domestic consumer's authority, advanced level user's authority, sensitive users etc. under this situation according to the VPN client, can obtain based on user name) determine the VPN configuration information of this VPN client correspondence, and the VPN configuration information of determining is sent to the VPN client.When issuing the address of VPN IAD, certificate server it is also conceivable that the shunting loading condition, many as current VPN client by VPN IAD 1 accesses network, and the VPN client by VPN IAD 2 accesses network after a little while, can consider that then the address that issues VPN IAD 2 gives the VPN client.
Based on above-mentioned handling process, the VPN client can obtain the VPN configuration information, and afterwards, the VPN client can be according to VPN configuration information accesses network (being the enterprises private network).Concrete, the VPN client can be utilized the address of VPN parameter and VPN IAD to set up VPN with the VPN IAD to be connected (as setting up processes such as ipsec encryption tunnel, L2TP Tunnel, it is similar with existing realization that this VPN connects the process of setting up, just can omit the authentication process), and after the VPN connection is set up successfully, by VPN IAD accesses network (promptly visiting enterprises private network data).
It should be noted that among the present invention that the mode that the VPN client obtains Intranet IP address comprises: when the VPN configuration information is sent to the VPN client, the Intranet IP address of VPN client is sent to the VPN client by the WEB server; Perhaps, VPN connect set up successfully after, by the VPN IAD Intranet IP address of VPN client is sent to the VPN client.
In order more clearly to set forth technical scheme provided by the invention, be that example describes below in conjunction with the application scenarios of carrying out the authentication process by the WEB server.Under this application scenarios, the present invention proposes a kind of sending method of VPN configuration information, and this method is applied to comprise that as shown in Figure 4, this method may further comprise the steps in the system of VPN client, WEB server, VPN IAD and certificate server:
Step 401, VPN client send HTTP (Hyper Text Transfer Protoco1, the HTML (Hypertext Markup Language)) logging request of carrying out authentication to the WEB server.
Among the present invention, the VPN client need be set up process with authentication process and vpn tunneling and separately carries out, and therefore, the VPN client is sent the HTTP logging request to carry out authentication as the HTTP client earlier.Wherein, the domain name of WEB server can immobilize, and always to open the processing procedure of domain name www.aaa.com similar with IE acquiescence, do not repeat them here.
Step 402, the WEB server obtains the ID authentication request of VPN client.
For the HTTP logging request of carrying out authentication from the VPN client, can carry information such as username and password, therefore, the WEB server can be based on information acquisition ID authentication request such as this username and passwords.
Step 403, the WEB server sends to certificate server with ID authentication request.
Step 404, certificate server carries out authentication according to ID authentication request to the VPN client.
Owing to carry information such as username and password in the ID authentication request, therefore, certificate server can utilize information such as username and password that the VPN client is carried out authentication.
When step 405, certificate server are determined the VPN client by authentication, the VPN configuration information of VPN client correspondence is sent to the WEB server.
This VPN configuration information comprises the address and the VPN parameter of VPN IAD, and this VPN parameter includes but not limited to the relevant parameter (as verification method, security protocol, verification algorithm, cryptographic algorithm, encapsulation mode, safety coalition existence period etc.) of IPSec and L2TP agreement.
Among the present invention, safeguarding on certificate server has the VPN configuration information, based on the pairing VPN configuration information of each user of this maintenance, the VPN configuration information can be sent to the WEB server.
Further, on certificate server, can be the user and safeguard identical VPN configuration information, directly the VPN configuration information is sent to the WEB server under this situation; Can also be on certificate server based on user role (as domestic consumer, advanced level user, sensitive users etc.) the VPN configuration information different (as the VPN configuration information of the corresponding high strength encrypting mode of sensitive users etc.) for the user safeguards, need authority information (as domestic consumer's authority, advanced level user's authority, sensitive users etc. under this situation according to the VPN client, can obtain based on user name) determine the VPN configuration information of this VPN client correspondence, and the VPN configuration information of determining is sent to the WEB server.
Further, when issuing the address of VPN IAD, certificate server it is also conceivable that the shunting loading condition, many as current VPN client by VPN IAD 1 accesses network, and the VPN client by VPN IAD 2 accesses network after a little while, can consider that then the address that issues VPN IAD 2 gives the VPN client.
Step 406, the WEB server sends to the VPN client with the VPN configuration information.
At certificate server when the WEB server sends the VPN configuration information, certificate server can be configured in the VPN configuration information on the WEB page, and the WEB page sent to the WEB server, afterwards, the WEB page downloading that will be carried the VPN configuration information by the WEB server is given the VPN client.
Under the another kind of execution mode, at certificate server when the WEB server sends the VPN configuration information, certificate server can directly send to the WEB server with the VPN configuration information, by the WEB server VPN configuration information is configured on the WEB page afterwards, and the WEB page downloading that will carry the VPN configuration information is given the VPN client.
Based on above-mentioned handling process, the VPN client can obtain the VPN configuration information, and afterwards, the VPN client can be according to VPN configuration information accesses network (being the enterprises private network).Concrete, the VPN client can be utilized the address of VPN parameter and VPN IAD to set up VPN with the VPN IAD to be connected (as setting up processes such as ipsec encryption tunnel, L2TP Tunnel, it is similar with existing realization that this VPN connects the process of setting up, just can omit the authentication process), and after the VPN connection is set up successfully, by VPN IAD accesses network (promptly visiting enterprises private network data).
It should be noted that among the present invention that the mode that the VPN client obtains Intranet IP address comprises: when the VPN configuration information is sent to the VPN client, the Intranet IP address of VPN client is sent to the VPN client by the WEB server; Perhaps, VPN connect set up successfully after, by the VPN IAD Intranet IP address of VPN client is sent to the VPN client.
In sum, among the present invention, by on certificate server, safeguarding the VPN configuration information, and in the authentication process, by certificate server the VPN configuration information dynamically is handed down to the VPN client, making the user need not manual configuration VPN configuration information (is that the user is except that needs input key, all the other configurations are all automatically finished), do not need the VPN configuration of complex management, even change (being that the VPN configuration information changes) has taken place in network configuration, webmaster does not need to notify the user yet, gets final product but directly make amendment on certificate server.
Further, certificate server can dynamically issue different VPN access gateway address and VPN parameter according to different user, make sensitive users can adopt the high strength encrypting mode to obtain sufficient safety, and make domestic consumer can adopt suitable cipher mode guaranteed efficiency, and can under many VPN IAD, play the effect of branch current load, make vpn system more flexibly effectively.
Inventive concept based on same with said method the invention allows for a kind of certificate server, is applied to comprise that in the system of VPN client and described certificate server, as shown in Figure 5, described certificate server comprises:
Obtain module 11, be used to obtain ID authentication request, and when determining described VPN client by authentication, obtain the VPN configuration information of described VPN client correspondence according to described ID authentication request at described VPN client;
Sending module 12 is used for described VPN configuration information is sent to described VPN client, by described VPN client according to described VPN configuration information accesses network.
Also comprise the WEB server in the described system; Described acquisition module 11 specifically is used to receive the ID authentication request at described VPN client from described WEB server.
Also comprise the VPN IAD in the described system, described VPN configuration information comprises the address and the VPN parameter of described VPN IAD; Described acquisition module 11 specifically is used for determining according to the authority information of described VPN client the VPN configuration information of described VPN client correspondence.
Also comprise the WEB server in the described system; Described sending module 12 specifically is used for described VPN configuration information is sent to described WEB server, by described WEB server described VPN configuration information is sent to described VPN client.
Wherein, each module of apparatus of the present invention can be integrated in one, and also can separate deployment.Above-mentioned module can be merged into a module, also can further split into a plurality of submodules.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by hardware, also can realize by the mode that software adds necessary general hardware platform.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, module in the accompanying drawing or flow process might not be that enforcement the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.The module of the foregoing description can be merged into a module, also can further split into a plurality of submodules.
The invention described above sequence number is not represented the quality of embodiment just to description.
More than disclosed only be several specific embodiment of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.
Claims (10)
1. the sending method of a VPN configuration information is applied to comprise in the system of VPN client and certificate server, and it is characterized in that, this method may further comprise the steps:
Described certificate server obtains the ID authentication request at described VPN client;
When described certificate server was determined described VPN client by authentication according to described ID authentication request, described certificate server obtained the VPN configuration information of described VPN client correspondence;
Described certificate server sends to described VPN client with described VPN configuration information, by described VPN client according to described VPN configuration information accesses network.
2. the method for claim 1 is characterized in that, also comprises the WEB server in the described system, and described certificate server obtains the ID authentication request at described VPN client, specifically comprises:
Described WEB server receives the HTTP logging request of carrying out authentication from described VPN client, and obtains the ID authentication request of described VPN client based on described HTTP logging request;
Described WEB server sends to described certificate server with described ID authentication request, by the ID authentication request of described certificate server reception at described VPN client.
3. the method for claim 1 is characterized in that, described certificate server obtains the VPN configuration information of described VPN client correspondence, specifically comprises:
Described certificate server is determined the VPN configuration information of described VPN client correspondence according to the authority information of described VPN client.
4. as claim 1 or 3 described methods, it is characterized in that also comprise the WEB server in the described system, described certificate server sends to described VPN client with described VPN configuration information, specifically comprises:
Described certificate server sends to described WEB server with described VPN configuration information, by described WEB server described VPN configuration information is sent to described VPN client.
5. method as claimed in claim 4 is characterized in that, also comprises the VPN IAD in the described system, and described VPN configuration information comprises the address and the VPN parameter of described VPN IAD;
Described VPN client specifically comprises according to described VPN configuration information accesses network:
Described VPN client is utilized the address of described VPN parameter and described VPN IAD to set up VPN with described VPN IAD to be connected, and VPN connect set up successfully after, by described VPN IAD accesses network.
6. method as claimed in claim 5 is characterized in that, described method further comprises:
When described VPN configuration information being sent to described VPN client, described WEB server sends to described VPN client with the Intranet IP address of described VPN client; Perhaps,
After the VPN connection was set up successfully, described VPN IAD sent to described VPN client with the Intranet IP address of described VPN client.
7. a certificate server is applied to comprise in the system of VPN client and described certificate server, and it is characterized in that, described certificate server comprises:
Obtain module, be used to obtain ID authentication request, and when determining described VPN client by authentication, obtain the VPN configuration information of described VPN client correspondence according to described ID authentication request at described VPN client;
Sending module is used for described VPN configuration information is sent to described VPN client, by described VPN client according to described VPN configuration information accesses network.
8. certificate server as claimed in claim 7 is characterized in that, also comprises the WEB server in the described system;
Described acquisition module specifically is used to receive the ID authentication request at described VPN client from described WEB server.
9. certificate server as claimed in claim 7 is characterized in that, also comprises the VPN IAD in the described system, and described VPN configuration information comprises the address and the VPN parameter of described VPN IAD;
Described acquisition module specifically is used for determining according to the authority information of described VPN client the VPN configuration information of described VPN client correspondence.
10. as claim 7 or 9 described certificate servers, it is characterized in that, also comprise the WEB server in the described system;
Described sending module specifically is used for described VPN configuration information is sent to described WEB server, by described WEB server described VPN configuration information is sent to described VPN client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102439240A CN102255920A (en) | 2011-08-24 | 2011-08-24 | Method and device for sending VPN (Virtual Private Network) configuration information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102439240A CN102255920A (en) | 2011-08-24 | 2011-08-24 | Method and device for sending VPN (Virtual Private Network) configuration information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102255920A true CN102255920A (en) | 2011-11-23 |
Family
ID=44982915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011102439240A Pending CN102255920A (en) | 2011-08-24 | 2011-08-24 | Method and device for sending VPN (Virtual Private Network) configuration information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102255920A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984045A (en) * | 2012-12-05 | 2013-03-20 | 网神信息技术(北京)股份有限公司 | Access method of Virtual Private Network and Virtual Private Network client |
CN103118443A (en) * | 2013-01-15 | 2013-05-22 | 杭州华三通信技术有限公司 | Configuration method and configuration device for long-distance branch device |
CN103281694A (en) * | 2013-06-20 | 2013-09-04 | 福建伊时代信息科技股份有限公司 | Configuration file distributing method and device |
CN105142141A (en) * | 2015-07-23 | 2015-12-09 | 攀钢集团攀枝花钢铁研究院有限公司 | Terminal equipment, authentication server, system and method for mobile office identity verification |
CN105493453A (en) * | 2014-12-30 | 2016-04-13 | 华为技术有限公司 | Method, device and system achieving remote access |
WO2016065637A1 (en) * | 2014-10-31 | 2016-05-06 | Huawei Technologies Co.,Ltd. | Method and apparatus for remote access |
CN105959197A (en) * | 2015-07-30 | 2016-09-21 | 杭州迪普科技有限公司 | SSL VPN user interface customization method and device |
CN106254204A (en) * | 2016-09-28 | 2016-12-21 | 乐视控股(北京)有限公司 | The collocation method of the Ipsec tunnel vital stage under cloud environment and device |
CN106685785A (en) * | 2016-12-27 | 2017-05-17 | 北京航空航天大学 | Intranet access system based on IPsec VPN proxy |
CN107145531A (en) * | 2017-04-18 | 2017-09-08 | 北京思特奇信息技术股份有限公司 | The user management method of distributed file system and distributed file system |
CN107800569A (en) * | 2017-10-16 | 2018-03-13 | 中国联合网络通信有限公司广东省分公司 | A kind of VPN fast speed access systems and method based on ONT |
CN109076005A (en) * | 2018-04-28 | 2018-12-21 | 深圳前海达闼云端智能科技有限公司 | A kind of VPN circuit switching method, device and electronic equipment |
CN111245699A (en) * | 2020-01-15 | 2020-06-05 | 广州华多网络科技有限公司 | Remote communication service control method, server and client |
CN112532504A (en) * | 2020-11-05 | 2021-03-19 | 深信服科技股份有限公司 | Remote access method, device, terminal, server and storage medium |
CN113347072A (en) * | 2021-06-23 | 2021-09-03 | 北京天融信网络安全技术有限公司 | VPN resource access method, device, electronic equipment and medium |
CN113691394A (en) * | 2021-07-29 | 2021-11-23 | 广州鲁邦通物联网科技有限公司 | Method and system for establishing and switching VPN communication |
CN113766019A (en) * | 2021-09-01 | 2021-12-07 | 江苏信臣健康科技股份有限公司 | Internet of things system based on combination of cloud and edge calculation |
CN114389916A (en) * | 2022-01-20 | 2022-04-22 | 迈普通信技术股份有限公司 | Networking communication method, device, system and network equipment |
CN113766019B (en) * | 2021-09-01 | 2024-04-30 | 江苏信臣健康科技股份有限公司 | Internet of things system based on cloud and edge computing combination |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101296138A (en) * | 2007-04-28 | 2008-10-29 | 杭州华三通信技术有限公司 | Wireless terminal configuration generating method, system and device |
-
2011
- 2011-08-24 CN CN2011102439240A patent/CN102255920A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101296138A (en) * | 2007-04-28 | 2008-10-29 | 杭州华三通信技术有限公司 | Wireless terminal configuration generating method, system and device |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984045A (en) * | 2012-12-05 | 2013-03-20 | 网神信息技术(北京)股份有限公司 | Access method of Virtual Private Network and Virtual Private Network client |
CN103118443A (en) * | 2013-01-15 | 2013-05-22 | 杭州华三通信技术有限公司 | Configuration method and configuration device for long-distance branch device |
CN103118443B (en) * | 2013-01-15 | 2016-12-28 | 杭州华三通信技术有限公司 | A kind of remote branch equipment configuration method and device |
CN103281694A (en) * | 2013-06-20 | 2013-09-04 | 福建伊时代信息科技股份有限公司 | Configuration file distributing method and device |
CN103281694B (en) * | 2013-06-20 | 2017-02-08 | 福建伊时代信息科技股份有限公司 | Configuration file distributing method and device |
CN107005442A (en) * | 2014-10-31 | 2017-08-01 | 华为技术有限公司 | Method and apparatus for remotely accessing |
WO2016065637A1 (en) * | 2014-10-31 | 2016-05-06 | Huawei Technologies Co.,Ltd. | Method and apparatus for remote access |
US10681010B2 (en) | 2014-10-31 | 2020-06-09 | Huawei Technologies Co., Ltd. | Establishing a connection between a user device and an access zone |
US11570151B2 (en) | 2014-10-31 | 2023-01-31 | Beijing Huawei Digital Technologies Co., Ltd. | Establishing a connection between a user device and an access zone |
CN105493453B (en) * | 2014-12-30 | 2019-02-01 | 华为技术有限公司 | It is a kind of to realize the method, apparatus and system remotely accessed |
CN105493453A (en) * | 2014-12-30 | 2016-04-13 | 华为技术有限公司 | Method, device and system achieving remote access |
CN105142141A (en) * | 2015-07-23 | 2015-12-09 | 攀钢集团攀枝花钢铁研究院有限公司 | Terminal equipment, authentication server, system and method for mobile office identity verification |
CN105959197A (en) * | 2015-07-30 | 2016-09-21 | 杭州迪普科技有限公司 | SSL VPN user interface customization method and device |
CN106254204A (en) * | 2016-09-28 | 2016-12-21 | 乐视控股(北京)有限公司 | The collocation method of the Ipsec tunnel vital stage under cloud environment and device |
CN106685785B (en) * | 2016-12-27 | 2020-06-05 | 北京航空航天大学 | Intranet access system based on IPsec VPN proxy |
CN106685785A (en) * | 2016-12-27 | 2017-05-17 | 北京航空航天大学 | Intranet access system based on IPsec VPN proxy |
CN107145531A (en) * | 2017-04-18 | 2017-09-08 | 北京思特奇信息技术股份有限公司 | The user management method of distributed file system and distributed file system |
CN107145531B (en) * | 2017-04-18 | 2020-09-04 | 北京思特奇信息技术股份有限公司 | Distributed file system and user management method of distributed file system |
CN107800569A (en) * | 2017-10-16 | 2018-03-13 | 中国联合网络通信有限公司广东省分公司 | A kind of VPN fast speed access systems and method based on ONT |
CN107800569B (en) * | 2017-10-16 | 2020-09-04 | 中国联合网络通信有限公司广东省分公司 | VPN quick access system and method based on ONT |
CN109076005A (en) * | 2018-04-28 | 2018-12-21 | 深圳前海达闼云端智能科技有限公司 | A kind of VPN circuit switching method, device and electronic equipment |
CN109076005B (en) * | 2018-04-28 | 2021-02-09 | 深圳前海达闼云端智能科技有限公司 | VPN line switching method and device and electronic equipment |
CN111245699B (en) * | 2020-01-15 | 2021-08-17 | 广州华多网络科技有限公司 | Remote communication service control method, server and client |
CN111245699A (en) * | 2020-01-15 | 2020-06-05 | 广州华多网络科技有限公司 | Remote communication service control method, server and client |
CN112532504A (en) * | 2020-11-05 | 2021-03-19 | 深信服科技股份有限公司 | Remote access method, device, terminal, server and storage medium |
CN113347072A (en) * | 2021-06-23 | 2021-09-03 | 北京天融信网络安全技术有限公司 | VPN resource access method, device, electronic equipment and medium |
CN113691394A (en) * | 2021-07-29 | 2021-11-23 | 广州鲁邦通物联网科技有限公司 | Method and system for establishing and switching VPN communication |
CN113691394B (en) * | 2021-07-29 | 2023-07-21 | 广州鲁邦通物联网科技股份有限公司 | VPN communication establishing and switching method and system |
CN113766019A (en) * | 2021-09-01 | 2021-12-07 | 江苏信臣健康科技股份有限公司 | Internet of things system based on combination of cloud and edge calculation |
CN113766019B (en) * | 2021-09-01 | 2024-04-30 | 江苏信臣健康科技股份有限公司 | Internet of things system based on cloud and edge computing combination |
CN114389916A (en) * | 2022-01-20 | 2022-04-22 | 迈普通信技术股份有限公司 | Networking communication method, device, system and network equipment |
CN114389916B (en) * | 2022-01-20 | 2023-12-15 | 迈普通信技术股份有限公司 | Networking communication method, device, system and network equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102255920A (en) | Method and device for sending VPN (Virtual Private Network) configuration information | |
EP3459222B1 (en) | Device authentication based upon tunnel client network requests | |
CN102316092B (en) | VPN network client for mobile device having fast reconnect | |
US11349814B2 (en) | Automatic placeholder finder-filler | |
US8832782B2 (en) | Single sign-on system and method | |
JP6358549B2 (en) | Automatic login and logout of sessions with session sharing | |
CN102316093B (en) | Dual-Mode Multi-Service VPN Network Client for Mobile Device | |
CN102857520B (en) | Telnet protocol security access system and method for character terminal | |
US20230106172A1 (en) | Unification of data flows over network links with different internet protocol (ip) addresses | |
CN106169952B (en) | A kind of authentication method that internet Key Management Protocol is negotiated again and device | |
US20120167196A1 (en) | Automatic Virtual Private Network | |
EP3973423A1 (en) | Computing system and methods providing session access based upon authentication token with different authentication credentials | |
US20220345311A1 (en) | Computing system and related methods providing multiple endpoint connections based upon connection leases | |
CN103716280B (en) | data transmission method, server and system | |
CN103957194B (en) | A kind of procotol IP cut-in methods and access device | |
CN105323291A (en) | Method and device for processing unified login of mobile applications | |
CN112910903B (en) | SSL certificate deployment-free method, device and system | |
US10601788B2 (en) | Interception of secure shell communication sessions | |
CN104243488A (en) | Login authentication method of cross-website server | |
CN102629928B (en) | Implementation method for safety link of internet lottery ticket system based on public key | |
CN103607403A (en) | Method, device and system for using safety domain in NAT network environment | |
EP2028822B1 (en) | Method and system for securing a commercial grid network over non-trusted routes | |
WO2016082363A1 (en) | User data management method and apparatus | |
Zain et al. | IMPLEMENTATION OF VPN SERVER USING L2TP PROTOCOL AND IPSEC METHODS AS NETWORK SECURITY | |
CN103795719B (en) | Terminal security equipment simplify configuration management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20111123 |