Research Article
Big Data-Based Access Control System in Educational Information Security Assurance
| | Test item | Test content | Test results |
| | Performance testing | The link repeatedly up/down, whether the packet is retransmitted | There is debugging information for retransmission of packets | | Construct the correct protocol packet attack and observe the debugging information | Message is discarded | | Construct wrong protocol packet attack, observe debugging information | Message is discarded | | Plug and unplug the interface and observe whether the main/standby switchover is successful | Active/standby switchover succeeded |
|
|