Research Article
Big Data-Based Access Control System in Educational Information Security Assurance
| Test item | Test content | Test results |
| Performance testing | The link repeatedly up/down, whether the packet is retransmitted | There is debugging information for retransmission of packets | Construct the correct protocol packet attack and observe the debugging information | Message is discarded | Construct wrong protocol packet attack, observe debugging information | Message is discarded | Plug and unplug the interface and observe whether the main/standby switchover is successful | Active/standby switchover succeeded |
|
|