论文部分内容阅读
传统意义上的网络管理和运营是以技术为中心的,所有的网络智能和决策能力都被置于核心设备上,在此进行设备识别并实施访问和安全策略,其验证程序是一个是与否的问题。
Traditionally, network management and operations are technology-centric. All network intelligence and decision-making capabilities are placed on the core devices where they are identified and implemented for access and security policies. The verification process is either yes or no The problem.