CN100356725C - Managing method for network facilities - Google Patents

Managing method for network facilities Download PDF

Info

Publication number
CN100356725C
CN100356725C CNB021603316A CN02160331A CN100356725C CN 100356725 C CN100356725 C CN 100356725C CN B021603316 A CNB021603316 A CN B021603316A CN 02160331 A CN02160331 A CN 02160331A CN 100356725 C CN100356725 C CN 100356725C
Authority
CN
China
Prior art keywords
equipment
certified
authenticating device
response message
authentication request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021603316A
Other languages
Chinese (zh)
Other versions
CN1510868A (en
Inventor
刘刀桂
杨利明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB021603316A priority Critical patent/CN100356725C/en
Publication of CN1510868A publication Critical patent/CN1510868A/en
Application granted granted Critical
Publication of CN100356725C publication Critical patent/CN100356725C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The present invention relates to a management method for network equipment, which belongs to the technical field of network communication. In the method, first of all, by-pass MAC address tables are arranged on authentication equipment; authentication request messages are transmitted to authenticated equipment by the authentication equipment, a response message comprising the bridge MAC address of the authenticated equipment is transmitted to the authentication equipment after the authenticated equipment receives the messages, and the authentication request message is simultaneously forwarded to sublayer authenticated equipment; the process is repeated until the authenticated equipment at the nth layer receives the authentication request message, and the response message is transmitted to the authentication equipment; the bridge MAC address, etc. of the authenticated equipment at all layers are filled in the by-pass MAC address tables after all the response messages of the sublayer authenticated equipment are received; upper layer equipment is used for managing network equipment according to the by-pass MAC address tables. The method of the present invention can be used for providing maintainability, adaptability and extensibility for networks.

Description

A kind of management method of the network equipment
Technical field
The present invention relates to network communications technology field, relate in particular to a kind of management method of the network equipment.
Background technology
At present, in existing data network, for example ethernet switched network adopts IEEE802.1X agreement (hereinafter to be referred as 802.1X) that the user is authenticated mostly.But to the authenticating device of great majority based on 802.1X, owing to the reasons such as complexity that realize certified person role and authenticator role function simultaneously, the general function that only realizes as authenticator role.The port that will cause upper network layer equipment to authenticate by the 802.1X that comes into force like this adopts Telnet (hereinafter to be referred as Telnet) and Simple Network Management Protocol (hereinafter to be referred as SNMP) etc. that lower floor's equipment is managed.From the angle of management, just 802.1X and Telnet and SNMP etc. can not coexist simultaneously.
Summary of the invention
The objective of the invention is to propose a kind of management method of the network equipment, make through communicating by letter between authenticating device and the lower floor certified equipment and can not interrupt because of the 802.1X agreement, thus the problem that 802.1X and Telnet and SNMP etc. can not co-ordinations in the solution prior art.
The management method of the network equipment that the present invention proposes comprises following each step:
1, when the authenticating device initialization, on authenticating device, sets up the by-pass MAC lattice of certified equipment;
2, authenticating device sends authentication request packet by all the 802.1X ports that come into force on this equipment to certified equipment;
3, after the certified equipment of one deck receives above-mentioned message, receiving port by this equipment sends a response message to authenticating device, the bridge MAC Address that contains the certified equipment of this layer in the response message will be passed through other port except that receiving port of this equipment to two layers of certified device forwards in addition from the authentication request packet of authentication equipment;
4, after two layers of certified equipment receives the authentication request packet that relaying comes, receiving port by this equipment sends a response message to authenticating device, the bridge MAC Address that contains the certified equipment of this layer in the above-mentioned response message, the authentication request packet that relaying is come passes through other port except that receiving port of this equipment to three layers of certified device forwards in addition;
5, other certified device synchronization are rapid 4, receive authentication request packet up to the certified equipment of n layer, and send response message to authenticating device;
6, after authenticating device receives the response message of all certified equipment of lower floor, the bridge MAC Address of every layer of certified equipment is inserted in the above-mentioned by-pass MAC lattice;
7, according to by-pass MAC, upper layer device is realized the management to the network equipment.
In the said method, authenticating device and certified equipment are any in Ethernet switch, router or the wireless access accessing points.
Authenticating device is regularly to send authentication request packet by all the 802.1X ports that come into force on this equipment to certified equipment in the said method.
The destination address of request authentication message is " 01-80-C2-00-00-0A " in the said method.
In the said method, certified equipment is unicast message or multicast message to the response message that authenticating device sends.
In the said method, can also contain the certified equipment MAC Address corresponding with the virtual local area network interface in the response message, the MAC Address that certified equipment is corresponding with the virtual local area network interface has one or more.
In the said method, two layers of certified equipment by the receiving port of this equipment to the process that authenticating device sends response message is: two layers of certified equipment send the certified equipment of one deck with above-mentioned response message, and the certified equipment of one deck is transmitted to authenticating device with above-mentioned response message again.
In the said method, the authenticating device continuous several times is after certified equipment sends authentication request packet, if no response then will be deleted with the corresponding MAC Address of this certified equipment in by-pass MAC.
The management method of the network equipment that the present invention proposes is set up the mac address table of the certified equipment of lower floor on the port of the 802.1X that authenticating device comes into force, make through communicating by letter between authenticating device and the lower floor certified equipment can not interrupt because of the 802.1X agreement.The advantage of the inventive method is: on the port of opening authentication, can make authentication protocol (as 802.1X) and NMP coexistence; To the Dynamic Maintenance of bypass MAC, network is had from maintainability by running status machine on authenticating device; Realization of this method and 802.1X protocol state machine be without any relation, thereby have better adaptability and extensibility.
Description of drawings
Fig. 1 is the FB(flow block) of the inventive method.
Embodiment
The management method of the network equipment that the present invention proposes, its FB(flow block) comprises following each step as shown in Figure 1:
1, when the authenticating device initialization, on authenticating device, sets up the by-pass MAC lattice of certified equipment;
2, authenticating device sends authentication request packet by all the 802.1X ports that come into force on this equipment to certified equipment;
3, after the certified equipment of one deck receives above-mentioned message, receiving port by this equipment sends a response message to authenticating device, the bridge MAC Address that contains the certified equipment of this layer in the response message will be passed through other port except that receiving port of this equipment to two layers of certified device forwards in addition from the authentication request packet of authentication equipment;
4, after two layers of certified equipment receives the authentication request packet that relaying comes, receiving port by this equipment sends a response message to authenticating device, the bridge MAC Address that contains the certified equipment of this layer in the above-mentioned response message, the authentication request packet that relaying is come passes through other port except that receiving port of this equipment to three layers of certified device forwards in addition;
5, other certified device synchronization are rapid 4, receive authentication request packet up to the certified equipment of n layer, and send response message to authenticating device;
6, after authenticating device receives the response message of all certified equipment of lower floor, the bridge MAC Address of every layer of certified equipment is inserted in the above-mentioned by-pass MAC lattice;
7, according to by-pass MAC, upper layer device is realized the management to the network equipment.
In the said method, authenticating device and certified equipment are any in Ethernet switch, router or the wireless access accessing points.
Authenticating device is regularly to send authentication request packet by all the 802.1X ports that come into force on this equipment to certified equipment in the said method, and the time interval regularly can be 5~60 seconds.Before network is unstable, will get the small value the time interval, make network faster stable like this; After the network stabilization, the time interval is got big value, can reduce network burden.
In the said method, certified equipment is unicast message or multicast message to the response message that authenticating device sends.The more report of unicast message Wen Eryan can reduce network burden; If but unicast message can not arrive authenticating device well, then uses multicast message.
In the said method, the authenticating device continuous several times is after certified equipment sends authentication request packet, if no response then will be deleted with the corresponding MAC Address of this certified equipment in by-pass MAC.
In the said method, authenticating device to coming into force of sending of certified equipment destination address can be " 01-80-C2-00-00-0A ", also can be the destination address of other form.
In the said method, two layers of certified equipment by the receiving port of this equipment to the process that authenticating device sends response message is: two layers of certified equipment send the certified equipment of one deck with above-mentioned response message, and the certified equipment of one deck is transmitted to authenticating device with above-mentioned response message again.
In the said method, can also contain the certified equipment MAC Address corresponding in the response message with the virtual local area network interface, wherein, the MAC Address that certified equipment is corresponding with the virtual local area network interface has one or more, this is because in some cases, to manage lower floor's equipment by a plurality of virtual net interfaces, then should be included in the MAC Address of a plurality of virtual net interface correspondences in the response message.
In the said method, the authenticating device continuous several times, for example three times, after certified equipment sends authentication request packet, if no response then will be deleted with the corresponding MAC Address of this certified equipment in by-pass MAC.This aging mechanism that authenticating device is safeguarded Bypass MAC, dynamic management that can network enabled.
Address in the mac address table of the present invention can be the bridge MAC Address of certified equipment and the MAC Address of VLAN (hereinafter to be referred as VLAN) interface correspondence etc.For the 802.1X agreement, have only user by authentication, it is legal that its MAC Address just is considered to.The certified device mac address table of the present invention by setting up be equivalent to be provided with a bypass for the certified equipment of lower floor on the port of the 802.1X that comes into force, so the apparatus characteristic MAC Address also can be described as the bypass MAC Address.
The port of opening authentication on the authenticating device sends particular B PDU message (Bridge Protocol Data Unit to its member device of hanging down, Bridge Protocol Data Unit), after member switch receives this message, send one and carry self identification MAC (Ethernet switch is meant bridge MAC) address, the response message that sometimes also can have the management interface MAC Address is simultaneously to other this message of member's transparent transmission.Authenticating device writes it to certified equipment mark MAC (also can be referred to as BypassMAC) with static mode and opens authentication port, is that the message of source MAC can transparent transmission thereby make with designated equipment MAC.Among Fig. 1, the authenticated exchange machine makes the 802.1X protocol validation on (referring to Ethernet switch, down together), can manage the switch that it is hung down by Telnet and SNMP etc., and detailed process is:
1, the 802.1X port that comes into force of authenticating device all on this equipment sends the request message of destination address for " 01-80-C2-00-00-0A " (can revise this address as required).
2, after the certified equipment of one deck is received request message from authenticating device, reply a response message that comprises the MAC Address of self bridge MAC and management vlan interface correspondence to the port that receives this request message.
3, simultaneously, the certified equipment of one deck is transmitted the request message from authenticating device to other port of its 802.1X that comes into force, and this process is called relaying.
4, two layers of certified equipment are received the request message that the certified equipment relaying of one deck is come, and in like manner, the response message that comprises self bridge MAC and management vlan interface MAC are issued the certified equipment of one deck.
5, the certified equipment of one deck is transmitted to authenticating device to the response message of two layers of certified equipment.In general, this process is that equipment is finished automatically, does not need software control.
6, authenticating device receive from one deck and two layers of certified equipment response message after, its bridge MAC and management vlan interface MAC are added by-pass MAC.
In order to guarantee network security, authentication request packet can be communicated by letter in Management VLAN with response message.And guarantee that domestic consumer can not Access Management Access VLAN.Be in order to prevent that the counterfeit certified equipment of user from sending out response message and obtaining network access authority to authenticating device like this.
Request message and response message are by comprising request message ID and response message ID respectively.When having only both consistent, it is effective that response message just is considered to; Otherwise, belong to the invalid response message.

Claims (4)

1, a kind of management method of the network equipment is characterized in that this method comprises following each step:
(1) when the authenticating device initialization, on authenticating device, sets up the by-pass MAC lattice of certified equipment;
(2) authenticating device sends authentication request packet by all the 802.1X ports that come into force on this equipment to certified equipment;
(3) after the certified equipment of one deck receives above-mentioned message, receiving port by this equipment sends response message to authenticating device, the bridge MAC Address that contains the certified equipment of this layer in the above-mentioned response message will be passed through other port except that receiving port of this equipment to two layers of certified device forwards in addition from the authentication request packet of authentication equipment;
After (4) two layers of certified equipment receives the authentication request packet that relaying comes, receiving port by this equipment sends response message to authenticating device, include the bridge MAC Address of the certified equipment of this layer in the above-mentioned response message, the authentication request packet that relaying is come passes through other port except that receiving port of this equipment to three layers of certified device forwards in addition;
(5) other certified device synchronization rapid (4) receive authentication request packet up to the certified equipment of n layer, and send response message to authenticating device;
(6) after authenticating device receives the response message of all certified equipment of lower floor, the bridge MAC Address of every layer of certified equipment is inserted in the above-mentioned by-pass MAC lattice;
(7) according to by-pass MAC, upper layer device is realized the management to the network equipment.
2, the method for claim 1 is characterized in that wherein said authenticating device and certified equipment are any in Ethernet switch, router or the wireless access accessing points.
3, the method for claim 1 is characterized in that authenticating device is regularly to send authentication request packet by all the 802.1X ports that come into force on this equipment to certified equipment in the step (2).
4, the method for claim 1 is characterized in that the destination address of wherein said authentication request packet is " 01-80-C2-00-00-0A ".
CNB021603316A 2002-12-26 2002-12-26 Managing method for network facilities Expired - Fee Related CN100356725C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021603316A CN100356725C (en) 2002-12-26 2002-12-26 Managing method for network facilities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021603316A CN100356725C (en) 2002-12-26 2002-12-26 Managing method for network facilities

Publications (2)

Publication Number Publication Date
CN1510868A CN1510868A (en) 2004-07-07
CN100356725C true CN100356725C (en) 2007-12-19

Family

ID=34237841

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021603316A Expired - Fee Related CN100356725C (en) 2002-12-26 2002-12-26 Managing method for network facilities

Country Status (1)

Country Link
CN (1) CN100356725C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100444557C (en) * 2005-12-27 2008-12-17 杭州华三通信技术有限公司 Method for positioning target apparatus in two layer network
EP2068498B1 (en) 2006-09-25 2017-12-13 Hewlett-Packard Enterprise Development LP Method and network device for communicating between different components
WO2008152807A1 (en) * 2007-06-13 2008-12-18 Panasonic Corporation Mac address overlap eliminating method, network device managing system, server, and information device
CN101150457B (en) * 2007-10-25 2010-06-16 中兴通讯股份有限公司 Testing method for Ethernet media access control table capacity
CN102195952B (en) * 2010-03-17 2015-05-13 杭州华三通信技术有限公司 Method and device terminal for triggering 802.1X Authentication
CN102185864B (en) * 2011-05-13 2014-12-24 北京星网锐捷网络技术有限公司 Security authentication strategy configuration method, device and system
CN104506370B (en) * 2014-12-31 2018-05-08 新华三技术有限公司 Without network management system management method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1331534A (en) * 2000-06-26 2002-01-16 三星电子株式会社 System and method for providing WAP via internet
WO2002060127A2 (en) * 2001-01-26 2002-08-01 International Business Machines Corporation Distributed multicast caching technique

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1331534A (en) * 2000-06-26 2002-01-16 三星电子株式会社 System and method for providing WAP via internet
WO2002060127A2 (en) * 2001-01-26 2002-08-01 International Business Machines Corporation Distributed multicast caching technique

Also Published As

Publication number Publication date
CN1510868A (en) 2004-07-07

Similar Documents

Publication Publication Date Title
KR101706006B1 (en) A method and system for updating distributed resilient network interconnect states
CN100594476C (en) Method and apparatus for realizing network access control based on port
CN100583773C (en) Method and device for controlling data link layer elements with network layer elements
JP4190421B2 (en) Personal virtual bridge local area network
CN100512109C (en) Access authentication system and method by verifying safety of accessing host
CN107800602A (en) A kind of message processing method, equipment and system
CN104601566B (en) authentication method and device
CN101478485B (en) Method for local area network access control and network gateway equipment
US20030147405A1 (en) Protecting the filtering database in virtual bridges
CN107277058A (en) A kind of interface authentication method and system based on BFD agreements
CN100356725C (en) Managing method for network facilities
CN106027491A (en) Independent link type communication processing method and system based on isolated IP (Internet Protocol) address
CN104539539A (en) Multi-service-board data forwarding method for AC device
CN100591068C (en) Method of transmitting 802.1X audit message via bridging device
Convery Hacking layer 2: Fun with Ethernet switches
CN1486032A (en) Method and apparatus for VLAN based network access control
CN100477609C (en) Method for implementing dedicated network access
CN108712398A (en) Port authentication method, server, interchanger and the storage medium of certificate server
Cisco sh_a_c
Cisco Cisco IOS Commands
Cisco Cisco IOS Commands
Cisco Cisco IOS Commands - s
Cisco Configuring Transparent Bridging
Cisco sh_a_c
Cisco sh_a_c

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CI03 Correction of invention patent

Correction item: Claims

Correct: Add claim Book Second

False: Lack of claim Book Second

Number: 51

Volume: 23

COR Change of bibliographic data

Free format text: CORRECT: RIGHT-CLAIMING DOCUMENT; FROM: LACK OF RIGHT-CLAIMING DOCUMENT PAGE TWO TO: ADD RIGHT-CLAIMING DOCUMENT PAGE TWO

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071219

Termination date: 20151226

EXPY Termination of patent right or utility model