CN103384281B - A kind of method preventing EZVPN dialing failed - Google Patents
A kind of method preventing EZVPN dialing failed Download PDFInfo
- Publication number
- CN103384281B CN103384281B CN201310257487.7A CN201310257487A CN103384281B CN 103384281 B CN103384281 B CN 103384281B CN 201310257487 A CN201310257487 A CN 201310257487A CN 103384281 B CN103384281 B CN 103384281B
- Authority
- CN
- China
- Prior art keywords
- dialing
- address
- private
- ezvpn
- firewall box
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of method preventing EZVPN dialing failed, it is characterised in that comprise the following steps: S1:PC sends EZVPN dial request to firewall box;S2: firewall box receives dial request, and distributes private IP address, if consulting encryption key success, then terminates flow process, and otherwise, in firewall box record this time turkey to dialing record table, turkey includes private IP address;S3:PC sends the request of EZVPN dial-up operation to firewall box again, firewall box checks dialing record table, if record has the dialing failure record of PC in dialing record table, then private IP address is again assigned to PC, otherwise, from private IP address pond, an original private IP address is chosen for PC.The present invention utilizes the private IP address in firewall box record EZVPN dialing failure request, and when PC reuses EZVPN dialing, firewall box searches this log, for the private IP address that PC distribution is identical, therefore effectively prevent EZVPN and dials unsuccessfully.
Description
Technical field
The present invention relates to network communication technology field, particularly to a kind of method preventing EZVPN dialing failed.
Background technology
nullWhen using EZVPN software that firewall box is carried out dial-up operation under windows operating system,If dial-up success,Then firewall box distributes a private IP address and is configured on this PC,If dialling unsuccessfully,And consult unsuccessfully after the distribution of address in EZVPN negotiations process,The most now fire wall is distributed to the private IP address of PC and has been configured on this PC,Now due to the IKE connection failure set up,So fire wall cannot send deletes the message of this private IP address to PC,Now will form an ossified IP address on PC,The existence of this IP address will influence whether that second time dials,Because the not success of dialing for the first time,When user continues dialing, firewall box is that this PC distributes a new private IP address,Now PC can point out and load this new private IP address failure.
It is to restart PC that prior art solves the way of the problems referred to above, makes the private IP address into PC configuration lose efficacy.But this way can make troubles to user undoubtedly, reduce the experience sense of user.
Summary of the invention
(1) to solve the technical problem that
The present invention is to solve after PC uses EZVPN to dial unsuccessfully for the first time, PC forms ossified IP, the problem that firewall box cannot distribute new IP address for PC again under conditions of not restarting PC.
(2) technical scheme
For solving above-mentioned technical problem, the invention provides a kind of method preventing EZVPN dialing failed, it is characterised in that
Comprise the following steps:
S1:PC sends EZVPN dial request to firewall box;
S2: described firewall box receives described dial request, and distributes private IP address, if consulting encryption key success, then terminate flow process, otherwise, in firewall box record this time turkey to dialing record table, described turkey includes described private IP address;
S3:PC sends the request of EZVPN dial-up operation to described firewall box again, described firewall box checks described dialing record table, if record has the dialing failure record of described PC in described dialing record table, then described private IP address is again assigned to described PC, otherwise, from private IP address pond, an original private IP address is chosen for described PC.
The dialing failure record holding time in described dialing record table is half an hour.
Described step S2 also including, the private IP address in dialing record table is labeled as using by described firewall box.
(3) beneficial effect
The present invention utilizes the private IP address in firewall box record EZVPN dialing failure request, when PC reuses EZVPN dialing, firewall box searches this log, for the private IP address that PC distribution is identical, therefore effectively prevent EZVPN and dial unsuccessfully, enhancing the stability of system, the experience sense that improve user is subject to.
Detailed description of the invention
Below the detailed description of the invention of the present invention is described in further detail.Following example are used for illustrating the present invention, but are not limited to the scope of the present invention.
The method of present embodiment comprises the following steps:
S1:PC sends the request of EZVPN dial-up operation to firewall box;
S2: firewall box receives dial request, and distributes private IP address to this PC, if consulting encryption key success, then terminating flow process, otherwise, consulting Flow ends, and firewall box record this time turkey, described unsuccessfully record includes described private IP address;
S3:PC sends the request of EZVPN dial-up operation to firewall box again, firewall box checks EZVPN dialing record table, if log has the dialing record of this PC, then the private IP address of record is again assigned to this PC, otherwise, from private IP address pond, an original private IP address is chosen for this PC.
Further, in EZVPN dialing record table, each dialing failed record holding time is half an hour.
Further, also including in step S2, the private IP address of record in EZVPN dialing record table is labeled as using by firewall box.
The present invention uses the private IP address in firewall box record EZVPN dialing failure request, if after PC uses EZVPN to dial unsuccessfully for the first time, again when firewall box initiates dial request, firewall box searches EZVPN dialing record table, if this PC dialled unsuccessfully, then the private IP address that the last time is distributed to this PC is again assigned to this PC, owing to PC was configured private ip, when again configuring identical private ip, PC will be considered that it is to repeat to load, and will not point out mistake.If this PC was to distribute a private ip, be reconfigured at a different private ip, then PC will be considered that configuration error.If there is no the record that this PC dialing is failed, then select a new private IP address and distribute to this PC.Thus prevent PC to use EZVPN to dial unsuccessfully, enhance the stability of system, improve the experience sense of user.
Embodiment of above is merely to illustrate the present invention; and not limitation of the present invention; those of ordinary skill about technical field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; the technical scheme of the most all equivalents falls within scope of the invention, and the scope of patent protection of the present invention should be defined by the claims.
Claims (3)
1. one kind prevents the method that EZVPN dialing is failed, it is characterised in that
Comprise the following steps:
S1:PC sends EZVPN dial request to firewall box;
S2: described firewall box receives described dial request, and distributes private IP address, if
Consult encryption key success, then terminate flow process, otherwise, firewall box record this time failure thing
Part is in dialing record table, and described turkey includes described private IP address;
S3:PC sends the request of EZVPN dial-up operation to described firewall box again, described
Firewall box checks described dialing record table, if record has described in described dialing record table
The dialing failure record of PC, then be again assigned to described PC by described private IP address, otherwise,
An original private IP address is chosen for described PC from private IP address pond.
Prevent the method that EZVPN dialing is failed the most as claimed in claim 1, it is characterised in that
The dialing failure record holding time in described dialing record table is half an hour.
Prevent the method that EZVPN dialing is failed the most as claimed in claim 1, it is characterised in that
Described step S2 also including, described firewall box is by the private IP address in dialing record table
It is labeled as using.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310257487.7A CN103384281B (en) | 2013-06-26 | 2013-06-26 | A kind of method preventing EZVPN dialing failed |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310257487.7A CN103384281B (en) | 2013-06-26 | 2013-06-26 | A kind of method preventing EZVPN dialing failed |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103384281A CN103384281A (en) | 2013-11-06 |
CN103384281B true CN103384281B (en) | 2016-08-24 |
Family
ID=49491972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310257487.7A Active CN103384281B (en) | 2013-06-26 | 2013-06-26 | A kind of method preventing EZVPN dialing failed |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103384281B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105516374A (en) * | 2014-09-23 | 2016-04-20 | 中兴通讯股份有限公司 | Home address distribution method and apparatus, server and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1291557C (en) * | 2002-03-25 | 2006-12-20 | 精工电子有限公司 | Communication device, communication system and programme |
US7987506B1 (en) * | 2006-11-03 | 2011-07-26 | Cisco Technology, Inc. | Methods and systems for dynamically updating a routing table in a virtual private network |
CN102611700A (en) * | 2012-02-24 | 2012-07-25 | 汉柏科技有限公司 | Method for realizing VPN (Virtual Private Network) access under transparent mode |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7499412B2 (en) * | 2005-07-01 | 2009-03-03 | Net Optics, Inc. | Active packet content analyzer for communications network |
-
2013
- 2013-06-26 CN CN201310257487.7A patent/CN103384281B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1291557C (en) * | 2002-03-25 | 2006-12-20 | 精工电子有限公司 | Communication device, communication system and programme |
US7987506B1 (en) * | 2006-11-03 | 2011-07-26 | Cisco Technology, Inc. | Methods and systems for dynamically updating a routing table in a virtual private network |
CN102611700A (en) * | 2012-02-24 | 2012-07-25 | 汉柏科技有限公司 | Method for realizing VPN (Virtual Private Network) access under transparent mode |
Non-Patent Citations (1)
Title |
---|
《Easy VPN技术及其应用》;尹淑玲 等;《信息安全与技术》;20130228(第2期);第65-66页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103384281A (en) | 2013-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6231054B2 (en) | Verification and management of wireless device platforms | |
CN110071984A (en) | A kind of network identity mapping method and system and terminal, mark gateway | |
US9356835B2 (en) | System to configure and manage routers through wireless communication | |
JP2011521510A5 (en) | ||
CN102316101A (en) | Safe access method based on dynamic host configuration protocol (DHCP) SNOOPING | |
WO2012158313A1 (en) | Method and apparatus for message distribution in a device management system | |
CN101217482A (en) | A method traversing NAT sending down strategy and a communication device | |
CN102404158B (en) | Method, device and system for processing network failures | |
CN106412960A (en) | Control method for realizing Wi-Fi (Wireless-Fidelity) network configuration | |
CN104378456A (en) | Allocation optimization method for IP addresses in local area network | |
US9485217B2 (en) | Method for configuring network nodes of a telecommunications network, telecommunications network, program and computer program product | |
CN107342972B (en) | Method and device for realizing remote access | |
CN103384281B (en) | A kind of method preventing EZVPN dialing failed | |
CN103312731A (en) | Processing method supporting both TLS short connection and long connection, processing system supporting both TLS short connection and long connection, and equipment | |
CN102170630A (en) | Method and system for preventing network locking of mobile terminal from being illegally cracked | |
WO2020176021A1 (en) | Automatic distribution of dynamic host configuration protocol (dhcp) keys via link layer discovery protocol (lldp) | |
CN109257291A (en) | A kind of novel intelligent router | |
CN115766170B (en) | Trusted SDP network control method and device, storage medium and electronic device | |
CN103856572B (en) | A kind of method and home gateway of terminal device renewed treaty IP address | |
CN105471612A (en) | Household gateway remote control method and device and household gateway equipment | |
US20210044965A1 (en) | Cloud controlled secure bluetooth pairing for network device management | |
KR101491322B1 (en) | Self-configuring local area network security | |
US20100095338A1 (en) | Cable modem and method for updating digital certificates of the cable modem | |
CN101697542B (en) | Authentication method, soft switch and terminal | |
US20140359733A1 (en) | Authentication System and Method for Authenticating IP Communications Clients at a Central Device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right | ||
PP01 | Preservation of patent right |
Effective date of registration: 20180528 Granted publication date: 20160824 |