CN107623698B - Method and device for remotely debugging network equipment - Google Patents

Method and device for remotely debugging network equipment Download PDF

Info

Publication number
CN107623698B
CN107623698B CN201710987299.8A CN201710987299A CN107623698B CN 107623698 B CN107623698 B CN 107623698B CN 201710987299 A CN201710987299 A CN 201710987299A CN 107623698 B CN107623698 B CN 107623698B
Authority
CN
China
Prior art keywords
network equipment
port
cloud server
target network
debugging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710987299.8A
Other languages
Chinese (zh)
Other versions
CN107623698A (en
Inventor
曾庆晃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gongjin Electronics Co Ltd
Original Assignee
Shenzhen Gongjin Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Gongjin Electronics Co Ltd filed Critical Shenzhen Gongjin Electronics Co Ltd
Priority to CN201710987299.8A priority Critical patent/CN107623698B/en
Publication of CN107623698A publication Critical patent/CN107623698A/en
Application granted granted Critical
Publication of CN107623698B publication Critical patent/CN107623698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method for remotely debugging network equipment is applied to a network comprising a cloud server and at least one network equipment, and comprises the following steps: verifying the validity of the ID of the target network equipment; establishing long connection with the target network equipment through a private protocol; sending cloud server parameter information to target network equipment; mapping the second port to the first port; and receiving debugging data sent by the destination network equipment. According to the method and the device for debugging the network equipment remotely, the computer equipment and the computer readable storage medium, after the remote debugging instruction is sent out, the secure shell protocol tunnel between the cloud server and the network equipment is established by starting the secure shell protocol service, so that the operation is convenient, and the network equipment can be debugged conveniently. And the cloud server can acquire the execution result of the debugging instruction, so that the fault problem of the network equipment is analyzed and positioned according to the execution result of the debugging instruction, the network equipment does not need to be debugged locally, and the labor and time required for debugging the network equipment are saved.

Description

Method and device for remotely debugging network equipment
Technical Field
The invention relates to the technical field of computer network management, in particular to a method and a device for remotely debugging network equipment.
Background
With the development of network communication technology, the wireless communication technology is mature and the application range is wider and wider. Various industries establish wireless local area networks of the industries. How to implement network devices for remote management purposes is a problem in these enterprise units, and the local debugging is inefficient and requires a lot of manpower and time.
Disclosure of Invention
Based on this, it is necessary to provide a method and apparatus for remotely debugging a network device, aiming at the problem that local debugging of the network device consumes time and labor.
A method for remotely debugging network equipment is applied to a network comprising a cloud server and at least one network equipment, and comprises the following steps:
verifying the validity of the ID of the target network equipment;
after determining that the ID of the target network equipment is legal, receiving a long connection request established by a private protocol of the target network equipment;
sending cloud server parameter information to target network equipment; the cloud server is provided with a first port and a second port, the first port is used for detecting networking of a target network device, and the second port is used for establishing a secure shell protocol tunnel with the target network device; the parameter information includes at least a port number of the second port;
mapping the second port to the first port, so that a manager can log in the second port and remotely debug the target network equipment through the secure shell protocol tunnel;
and receiving a debugging result sent by the destination network equipment.
In one embodiment, the step of verifying the validity of the destination network device ID further includes:
and checking the binding state of the ID of the destination network equipment in the cloud server.
In one embodiment, the cloud server parameter information includes a port number of the second port, or further includes at least one of an IP address, a user name, and a password.
In one embodiment, the step of receiving the long connection request established by the destination network device through the private protocol further includes:
when the network state of the destination network equipment changes, the manager is prompted to change the network state.
A method of remotely commissioning a network device, comprising:
after the network equipment ID is successfully verified by the cloud server, long connection is established with the cloud server through a private protocol;
receiving cloud server parameter information sent by a cloud server;
receiving a command of establishing a secure shell protocol tunnel by a cloud server, and starting a secure shell protocol service to establish the secure shell protocol tunnel;
and receiving a remote debugging instruction of the cloud server and searching for a target network device problem.
In one embodiment, the step of establishing a long connection with a server via a private protocol includes:
and synchronizing data of the ID binding state of the target network equipment in the cloud server.
In one embodiment, the receiving a cloud server remote debugging instruction and searching for a destination network device problem includes:
and detecting the process state and the use condition of the processor according to the remote debugging instruction.
An apparatus for remotely commissioning a network device, comprising:
the information verification module is used for verifying the validity of the ID of the target network equipment;
the long private protocol connection module is used for carrying out long private protocol connection between the cloud server and the target network equipment;
the secure shell protocol tunnel module is used for establishing a secure shell protocol tunnel between the cloud server and the target network equipment;
and the remote debugging module is used for remotely debugging the execution of the target network equipment instruction.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements a method of remotely debugging a destination network device according to any of claims 1 to 7 when executing the computer program.
A computer storage medium having stored thereon a computer program which, when executed by a processor, carries out a method of remotely debugging a destination network device according to any of claims 1 to 7.
According to the method and the device for debugging the network equipment remotely, the computer equipment and the computer readable storage medium, after the remote debugging instruction is sent out, the secure shell protocol tunnel between the cloud server and the network equipment is established by starting the secure shell protocol service, so that the operation is convenient, and the network equipment can be debugged conveniently. And the cloud server can acquire the execution result of the debugging instruction, so that the fault problem of the network equipment is analyzed and positioned according to the execution result of the debugging instruction, the network equipment does not need to be debugged locally, and the labor and time required for debugging the network equipment are saved.
Drawings
FIG. 1 is a block diagram of an embodiment of a remote debugging network device;
FIG. 2 is a timing diagram of a method for remotely debugging a network device in one embodiment;
FIG. 3 is a flow diagram illustrating a method for remotely debugging a network device, according to an embodiment;
FIG. 4 is a first flowchart illustrating a process for verifying the validity of a network device according to an embodiment;
FIG. 5 is a flow diagram of a second embodiment of verifying the legitimacy of a network device;
FIG. 6 is a schematic diagram of a computer apparatus in one embodiment;
fig. 7 is a schematic structural diagram of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, in one embodiment, an apparatus for remotely debugging a network device is provided, which includes an information verification module 110, a private protocol long connection module 120, a secure shell protocol tunnel module 130, and a remote debugging module 140.
The information verification module 110 is configured to verify the validity of the ID of the destination network device, so that the cloud server records information such as the MAC address and the serial number of the destination network device, and verifies whether to bind with the cloud server by screening the information of the destination network device.
The long private protocol connection module 120 is configured to perform long connection between the cloud server and the destination network device, and send cloud server parameter information to the destination network device according to information such as an MAC address and a serial number of the destination network device.
And the secure shell protocol tunnel module 130 is configured to establish a secure shell protocol tunnel between the cloud server and the destination network device, where the destination network device starts a secure shell protocol service and establishes the secure shell protocol tunnel according to the received cloud server information.
And the remote debugging module 140 is used for remotely debugging the target network equipment, and a manager debugs the target network equipment through the remote debugging instruction to analyze and locate the problem of the target network equipment.
In one embodiment, the destination network device receives cloud server parameter information, wherein the cloud server parameter information comprises at least one of a cloud server IP address, a port number, a user name and a password.
As illustrated in fig. 2, in one embodiment, a method for remotely debugging a destination network device is provided, the method comprising the steps of:
step 201, sending an ip address, a second port, a user name and a password of the cloud server. In this embodiment, the destination network device is in a network connection state, and is long-connected to the cloud server through a private protocol, and the long-connection state may be determined according to whether the network device ID is bound in the cloud server.
Step 202, starting a secure shell protocol service, and starting a secure shell protocol tunnel from the network device to the cloud server. The secure shell protocol service may be open secure shell protocol, dropshell, etc. The preferred secure shell protocol service is dropclear, which is a lightweight secure shell protocol server and client, and the occupied memory space capacity is small.
Step 203, mapping the second port to the first port, and connecting the secure shell protocol to the destination network device.
Step 204, the secure shell protocol tunnel is successfully established, so that a manager can log in the second port to remotely debug the target network equipment through the secure shell protocol tunnel; and if the establishment fails, feeding back failure information to prompt that the establishment of the secure shell protocol tunnel fails.
Step 205, entering a login interface of the network device, and prompting to input a user name and a password on a page.
And step 206, inputting the user name and the password and sending the user name and the password to the cloud server.
Step 207, the user name and the password are sent to the network device, and the network device performs authentication.
Step 208, returning an authentication result, and logging in the network equipment if the authentication is successful; if the authentication fails, the administrator is prompted to re-enter the username and password.
Step 209, the authentication is successful, the network device is logged in, and the administrator can perform remote debugging on the network device.
Step 210, inputting a debugging instruction, for example, checking the process state through ps, checking the use status of cpu and the like through top, and capturing the data packet.
Step 211, sending a debugging instruction, receiving the debugging instruction and executing corresponding operation by the network device, and recording a debugging result.
And step 212, feeding back an operation result corresponding to the debugging instruction.
And step 213, displaying an operation result corresponding to the debugging instruction, checking the debugging result by the manager, and analyzing and positioning the problem of the network equipment fault.
According to the method for remotely debugging the network equipment, when the cloud server detects that the network equipment is on line, long connection is carried out on the network equipment server through the private protocol; the cloud server sends a remote connection starting instruction, and sends information corresponding to the serial number and the physical address of the network equipment to the network equipment according to the recorded serial number and the physical address of the network equipment; the network equipment receives information sent by the cloud server, starts a secure shell protocol service and establishes a secure shell protocol tunnel with the cloud server; a manager logs in the network equipment and enters a network equipment management page; and the network equipment receives the debugging instruction, debugs and records the debugging result, and feeds back the debugging result to the cloud server. According to the method for remotely debugging the network equipment, a manager does not need to debug the network equipment, the cloud server can be used for remotely connecting the network equipment, the cloud server and the network equipment establish a secure shell protocol tunnel for remote debugging, and the fault problem of the network equipment is recorded, so that the purpose of remotely maintaining the network equipment is achieved, and labor and time are saved.
As illustrated in fig. 3, in one embodiment, a method for remotely debugging a network device is provided, the method comprising the steps of:
step 301, the administrator logs in and operates the cloud server through telnet.
Step 302, inputting a serial number of the network device to be debugged.
In step 303, the cloud server determines whether the network device is online, if so, performs step 305, and if not, performs step 304.
Step 304, prompting the network device to go offline, and may retry later, jumping back to step 302.
Step 305, the cloud server sends a telnet instruction to the network device.
Step 306, the network device side starts a secure shell protocol service, and opens a secure shell protocol tunnel connected to the cloud server.
Step 307, the secure shell protocol tunnel is successfully established, and the cloud server initiates secure shell protocol connection to the network device.
Step 308, after the connection is successful, the network device enters a network device login interface, and the administrator can manage the network device.
Step 309, displaying the data returned by the network device.
In step 310, the administrator inputs a debugging command to debug the network device.
In step 311, the cloud server determines whether to close telnet, if yes, step 312 is performed, and if not, step 313 is performed.
In step 312, the network device receives the telnet close command, and closes the secure shell protocol tunnel and the secure shell protocol connection.
Step 313, sending the debug instruction to the network device.
And step 314, the network device feeds back the debugging result and displays the debugging result on a network device login interface.
In the method for debugging the network equipment remotely, the telnet is one member of a TCP/IP protocol family, is a standard protocol and a main mode of Internet remote login service, and has the functions of remotely logging in a server, sending an instruction, feeding back an instruction result, locally displaying a feedback result and the like. The method comprises the steps that a manager logs in and operates a cloud server in a telnet mode, remote connection of network equipment can be conducted through the cloud server, remote debugging is conducted through a safety shell protocol tunnel established between the cloud server and the network equipment, a debugging instruction debugging result is fed back to a network equipment logging interface by the network equipment, the manager analyzes and positions network equipment faults by checking the debugging result, and therefore the purpose of remotely maintaining the network equipment is achieved, local debugging is not needed, and debugging and positioning faults are quickly and effectively completed.
As illustrated in fig. 4, in one embodiment, a method for remotely debugging a network device is provided, the method comprising the steps of:
step 401, receiving network device failure information.
Step 402, detecting whether the network device is bound, if so, performing step 407, and if not, performing step 403.
Step 403, detecting whether the allowed long connection is not bound, if so, performing step 404, otherwise, performing step 409.
Step 404, marking the network devices that are not bound and are allowed to be connected for a long time.
Step 405, restart the network device.
Step 406, synchronizing the binding relationship of the network devices and jumping back to step 402.
Step 407, checking whether long connection is allowed, if yes, performing step 408, and if not, performing step 409.
And step 408, keeping the connection, wherein the cloud server is kept connected with the network equipment.
And step 409, disconnecting, and disconnecting the cloud server from the network equipment.
According to the method for verifying the legality of the network equipment, when the network equipment is not bound with the database in the cloud server; judging whether the allowed long connection is not bound; marking the unbound network equipment which can allow long connection to re-determine the binding relationship; the binding relationship determines that a long connection is established with the cloud server. According to the method for verifying the legality of the network equipment, the legality of the network equipment is verified by verifying the binding relationship between the network equipment and the cloud server database, so that whether the network equipment can establish long connection with the cloud server or not is determined.
As illustrated in fig. 5, in one embodiment, a method for remotely debugging a network device is provided, the method comprising the steps of:
step 501, the cloud server and the network device are in a synchronous binding relationship, and long connection is allowed to be established.
Step 502, the network device establishes a long connection with the cloud server through a private protocol.
Step 503, receiving the ip address, the port number of the second port, the user name, and the password sent by the cloud server.
Step 504, receiving a command sent by the cloud server to establish a secure shell protocol tunnel.
And 505, starting the secure shell protocol service, and establishing a secure shell protocol tunnel with the cloud server.
Step 506, feeding back the secure shell protocol tunnel establishment information.
Step 507, determining whether the received instruction is an instruction to end debugging, if so, performing step 508, and if not, performing step 509.
And step 508, receiving the debugging ending instruction, and closing the secure shell protocol service and the secure shell protocol tunnel service.
Step 509, receive the debug instruction and execute the debug instruction.
Step 510, feeding back an operation result corresponding to the debugging instruction to the cloud server.
According to the method for verifying the legality of the network equipment, when the cloud server and the network equipment are in a synchronous binding relationship, long connection is allowed to be established, the network equipment establishes long connection with the cloud server through a private protocol, and relevant parameters sent by the cloud server are received; after receiving the command of establishing the secure shell protocol tunnel, the network equipment starts secure shell protocol service, establishes a secure shell protocol tunnel with the cloud server and feeds back establishment information; and receiving an instruction and performing corresponding operation. The secure shell protocol service can be opensh service, dropleg service and the like, wherein dropleg service is preferred, and because dropleg service is a secure shell protocol service which occupies a very small memory, the network device can respond to the instruction of the cloud server more quickly, and the operation process is also quicker.
Fig. 6 is a schematic diagram of an internal structure of a computer device in another embodiment, which can be used as an application server. As shown in fig. 6, the server includes a processor, a memory, and a network interface connected by a system bus. The memory may include, among other things, a non-volatile storage medium and an internal memory. The memory of the computer device stores an operating system, a database and a computer program, and the database can store the serial number, the MAC address, the user name, the password corresponding to the user name and the like of the network device. The computer program, when executed, causes a processor to implement a method of remotely debugging a network device. The processor of the computer device is used for providing calculation and control capability and supporting the operation of the whole computer device. The network interface of the computer device is used for communicating with an external terminal through the internet, such as receiving debugging instructions or feeding back debugging execution results. The computer device may be implemented as a stand-alone server or as a server cluster of multiple servers.
Fig. 7 is a schematic diagram of an internal structure of a computer device according to an embodiment, which can be used as an application network device. As shown in fig. 7, the computer apparatus includes a processor, a memory, a network interface, a display screen, and an input device, which are connected through a system bus. The memory may include, among other things, a non-volatile storage medium and an internal memory. The memory may have stored therein an operating system and also a computer program for implementing a method of remotely debugging a network device. The processor is used to provide computing and control capabilities to support the operation of the entire computer device. The internal memory provides an environment for running the computer program in the nonvolatile storage medium. The network interface is used for accessing the internet and connecting with the cloud server, such as receiving a debugging instruction, feeding back an execution result of the debugging instruction and the like; but also for connecting to the internet. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, or an external keyboard, a touch pad or a mouse, and the like. The computer device may be a router, a laptop, a tablet computer, a wearable device, or the like.
Those skilled in the art will appreciate that the configurations shown in fig. 6 and 7 are merely block diagrams of portions of configurations related to aspects of the present application, and do not constitute limitations on the computing devices to which aspects of the present application may be applied, as particular computing devices may include more or less components than shown, or combine certain components, or have a different arrangement of components.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only show some embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. A method for remotely debugging network equipment is applied to a network comprising a cloud server and at least one network equipment, and is characterized in that the method comprises the following steps:
verifying the validity of the ID of the target network equipment; the verifying the validity of the destination network device ID comprises: checking the binding state of the ID of the target network equipment in the cloud server;
after determining that the ID of the target network equipment is legal, receiving a long connection request established by a private protocol of the target network equipment;
sending cloud server parameter information to target network equipment; the cloud server is provided with a first port and a second port, the first port is used for detecting networking of a target network device, and the second port is used for establishing a secure shell protocol tunnel with the target network device; the parameter information includes at least a port number of the second port;
mapping the second port to the first port, so that a manager can log in the second port and remotely debug the target network equipment through the secure shell protocol tunnel;
and receiving a debugging result sent by the destination network equipment.
2. The method for remotely debugging a network device according to claim 1, wherein the cloud server parameter information comprises a port number of the second port, or further comprises at least one of an IP address, a user name, and a password.
3. The method of claim 1, wherein the step of receiving the long connection request established by the destination network device via a private protocol further comprises:
when the network state of the destination network equipment changes, the manager is prompted to change the network state.
4. A method of remotely commissioning a network device, comprising:
after the network equipment ID is successfully verified by the cloud server, long connection is established with the cloud server through a private protocol; verifying the validity of the destination network device ID includes: checking the binding state of the ID of the target network equipment in the cloud server;
receiving cloud server parameter information sent by a cloud server; the cloud server is provided with a first port and a second port, the first port is used for detecting networking of a target network device, and the second port is used for establishing a secure shell protocol tunnel with the target network device; the parameter information includes at least a port number of the second port;
receiving a command of establishing a secure shell protocol tunnel by a cloud server, and starting a secure shell protocol service to establish the secure shell protocol tunnel; the second port is mapped to the first port, so that a manager can log in the second port and remotely debug the target network equipment through the secure shell protocol tunnel;
and receiving a remote debugging instruction of the cloud server and searching for a target network device problem.
5. The method of claim 4, wherein the step of establishing a long connection with the server via a private protocol comprises:
and synchronizing data of the ID binding state of the target network equipment in the cloud server.
6. The method for remotely debugging network equipment according to claim 4, wherein the receiving a cloud server remote debugging instruction and finding a target network equipment problem comprises:
and detecting the process state and the use condition of the processor according to the remote debugging instruction.
7. An apparatus for remotely debugging a network device, comprising:
the information verification module is used for verifying the validity of the ID of the target network equipment; the verifying the validity of the destination network device ID comprises: checking the binding state of the ID of the target network equipment in the cloud server;
the private protocol long connection module is used for carrying out private protocol long connection between the cloud server and the target network equipment and sending cloud server parameter information to the target network equipment; the cloud server is provided with a first port and a second port, the first port is used for detecting networking of a target network device, and the second port is used for establishing a secure shell protocol tunnel with the target network device; the parameter information includes at least a port number of the second port;
the secure shell protocol tunnel module is used for establishing a secure shell protocol tunnel between the cloud server and the target network equipment; the second port is mapped to the first port, so that a manager can log in the second port and remotely debug the target network equipment through the secure shell protocol tunnel;
and the remote debugging module is used for remotely debugging the execution of the target network equipment instruction.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements a method of remotely debugging a destination network device according to any of claims 1 to 6 when executing the computer program.
9. A computer storage medium having a computer program stored thereon, the program, when executed by a processor, implementing a method for remotely debugging a destination network device as recited in any of claims 1-6.
CN201710987299.8A 2017-10-20 2017-10-20 Method and device for remotely debugging network equipment Active CN107623698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710987299.8A CN107623698B (en) 2017-10-20 2017-10-20 Method and device for remotely debugging network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710987299.8A CN107623698B (en) 2017-10-20 2017-10-20 Method and device for remotely debugging network equipment

Publications (2)

Publication Number Publication Date
CN107623698A CN107623698A (en) 2018-01-23
CN107623698B true CN107623698B (en) 2021-01-22

Family

ID=61091812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710987299.8A Active CN107623698B (en) 2017-10-20 2017-10-20 Method and device for remotely debugging network equipment

Country Status (1)

Country Link
CN (1) CN107623698B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110278092A (en) * 2018-03-13 2019-09-24 成都市共维科技有限公司 Router long-range control method and system based on MQTT agreement
CN109788033B (en) * 2018-12-18 2022-06-03 北京百度网讯科技有限公司 Unmanned vehicle remote debugging method, device and system and storage medium
CN111342987A (en) * 2018-12-19 2020-06-26 广州五壹工程师信息技术有限公司 Method for remotely debugging local area network equipment through mobile phone
CN110209508A (en) * 2019-05-20 2019-09-06 湖南康通电子股份有限公司 A kind of method and system of broadcasting equipment remote debugging
CN110879564B (en) * 2019-10-31 2020-12-18 军创(厦门)自动化科技有限公司 Remote debugging and monitoring method and system for PLC (programmable logic controller)
CN111258906A (en) * 2020-01-19 2020-06-09 北京皮尔布莱尼软件有限公司 Remote debugging method and system for page
CN111309543A (en) * 2020-02-11 2020-06-19 广州视源电子科技股份有限公司 Debugging method and device, electronic equipment and storage medium
CN112671907B (en) * 2020-12-24 2023-07-11 深圳市潮流网络技术有限公司 Terminal equipment debugging method and device, terminal equipment and storage medium
CN112732526A (en) * 2021-01-07 2021-04-30 深圳市宏辉智通科技有限公司 Remote management method and system for terminal equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014138A (en) * 2010-12-16 2011-04-13 北京安天电子设备有限公司 Embedded virus capture device and circuit board
CN102929613A (en) * 2012-10-16 2013-02-13 无锡江南计算技术研究所 Adjusting and optimizing device and method for operating system
CN104202398A (en) * 2014-09-04 2014-12-10 北京星网锐捷网络技术有限公司 Remote control method, device and system
CN106161642A (en) * 2016-07-26 2016-11-23 苏州迈科网络安全技术股份有限公司 Network equipment long-distance management method, platform and system
CN107040777A (en) * 2017-06-08 2017-08-11 深圳市创维软件有限公司 A kind of remote debugging method, set top box and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7877507B2 (en) * 2008-02-29 2011-01-25 Red Hat, Inc. Tunneling SSL over SSH

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014138A (en) * 2010-12-16 2011-04-13 北京安天电子设备有限公司 Embedded virus capture device and circuit board
CN102929613A (en) * 2012-10-16 2013-02-13 无锡江南计算技术研究所 Adjusting and optimizing device and method for operating system
CN104202398A (en) * 2014-09-04 2014-12-10 北京星网锐捷网络技术有限公司 Remote control method, device and system
CN106161642A (en) * 2016-07-26 2016-11-23 苏州迈科网络安全技术股份有限公司 Network equipment long-distance management method, platform and system
CN107040777A (en) * 2017-06-08 2017-08-11 深圳市创维软件有限公司 A kind of remote debugging method, set top box and server

Also Published As

Publication number Publication date
CN107623698A (en) 2018-01-23

Similar Documents

Publication Publication Date Title
CN107623698B (en) Method and device for remotely debugging network equipment
CN110442524B (en) Method and device for testing web service interface with authentication authorization
US10033717B2 (en) Terminal single sign-on configuration, authentication method, and system, and application service system thereof
US11716390B2 (en) Systems and methods for remote management of appliances
US10432613B2 (en) HTTPS enabled client tool
CN109257254B (en) Network connectivity checking method, device, computer equipment and storage medium
CN106911648B (en) Environment isolation method and equipment
US10757104B1 (en) System and method for authentication in a computing system
US20220217143A1 (en) Identity security gateway agent
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
US11444785B2 (en) Establishment of trusted communication with container-based services
CN113341798A (en) Method, system, device, equipment and storage medium for remotely accessing application
CN110166544B (en) Load balancing application creation method and device, computer equipment and storage medium
CN107294910B (en) Login method and server
US8677446B2 (en) Centrally managed impersonation
US20200267146A1 (en) Network analytics for network security enforcement
CN107819639B (en) Test method and device
US9678772B2 (en) System, method, and computer-readable medium
CN112929388A (en) Network identity cross-device application rapid authentication method and system, and user agent device
CN114070632B (en) Automatic penetration test method and device and electronic equipment
CN107172082B (en) File sharing method and system
US20230113510A1 (en) Multi-cluster access
CN112104630B (en) Website one-key closing method and device, computer equipment and storage medium
US20230114129A1 (en) Multi-cluster boot-strapping
CN115333847B (en) Data transmission method, data processing system and computing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant