CN1318998C - Method for accessing computer provided with proxy server into network - Google Patents

Method for accessing computer provided with proxy server into network Download PDF

Info

Publication number
CN1318998C
CN1318998C CNB031374875A CN03137487A CN1318998C CN 1318998 C CN1318998 C CN 1318998C CN B031374875 A CNB031374875 A CN B031374875A CN 03137487 A CN03137487 A CN 03137487A CN 1318998 C CN1318998 C CN 1318998C
Authority
CN
China
Prior art keywords
computer user
message
address
acting server
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031374875A
Other languages
Chinese (zh)
Other versions
CN1567283A (en
Inventor
沈宁国
顾勤丰
唐周和
熊苏学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031374875A priority Critical patent/CN1318998C/en
Publication of CN1567283A publication Critical patent/CN1567283A/en
Application granted granted Critical
Publication of CN1318998C publication Critical patent/CN1318998C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a method for accessing a computer for which a proxy server is configured to a network, which solves the problem that when the user of the computer for which a proxy server is configured is accessed to the network, the configured proxy server may be accordingly changed into being incapable of being accessed. The method leads to that when the user of the computer for which the proxy server is configured is accessed to the network, the destination address and the port of an uploaded message are replaced as the address and the port of an accessible proxy server, and simultaneously, the check sum of the message is modified; the source address and the port of a downloaded message are accordingly replaced as the address and the port of the originally configured proxy server of the computer user, and simultaneously, the check sum of the message is modified.

Description

A kind of method that has disposed the computing machine access network of acting server
Technical field
The present invention relates to network access technique, relate to a kind of method that has disposed the computing machine access network of acting server (Proxy Server) or rather.
Background technology
In the present network, require the network configuration of the computing machine of access network must meet corresponding requirement usually.When computing machine is transferred in other networks, need to revise network configuration or need apply for the IP address again.Computer user's use for convenience in the time of in transferring to new network, does not need to change the network configuration that inserts computing machine and just can normally use, and similarly is in original network, so plug and play technique occurred.In present network, many computer users have disposed acting server, when accesses network, earlier acting server are issued in request, go to carry out these request and accesses network by acting server, then the visit result are sent to the computer user.But, in the prior art, usually require computer user's network configuration must meet the corresponding requirements of institute's access network, when acting server that computing machine disposed does not meet the network that is inserted, the acting server that is disposed needs to revise the network configuration of this computing machine this moment with regard to inaccessible.For example shown in Figure 1, computer user 1 has disposed acting server A in network A, and by this acting server A access network based on ethernet, when computer user's transfer is linked in the network B, acting server A is invisible for computer user 1, the acting server that is to say computer user's 1 configuration does not meet network B, at this moment, must revise computer user's network configuration, remove the acting server that is disposed or reconfigure an available acting server, just can carry out normal network communication.
Therefore, the technical matters that prior art exists is: when the computer user who has disposed acting server is linked in the network, the acting server that is disposed may correspondingly become inaccessible, the computer user who has promptly disposed acting server can not realize plug and play when being linked into network, the computer user just needs to revise network configuration like this, uses very inconvenient.
Summary of the invention
The purpose of this invention is to provide a kind of method that has disposed the computing machine access network of acting server, plug and play when being linked into network with the computer user who realizes having disposed acting server, the computer user does not need to change the setting of acting server, just can carry out normal network communication.
The object of the present invention is achieved like this: a kind of method that has disposed the computing machine access network of acting server is characterized in that this method comprises:
A, intercept and capture the request message that the computer user uploads,, judge whether this computer user has disposed acting server by resolving the data content of this request message by access device;
If b computer user has disposed acting server, then revise the parameter of this computer user parameter of uploading message and the message that reaches this computer user down or revise this computer user's network configuration parameters, according to amended parameter message transmission.
When revising the parameter of described the computer user parameter of uploading message and the message that reaches this computer user down, described step b may further comprise the steps:
2a, on the access device of network pre-configured one available acting server;
2b, upload in the message process: the destination address of all messages that access device is uploaded the computer user subsequently and address and the port that port replaces with above-mentioned available acting server, revise simultaneously these messages verification and;
2c, upload amended message among the step 2b;
2d, pass in the message process down: access device is intercepted and captured the message that above-mentioned available agent server passes down to the computer user who has disposed acting server, the source address of this message and port are replaced with the address and the port of the acting server of computer user's configuration, revise simultaneously this message verification and;
2e, will pass to the computer user under the amended message among the step 2d.
Configuration available agent server comprises on access device: with domain name and port arrangement available agent server or with IP address and port arrangement available agent server.
If on access device,, then at first will be resolved to the IP address of the available agent server domain name that disposes by name server with the form configuration available agent server of domain name and port.
If the computer user has disposed illegal computer user's address information, then further comprising the steps of in step 2b:
2b ', access device are discerned the user according to computer user's MAC Address, perhaps discern the user according to computer user's VLAN ID and MAC Address, correspondingly regenerate legal computer user's address information, and replace corresponding illegal address information in the described message;
In step 2d, also should may further comprise the steps:
The legal computer user address information that 2d ', access device are replaced message according to the original illegal address information of user.
The described computer user's Configuration Agent server that has disposed acting server comprises: with domain name and port arrangement acting server or with IP address and port arrangement acting server.
If the computer user is then further comprising the steps of before step a with the form Configuration Agent server of domain name and port:
7a, the IP address of domain name that has disposed computer user's acting server that it is disposed to the name server request of acting server;
If the 7b name server does not search the IP address of domain name described in the step 7a, then respond the domain name mapping message that reports an error to the computer user, after access device intercepts this message, re-construct domain name mapping deception message, by this domain name mapping deception message, give the computer user as the IP address response of the acting server that the computer user disposed with the IP address of above-mentioned available agent server; Otherwise, can respond the IP address of this domain name that searches to the computer user by the domain name mapping message.
If the acting server of computer user's configuration transmits message according to Transmission Control Protocol, and is then further comprising the steps of before step a:
8a, the computer user who has disposed acting server send to the acting server that is disposed and set up the handshake message that TCP connects;
8b, access device are intercepted and captured the handshake message that the computer user sends, and the acting server that the direct analogy computer user is disposed is beamed back to the computer user and answered message, connect to set up TCP;
After 8c, computer user receive the back message using that passes under the access device, upload confirmation message for the acting server that the computer user disposed, the TCP successful connection is set up.
If the acting server of computer user configuration transmits message according to Transmission Control Protocol, then after step 7b, further comprising the steps of before the step a:
9a, the computer user who has disposed acting server send to the acting server that is disposed and set up the handshake message that TCP connects;
9b, access device are intercepted and captured the handshake message that the computer user sends, and the acting server that the direct analogy computer user is disposed is beamed back to the computer user and answered message, connect to set up TCP;
After 9c, computer user receive the back message using that passes under the access device, upload confirmation message for the acting server that the computer user disposed, the TCP successful connection is set up.
The acting server that described access device direct analogy computer user is disposed is beamed back the step of answering message to the computer user: access device is directly constructed a back message using and is given the computer user, the source address of this back message using is filled out the destination address into described handshake message, and destination address is filled out the address into the computer user.
When revising described computer user's network configuration parameters, described step b is further comprising the steps of:
11a, directly pass the software that can revise computer user's network configuration parameters down to the computer user, software modification computer user's network configuration parameters thus, cancellation computer user's agency is provided with;
11b, computer user are after leaving access device or after restarting computing machine, and software does not rerun, and computer user's network configuration reverts to original configuration immediately.
The present invention has realized having disposed the plug and play of computer user when being linked into network of acting server, make the computer user not need to change the setting of acting server, just can carry out normal network communication, greatly make things convenient for computer user's use, improve the efficient of work.
Description of drawings
Fig. 1 is linked into the network of network structural drawing for the computer user;
Fig. 2 is that computer user's IP address, gateway address and acting server configuration is all illegal, and the process flow diagram of computer user's accesses network during with IP address and port arrangement acting server;
Fig. 3 is that computer user's IP address, gateway address, name server and acting server is all illegal, and the process flow diagram of computer user's accesses network during with domain name and port arrangement acting server.
Embodiment
Further specify implementation method of the present invention below in conjunction with the drawings and specific embodiments.
Core concept of the present invention is: during message through access equipment that the computer user uploads, access device judges by message whether the computer user has disposed acting server, if then realize plug and play by the related parameter that has of revising this computer user.The disposal route that related parameter is arranged of revising this computer user is pre-configured one an available acting server on access device, when the computer user who has disposed acting server is linked into network, no matter whether the acting server of its configuration is available, the message that the computer user sends is by access device the time, the destination address of this message and port all will be replaced by the address and the port of this available acting server, revise simultaneously message check and; And this available acting server is responded the message to the computer user, through access device the time, the address and the port of the acting server that the source address of this message and port are replaced by the computer user accordingly and are disposed, need simultaneously to revise message verification and.Like this, the computer user just can not revise generation of computers reason server setting and can normally use
Access device described herein is a kind of access device of supporting acting server.Available acting server can be independent of outside the access device physically, also can be integrated within the access device, but logically with the common access device that constitutes a support acting server of access device.
The access device server of can doublely acting as agent, that is: acting server is built in the access device, and access device is realized the function of acting server with a software module.Like this, recognizing after the computer user disposed acting server, the message (as: HTTP request message) of the needs agency's that the computer user is sent accesses network is given built-in proxy modules and is handled.
The form of configuration available agent server comprises on access device: with domain name and port arrangement available agent server or with IP address and port arrangement available agent server.If during with the form of domain name and port configuration available agent server, then access device must be supported domain name server parses function, and at first will be resolved to the IP address of the domain name that is disposed by name server on access device.If acting server and access server are same equipment, then give tacit consent to the address of this acting server and port and be the address and the port of available acting server.
The present invention supports various acting servers, as: HTTP (HTTP, HypertextTransfer Protocol) acting server, Secure agency by agreement server, telefile host-host protocol (FTP, File Transfer Protocol) acting server, Gopher agency by agreement server and Socks agency by agreement server etc.Be that example is set forth concrete realization flow with the http proxy server that transmits message according to Transmission Control Protocol below.
Computer user's Configuration Agent server has two kinds of forms: a kind of by IP address and port arrangement acting server; Another kind of by domain name and port arrangement acting server, below introduce respectively.
Embodiment one: for the method for coming computer user's access network of Configuration Agent server by the form of IP address and port.
As shown in Figure 1, computer user 1 and computer user 2 are in network A, computer user 3 is in network B, the acting server that computer user 1 and computer user 2 are disposed is acting server A, because acting server B is available for the computer user in the network B, therefore access device B goes up address and the port of pre-configured acting server B, address and the port of supposing the acting server A that computer user 1 disposes herein are (1.1.1.1:8080), the address of acting server B and port are (2.2.2.2:1000), and computer user 1 IP address is (10.0.0.10).When computer user's 1 transfer was linked in the network B, computer user 1 IP address, gateway address and acting server configuration all became illegal.As shown in Figure 2, the process of computer user's 1 accesses network may further comprise the steps:
A, computer user 1 send to acting server A and set up the handshake message that TCP connects, and the source address of this message is computer user 1 address (10.0.0.10), and destination address then is the address (1.1.1.1) of acting server A;
B, access device B intercept and capture the handshake message that computer user 1 sends, and simulation acting server A passes back for 1 time for the computer user to answer message;
In this step: behind the handshake message that access device B intercepting and capturing computer user 1 sends, this message is not uploaded to acting server A, respond to computer user 1 but directly construct a message, the source address of message is filled out and is that the address of acting server A (1.1.1.1), destination address fill out and is computer user 1 address (10.0.0.10);
After c, computer user 1 receive the back message using that passes under the access device B, upload confirmation message for acting server A, this moment, computer user 1 thought that successfully having set up TCP with acting server A is connected, and sent the HTTP request message immediately;
In computer user 1, be successfully to have set up TCP with acting server A to be connected, be actually between computer user 1 and the access device B and set up the TCP connection.
D, access device B intercepts and captures the HTTP request message described in the step c, by resolving the data content of this HTTP request message, can know whether computer user 1 has disposed acting server, disposed acting server if find this user, then all HTTP messages of uploading subsequently of this user are by access device the time, the destination address of this HTTP message and port (1.1.1.1:8080) all are replaced by address and the port (2.2.2.2:1000) of acting server B, and according to computer user 1 MAC Address mark as identification computer user 1, perhaps according to VLAN ID and MAC Address mark as identification computer user 1, regenerate legal users IP address and gateway address, replace computer user's 1 original IP address and gateway address, revise simultaneously this HTTP message verification and, upload amended HTTP message then and give acting server B;
E, acting server B have received after computer user 1 the HTTP message, substituting for computer user 1 visit Internet, and receiving computer user 1 data of being asked, by back message using the data of computer user's 1 request are issued computer user 1 then;
F, access device B intercept and capture the back message using described in the step e, address and port (1.1.1.1:8080) that the source address and the port (2.2.2.2:1000) of this back message using replaced with acting server A, and the legitimate ip address and the gateway address that regenerate replace with computer user's 1 original IP address and gateway address, revise simultaneously back message using verification and, will pass to computer user 1 under the amended back message using then.
Embodiment two: for the method for coming computer user's access network of Configuration Agent server by the form of domain name and port.
As shown in Figure 1, computer user 1 and computer user 2 are in network A, computer user 3 is in network B, the acting server that computer user 1 and computer user 2 are disposed is acting server A, because acting server B is available for the computer user in the network B, so the last pre-configured acting server B of access device B, this sentences the form Configuration Agent server B of domain name and port, in this case, access device must support region name analysis function.Domain name and the port of supposing the acting server A that computer user 1 disposes are (proxya.huawei.com:8080), the domain name of acting server B and port are (proxyb.huawei.com:1000), and computer user 1 address is (10.0.0.10).When computer user's 1 transfer was linked in the network B, computer user 1 IP address, gateway address, name server and acting server all became illegal.As shown in Figure 3, the process of computer user's 1 accesses network may further comprise the steps:
A, access device are resolved to the IP address of acting server B domain name by name server, are assumed to be (2.2.2.2) herein;
B, computer user 1 are to the IP address of the domain name of name server upload request message request acting server A;
C, access device are intercepted and captured the request message described in the step b, according to computer user 1 MAC Address mark as identification computer user 1, perhaps according to VLAN ID and MZC address mark as identification computer user 1, regenerate legal domain name server address, replace the illegal domain name server address in this message, and amended request message is uploaded to the real name server of network B.
D, judge whether name server searches the IP address of the domain name of acting server A.
If name server does not search the IP address of the domain name of acting server A, then:
D1, name server will be responded the domain name mapping error message to computer user 1, after access device B intercepts this message, re-construct domain name mapping deception message, the address (2.2.2.2) of acting server B is responded to computer user 1 by this domain name mapping deception message as the IP address of acting server A.At this moment, the IP address of the acting server A after the parsing and port are (2.2.2.2:8080);
D2, computer user 1 send to acting server A and set up the handshake message that TCP connects, the source address of this handshake message is computer user 1 address (10.0.0.10), the address (2.2.2.2) of the acting server A that destination address is then thought for computer user 1;
D3, access device B intercept and capture the handshake message that computer user 1 sends, and simulation acting server A passes back for 1 time for the computer user to answer message;
In this step: behind the handshake message that access device B intercepting and capturing computer user 1 sends, this handshake message is not uploaded to acting server A, respond to computer user 1 but directly construct a message, the source address of this back message using is filled out and is that the address of acting server A (2.2.2.2), destination address fill out and is computer user 1 address (10.0.0.10).
After d4, computer user 1 receive the back message using that passes under the access device B, upload confirmation message for acting server A, this moment, computer user 1 thought that successfully having set up TCP with acting server A is connected, and sent the HTTP request message immediately;
In computer user 1, be successfully to have set up TCP with acting server A to be connected, be actually between computer user 1 and the access device B and set up the TCP connection.
D5, access device B intercepts and captures steps d 4 described HTTP request messages, by resolving the data content of this HTTP request message, can know whether computer user 1 has disposed acting server, if find that the user has disposed acting server, then all HTTP messages of uploading subsequently of user are by access device the time, the destination address of these HTTP messages and port (2.2.2.2:8080) all are replaced by address and the port (2.2.2.2:1000) of acting server B, and according to computer user 1 MAC Address mark as identification computer user 1, perhaps according to VLAN ID and MAC Address mark as identification computer user 1, regenerate legal users IP address and gateway address, replace computer user's 1 original IP address and gateway address, revise simultaneously the HTTP message verification and, upload amended HTTP message then and give acting server B;
D6, acting server B have received after computer user 1 the HTTP message, substituting for computer user 1 visit Internet, and receiving computer user 1 data of being asked, by back message using the data of computer user's 1 request are issued computer user 1 then.
D7, access device B intercept and capture the back message using described in the steps d 6, address and port (2.2.2.2:8080) that the source address and the port (2.2.2.2:1000) of this back message using replaced with acting server A, and the legitimate ip address and the gateway address that regenerate replace with computer user's 1 original IP address and gateway address, revise simultaneously message verification and, will pass to computer user 1 under the amended back message using then.
If name server searches the IP address of the domain name of acting server A, be assumed to be (1.1.1.1), then:
D1 ', name server will be responded the IP address of the domain name of acting server A to computer user 1 by the domain name mapping message, and in this case, access device B does not carry out the domain name mapping deception.
D2 ', computer user 1 send to acting server A and set up the handshake message that TCP connects, and the source address of message is computer user 1 address (10.0.0.10), and destination address then is the address (1.1.1.1) of acting server A;
D3 ', access device B intercept and capture the handshake message that computer user 1 sends, and simulation acting server A passes back for 1 time for the computer user to answer message;
In this step: behind the handshake message that access device B intercepting and capturing computer user 1 sends, this handshake message is not uploaded to acting server A, respond to computer user 1 but directly construct a message, the source address of message is filled out and is that the address of acting server A (1.1.1.1), destination address fill out and is computer user 1 address (10.0.0.10);
After d4 ', computer user 1 receive the back message using that passes under the access device B, upload confirmation message for acting server A, this moment, computer user 1 thought that successfully having set up TCP with acting server A is connected, and sent the HTTP request message immediately;
In computer user 1, be successfully to have set up TCP with acting server A to be connected, be actually between computer user 1 and the access device B and set up the TCP connection.
D5 ', access device B intercepts and captures the HTTP request message described in the steps d 4 ', by resolving the data content of this HTTP request message, can know whether computer user 1 has disposed acting server, if find that computer user 1 has disposed acting server, then all HTTP messages of uploading subsequently of computer user 1 are by access device the time, the destination address of these HTTP messages and port (1.1.1.1:8080) all are replaced by address and the port (2.2.2.2:1000) of acting server B, and according to computer user 1 MAC Address mark as identification computer user 1, perhaps according to VLAN ID and MAC Address mark as identification computer user 1, regenerate legal users IP address and gateway address, replace computer user's 1 original IP address and gateway address, revise simultaneously the HTTP message verification and, upload amended HTTP message then and give acting server B;
D6 ', acting server B have received after computer user 1 the HTTP message, substituting for computer user 1 visit Internet, and receiving computer user 1 data of being asked, by back message using the data of computer user's 1 request are issued computer user 1 then.
D7 ', access device B intercept and capture the back message using described in the steps d 6 ', address and port (1.1.1.1:8080) that the source address and the port (2.2.2.2:1000) of this back message using replaced with acting server A, and the legitimate ip address and the gateway address that regenerate replace with computer user's 1 original IP address and gateway address, revise simultaneously message verification and, will pass to computer user 1 under the amended message then.
More than two embodiment all be the situation that the computer user has disposed illegal IP address, illegal gateway address or illegal name server (user oneself configuration).When the computer user has disposed legal IP address, (can pass through DHCP (DHCPDynamic Host Configuration Protocol) obtains for legal gateway address or legal name server, also can user oneself configuration) time, implementation step is similar with the step of above-mentioned two embodiment, only in the process of uploading and descending to pass, access device can not regenerate legal users IP address, gateway address or domain name server address, can not replace corresponding IP address yet, gateway address or domain name server address, and the address of just replacing acting server.
In order to realize purpose of the present invention, this computer user's of described modification the disposal route that related parameter is arranged also has a kind of replacement scheme:
Access device is at the request message by analytical Calculation machine user, recognize after the computer user disposed acting server, directly pass a software (as: ActiveX control) down to the computer user, software modification computer user's network configuration parameters thus, cancellation computer user's agency is provided with, like this, computer user's accesses network does not just need to have acted on behalf of by acting server again.The computer user is after leaving access device or after restarting computing machine, and software does not rerun, and computer user's network configuration also reverts to former configuration immediately.This scheme is to have finished the work of revising computer network configuration by the software replacement computer user that access device passes down in fact.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with the people of this technology in the disclosed technical scope of the present invention; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.

Claims (11)

1, a kind of method that has disposed the computing machine access network of acting server is characterized in that this method comprises:
A, intercept and capture the request message that the computer user uploads,, judge whether this computer user has disposed acting server by resolving the data content of this request message by access device;
If b computer user has disposed acting server, then revise the parameter of this computer user parameter of uploading message and the message that reaches this computer user down or revise this computer user's network configuration parameters, according to amended parameter message transmission.
2, the method for claim 1 is characterized in that, when revising the parameter of described the computer user parameter of uploading message and the message that reaches this computer user down, described step b may further comprise the steps:
2a, on the access device of network pre-configured one available acting server;
2b, upload in the message process: the destination address of the message that access device is uploaded the computer user subsequently and address and the port that port replaces with above-mentioned available acting server, revise simultaneously these messages verification and;
2c, upload amended message among the step 2b;
2d, pass in the message process down: access device is intercepted and captured the message that above-mentioned available agent server passes down to the computer user who has disposed acting server, the source address of this message and port are replaced with the address and the port of the acting server of computer user's configuration, revise simultaneously this message verification and;
2e, will pass to the computer user under the amended message among the step 2d.
3, method as claimed in claim 2 is characterized in that, configuration available agent server comprises on access device: with domain name and port arrangement available agent server or with IP address and port arrangement available agent server.
4, method as claimed in claim 3 is characterized in that, if the form with domain name and port disposes the available agent server on access device, then at first will be resolved to the IP address of the available agent server domain name that disposes by name server.
5, method as claimed in claim 2 is characterized in that, and is if the computer user has disposed illegal computer user's address information, then further comprising the steps of in step 2b:
2b ', access device are controlled (MAC according to computer user's medium accesses, Medium AccessControl) Address Recognition user, perhaps discern the user according to computer user's VLAN ID (VLAN ID) and medium accesses control address, correspondingly regenerate legal computer user's address information, and replace corresponding illegal address information in the described message;
In step 2d, also should may further comprise the steps:
The legal computer user address information that 2d ', access device are replaced message according to the original illegal address information of user.
As claim 2 or 5 described methods, it is characterized in that 6, the described computer user's Configuration Agent server that has disposed acting server comprises: with domain name and port arrangement acting server or with IP address and port arrangement acting server.
7, method as claimed in claim 6 is characterized in that, if the computer user is then further comprising the steps of before step a with the form Configuration Agent server of domain name and port:
7a, the IP address of domain name that has disposed computer user's acting server that it is disposed to the name server request of acting server;
If the 7b name server does not search the IP address of domain name described in the step 7a, then respond the domain name mapping message that reports an error to the computer user, after access device intercepts this message, re-construct domain name mapping deception message, by this domain name mapping deception message, give the computer user as the IP address response of the acting server that the computer user disposed with the IP address of above-mentioned available agent server; Otherwise, can respond the IP address of this domain name that searches to the computer user by the domain name mapping message.
8, method as claimed in claim 2 is characterized in that, and is if the acting server of computer user's configuration transmits message according to Transmission Control Protocol, then further comprising the steps of before step a:
8a, the computer user who has disposed acting server send to the acting server that is disposed and set up the handshake message that TCP connects;
8b, access device are intercepted and captured the handshake message that the computer user sends, and the acting server that the direct analogy computer user is disposed is beamed back to the computer user and answered message, connect to set up TCP;
After 8c, computer user receive the back message using that passes under the access device, upload confirmation message for the acting server that the computer user disposed, the TCP successful connection is set up.
9, method as claimed in claim 7 is characterized in that, if the acting server of computer user configuration transmits message according to Transmission Control Protocol, then after step 7b, further comprising the steps of before the step a:
9a, the computer user who has disposed acting server send to the acting server that is disposed and set up the handshake message that TCP connects;
9b, access device are intercepted and captured the handshake message that the computer user sends, and the acting server that the direct analogy computer user is disposed is beamed back to the computer user and answered message, connect to set up TCP;
After 9c, computer user receive the back message using that passes under the access device, upload confirmation message for the acting server that the computer user disposed, the TCP successful connection is set up.
As claims 8 or 9 described methods, it is characterized in that 10, the acting server that described access device direct analogy computer user is disposed is beamed back the step of answering message to the computer user and is:
Access device is directly constructed a back message using and is given the computer user, and the source address of this back message using is filled out the destination address into described handshake message, and destination address is filled out the address into the computer user.
11, the method for claim 1 is characterized in that, when revising described computer user's network configuration parameters, described step b may further comprise the steps:
11a, directly pass the software that can revise computer user's network configuration parameters down to the computer user, software modification computer user's network configuration parameters thus, cancellation computer user's agency is provided with;
11b, computer user are after leaving access device or after restarting computing machine, and software does not rerun, and computer user's network configuration reverts to original configuration immediately.
CNB031374875A 2003-06-25 2003-06-25 Method for accessing computer provided with proxy server into network Expired - Fee Related CN1318998C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031374875A CN1318998C (en) 2003-06-25 2003-06-25 Method for accessing computer provided with proxy server into network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031374875A CN1318998C (en) 2003-06-25 2003-06-25 Method for accessing computer provided with proxy server into network

Publications (2)

Publication Number Publication Date
CN1567283A CN1567283A (en) 2005-01-19
CN1318998C true CN1318998C (en) 2007-05-30

Family

ID=34470435

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031374875A Expired - Fee Related CN1318998C (en) 2003-06-25 2003-06-25 Method for accessing computer provided with proxy server into network

Country Status (1)

Country Link
CN (1) CN1318998C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931635B (en) * 2009-06-18 2014-05-28 北京搜狗科技发展有限公司 Network resource access method and proxy device
CN102143187A (en) * 2011-04-07 2011-08-03 北京星网锐捷网络技术有限公司 Method and system for terminal equipment to access network as well as network access proxy device
CN109729187B (en) * 2019-01-09 2022-08-30 广州视源电子科技股份有限公司 Proxy communication method, system, device and storage medium
CN111787110B (en) * 2020-07-03 2023-03-31 国网湖北省电力有限公司 Socks proxy discovery method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997038389A2 (en) * 1996-04-10 1997-10-16 Lextron Systems, Inc. A proxy-server system for enhancing functionality of computers accessing servers on the internet
CN1201944A (en) * 1997-03-24 1998-12-16 格维康姆公司 Method and structure for wireless access to the internet
CN1310408A (en) * 2000-02-24 2001-08-29 华中师范大学 Network proxy server with Chinese remote management interface

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997038389A2 (en) * 1996-04-10 1997-10-16 Lextron Systems, Inc. A proxy-server system for enhancing functionality of computers accessing servers on the internet
CN1201944A (en) * 1997-03-24 1998-12-16 格维康姆公司 Method and structure for wireless access to the internet
CN1310408A (en) * 2000-02-24 2001-08-29 华中师范大学 Network proxy server with Chinese remote management interface

Also Published As

Publication number Publication date
CN1567283A (en) 2005-01-19

Similar Documents

Publication Publication Date Title
US7680954B2 (en) Proxy DNS for web browser request redirection in public hotspot accesses
CN101465856B (en) Method and system for controlling user access
US8190773B2 (en) System and method for accessing a web server on a device with a dynamic IP-address residing behind a firewall
CN103812728B (en) A kind of network diagnosis method, system and router
CN101388800B (en) Method, device and system for pressed test to network performance of server
CN100433645C (en) Network device management method and network management system
WO2003013072A1 (en) A method of user data exchange in the data network and a data network system
CN108093098A (en) A kind of domain name mapping request sending method and device
CN101741902B (en) System and method for Internet terminal to quickly access to Internet server
CN101599857B (en) Method, device and network detection system for detecting number of host computers accessed to sharing
CN108696546A (en) A kind of method and device of the user terminal access public network of Enterprise Mobile private network
CN1318998C (en) Method for accessing computer provided with proxy server into network
CN103607333A (en) Local area network port proxy method for port proxy server
JP2003141002A (en) Url length conversion system and program
US20130148572A1 (en) Communication system and method
CN101317424A (en) Device and method to detect applications running on a local network for automatically performing the network address translation
CN113132218A (en) Home gateway access method, device, system processor and storage medium
Cisco Configuring SLIP and PPP
Cisco Configuring SLIP and PPP
Cisco Configuring SLIP and PPP
Cisco Configuring SLIP and PPP
Cisco Configuring SLIP and PPP
Cisco Configuring SLIP and PPP
Cisco Configuring SLIP and PPP
Cisco Configuring SLIP and PPP

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070530

Termination date: 20200625