CN115604095A - Network equipment configuration method and system - Google Patents

Network equipment configuration method and system Download PDF

Info

Publication number
CN115604095A
CN115604095A CN202211276735.8A CN202211276735A CN115604095A CN 115604095 A CN115604095 A CN 115604095A CN 202211276735 A CN202211276735 A CN 202211276735A CN 115604095 A CN115604095 A CN 115604095A
Authority
CN
China
Prior art keywords
configuration
command
network device
network equipment
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211276735.8A
Other languages
Chinese (zh)
Inventor
杨光熠
王炜煜
王辉
赵红蕾
施伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Bilibili Technology Co Ltd
Original Assignee
Shanghai Bilibili Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Bilibili Technology Co Ltd filed Critical Shanghai Bilibili Technology Co Ltd
Priority to CN202211276735.8A priority Critical patent/CN115604095A/en
Publication of CN115604095A publication Critical patent/CN115604095A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the application provides a network equipment configuration method, which comprises the following steps: responding to a configuration request for configuring target network equipment sent by a requester, and establishing SSH connection with the target network equipment, wherein the number of the target network equipment is N, and N is a positive integer; receiving a first configuration command issued to first network equipment, forwarding the received first configuration command to the first network equipment, and receiving a first result returned by the first network equipment based on the first configuration command, wherein the first network equipment is any one of the target network equipment; returning the received first result to the requester. The network equipment configuration method provided by the embodiment of the application can improve the switch configuration efficiency and can complete the configuration of all switches at one time.

Description

Network equipment configuration method and system
Technical Field
The present application relates to the field of communications technologies, and in particular, to a network device configuration method, a system, a computer device, and a storage medium.
Background
In enterprise level network device management, a large number of switches are typically required to be configured. If each switch is configured one by one manually, a lot of repetitive manual labor can be caused, the efficiency is low, and manual configuration errors are easily caused, so that the automatic issuing of switch configuration is necessary.
However, currently, the mainstream Configuration automatic issuing is realized by supporting a Network Configuration (NETCONF) protocol, but not all manufacturers' models of devices support the NETCONF protocol, and the protocol versions are not uniform, and an exchanger that does not support the NETCONF protocol can only be configured in a manual manner, so that the efficiency is low, and the Configuration work of all exchangers cannot be completed at one time.
Disclosure of Invention
The present application aims to provide a network device configuration method, system, computer device, and storage medium, which are used to solve the technical problems that the existing switch configuration efficiency is low and the configuration of all switches cannot be completed at one time.
One aspect of the embodiments of the present application provides a network device configuration method, including: responding to a configuration request for configuring target network equipment sent by a requester, and establishing SSH connection with the target network equipment, wherein the number of the target network equipment is N, and N is a positive integer; receiving a first configuration command issued to first network equipment, forwarding the received first configuration command to the first network equipment, and receiving a first result returned by the first network equipment based on the first configuration command, wherein the first network equipment is any one of target network equipment; and returning the received first result to the requester.
Optionally, the establishing, in response to a configuration request sent by the requester, an SSH connection with the target network device includes: under the condition of receiving a configuration request sent by a requester, determining whether the configuration request is a legal request according to a preset verification mode, wherein the preset verification mode comprises at least one of certificate verification, request timestamp verification, signature verification and token verification; and establishing the SSH connection with the target network equipment under the condition that the configuration request is determined to be a legal request.
Optionally, establishing an SSH connection with the target network device includes: receiving a second result returned by the target network equipment based on the SSH connection; and determining that the connection with the target network equipment is successful under the condition that the second result is received and comprises the first preset information.
Optionally, forwarding the received first configuration command to the first network device includes: under the condition that the connection with the first network equipment is determined to be successful, sending a preset command to the first network equipment, and receiving a third result returned by the first network equipment based on the preset command; and forwarding the first configuration command to the first network equipment under the condition that the third result is received and the second preset information exists in the third result.
Optionally, the first configuration command includes several subcommands, and the method further includes: forwarding the current sub-command to the first network device; under the condition that a first sub-result returned by the first network equipment based on the current sub-command is received, identifying the first sub-result to determine the execution completion state of the current sub-command; and under the condition that the execution state is successful, acquiring a next sub-command and forwarding the next sub-command to the first network equipment.
Optionally, identifying the first sub-result to determine an execution completion status of the current sub-command comprises: identifying and determining whether a command prompt is included in the first sub-result; under the condition that the command prompt is determined to be included in the first sub-result, command echoing information in the first sub-result is extracted; and under the condition that the command playback information contains error information, determining that the execution completion state of the current sub-command is execution failure, otherwise, determining that the execution completion state of the current sub-command is execution success.
Optionally, the method further comprises: and recording the request sent by the requester and the result returned by the target network equipment based on the request to form a configuration operation record.
Optionally, the first configuration command is issued through a standard configuration template, and the method further includes: acquiring the current configuration of target network equipment; the current configuration is compared to the standard configuration of the standard configuration template to determine whether the current configuration is consistent with the standard configuration.
An aspect of an embodiment of the present application further provides a network device configuration system, including: the front end is used for sending a configuration request and issuing a configuration command to the network equipment; the configuration server is used for receiving the configuration request, forwarding the configuration command to the network equipment, receiving a result returned by the network equipment based on the configuration command, and returning the received result to the front end; and the network equipment is used for receiving the configuration command forwarded by the configuration server and returning a result to the configuration server based on the configuration command.
Optionally, the configuration server includes a task management module, a command service module, a terminal service module, and an SSH proxy module; the front end is used for issuing a configuration command through a batch mode or a terminal switching mode; the task management module is used for receiving a configuration command issued by the front end in a batch mode, creating a task according to the configuration command, submitting the task to the command service module according to preset time to execute the task, and monitoring and storing the state and the result of the task; the command service module is used for splitting, scheduling and executing the configuration command in the task according to the task and analyzing the result returned by the SSH agent; the terminal service module is used for receiving a configuration command issued by the front end through a terminal delivery mode and transmitting the configuration command to the SSH agent module; and the SSH agent module is used for receiving the configuration command issued by the command service module or the terminal service module, forwarding the configuration command to the network equipment, and forwarding a result returned by the network equipment to the command service module or the terminal service module.
An aspect of the embodiments of the present application further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the computer device is configured to implement the steps of the network device configuration method described above.
An aspect of the embodiments of the present application further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is executable by at least one processor, so that the at least one processor executes the steps of the network device configuration method described above.
The network device configuration method, the system, the computer device and the storage medium provided by the embodiment of the application have the following advantages:
establishing SSH connection with target network equipment by responding to a configuration request sent by a requester; receiving a configuration command issued to any target network equipment, and forwarding the received configuration command to the corresponding target network equipment; returning the received result returned by the target network equipment according to the configuration command to the requester, and realizing the configuration of the target network equipment in an SSH protocol mode; because the target network equipment supports the SSH protocol mode, the configuration command is issued in the SSH connection mode, and the configuration issuing of all the target network equipment can be realized, so that the configuration of the network equipment (switch) of all projects can be completed at one time, and the configuration efficiency of the network equipment (switch) is improved.
Drawings
FIG. 1 schematically illustrates an environmental architecture diagram of an embodiment of the present application;
fig. 2 schematically shows a flowchart of a network device configuration method according to a first embodiment of the present application;
FIG. 3 is a flowchart of sub-steps of step S510 in FIG. 2;
FIG. 4 is a flowchart illustrating the substeps of step S512 in FIG. 3;
FIG. 5 is a flowchart of the substeps of step S520 of FIG. 2;
FIG. 6 is a flow chart of the addition step of FIG. 2;
FIG. 7 is a flowchart of the substeps of step S620 in FIG. 6;
FIG. 8 is a flow chart of another additional step of FIG. 2;
FIG. 9 is a flowchart illustrating a method for configuring a network device;
fig. 10 is a block diagram schematically illustrating a network device configuration system according to a second embodiment of the present application;
fig. 11 schematically shows another block diagram of a network device configuration system according to a second embodiment of the present application;
FIG. 12 is a diagram of a specific example of a network device configuration system;
FIG. 13 is a schematic illustration of the SSH proxy module of FIG. 11;
fig. 14 schematically shows a hardware architecture diagram of a computer device according to a third embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the descriptions relating to "first", "second", etc. in the embodiments of the present application are only for descriptive purposes and are not to be construed as indicating or implying relative importance or implicitly indicating the number of indicated technical features. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
In the description of the present application, it should be understood that the numerical references before the steps do not identify the order of performing the steps, but merely serve to facilitate the description of the present application and to distinguish each step, and therefore should not be construed as limiting the present application.
The following are explanations of terms referred to in the present application:
the Secure Shell (SSH) protocol is an encrypted network transmission protocol, and can provide a Secure transmission environment for network services in an unsecure network. An SSH connection refers to a connection established based on the SSH protocol.
The NETCONF protocol is a network management protocol based on XML (extensible markup language) and provides a programmable method for configuring and managing network devices.
WebSocket, a network transport protocol, can perform full duplex communication over a single TCP (transmission control protocol) connection, and is located at the application layer of the OSI (open system interconnection) model. WSS (Web Socket Secure) is an encrypted version of WebSocket.
The Secure Socket Layer (SSL), also called Secure communication Layer, is an encrypted Internet security protocol.
Fig. 1 schematically shows an environmental architecture diagram of an embodiment of the present application, as shown in the drawing:
the target network devices 400 are connected to the server 100 through the network 200, and the client 300 is connected to the server through the network 200. The user of the client 300 sends the configuration command of the target network device 400 to the server 100 through the client 300, the server 100 issues the received configuration command to the target network device 400, the target network device 400 returns a result to the server 100 based on the configuration command, and the server 100 returns the returned result to the client 300.
In an exemplary embodiment, the server 100 may index a data center, such as a single house, or be distributed over different geographic locations (e.g., over several houses). The server 100 may provide services through one or more networks 200.
Network 200 includes various network devices such as routers, switches, multiplexers, hubs, modems, bridges, repeaters, firewalls, proxy devices, and/or the like. Network 200 may include physical links such as coaxial cable links, twisted pair cable links, fiber optic links, combinations thereof, and/or the like. The network 200 may include wireless links, such as cellular links, satellite links, wi-Fi links, and/or the like.
The client 300 may include a device such as a mobile device, a tablet device, a laptop computer, a smart device (e.g., smart apparel, smart watch, smart glasses), a virtual reality headset, a gaming device, a set-top box, a digital streaming device, a robot, a vehicle terminal, a smart television, a television box, or an e-book reader.
Target network device 400 may include, but is not limited to, a router, switch, etc. network device.
In the related technology, only the switch supporting the NETCONF protocol can support the automatic issuing of the configuration, but the number of devices supporting the NETCONF protocol is small, and the switch not supporting the NETCONF protocol can be configured only in a manual mode, so that the efficiency is low and the configuration work of all switches cannot be completed at one time.
The network equipment configuration scheme of the embodiment of the application can improve the configuration efficiency of the switches and can complete the configuration work of all the switches at one time.
The network device configuration scheme will be introduced by several embodiments, and for ease of understanding, the server 100 will be exemplarily described as an implementation subject.
Example one
Fig. 2 schematically shows a flowchart of a network device configuration method according to an embodiment of the present application, including step S510 to step S530, which are specifically described as follows:
step S510, in response to a configuration request sent by the requester for configuring the target network device, establishing an SSH connection with the target network device, where N target network devices are N, and N is a positive integer.
The requesting party is, for example, the client 300 in fig. 1, and sends a configuration request to the server 100 under the input and control of the user of the client 300.
The server 100 receives the configuration request sent by the requester, and in a case that the configuration request is received, establishes an SSH connection between the server 100 and the target network device 400. Since the number of the target network devices 400 is a positive integer, the server 100 may establish an SSH connection with one target network device 400, or may establish an SSH connection with multiple target networks 400.
In order to ensure the security of the configuration of the target network device 400, the server 100 may check the configuration request, and in case of checking the security, the SSH connection between the server 100 and the target network device 400 is established again. In an exemplary embodiment, as shown in fig. 3, step S510 may include step S511 to step S512, where step S511 determines whether the configuration request is a legal request according to a preset verification manner when the configuration request sent by the requester is received, where the preset verification manner includes at least one of certificate verification, request timestamp verification, signature verification, and token verification; step S512, in case that the configuration request is determined to be a legal request, establishing an SSH connection with the target network device 400. The certificate check may specifically be an SSL client certificate check. The preset verification mode may include other verification modes besides the above verification mode, and may be specifically set according to actual needs, which is not limited herein. In this embodiment, the security of the configuration of the target network device 400 can be ensured by verifying the received configuration request and then establishing the SSH connection with the target network device 400 after the verification.
Step S520, receiving a first configuration command issued to the first network device, forwarding the received first configuration command to the first network device, and receiving a first result returned by the first network device based on the first configuration command, where the first network device is any one of the target network devices.
The first configuration command refers to a configuration command issued by a requester for the first network device. The requester may specify a plurality of target network devices 400 and the concurrency degree at a time, and may specify the order of issuing the configuration commands, so that the server 100 may issue the configuration commands according to the order specified by the user. When issuing the configuration command, the requesting party may issue the configuration command packet (i.e., the configuration command set) in the form of a configuration command packet, and after specifying the object to be issued, the requesting party may issue the configuration command packet. When receiving the configuration command, the server 100 forwards the configuration command to the corresponding target network device 400 according to the object specified by the configuration command. When the designated object is a target network device 400, the server 100 forwards the configuration command to the target network device 400; when the designated object is a target network device 400, the server forwards the configuration command to the target network device 400.
For example, the requester issues the configuration command to the switch of the manufacturer a according to a preset template, and configures the switch of the manufacturer a; the server 100, upon receiving the configuration command, forwards the configuration command to all switches of the "a vendor".
The first result is a result returned by the first network device for the first configuration command, that is, information returned by the first network device after configuration is performed according to the first configuration command.
In step S530, the received first result is returned to the requester.
Alternatively, the server 100 may, in a case that the first result is received, immediately return the received first result to the requester; or after receiving the first results of all the target network devices 400, return the first results of all the target network devices 400 to the requester, which may be specifically set according to actual needs, and is not limited here.
In the network device configuration method provided in this embodiment, an SSH connection with a target network device is established by responding to a configuration request sent by a requester; receiving a configuration command issued to any target network equipment, and forwarding the received configuration command to the corresponding target network equipment; then returning the received result returned by the target network equipment according to the configuration command to the requesting party, and realizing the configuration of the target network equipment in a mode of SSH protocol; because the target network equipment supports the SSH protocol mode, the configuration command is issued in the SSH connection mode, and the configuration issuing of all the target network equipment can be realized, so that the configuration of the network equipment (switch) of all projects can be completed at one time, and the configuration efficiency of the network equipment (switch) is improved.
In an exemplary embodiment, in step S512, the SSH connection with the target network device is established, as shown in fig. 4, the SSH connection may include steps S5121 to S5122, which are specifically as follows:
step S5121, receiving a second result returned by the target network device based on the SSH connection.
The second result is a result returned by the target network device 400 according to the SSH connection, that is, information returned by the target network device 400 after performing the SSH connection according to the SSH connection request of the server 100.
Step S5122, determining that the connection with the target network device is successful when the second result is received and the second result includes the first preset information.
Optionally, the server 100 may identify the second result when receiving the second result, and determine that the connection with the target network device 400 is successful when determining that the second result includes the first preset information. The first preset information may be information related to a connection success. Since the SSH connection generally results in a successful connection or a failure due to connection timeout, and the connection indicator is provided when the connection is successful, the first preset information may be the connection indicator, that is, in the case that the second result includes the connection indicator, it is determined that the connection with the target network device 400 is successful. When the server 100 identifies the second result, the second result may be identified by using a regular expression, and if the second result includes information matched with the regular expression, it is determined that the second result includes the first preset information.
Alternatively, if the second result is not received within the predetermined time or the second result does not include the first preset information, it is determined that the SSH connection with the target network device 400 is not successful.
It can be understood that, whether the connection with the target network device 400 is successful is determined according to whether the received second result includes the first preset information, and the connection state with the target network device 400 can be automatically determined, so that when the connection is successful, the server 100 can automatically issue the configuration command to the target network device 400, which is beneficial to automatically implementing the issue of the configuration according to a certain plan. For example, the requester may set a timing configuration plan, send the configuration command packet and the specified object to the server 100 in advance, establish SSH connection with the target network device 400 by the server 100 according to the timing time, and issue the configuration command to the target network device 400 when it is determined that the connection is successful.
In this embodiment, by receiving a second result returned by the target network device based on the SSH connection, it is determined that the target network device is successfully connected to the target network device when the second result is received and the second result includes the first preset information; because whether the connection with the target network equipment is successful or not can be determined according to whether the first preset information is included in the second result or not, the connection state with the target network equipment can be automatically determined, and therefore the automatic issuing of the configuration command is conveniently achieved.
In an exemplary embodiment, in step S520, the received first configuration command is forwarded to the first network device, as shown in fig. 5, including steps S521 to S522, which are specifically as follows:
step S521, sending a preset command to the first network device and receiving a third result returned by the first network device based on the preset command when it is determined that the connection with the first network device is successful.
The preset command may include, but is not limited to, an enter command for determining whether the first network device is ready to receive the configuration command in a state where the connection is successful.
The third result is a result returned by the first network device in response to the preset command, that is, information returned by the first network device in response to the preset command.
Step S522, in a case that the third result is received and the second preset information exists in the third result, forwarding the first configuration command to the first network device.
The server 100 may identify the third result when receiving the third result, determine that the first network device is ready to accept the configuration command when determining that the third result includes the second preset information, and forward the first configuration command to the first network device. The second preset information may be information related to a ready-to-receive command state. Since the target network device 400 returns information related to the command prompt according to the preset command when in a state of being ready to receive the command, the second preset information may be the command prompt, i.e. in case the third result includes the command prompt, it is determined that the first network device is ready to receive the configuration command. Similarly, when the server 100 identifies the third result, the regular expression may also be used to identify the third result, so as to determine whether the third result includes the second preset information.
Optionally, if the third result is not received within a predetermined time or the third result does not include the second preset information, it may be determined that the first network device is not prepared accordingly (for example, the current memory is insufficient).
It can be understood that, if the configuration command is issued without determining that the first network device is ready to receive the configuration command, the issued configuration command may not be executed because the first network device is not ready to receive the configuration command; in this embodiment, by sending the preset command to the first network device when the connection is successful, and forwarding the first configuration command to the first network device when the third result is received and the second preset information exists in the third result, the corresponding configuration command can be sent to the first network device when it is determined that the first network device is ready to receive the configuration command, so as to improve the efficiency of executing the configuration command; meanwhile, whether the first network equipment is ready for receiving the configuration command or not is determined according to whether the third result has the second preset information or not by sending the preset command, so that the command receiving state of the first network equipment can be automatically determined, and the configuration command can be automatically issued conveniently.
In an exemplary embodiment, the first configuration command includes a plurality of subcommands, and as shown in fig. 6, the network device configuration method may further include steps S610 to S630, which are specifically as follows:
step S610, forwarding the current sub-command to the first network device.
The sub-command is an independent configuration command in the first configuration command, for example, a command for configuring an IP address.
The first configuration command may particularly be in the form of a command list, in which a plurality of sub-commands is included. When the server 100 sends the first configuration command to the first network device, the sub-commands in the command list are forwarded one by one, and when the first network device completes the current sub-command, the next sub-command is sent to the first network device.
In step S620, in the case of receiving a first sub-result returned by the first network device based on the current sub-command, the first sub-result is identified to determine an execution completion status of the current sub-command.
In an exemplary embodiment, as shown in fig. 7, the identifying the first sub-result in step S620 to determine the execution completion status of the current sub-command may include steps S621 to S623, that is:
step S621, identify and determine whether the first sub-result includes a command prompt.
Likewise, the server 100 may also identify whether the first sub-result includes a command prompt according to a regular expression. In the case where the first sub-result includes a command prompt, this indicates that the first network device has responded to the current sub-command.
In step S622, in the case where it is determined that the command prompt is included in the first sub-result, the command echoing information in the first sub-result is extracted.
When the command playback information in the first sub-result is extracted, the server 100 may also extract through a regular expression, for example, corresponding information may be extracted through a "\ \ S + [ # > \\ \ S \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \.
Step S623, determining that the execution completion status of the current sub-command is execution failure when the command playback information includes error information, otherwise determining that the execution completion status of the current sub-command is execution success.
Specifically, if the command playback information includes error information, it indicates that the first network device fails to execute the current sub-command, and determines that the execution completion status of the current sub-command is execution failure; if the command playback information does not contain error information, the current sub-command is indicated to be executed and completed by the first network equipment, and the execution completion state of the current sub-command is determined to be successful.
In this embodiment, by identifying the first sub-result, under the condition that the first sub-result includes the command prompt, extracting the command echoing information in the first sub-result, and determining the execution completion state of the current sub-command according to the command echoing information, the automatic identification of the configuration command result can be implemented.
Step S630, when the execution state is successful, acquiring a next sub-command and forwarding the next sub-command to the first network device.
That is, under the condition that the current sub-command is successfully executed, the server 100 obtains the next sub-command in the first configuration command, and forwards the next sub-command to the first network device for execution.
In this embodiment, by forwarding the current sub-command in the first configuration command to the first network device, in the case of receiving a first sub-result returned by the first network device based on the current sub-command, identifying the first sub-result to determine an execution completion state of the current sub-command; and when the execution state is successful, acquiring the next sub-command and forwarding the next sub-command to the first network equipment, so that the server side can issue the configuration command on the basis of determining the execution completion state of the current sub-command, thereby realizing the automatic issuing of a plurality of configuration commands and improving the configuration efficiency.
In an exemplary embodiment, the network device configuration method may further include: and recording the request sent by the requester and the result returned by the target network equipment based on the request to form a configuration operation record.
The request sent by the requester may include, but is not limited to, ID of the requester, request time, request object, request configuration content, and the like. And the result returned by target network device 400 based on the request may include, but is not limited to, configuration specific content, configuration status information (success or failure), etc.
It can be understood that, by recording the request sent by the requester and the result returned by the target network device based on the request, the configuration of the target network device can be automatically stored conveniently, corresponding tracing can be performed conveniently, and the efficiency of configuration management can be improved.
In an exemplary embodiment, the first configuration command is issued through a standard configuration template, as shown in fig. 8, the network device configuration method may further include steps S710 to S720, which are specifically as follows:
step S710, obtain the current configuration of the target network device.
Step S720, comparing the current configuration with the standard configuration of the standard configuration template to determine whether the current configuration is consistent with the standard configuration.
The standard configuration may be preset according to actual situations, and is not limited herein. For configurations in which all target network devices 400 have the same value, the standard configuration may refer to a specific value, and when the values of the two are consistent, the two are determined to be consistent. The standard configuration may set a range of values for configurations with different values for different target network devices 400, and when a comparison is made, the target network device 400 may be determined to be consistent as long as it is determined that it belongs to the range of values for the standard configuration.
In this embodiment, by obtaining the current configuration of the target network device, and comparing the current configuration with the standard configuration of the standard configuration template, it can be determined whether the current configuration is consistent with the standard configuration, so as to quickly determine whether the configuration of the target network device is accurate and whether corresponding omission exists, thereby improving the efficiency of configuration management.
In order to more clearly describe the network device configuration method according to the embodiment of the present application, the following description is made by using a specific example.
Please refer to fig. 9, which is a flowchart illustrating a network device configuration method, the process is substantially as follows:
1. the user sends a configuration request to the target network device 400 through a front end (e.g., browser or APP);
2. the server 100 checks the authority of the request, if the request passes the check, the process enters 3, otherwise, the process is ended;
3. the server 100 establishes an SSH connection with the target network device 400;
4. reading the connection output of the target network device 400;
5. the server 100 identifies whether the connection prompt is included in the connection output, if not, the step 6 is entered, otherwise, the step 7 is entered;
6. determining whether the reading is overtime, if so, entering 11, otherwise, returning to 4;
7. the server 100 sends an enter command (i.e. a preset command);
8. the server 100 reads the command output returned by the target network device 400 according to the enter command;
9. the server 100 identifies whether the command output includes a command prompt, if not, 10 is entered, otherwise 12 is entered;
10. determining whether the reading is overtime, if so, entering 11, otherwise, returning 8;
11. the server 100 determines that the timeout failed;
12. the server 100 identifies the current host name of the target network device 400, and enters 13;
13. the server 100 traverses the command list of the configuration command, and if the command list is traversed, the process goes to 26, otherwise, the process goes to 14;
14. the server 100 sends the current configuration command of the command list to the target network device 400;
15. the server 100 reads the command output of the target network device 400 based on the current configuration command;
16. the server 100 identifies whether the command output includes a prompt, if so, the process goes to 17, otherwise, the process goes to 20;
17. the server 100 extracts the information of the command redisplay;
18. the server 100 identifies whether the information displayed back by the command includes error information, if not, returns to 13, otherwise, enters 19;
19. determining that the execution failed;
20. the server 100 identifies more prompts (which can be extracted by a formal expression through [ \ \ S \ S ] } Mm ] ore [ \ \ S \ S ] } -if more prompts are identified, then 21 is entered, otherwise 22 is entered;
21. the server 100 sends a space command (in response to more prompts, so that the target network device 400 may make corresponding command outputs), returning to 15;
22. the server 100 identifies a decision prompt (the decision prompt and more prompts are two different prompts), if the decision prompt is identified, the process goes to 23, otherwise, the process goes to 24;
23. the server 100 sends a decision command (for selecting a decision prompt so that the target network device 400 can perform corresponding command output), and returns to 15;
24. reading whether the time is overtime or not, if yes, returning to 15, and if not, entering 25;
25. failure to time out;
26. the execution is successful.
Example two
Fig. 10 schematically illustrates a block diagram of a network device configuration system 800 according to a second embodiment of the present application, where the network device configuration system 800 may be partitioned into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the second embodiment of the present application. The program modules referred to in the embodiments of the present application refer to a series of computer program instruction segments that can perform specific functions, and the following description will specifically describe the functions of each program module in the embodiments.
As shown in fig. 10, the network device configuration system 800 may include a front end 810, a configuration server 820, and a network device 830. It is understood that the configuration server 820 may correspond to the server 100 in fig. 1 and the network device 830 may correspond to the target network device 400 in fig. 1.
A front end 810, configured to send a configuration request and issue a configuration command to the network device 830;
the configuration server 820 is configured to receive the configuration request, forward the configuration command to the network device 830, receive a result returned by the network device 830 based on the configuration command, and return the received result to the front end 810;
the network device 830 is configured to receive the configuration command forwarded by the configuration server 820, and return a result to the configuration server 820 based on the configuration command.
In an exemplary embodiment, as shown in fig. 11, the configuration service 820 may include a task management module 821, a command service module 822, a terminal service module 823, and an SSH agent module 824.
A front end 810, configured to issue a configuration command in a batch mode or a terminal delivery mode;
the task management module 821 is configured to receive a configuration command issued by the front end 810 in the batch mode, create a task according to the configuration command, submit the task to the command service module 822 according to a predetermined time to execute the task, and monitor and store a state and a result of the task;
the command service module 822 is used for splitting, scheduling and executing the configuration command in the task according to the task, and analyzing the result returned by the SSH agent module 824;
the terminal service module 823 is configured to receive a configuration command issued by the front end 810 in the terminal handing mode, and forward the configuration command to the SSH agent module 824;
the SSH agent module 824 is configured to receive the configuration command sent by the command service module 822 or the terminal service module 823, forward the configuration command to the network device 830, and forward a result returned by the network device 830 to the command service module 822 or the terminal service module 823.
Please refer to fig. 12, which is a diagram illustrating a network device configuration system 800. As shown in the figure:
front end (i.e., front end 810): specifically, a platform page for configuring issuing operation and management can be configured for a user, the user initiates the configuration issuing operation in the platform page, and two different issuing modes are supported: the task mode supports batch configuration and issuing; the second is a terminal mode, which supports interactive configuration and issue; meanwhile, the user can check the configuration issuing state and result in the platform page, and perform management operations such as failure retry and the like.
Task management (i.e., task management module 821): the management module of the task mode provides functions of creating tasks, monitoring and storing task states and results, scheduling tasks, inquiring task information and the like, and specific configuration discovery is realized by submitting to a command service (namely a command service module 822) through an HTTPS protocol.
Command service (i.e., command service Module 822): the module for splitting, scheduling, executing and result analyzing the specific configuration command interacts with the SSH agent (i.e., the SSH agent module 824) in real time through the WSS protocol to issue the single configuration command.
Terminal services (i.e., terminal services module 823): and the management module of the terminal mode provides functions of establishing a terminal, establishing connection with the SSH agent, forwarding a configuration command and a configuration result and the like.
SSH proxy (i.e., SSH proxy module 824): the SSH connection is established with the switch (i.e., the network device 830), the configuration issued command sent by the command service and the terminal service through the WSS protocol is forwarded to the SSH connection with the switch, and the returned result in the SSH connection with the switch is read and returned to the command service and the terminal service through the WSS protocol.
It should be noted that the configuration server 100 may include a server and a container in the figure, and the container may be a server different from the server in the figure.
In an exemplary embodiment, the SSH proxy module 824 is further configured to: under the condition of receiving a configuration request sent by a requesting party (namely, a front end 810), determining whether the configuration request is a legal request according to a preset verification mode, wherein the preset verification mode comprises at least one of certificate verification, request timestamp verification, signature verification and token verification; in the event that the configuration request is determined to be a legitimate request, an SSH connection is established with network device 830.
Please further refer to fig. 13, which is a schematic diagram illustrating the SSH proxy module 824, and as shown in the figure, the SSH proxy module 824 may specifically be configured to:
1. and (4) permission verification: verifying whether the received request is a legal request, and sequentially performing SSL client certificate verification, request timestamp verification, signature verification and Token verification;
2. establishing connection: establishing an SSH connection with the switch (i.e., network device 830) according to the switch specified in the request;
3. the request agent: and transmitting the received configuration issuing command request to the SSH connection of the switch in real time through the WSS protocol, reading a return result in the SSH connection of the switch, returning the return result to the requesting party through the WSS protocol in real time, and recording the request and the result into a file for operation audit during transmission.
In an exemplary embodiment, the SSH proxy module 824 is further configured to: receiving a second result returned by the network device 830 based on the SSH connection; in a case where the second result is received and the second result includes the first preset information, it is determined that the connection with the network device 830 is successful.
In the exemplary embodiment, configuration server 820 is further configured to: under the condition that the connection with the first network equipment is determined to be successful, sending a preset command to the first network equipment, and receiving a third result returned by the first network equipment based on the preset command; and forwarding the first configuration command to the first network device if the third result is received and the second preset information exists in the third result, wherein the first network device is any one of the network devices 830.
In an exemplary embodiment, the configuration command includes several subcommands, and the configuration server 820 is further configured to: forwarding the current sub-command to the first network device; under the condition that a first sub-result returned by the first network equipment based on the current sub-command is received, identifying the first sub-result to determine the execution completion state of the current sub-command; and under the condition that the execution state is successful, acquiring a next sub-command and forwarding the next sub-command to the first network equipment.
In the exemplary embodiment, the configuration server 820 is further configured to: identifying and determining whether a command prompt is included in the first sub-result; under the condition that the command prompt is determined to be included in the first sub-result, command echoing information in the first sub-result is extracted; and under the condition that the command echoing information contains error information, determining that the execution completion state of the current sub-command is execution failure, otherwise, determining that the execution completion state of the current sub-command is execution success.
In the exemplary embodiment, the configuration server 820 is further configured to: the requests sent by the front end 810 and the results returned by the network device 830 based on the requests are recorded to form a configuration operation record.
In an exemplary embodiment, the configuration command is issued through a standard configuration template, and the configuration server 820 is further configured to: obtaining a current configuration of the network device 830; the current configuration is compared to the standard configuration of the standard configuration template to determine whether the current configuration is consistent with the standard configuration.
EXAMPLE III
Fig. 14 schematically shows a hardware architecture diagram of a computer device 900 adapted to the network device configuration method according to the third embodiment of the present application. The computer device 900 may be a device capable of automatically performing numerical calculations and/or data processing according to instructions set or stored in advance. For example, the server may be a rack server, a blade server, a tower server or a cabinet server (including an independent server or a server cluster composed of a plurality of servers), a gateway, and the like. As shown in fig. 14, computer device 900 includes at least, but is not limited to: the memory 910, processor 920, and network interface 930 may be communicatively linked to each other via a system bus. Wherein:
the memory 910 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 910 may be an internal storage module of the computer device 900, such as a hard disk or a memory of the computer device 900. In other embodiments, the memory 910 may also be an external storage device of the computer device 900, such as a plug-in hard disk provided on the computer device 900, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Of course, the memory 910 may also include both internal and external memory modules of the computer device 900. In this embodiment, the memory 910 is generally used for storing an operating system and various application software installed in the computer device 900, such as program codes of a network device configuration method. In addition, the memory 910 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 920 may be, in some embodiments, a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor, or other data Processing chip. The processor 920 is generally configured to control overall operations of the computer device 900, such as performing control and processing related to data interaction or communication with the computer device 900. In this embodiment, the processor 920 is configured to execute program codes stored in the memory 910 or process data.
Network interface 930 may include a wireless network interface or a wired network interface, and network interface 930 is typically used to establish communication links between computer device 900 and other computer devices. For example, the network interface 930 is used to connect the computer apparatus 900 to an external terminal through a network, establish a data transmission channel and a communication link between the computer apparatus 900 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Internet), the Internet (Internet), a Global System of Mobile communication (GSM), wideband Code Division Multiple Access (WCDMA), 4G network, 5G network, bluetooth (Bluetooth), wi-Fi (wireless fidelity), or the like.
It is noted that FIG. 14 only shows a computer device having components 910-930, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the network device configuration method stored in the memory 910 may also be divided into one or more program modules, and executed by one or more processors (in this embodiment, the processor 920) to complete the embodiments of the present application.
Example four
Embodiments of the present application also provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the network device configuration method in the embodiments.
In this embodiment, the computer-readable storage medium includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the computer readable storage medium may be an internal storage unit of the computer device, such as a hard disk or a memory of the computer device. In other embodiments, the computer readable storage medium may be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device. Of course, the computer-readable storage medium may also include both internal and external storage devices of the computer device. In this embodiment, the computer-readable storage medium is generally used for storing an operating system and various types of application software installed in the computer device, for example, the program code of the network device configuration method in the embodiment, and the like. In addition, the computer-readable storage medium may also be used to temporarily store various types of data that have been output or are to be output.
It should be obvious to those skilled in the art that the modules or steps of the embodiments of the present application described above can be implemented by a general-purpose computing device, they can be centralized on a single computing device or distributed on a network composed of a plurality of computing devices, alternatively, they can be implemented by program code executable by the computing device, so that they can be stored in a storage device and executed by the computing device, and in some cases, the steps shown or described can be executed in a sequence different from that shown or described, or they can be separately manufactured as individual integrated circuit modules, or a plurality of modules or steps in them can be manufactured as a single integrated circuit module. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (12)

1. A network device configuration method, comprising:
responding to a configuration request sent by a requester for configuring target network equipment, and establishing SSH connection with the target network equipment, wherein the number of the target network equipment is N, and N is a positive integer;
receiving a first configuration command issued to first network equipment, forwarding the received first configuration command to the first network equipment, and receiving a first result returned by the first network equipment based on the first configuration command, wherein the first network equipment is any one of the target network equipment;
returning the received first result to the requestor.
2. The network device configuration method of claim 1, wherein the establishing an SSH connection with the target network device in response to the configuration request sent by the requester comprises:
under the condition that the configuration request sent by the requester is received, determining whether the configuration request is a legal request according to a preset verification mode, wherein the preset verification mode comprises at least one of certificate verification, request timestamp verification, signature verification and token verification;
and under the condition that the configuration request is determined to be a legal request, establishing SSH connection with the target network equipment.
3. The network device configuration method of claim 2, wherein the establishing an SSH connection with the target network device comprises:
receiving a second result returned by the target network equipment based on the SSH connection;
and determining that the connection with the target network equipment is successful under the condition that the second result is received and comprises first preset information.
4. The network device configuration method of claim 3, wherein forwarding the received first configuration command to the first network device comprises:
under the condition that the connection with the first network equipment is determined to be successful, sending a preset command to the first network equipment, and receiving a third result returned by the first network equipment based on the preset command;
and forwarding the first configuration command to the first network equipment under the condition that the third result is received and second preset information exists in the third result.
5. The network device configuration method of claim 1, wherein the first configuration command comprises a number of subcommands, and wherein the method further comprises:
forwarding the current sub-command to the first network device;
in the case of receiving a first sub-result returned by the first network device based on the current sub-command, identifying the first sub-result to determine an execution completion status of the current sub-command;
and under the condition that the execution state is successful, acquiring the next subcommand and forwarding the next subcommand to the first network equipment.
6. The network device configuration method of claim 5, wherein the identifying the first sub-result to determine the execution completion status of the current sub-command comprises:
identifying and determining whether a command prompt is included in the first sub-result;
under the condition that the first sub-result comprises a command prompt, extracting command echoing information in the first sub-result;
and under the condition that the command echoing information contains error information, determining that the execution completion state of the current sub-command is execution failure, otherwise, determining that the execution completion state of the current sub-command is execution success.
7. The network device configuration method of any of claims 1-6, further comprising:
and recording the request sent by the requester and the result returned by the target network equipment based on the request to form a configuration operation record.
8. The network device configuration method of any one of claims 1-6, wherein the first configuration command is issued through a standard configuration template, the method further comprising:
acquiring the current configuration of the target network equipment;
comparing the current configuration to a standard configuration of the standard configuration template to determine whether the current configuration is consistent with the standard configuration.
9. A network device configuration system, comprising:
the front end is used for sending a configuration request and issuing a configuration command to the network equipment;
the configuration server is used for receiving the configuration request, forwarding the configuration command to the network equipment, receiving a result returned by the network equipment based on the configuration command, and returning the received result to the front end;
the network device is configured to receive the configuration command forwarded by the configuration server, and return the result to the configuration server based on the configuration command.
10. The network device configuration system of claim 9, wherein the configuration server comprises a task management module, a command service module, a terminal service module and an SSH agent module;
the front end is used for issuing the configuration command through a batch mode or a terminal switching mode;
the task management module is used for receiving the configuration command issued by the front end through a batch mode, creating a task according to the configuration command, submitting the task to the command service module according to preset time to execute the task, and monitoring and storing the state and the result of the task;
the command service module is used for splitting, scheduling and executing the configuration command in the task according to the task and analyzing a result returned by the SSH agent;
the terminal service module is used for receiving the configuration command issued by the front end through a terminal delivery mode and forwarding the configuration command to the SSH agent module;
the SSH proxy module is configured to receive the configuration command issued by the command service module or the terminal service module, forward the configuration command to the network device, and forward a result returned by the network device to the command service module or the terminal service module.
11. A computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor is adapted to carry out the steps of the network device configuration method of any of claims 1 to 8 when executing the computer program.
12. A computer-readable storage medium, having stored thereon a computer program, the computer program being executable by at least one processor to cause the at least one processor to perform the steps of the network device configuration method of any one of claims 1 to 8.
CN202211276735.8A 2022-10-18 2022-10-18 Network equipment configuration method and system Pending CN115604095A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211276735.8A CN115604095A (en) 2022-10-18 2022-10-18 Network equipment configuration method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211276735.8A CN115604095A (en) 2022-10-18 2022-10-18 Network equipment configuration method and system

Publications (1)

Publication Number Publication Date
CN115604095A true CN115604095A (en) 2023-01-13

Family

ID=84849518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211276735.8A Pending CN115604095A (en) 2022-10-18 2022-10-18 Network equipment configuration method and system

Country Status (1)

Country Link
CN (1) CN115604095A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506291A (en) * 2023-06-28 2023-07-28 章和技术(广州)有限公司 Method and device for analyzing configuration content of network equipment of power system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506291A (en) * 2023-06-28 2023-07-28 章和技术(广州)有限公司 Method and device for analyzing configuration content of network equipment of power system
CN116506291B (en) * 2023-06-28 2023-09-05 章和技术(广州)有限公司 Method and device for analyzing configuration content of network equipment of power system

Similar Documents

Publication Publication Date Title
CN111490893B (en) Method, device and system for establishing network forwarding model
CN110119350B (en) Software development kit testing method, device and equipment and computer storage medium
CN112988485A (en) Simulation test method and device for power Internet of things equipment
US10833914B2 (en) Device or vendor independent network switch management via embedded management controller stack
US20230161541A1 (en) Screen projection method and system
US20220191279A1 (en) IoT Device Data Management Method, Apparatus, and System
CN111104139A (en) Firmware upgrading method, device, equipment and storage medium
CN112437047A (en) Remote server management method, system and related device
CN113312064A (en) Installation configuration method and device of physical machine and computer readable medium
CN110661673B (en) Heartbeat detection method and device
CN112395187A (en) Test method, test system, computer device and storage medium
CN115604095A (en) Network equipment configuration method and system
WO2022033079A1 (en) Pico base station configuration method and apparatus, and storage medium and electronic apparatus
CN111181781A (en) Vdbench test configuration method, system, terminal and storage medium
CN110198222A (en) A kind of distribution power automation terminal plug and play test method and test main website
CN113364820A (en) Equipment control method and device of Internet of things service system
CN114490746B (en) Equipment testing method and device, equipment to be tested and storage medium
CN113726813B (en) Network security configuration method, device and storage medium
CN114416420A (en) Equipment problem feedback method and system
CN111338642A (en) Method, device, terminal and storage medium for determining application downloading path
US11967225B2 (en) Method and apparatus for implementing video click based on bluetooth device
CN113193987B (en) Equipment control method and device
CN116980286A (en) Device configuration method, device control method, storage medium, and terminal
US8880713B2 (en) System and methods for use in communicating with an energy management device in an energy device network
CN116610587A (en) Automatic test method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination