CN109639509A - A kind of method for configuring network equipment and device - Google Patents

A kind of method for configuring network equipment and device Download PDF

Info

Publication number
CN109639509A
CN109639509A CN201910054763.7A CN201910054763A CN109639509A CN 109639509 A CN109639509 A CN 109639509A CN 201910054763 A CN201910054763 A CN 201910054763A CN 109639509 A CN109639509 A CN 109639509A
Authority
CN
China
Prior art keywords
user
check value
configuration file
network equipment
provisional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910054763.7A
Other languages
Chinese (zh)
Other versions
CN109639509B (en
Inventor
徐志辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd Hefei Branch
Original Assignee
New H3C Technologies Co Ltd Hefei Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd Hefei Branch filed Critical New H3C Technologies Co Ltd Hefei Branch
Priority to CN201910054763.7A priority Critical patent/CN109639509B/en
Publication of CN109639509A publication Critical patent/CN109639509A/en
Application granted granted Critical
Publication of CN109639509B publication Critical patent/CN109639509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration
    • H04L41/0869Validating the configuration within one network element
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

This application provides a kind of method for configuring network equipment and devices, are related to field of computer technology, which comprises after the user logs, obtain executed first configuration data, and generate the first provisional configuration file according to the first configuration data;After user logs off, the second configuration data that user inputs before logging off is obtained, and the second provisional configuration file is generated according to the second configuration data;If the second provisional configuration file and the first provisional configuration file are inconsistent, come into force the second provisional configuration file.In the application, by record and compare user log in after and user log off after corresponding configuration data, it is ensured that storage medium is read and write when configuration changes, ensure that write-in storage medium in configuration data reliability;Meanwhile being automatically saved by configuration data after being changed after user logs off, solve the problems, such as that configuration data is lost caused by restarting due to the network equipment, accelerates the time of business recovery.

Description

A kind of method for configuring network equipment and device
Technical field
This application involves field of computer technology, in particular to a kind of method for configuring network equipment and device.
Background technique
In the management mode based on global wide area network (World Wide Web, Web) management network equipment, user can By Web, is quickly and easily configured on any node of network, detects and controls the network equipment.
In practice, for frequently managing the user of the network equipment using Web, these users often lose when logging off Forget to save the configuration to the network equipment.In this way, the configuration data before the network equipment is restarted can not be timely after the network equipment is restarted It saves, so as to cause configuration data loss, and then influences the time of business recovery.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of method for configuring network equipment and device, Neng Gou User automatically saves the configuration data that changes after logging off, and solves configuration data caused by restarting due to the network equipment The problem of loss, accelerates the time of business recovery.
In a first aspect, the embodiment of the present application provides a kind of method for configuring network equipment, it is applied to the network equipment, the side Method includes:
After the user logs, executed first configuration data is obtained, and generates first according to first configuration data Provisional configuration file;
After the user logs off, the second configuration data that the user inputs before logging off, and root are obtained The second provisional configuration file is generated according to second configuration data;
If the second provisional configuration file and the first provisional configuration file are inconsistent, described second is come into force temporarily Configuration file.
Second aspect, the embodiment of the present application also provides a kind of configuration data storage device, described device includes: first to obtain Modulus block, second obtain module and the module that comes into force;
Described first obtains module, for after the user logs, obtaining executed first configuration data, and according to described First configuration data generates the first provisional configuration file;
Described second obtains module, for it is defeated before logging off to obtain the user after the user logs off The second configuration data entered, and the second provisional configuration file is generated according to second configuration data;
The module that comes into force, for inconsistent in the second provisional configuration file and the first provisional configuration file When, come into force the second provisional configuration file.
A kind of method for configuring network equipment and device provided by the embodiments of the present application, after recording and comparing user's login With log off after corresponding configuration data, it is ensured that read and write storage medium when configuration changes, ensure that write-in is deposited The reliability of configuration data in storage media;Meanwhile configuring preservation opportunity and being selected in after user logs off, by being exited in user It is changed automatically saving for rear configuration data after login, solves configuration data caused by restarting due to the network equipment and loses The problem of, accelerate the time of business recovery.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of structural schematic diagram of interactive system provided by the embodiment of the present application.
Fig. 2 shows a kind of flow charts of method for configuring network equipment provided by the embodiment of the present application.
Fig. 3 shows the flow chart of another kind method for configuring network equipment provided by the embodiment of the present application.
Fig. 4 shows the flow chart of another method for configuring network equipment provided by the embodiment of the present application.
Fig. 5 shows the flow chart of another method for configuring network equipment provided by the embodiment of the present application.
Fig. 6 shows the flow chart of another method for configuring network equipment provided by the embodiment of the present application.
Fig. 7 shows the flow chart of another method for configuring network equipment provided by the embodiment of the present application.
Fig. 8 shows a kind of structural schematic diagram of network equipments configuration device provided by the embodiment of the present application.
Fig. 9 shows a kind of structural schematic diagram of the network equipment provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work There are other embodiments, shall fall in the protection scope of this application.
In order to solve after the network equipment is restarted, the configuration data before the network equipment is restarted can not save in time and cause to match The problem of setting loss of data, the relevant technologies provide a kind of method for configuring network equipment, and user is every to issue one to the network equipment The configuration data is written in storage medium for configuration data, the network equipment, carries out primary configuration and saves.But when user is more When secondary modification configuration data, configuration data is modified every time and all triggers configuration preservation, frequently read-write storage medium is will cause, reduces The service life of storage medium.
In addition, the relevant technologies additionally provide another method for configuring network equipment, exited or user being currently configured the page User is prompted to save configuration data when login is exited.But in this method, when network interruption or browser lead to user extremely Improper user to be prompted to save configuration data when exiting, user has no chance to save configuration data in the case of this kind, this is still So the configuration data of the network equipment is caused not save in time, and then configuration data is caused to be lost.
To solve the above-mentioned problems, the embodiment of the present application provides a kind of method for configuring network equipment and device, Neng Gou User automatically saves the configuration data that changes after logging off, and solves configuration data caused by restarting due to the network equipment The problem of loss, accelerates the time of business recovery.
As shown in Figure 1, being interactive system based on method for configuring network equipment provided by the embodiments of the present application, the interaction System includes: the network equipment 101 and network management device 102;It can be between the network equipment 101 and network management device 102 Row data communication.Correspondingly, user can carry out the network equipment 101 by the web browser in network management device 102 Management.Here, user includes: the operating status for inquiring the network equipment 101 to the management that the network equipment 101 carries out, sets to network Standby 101 configure etc..
As an implementation, the above-mentioned network equipment 101 can be the equipment such as router, interchanger.Above-mentioned network pipe Managing equipment 102 can be the terminal device or server for being embedded with web browser.Here, above-mentioned terminal device can be with are as follows: a The electronic equipments such as people's computer (personal computer, PC), tablet computer and intelligent terminal.
It should be noted that user can also be directly operated on network devices to realize the configuration to the network equipment.This Apply being not intended to limit user to the configuration mode of the network equipment in embodiment.
Below with reference to above-mentioned interactive system to a kind of method for configuring network equipment provided by the embodiments of the present application and device into Row description.
As shown in Fig. 2, being a kind of method for configuring network equipment provided by the embodiments of the present application, this method can be applied to net Network equipment, the method specifically includes the following steps:
S201, after the user logs obtains executed first configuration data, and is generated according to first configuration data First provisional configuration file.
In the embodiment of the present application, after the user logs, the network equipment obtains current executed first saved in memory Configuration data.
As an implementation, the network equipment is when user logs in and establishes session connection with user, when obtaining current Executed first configuration data saved in memory, and the first provisional configuration file is generated according to first configuration data.
Wherein, the establishment process of above-mentioned session connection is as follows: user is matched by the web browser login of network management device The web page of the network equipment is set, and inputs user information in web page, correspondingly, network management device is sent out to the network equipment Send the session request for carrying user information.The network equipment is after receiving the session request, to the user in the session request Information is verified, and after user information is verified, the network equipment establishes session connection namely net with network management device Network equipment establishes the session connection with user.
S202, after the user logs off, obtain the second configuration data that the user inputs before logging off, And the second provisional configuration file is generated according to second configuration data.
In the embodiment of the present application, after user logs off, the network equipment obtains in memory the user that saves and steps on exiting The second configuration data inputted before record.
As an implementation, the network equipment is determined when detecting that the session connection with network management device disconnects User logs off.In network management device side, either user actively logs off or network management device encounters network Interrupt or browser cause extremely it is improper exit, the determining session connection with network management device of the network equipment disconnects.
If S203, the second provisional configuration file and the first provisional configuration file are inconsistent, described is come into force Two provisional configuration files.
In the embodiment of the present application, corresponding first provisional configuration file and session connect when the network equipment establishes session connection Corresponding second provisional configuration file is compared when connecing disconnection, if the second provisional configuration file and the first provisional configuration file are not Unanimously, it is determined that configuration is changed, at this point, storage medium is written in the second provisional configuration file after variation by the network equipment In, meanwhile, the configuration file of second provisional configuration file renamed as network equipment next time of the starting of storage medium will be written Filename, with come into force variation after the second provisional configuration file.
Above-mentioned method for configuring network equipment provided by the embodiments of the present application, in entire process of user login, provisional configuration text Part is all to guarantee most Write-once storage mediums using memory file, reduces the read-write number of storage medium, extends storage The service life of medium.Meanwhile it is that automatic trigger saves that the configuration data of whole process, which saves operation, simplifies user behaviour Make.
Above-mentioned method for configuring network equipment provided by the embodiments of the present application is logged in and was exited by recording and comparing user Corresponding configuration data in journey, it is ensured that read and write storage medium when configuration changes, ensure that in write-in storage medium Configuration data reliability;Meanwhile when the preservation opportunity of configuration data is selected in user and logs off after variation, both reduces and match It sets preservation number and solves the problems, such as that configuration data is lost caused by restarting due to the network equipment, accelerates business recovery again Time.
As shown in figure 3, determining the second provisional configuration text in method for configuring network equipment provided by the embodiments of the present application Part and the whether consistent method of the first provisional configuration file, specifically include:
S301, obtain that the user is corresponding to exit check value;Wherein, the check value that exits is that the network equipment exists What the user generated after logging off according to second configuration data of input.
In the embodiment of the present application, if user is without the non-management user of configuration permission, the user is corresponding to be exited Check value has specific identifier;If user is the management user with configuration permission but does not issue configuration operation, the user The corresponding check value that exits is with specific identifier;If the user is the management user with configuration permission and has issued configuration behaviour Make, then the corresponding check value that exits of the user is without specific identifier.Here, refer to have with configuration permission and be set for network Standby configuration permission.
If S302, the check value that exits are with specific identifier, it is determined that the second provisional configuration file and described the One provisional configuration file is consistent.
As an implementation, above-mentioned specific identifier is 0;The network equipment exits check value detecting that user is corresponding When being 0, determine that the second provisional configuration file is consistent with the first provisional configuration file;Correspondingly, the network equipment determines that configuration is not sent out Changing.
If S303, the check value that exits obtain the corresponding login verification of the user without the specific identifier Value, and according to the logins check value and the comparison result for exiting check value, determine the second provisional configuration file and Whether the first provisional configuration file is consistent;Wherein, the login check value is that the network equipment is logged in the user It generates afterwards.
In the embodiment of the present application, if user is the non-management user without configuration permission, the corresponding login of the user Check value has specific identifier;If user is with the management user of configuration permission, the corresponding login check value of the user is not With specific identifier.
Here, the network equipment is corresponding by user when detecting that user is corresponding and exiting check value without specific identifier Login check value and exit check value and be compared;If it is equal with check value is exited to log in check value, it is determined that second is interim Configuration file and the first provisional configuration file are consistent, correspondingly, the network equipment determines that configuration does not change.If logging in check value It is unequal with check value is exited, it is determined that the second provisional configuration file and the first provisional configuration file are inconsistent, correspondingly, network Equipment determines that configuration changes.
In the embodiment of the present application, used for the non-management user for not having configuration permission and the management for not issuing configuration operation Family, by exiting whether check value has specific identifier, come judge the first provisional configuration file and the second provisional configuration whether one It causes;And be directed to configuration permission and issued the management user of configuration operation, by logging in check value accordingly and exiting Whether the comparison of check value is consistent to judge the first provisional configuration file and the second provisional configuration file.In this way, simple Change the determining process for configuring and whether changing, improves the processing speed of the network equipment.
Further, as shown in figure 4, in the embodiment of the present application, after the user logs in, the network equipment generates institute The corresponding method for logging in check value of user is stated, is specifically comprised the following steps:
S401, the user log in after, judge whether the user has the configuration permission for the network equipment.
Wherein, it is previously stored with the mapping table of user information and user right in the network equipment, is logged in simultaneously in user When establishing session with the network equipment, the network equipment obtains the user information of active user, and looks into preset mapping table Look for user right corresponding with the user information;If the user right includes configuration permission, determine that active user is with matching Set the management user of permission;If the user right includes configuring permission, determine that active user is to weigh without configuration The non-management user of limit.
If S402, the user have the configuration permission for the network equipment, according to first configuration data, Generate the corresponding login check value of the user.
In the embodiment of the present application, when user logs in, the network equipment is if it is determined that active user is the pipe with configuration permission User is managed, then collects the first configuration data and generates the first provisional configuration file.Then, according in the first provisional configuration file One configuration data calculates the corresponding login check value of active user, and the login check value is recorded in the login meeting of active user It talks about in information.
Here, the network equipment is by Message Digest 5 (Message Digest Algorithm, MD5) algorithm to first The first configuration data in provisional configuration file is calculated, and obtains the corresponding login check value of active user, and by the login Check value is recorded in the login sessions information with active user.After logging in check value record and completing, the network equipment is deleted First provisional configuration file, to discharge the memory source that the first provisional configuration file occupies.
If S403, the user do not have the configuration permission for the network equipment, it is corresponding to generate the user Login check value with specific identifier.
Here, if it is determined that active user is the non-management user without configuration permission, then generation is current uses the network equipment The corresponding login check value including specific identifier in family.
As an implementation, if active user is non-management user, the network equipment is stepped on active user is corresponding Record check value is recorded as 0.
Further, as shown in figure 5, in the embodiment of the present application, after the user logs off, the network equipment is raw Specifically comprise the following steps: at the corresponding method for exiting check value of the user
S501, the corresponding login check value of the user is obtained.
If S502, the login check value do not have the specific identifier, according to second configuration data, institute is generated State that user is corresponding to exit check value.
In the embodiment of the present application, if the network equipment detects that the corresponding login check value of active user does not have specific mark Know, determines that active user is the management user with configuration permission, then collect the second configuration data of active user's transmission and life At the second provisional configuration file;Then, active user is calculated according to the second configuration data in the second provisional configuration file to correspond to Exit check value, and this is exited into check value and is recorded in the login sessions information of active user.
Here, the network equipment calculates the second configuration data in the second provisional configuration file by MD5 algorithm, obtains Check value is exited to active user is corresponding, and this is exited into check value and is recorded in the login sessions information of active user.
If S503, the login check value have the specific identifier, it is corresponding with the spy to generate the user What calibration was known exits check value.
In the embodiment of the present application, if the network equipment detects that the corresponding login check value of active user has specific identifier, Determine that active user is the non-management user without configuration permission, correspondingly, the active user obtained is defeated before logging off The second configuration data entered is sky, correspondingly, generating the second provisional configuration file according to second configuration data is also sky, accordingly , for the network equipment according to above-mentioned second configuration data for sky, generation active user is corresponding to exit school including specific identifier Test value.
In the embodiment of the present application, if the network equipment detects that the corresponding login check value of active user is 0, determine current User is non-management user, at this point, the corresponding check value that exits of active user is set to 0.
In the embodiment of the present application, by being screened and having been screened to user right, reduces and do not have configuration permission The login of non-management user and exiting causes configuration to save, to save the process resource of the network equipment.
Further, as shown in fig. 6, in the embodiment of the present application, the network equipment generation user is corresponding to be exited The method of check value, further includes:
If S601, the corresponding login check value of the user do not have the specific identifier, judge that the user sends The number of configuring request whether be greater than preset initial value.
In the embodiment of the present application, if the network equipment detects that the corresponding login check value of active user does not have specific mark Know, determines that active user is the management user with configuration permission, and further judge the configuring request that active user sends Whether number is greater than preset initial value.
In the embodiment of the present application, for the network equipment when establishing session connection with user, the configuring request that user is issued is a Number is set as initial value, and the initial value is recorded in the login sessions information with the user.The network equipment receives the use When the request that family issues, according to the identification information judgment in request, whether the request is configuration class request, if the request is configuration Configuring request number execution in login sessions information is then added 1 operation by class request.
For example, preset initial value is set as 0, the network equipment often receives the configuration class request that user issues, and holds The number for being about to configuring request adds 1 operation.
If S602, the number for logging in the configuring request that check value does not have the specific identifier and the user sends Greater than preset initial value, then according to second configuration data, generate that the user is corresponding to exit check value.
In the embodiment of the present application, preset just if the network equipment detects that the number for the configuring request that active user sends is greater than Initial value, it is determined that active user has carried out configuration operation, at this point, the network equipment collects the second configuration data in configuring request, And according to the second configuration data, the second provisional configuration file is generated;Then, the network equipment is according in the second provisional configuration file Second configuration data calculates that active user is corresponding exits check value, and this is exited the login that check value is recorded in active user In session information.
If S603, the number for logging in the configuring request that check value does not have the specific identifier and the user sends Equal to preset initial value, then generate that the user is corresponding to exit check value with the specific identifier.
In the embodiment of the present application, preset just if the network equipment detects that the number for the configuring request that active user sends is equal to Initial value, it is determined that active user does not carry out configuration operation, at this point, it includes specific mark that it is corresponding, which to generate active user, for the network equipment That knows exits check value.
It as an implementation, will if the network equipment detects that the number for the configuring request that active user sends is 0 The corresponding check value that exits of active user is set to 0.
In the present embodiment, the network equipment counts configuration operation of the management user in login process, avoids Redundant computation and processing caused by the non-configuration generic operation of user are managed, the process resource of the network equipment is equally saved, is accelerated Processing speed of the network equipment to the configuration operation of management user.
In the embodiment of the present application, check value will be logged in, exit the related control informations such as check value, configuring request number record In the login sessions information of user, multi-user concurrent can be supported to operate.
Further, as shown in fig. 7, in method for configuring network equipment provided by the embodiments of the present application, described second is come into force After provisional configuration file, further includes:
S701, come into force filename and the user information of the user for obtaining the second provisional configuration file.
S702, the user information according to the come into force filename and the user of the second provisional configuration file, generate day Will information.
In conjunction with step 701 and step 702, the essential record related letter of the second configuration file of variation in the log information The user information of breath and change network equipments configuration, it is therefore an objective to the user information be prompted to modify the configuration data of the network equipment And it triggers configuration and saves.
In the embodiment of the present application, the network equipment deletes the second provisional configuration file after generating log information, with release The memory source that second provisional configuration file occupies.
In the embodiment of the present application, by generating log information, the maintainability of the network equipment is enhanced.
The embodiment of the present application also provides a kind of network equipments configuration device, described device is for executing above-mentioned configuration data Storage method, as shown in figure 8, described device includes: that the first acquisition module 801, second obtains module 802 and the module 803 that comes into force;
First obtains module 801, for after the user logs, obtaining executed first configuration data, and according to described First configuration data generates the first provisional configuration file;
Second obtains module 802, inputs before logging off for after the user logs off, obtaining the user The second configuration data, and according to second configuration data generate the second provisional configuration file;
The module that comes into force 803 is used for when the second provisional configuration file and the first provisional configuration file are inconsistent, Come into force the second provisional configuration file.
Further, network equipments configuration device provided by the embodiments of the present application further include: third obtains module and determination Module;
The third obtains module, and for obtaining, the user is corresponding to exit check value;Wherein, described to exit check value It is that the network equipment generates after the user logs off according to second configuration data of input;
The determining module, for it is described exit check value with specific identifier when, determine second provisional configuration File is consistent with the first provisional configuration file;And it is described exit check value without the specific identifier when, obtain The corresponding login check value of the user, and according to the login check value and the comparison result for exiting check value, it determines Whether the second provisional configuration file and the first provisional configuration file are consistent;Wherein, the login check value is described What the network equipment generated after the user logs in.
Further, network equipments configuration device provided by the embodiments of the present application further includes the first generation module;
First generation module, when for having the configuration permission for the network equipment in the user, according to First configuration data generates the corresponding login check value of the user;And does not have in the user and be directed to the net When the configuration permission of network equipment, the corresponding login check value with specific identifier of the user is generated.
Further, network equipments configuration device provided by the embodiments of the present application further includes the 4th acquisition module and second Generation module;
Described 4th obtains module, for obtaining the corresponding login check value of the user;
Second generation module, for when the logins check value is without the specific identifier, according to described the Two configuration datas, generate that the user is corresponding to exit check value;And there is the specific identifier in the login check value When, generate that the user is corresponding to exit check value with the specific identifier.
Further, in network equipments configuration device provided by the embodiments of the present application, second generation module is also used In:
It is greater than in the number for the configuring request that the login check value does not have the specific identifier and the user sends When preset initial value, according to second configuration data, generate that the user is corresponding to exit check value;
It is equal in the number for the configuring request that the login check value does not have the specific identifier and the user sends When preset initial value, generate that the user is corresponding to exit check value with the specific identifier.
Further, network equipments configuration device provided by the embodiments of the present application, further includes: the 5th obtains module and third Generation module;
Described 5th obtains module, for obtaining come into force filename and the user of the second provisional configuration file User information;
Third generation module, for the user according to the come into force filename and the user of the second provisional configuration file Information generates log information.
Further, network equipments configuration device provided by the embodiments of the present application, further includes removing module;
The removing module, for it is interim to delete described first after generating the corresponding login check value of the user Configuration file;And after the second provisional configuration file that comes into force, the second provisional configuration file is deleted.
Network equipments configuration device provided by the embodiments of the present application, by record and compare user log in after and log off Corresponding configuration data afterwards, it is ensured that read and write storage medium when configuration changes, ensure that in write-in storage medium The reliability of configuration data;Meanwhile configuring preservation opportunity and being selected in after user logs off, by being carried out after user logs off Configuration data automatically saves after variation, solves the problems, such as that configuration data is lost caused by restarting due to the network equipment, is added The fast time of business recovery.
As shown in figure 9, being a kind of network equipment 90 provided by the embodiments of the present application, comprising: processor 901, memory 902 And bus, the memory 902 are stored with the executable machine readable instructions of the processor 901, when network equipment operation, By bus communication between the processor 901 and the memory 902, the machine readable instructions are by the processor 901 The step of above-mentioned method for configuring network equipment is executed when execution.
Specifically, above-mentioned memory 902 and processor 901 can be general memory and processor, do not do have here Body limits, and when the computer program of 901 run memory 902 of processor storage, is able to carry out above-mentioned network equipments configuration side Method.
Corresponding to above-mentioned method for configuring network equipment, a kind of computer storage medium provided by the embodiments of the present application is described Computer storage medium is stored with computer executable instructions, which can be performed above-mentioned network equipments configuration Method.
Network equipments configuration device provided by the embodiment of the present application for the specific hardware in equipment or can be installed on Software or firmware in equipment etc..The technical effect of device provided by the embodiment of the present application, realization principle and generation is with before It is identical to state embodiment of the method, to briefly describe, Installation practice part does not refer to place, can refer to phase in preceding method embodiment Answer content.It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process during reference can be made to the above method embodiment, details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method, it can be by others side Formula is realized.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only one kind are patrolled Function division is collected, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some communication interfaces, device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in embodiment provided by the present application can integrate in one processing unit, it can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing, in addition, term " the One ", " second ", " third " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen It please be described in detail, those skilled in the art should understand that: anyone skilled in the art Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution.The protection in the application should all be covered Within the scope of.Therefore, the protection scope of the application should be based on the protection scope of the described claims.

Claims (14)

1. a kind of method for configuring network equipment, which is characterized in that be applied to the network equipment, which comprises
After the user logs, executed first configuration data is obtained, and generates first temporarily according to first configuration data Configuration file;
After the user logs off, the second configuration data that the user inputs before logging off is obtained, and according to institute It states the second configuration data and generates the second provisional configuration file;
If the second provisional configuration file and the first provisional configuration file are inconsistent, come into force second provisional configuration File.
2. method for configuring network equipment according to claim 1, which is characterized in that determine the second provisional configuration file With the whether consistent method of the first provisional configuration file, specifically include:
Obtain that the user is corresponding to exit check value;Wherein, the check value that exits is the network equipment in the user It is generated after logging off according to second configuration data of input;
If the check value that exits is with specific identifier, it is determined that the second provisional configuration file and first provisional configuration File is consistent;
If the check value that exits without the specific identifier, obtains the corresponding login check value of the user, and according to The login check value and the comparison result for exiting check value determine that the second provisional configuration file faces with described first When configuration file it is whether consistent;Wherein, the login check value is that the network equipment generates after the user logs in.
3. method for configuring network equipment according to claim 2, which is characterized in that after the user logs in, the net Network equipment generates the corresponding method for logging in check value of the user, specifically includes:
If the user has the configuration permission for the network equipment, according to first configuration data, described in generation The corresponding login check value of user;
If the user does not have the configuration permission for the network equipment, it is corresponding with specific mark to generate the user The login check value of knowledge.
4. method for configuring network equipment according to claim 3, which is characterized in that after the user logs off, institute It states the network equipment and generates the corresponding method for exiting check value of the user, specifically include:
Obtain the corresponding login check value of the user;
If the login check value, which does not have the specific identifier, generates the user couple according to second configuration data That answers exits check value;
If the login check value has the specific identifier, corresponding the moving back with the specific identifier of the user is generated Check value out.
5. method for configuring network equipment according to claim 4, which is characterized in that the network equipment generates the user The corresponding method for exiting check value, further includes:
If the number for logging in the configuring request that check value does not have the specific identifier and the user sends is greater than default Initial value generates that the user is corresponding to exit check value then according to second configuration data;
If the number for logging in the configuring request that check value does not have the specific identifier and the user sends is equal to default Initial value, then generate that the user is corresponding to exit check value with the specific identifier.
6. method for configuring network equipment according to claim 1-5, which is characterized in that described to come into force described second After provisional configuration file, the method also includes:
Obtain come into force filename and the user information of the user of the second provisional configuration file;
According to the user information of the come into force filename and the user of the second provisional configuration file, log information is generated.
7. method for configuring network equipment according to claim 3, which is characterized in that generating the corresponding login of the user After check value, the method also includes: delete the first provisional configuration file;
After the second provisional configuration file that comes into force, the method also includes: delete the second provisional configuration file.
8. a kind of network equipments configuration device, which is characterized in that described device includes: the first acquisition module, the second acquisition module With the module that comes into force;
Described first obtains module, for after the user logs, obtaining executed first configuration data, and according to described first Configuration data generates the first provisional configuration file;
Described second obtains module, for after the user logs off, obtaining what the user inputted before logging off Second configuration data, and the second provisional configuration file is generated according to second configuration data;
The module that comes into force is used for when the second provisional configuration file and the first provisional configuration file are inconsistent, raw Imitate the second provisional configuration file.
9. network equipments configuration device according to claim 8, which is characterized in that further include: third obtain module and really Cover half block;
The third obtains module, and for obtaining, the user is corresponding to exit check value;Wherein, the check value that exits is institute State what the network equipment generated after the user logs off according to second configuration data of input;
The determining module, for it is described exit check value with specific identifier when, determine the second provisional configuration file It is consistent with the first provisional configuration file;And it is described exit check value without the specific identifier when, described in acquisition The corresponding login check value of user, and according to the login check value and the comparison result for exiting check value, determine described in Whether the second provisional configuration file and the first provisional configuration file are consistent;Wherein, the login check value is the network What equipment generated after the user logs in.
10. network equipments configuration device according to claim 9, which is characterized in that further include the first generation module;
First generation module, when for having the configuration permission for the network equipment in the user, according to described First configuration data generates the corresponding login check value of the user;And does not have in the user and set for the network When standby configuration permission, the corresponding login check value with specific identifier of the user is generated.
11. network equipments configuration device according to claim 10, which is characterized in that further include the 4th obtaining module and the Two generation modules;
Described 4th obtains module, for obtaining the corresponding login check value of the user;
Second generation module, for matching according to described second when the login check value does not have the specific identifier Data are set, generate that the user is corresponding to exit check value;And when the login check value has the specific identifier, Generate that the user is corresponding to exit check value with the specific identifier.
12. network equipments configuration device according to claim 11, which is characterized in that second generation module is also used In:
It is greater than in the number for the configuring request that the login check value does not have the specific identifier and the user sends default When initial value, according to second configuration data, generate that the user is corresponding to exit check value;
It is equal in the number for the configuring request that the login check value does not have the specific identifier and the user sends default When initial value, generate that the user is corresponding to exit check value with the specific identifier.
13. according to the described in any item network equipments configuration devices of claim 8-12, which is characterized in that further include: the 5th obtains Modulus block and third generation module;
Described 5th obtains module, for obtaining come into force filename and the use of the user of the second provisional configuration file Family information;
Third generation module, for come into force filename and the user's letter of the user according to the second provisional configuration file Breath generates log information.
14. network equipments configuration device according to claim 10, which is characterized in that further include removing module;
The removing module, for deleting first provisional configuration after generating the corresponding login check value of the user File;And after the second provisional configuration file that comes into force, the second provisional configuration file is deleted.
CN201910054763.7A 2019-01-21 2019-01-21 Network equipment configuration method and device Active CN109639509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910054763.7A CN109639509B (en) 2019-01-21 2019-01-21 Network equipment configuration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910054763.7A CN109639509B (en) 2019-01-21 2019-01-21 Network equipment configuration method and device

Publications (2)

Publication Number Publication Date
CN109639509A true CN109639509A (en) 2019-04-16
CN109639509B CN109639509B (en) 2021-12-07

Family

ID=66062256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910054763.7A Active CN109639509B (en) 2019-01-21 2019-01-21 Network equipment configuration method and device

Country Status (1)

Country Link
CN (1) CN109639509B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102387029A (en) * 2011-08-19 2012-03-21 迈普通信技术股份有限公司 System and method for automatically saving equipment configuration information
CN103932698A (en) * 2014-04-25 2014-07-23 深圳市理邦精密仪器股份有限公司 Method and system for automatic configuration of setting items of electrocardiograph
US20160080928A1 (en) * 2007-06-12 2016-03-17 Broadcom Corporation Method and system for a networked self-configuring communication device utilizing user preference information
CN107517110A (en) * 2016-06-15 2017-12-26 中兴通讯股份有限公司 Veneer configuration self-recovery method and device in a kind of distributed system
CN107547285A (en) * 2017-09-25 2018-01-05 新华三信息安全技术有限公司 A kind of configuration information store method and device
CN108418720A (en) * 2018-04-24 2018-08-17 深圳市菲菱科思通信技术股份有限公司 A kind of restoration methods, device and the routing device of routing device configuration information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160080928A1 (en) * 2007-06-12 2016-03-17 Broadcom Corporation Method and system for a networked self-configuring communication device utilizing user preference information
CN102387029A (en) * 2011-08-19 2012-03-21 迈普通信技术股份有限公司 System and method for automatically saving equipment configuration information
CN103932698A (en) * 2014-04-25 2014-07-23 深圳市理邦精密仪器股份有限公司 Method and system for automatic configuration of setting items of electrocardiograph
CN107517110A (en) * 2016-06-15 2017-12-26 中兴通讯股份有限公司 Veneer configuration self-recovery method and device in a kind of distributed system
CN107547285A (en) * 2017-09-25 2018-01-05 新华三信息安全技术有限公司 A kind of configuration information store method and device
CN108418720A (en) * 2018-04-24 2018-08-17 深圳市菲菱科思通信技术股份有限公司 A kind of restoration methods, device and the routing device of routing device configuration information

Also Published As

Publication number Publication date
CN109639509B (en) 2021-12-07

Similar Documents

Publication Publication Date Title
US10664368B2 (en) Modifying aspects of a storage system associated with data mirroring
CN103179053B (en) For providing the system and method for data management service
CN105262633B (en) A kind of application redundancy method and application redundancy system
CN108108286A (en) Method of data capture and device, server, storage medium
US9229647B2 (en) Systems, methods, and apparatus for spoofing a port of a host entity to identify data that is stored in a storage system and may be accessed by the port of the host entity
CN105450759A (en) System mirror image management method and device
CN111212111A (en) Object storage service management method and electronic equipment
KR101443071B1 (en) Error Check System of Webpage
US11080153B2 (en) Modifying journaling associated with data mirroring within a storage system
CN108920653A (en) A kind of page generation method, device, server and storage medium
CN106506484A (en) A kind of method of data backup, apparatus and system
CN105975364B (en) Data back up method and device
CN105759247A (en) Radar comprehensive recorder and radar data recording method
CN110808839A (en) Processing method, device, equipment and medium for block chain abnormal data
AU2021204550A1 (en) Scene detection method and apparatus, electronic device and computer storage medium
US7721053B2 (en) Intelligent logical unit provisioning
CN107911443A (en) A kind of session information processing method, device, server and readable storage medium storing program for executing
US7512637B2 (en) Storage system and undo processing method
CN109639509A (en) A kind of method for configuring network equipment and device
KR100625517B1 (en) System for controlling a training process of a cope with the hacking·virus based on the on-line network
CN115221060A (en) Case generation method, device and equipment based on associated field and storage medium
CN113890753A (en) Digital identity management method, device, system, computer equipment and storage medium
CN112711518B (en) Log uploading method and device
WO2022096959A1 (en) Scene detection method and apparatus, electronic device and computer storage medium
US9191267B2 (en) Device management for determining the effects of management actions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant