CN101043355A - Method for preventing MAC address cheat - Google Patents

Method for preventing MAC address cheat Download PDF

Info

Publication number
CN101043355A
CN101043355A CNA2006100608205A CN200610060820A CN101043355A CN 101043355 A CN101043355 A CN 101043355A CN A2006100608205 A CNA2006100608205 A CN A2006100608205A CN 200610060820 A CN200610060820 A CN 200610060820A CN 101043355 A CN101043355 A CN 101043355A
Authority
CN
China
Prior art keywords
mac address
port
list item
item
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100608205A
Other languages
Chinese (zh)
Other versions
CN100438439C (en
Inventor
马书雷
潘晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2006100608205A priority Critical patent/CN100438439C/en
Publication of CN101043355A publication Critical patent/CN101043355A/en
Application granted granted Critical
Publication of CN100438439C publication Critical patent/CN100438439C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The disclosed method for preventing the cheat of MAC address comprises: CPU system sets the dynamic MAC address transmission list item on up port as static state, and simulates the aging mechanism of chip MAC address for former up port list item to prevent cheating MAC address. This invention can record user port suffered malevolent attack and the attack time to notify user through CPU system man-machine interface and network management system in time.

Description

A kind of method that prevents MAC address spoofing
Technical field
The present invention relates to the data communication field, specifically, relate to a kind of method that prevents MAC address spoofing.
Background technology
The IEEE802.3 standard code in the ethernet mac frame of a standard, has target MAC (Media Access Control) address and source MAC, and length all is 6 bytes, and Fig. 1 is the ethernet mac frame format of standard, wherein:
Destination Address: target MAC (Media Access Control) address, 6Bytes
Source Address: source MAC, 6Bytes
Length/type: data length or type of message, 2Bytes
DATA: ethernet frame data carried by data territory
FCS: Frame Check Sequence
Which platform physical equipment target MAC (Media Access Control) address will be sent in order to the sign ethernet frame, and which platform physical equipment source MAC is sent by in order to the sign ethernet frame.First bit position of target MAC (Media Access Control) address (the minimum bit position of first byte) expression target MAC (Media Access Control) address is unicast address or multicast address, if 0, the expression target MAC (Media Access Control) address is a unicast address, if 1, the expression target MAC (Media Access Control) address is a multicast address.
If the target MAC (Media Access Control) address of ethernet frame is a unicast mac address, ethernet frame is behind access arrangement, equipment can be searched the mac address forwarding table item according to the target MAC (Media Access Control) address and the VLAN ID (Virtual LAN ID) of ethernet frame, if find, then according to the port numbers in the forwarding-table item, ethernet frame is forwarded from this port,, then all of the port of ethernet frame in this VLAN can be broadcasted if do not find.
IEEE 802.1Q (Virtual Bridged Local Area Networks) has stipulated the implementation of VLAN in the Ethernet.After the source MAC of the ethernet frame of standard, increase the 802.1Q label of one 4 byte, Fig. 2 is the 802.1Q frame format of standard, 802.1Q label comprises the tag protocol identifier (TPID of 2 bytes, Tag Protocol Identifier) and the tag control information of two bytes (TCI, TagControl Information).The TPID value is hexadecimal 8100, is used to identify the ethernet frame that this ethernet frame is the 802.1Q label; The detailed content of TCL as shown in Figure 3, wherein (VLAN ID VLANIdentifier) is one 12 territory to VID, identifies different VLAN, and value is 0~4095, is used to distinguish 4096 VLAN.Each data message of supporting the equipment of 802.1Q agreement to send out all can comprise this territory, to indicate own affiliated VLAN.
If equipment is received one not with the ethernet frame of 802.1Q label, can increase the label of 802.1Q according to port (or according to source MAC or message protocol type etc.); If receive the ethernet frame that has the 802.1Q label, ethernet frame is not made any modification.After receiving ethernet frame, equipment can increase corresponding forwarding-table item, and source MAC, VLAN ID and the port numbers of ethernet frame are noted, and this is called the study of MAC Address, and the basic format of ethernet mac address forwarding-table item as shown in Figure 4.
Source MAC is before study, equipment can be searched the mac address forwarding table item according to source MAC and VLAN ID, if find identical list item, and the port numbers difference, can upgrade forwarding-table item according to new port numbers, this is called website and shifts (station movement).If do not find identical list item, can increase a new forwarding-table item.The mac address forwarding table item can be divided into static mac address forwarding-table item and dynamic MAC address forwarding-table item, the static mac address forwarding-table item can only manual configuration in equipment, can not carry out website shifts, be that the port numbers of static mac address forwarding-table item can not enter automatically from different ports according to ethernet frame and upgrades, and dynamic MAC address can carry out the website transfer, be that the port numbers of dynamic MAC address forwarding-table item can enter automatically from different ports according to ethernet frame and upgrades, dynamic MAC address can wear out within a certain period of time, promptly can be deleted by network exchanging chip.
Usually can support the learning state of multiple MAC Address in the port attribute of network exchanging chip; commonly used is that MAC Address can be learnt to shift with website automatically; port can also be arranged to learn slave mode in addition: port can not learnt MAC Address automatically; if the source MAC in the ethernet frame does not exist on this port; hardware is not transmitted this ethernet frame, and delivers cpu system.
Because in access device, port can be divided into uplink port and user port, uplink port is meant the port that links to each other with upstream plant, upstream plant typically refers to three-tier switch or BAS (Broadband AccessServer, BAS Broadband Access Server), user port is meant the port that links to each other with subscriber computer or other two, three-tier switch.May learn the MAC Address of upstream plant at uplink port, may learn the MAC Address of subscriber equipment at user port, the ethernet frame that subscriber equipment sends, target MAC (Media Access Control) address is the MAC Address of upstream plant, after this ethernet frame arrival equipment, equipment can be searched the mac address forwarding table item, because the port numbers in the upstream plant mac address forwarding table item is a uplink port, institute's ethernet frame can be forwarded from uplink port by equipment, as shown in Figure 5.
If the MAC Address of subscriber equipment 1 is identical with the MAC Address of upstream plant, the perhaps MAC Address of the counterfeit upstream plant of subscriber equipment 1 malice, at this moment the MAC Address of upstream plant will be learnt at user port 1, the ethernet frame that subscriber equipment 2 sends to upstream plant, will be forwarded to user port 1 mistakenly, thereby cause subscriber equipment 2 to send ethernet frame to upstream plant, subscriber equipment 2 can't normally be surfed the Net, as shown in Figure 6.
Simultaneously, when the MAC Address of upstream plant was carried out the website transfer, equipment can not notify cpu system to handle, so can't detect the MAC Address of the counterfeit upstream plant of which subscriber equipment.
Do not support the situation of MAC Address collision detection in the prior art for common chip, common way is:
In uplink port configuring static MAC Address, described MAC Address is the MAC Address of upstream plant; If have a plurality of VLAN to exist, need in each VLAN, dispose a static mac address.When the source MAC of the ethernet frame that enters from user port is identical with the upstream plant MAC Address,, shift so website can not take place such MAC Address because uplink port has disposed static MAC Address.
But prior art has following shortcoming:
(1) because static configuration need be known the MAC Address of upstream plant earlier, do not knowing to realize static configuration under the upstream plant MAC Address situation;
(2) when a plurality of VLAN exist, need be in each VLAN the configuring static MAC Address, configuration is complicated;
(3) the website transfer that static mac address can only limit MAC Address is set, can't detect is which port has caused the MAC Address conflict.
Summary of the invention
Described in view of this, the method and apparatus that prevents MAC address spoofing provided by the invention has solved the MAC Address that need know upstream plant when uplink port configuring static MAC Address of the prior art, and configuration is complicated; And the MAC Address website problem of not notifying CPU to handle when shifting.
A kind of method that prevents MAC address spoofing provided by the invention, comprise: the dynamic MAC address forwarding-table item by the cpu system uplink port is set to static state, and the aging mechanism of the MAC Address of analog chip is that the mac address forwarding table item of uplink port carries out burin-in process and prevents MAC address spoofing to port.
Described burin-in process process comprises:
(1) cpu system is the cycle with the ageing time of MAC Address, the port numbers of regularly inquiring about in the mac address forwarding table is the mac address forwarding table item of uplink port, when state when being dynamic, be static state with the status modifier of this list item, the HIT position is set, and this list item is recorded in the software mac address table.
(2) if the port of the mac address forwarding table item that inquires is a uplink port, state is static, and this list item has been recorded in the software mac address table, then checks the HIT position of this list item, if the HIT position is eliminated, deletes this mac address forwarding table item.Otherwise, remove the HIT position.
Also comprise: after message enters from user port, when detecting in mac address forwarding table source MAC and the identical list item of VLAN ID thereof that has its MAC Address and VLAN ID thereof and message, and the port numbers that port numbers in the list item and message enter is inequality, and this list item is dynamic, port numbers in this mac address forwarding table item is changed to the user port number that message enters, remove the HIT position, and message is normally transmitted; And if this list item is static, what prove that this message has is illegal MAC Address.
If the port of the mac address forwarding table item that inquires is a uplink port, state is static, but this list item is not recorded in the software mac address table, this forwarding-table item is not handled.
Also comprise described illegal MAC Address and port information record, and by man-machine interface output or informing network management system.
Utilize the present invention, can solve because the subscriber equipment that MAC address spoofing or MAC Address repeat to cause can't send the problem of ethernet frame to upstream plant.Dynamic MAC address forwarding-table item by the cpu system uplink port is set to static state, and the aging mechanism of the MAC Address of analog chip, to port is that the mac address forwarding table item of uplink port carries out burin-in process, even the MAC Address of a certain list item is identical with VLAN ID the source MAC of the message that enters from user port and VLAN ID and the mac address forwarding table like this, because the mac address forwarding table item of uplink port all is set to static, the MAC Address website can not take place shift, so the message that can avoid mailing to uplink port for fear of subscriber equipment is forwarded on other user port by mistake;
And utilize and the invention solves the configuration complicated problems;
Simultaneously further when detecting user port the MAC Address identical with upstream plant arranged, can write down the user port number that malicious attack takes place, and the time of carrying out malicious attack, can in time notify the user in case of necessity.
Description of drawings
Fig. 1 is an ethernet mac frame schematic diagram;
Fig. 2 is the ethernet frame schematic diagram that has the 802.1Q label;
Fig. 3 is the TCL part schematic diagram in the 802.1Q label;
Fig. 4 ethernet mac address forwarding-table item schematic diagram;
Fig. 5 correctly is forwarded to the uplink port schematic diagram for the user port ethernet frame;
Fig. 6 is forwarded to other port schematic diagram for user port ethernet frame mistake;
Fig. 7 carries out the burin-in process flow chart for the present invention to the mac address forwarding table item of uplink port;
Fig. 8 is the process chart to message of the present invention.
Embodiment
The present invention is set to static state by the dynamic MAC address forwarding-table item of cpu system uplink port, and the aging mechanism of the MAC Address of analog chip, is that the mac address forwarding table item of uplink port carries out burin-in process to port.
Owing to have a HIT position usually in each mac address forwarding table item, be used to represent whether this list item is hit, and that is to say, when the source MAC in the message was identical with a mac address forwarding table item with VLAN ID, the HIT position of this list item can be set.
Network exchanging chip can be checked the dynamic MAC address list item in the mac address forwarding table according to the ageing time of setting, if the position, HIT position in the list item, then with the HIT bit clear, after the HIT position is eliminated, if continue to have source MAC and the VLAN ID message identical with VLAN ID with this list item MAC Address to enter, the HIT position of this list item is put again; If HIT please be removed the position when detecting, then prove in a digestion period do not have the message of identical sources MAC Address and VLAN ID to enter, this MAC Address list item is with deleted, just by aging.
Wherein the MAC address aging mechanism of cpu system analog chip is carried out the burin-in process flow process as shown in Figure 7 to the mac address forwarding table item of uplink port:
Step 701: regularly after the inquiry beginning, at first finding port numbers is the mac address forwarding table item of uplink port;
Step 702: judge then whether the mac address forwarding table item that is found is dynamic;
Step 703: if the mac address forwarding table item that is found is dynamic, just the status modifier with this list item is static, and establishes the HIT position;
Step 704: and described list item recorded in the software mac address table, this flow process finished;
Step 705:, check then whether this list item has been recorded in the software mac address table if the mac address forwarding table item that is found is static;
Step 706: if this list item is not noted down in the software mac address table, the MAC Address that is not setting in step 703 being described, is other static mac address (such as by the order line configuration), this list item is not handled, and finishes this flow process.
Step 707:, just check further whether the HIT position of this list item is eliminated if this list item is recorded in the software mac address table;
Step 708: if the HIT position of this list item also exists, remove this HIT position, finish this flow process;
Step 709:, then in mac address forwarding table, delete this mac address forwarding table item if the HIT position of this list item is to be eliminated.
Therefore, cpu system is the cycle with the ageing time of MAC Address, regularly inquire about mac address forwarding table, if the port of mac address forwarding table item is a uplink port, and state is dynamic, then the status modifier with this list item is static, the HIT position is set, and this list item is recorded in the software mac address table.At this moment, if the MAC Address of a certain list item is identical with VLAN ID the source MAC of the message that enters from user port and VLAN ID and the mac address forwarding table, because the mac address forwarding table item of uplink port all is set to static,, do not shift the MAC Address website so can not taking place.
Below in conjunction with Fig. 8 the handling process to message of the present invention is specifically described:
Step 801: message enters from user port;
Step 802: detect source MAC and the corresponding identical list item of VLAN ID thereof in mac address forwarding table, whether have its MAC Address and VLANID thereof and message;
Step 803: the if there is no source MAC and the corresponding identical list item of VLAN ID thereof of its MAC Address and VLAN ID thereof and message, user port is learnt this MAC Address, and normally transmits this message;
Step 804:, judge further that then the port numbers in this list item is whether identical with the port numbers that message enters if having the source MAC and the corresponding identical list item of VLAN ID thereof of its MAC Address and VLAN ID thereof and message;
Step 805: if the port numbers in this list item is identical with the port numbers that message enters, illustrate that this message is a normal message, can normal process;
Step 806:, judge further whether the state of this list item is dynamic if the port numbers that port numbers in this list item and message enter is inequality;
Step 807:, then the port numbers in this mac address forwarding table item is changed to the user port number that message enters, and the HIT position is set, and message is normally transmitted if this list item is dynamic;
Step 808: if this list item is static, proves with the MAC Address of upstream plant and repeat, is illegal MAC Address;
Step 809: send cpu system to handle message, the relevant invalid information of cpu system record, such as the user port number that malicious attack takes place, and the time of carrying out malicious attack, can in time notify the user in case of necessity.
Also have other that mac address forwarding table item of uplink port is carried out the means of burin-in process, but similar substantially with the technological means of above exposure.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (6)

1. method that prevents MAC address spoofing, it is characterized in that, the dynamic MAC address forwarding-table item of cpu system uplink port is set to static state, and the aging mechanism of the MAC Address of analog chip is that the forwarding-table item of the MAC Address of uplink port carries out burin-in process and prevents MAC address spoofing to port.
2. method according to claim 1 is characterized in that, the aging mechanism of the MAC Address of described analog chip comprises:
(1) cpu system is the cycle with the ageing time of MAC Address, regularly the port numbers of inquiring about in the mac address forwarding table is the state of the mac address forwarding table item of uplink port, when state when being dynamic, with the status modifier of this list item is static, the HIT position is set, and this list item is recorded in the software mac address table.
(2) if the port of the mac address forwarding table item that inquires is a uplink port, state is static, and this list item has been recorded in the software mac address table, then checks the HIT position of this list item, if the HIT position is eliminated, deletes this mac address forwarding table item.Otherwise, remove the HIT position.
3. method according to claim 2 is characterized in that if the port of the mac address forwarding table item that inquires is a uplink port, and state is static, but this list item is not recorded in the software mac address table, this forwarding-table item is not handled.
4. method according to claim 2, it is characterized in that, also comprise: after message enters from user port, when detecting in mac address forwarding table source MAC and the identical list item of VLAN ID thereof that has its MAC Address and VLAN ID thereof and message, and the port numbers that port numbers in the list item and message enter is inequality, and this list item is dynamic, the port numbers in this mac address forwarding table item is changed to the user port number that message enters, and message is normally transmitted.
5. method according to claim 3, it is characterized in that, after message enters from user port, when detecting in mac address forwarding table source MAC and the identical list item of VLAN ID thereof that has its MAC Address and VLAN ID thereof and message, and the port numbers that port numbers in the list item and message enter is inequality, and this list item is static, and what prove that this message has is illegal MAC Address.
6. method according to claim 5 is characterized in that, comprises described illegal MAC Address and port information record, and by man-machine interface output or informing network management system.
CNB2006100608205A 2006-05-19 2006-05-19 Method for preventing MAC address cheat Expired - Fee Related CN100438439C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100608205A CN100438439C (en) 2006-05-19 2006-05-19 Method for preventing MAC address cheat

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100608205A CN100438439C (en) 2006-05-19 2006-05-19 Method for preventing MAC address cheat

Publications (2)

Publication Number Publication Date
CN101043355A true CN101043355A (en) 2007-09-26
CN100438439C CN100438439C (en) 2008-11-26

Family

ID=38808586

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100608205A Expired - Fee Related CN100438439C (en) 2006-05-19 2006-05-19 Method for preventing MAC address cheat

Country Status (1)

Country Link
CN (1) CN100438439C (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010020103A1 (en) * 2008-08-22 2010-02-25 中兴通讯股份有限公司 Method and device for providing service for the duplicate mac address users
WO2010025647A1 (en) * 2008-09-02 2010-03-11 中兴通讯股份有限公司 Implementation method for binding the mac address in the broadband access system
CN101911648A (en) * 2008-01-11 2010-12-08 阿尔卡特朗讯公司 Facilitating defense against MAC table overflow attacks
CN101232447B (en) * 2008-02-28 2011-11-30 中兴通讯股份有限公司 Method for controlling learning MAC address preaging
CN102420762A (en) * 2011-12-05 2012-04-18 北京星网锐捷网络技术有限公司 Message forwarding method, message forwarding system, network equipment and firewall wire card
CN101674309B (en) * 2009-09-23 2012-05-09 中兴通讯股份有限公司 Ethernet access method and device thereof
CN102571564A (en) * 2011-12-19 2012-07-11 福建星网锐捷网络有限公司 Method, apparatus and device for aging static medium access control address
CN103139074A (en) * 2013-02-07 2013-06-05 杭州华三通信技术有限公司 Method and device used for handling media access control (MAC) address conflict
CN101800741B (en) * 2010-01-25 2014-08-20 中兴通讯股份有限公司 Device and method for preventing illegal media access control (MAC) address transfer
CN105704046A (en) * 2014-11-27 2016-06-22 中兴通讯股份有限公司 Multicast routing table entry processing method and device
CN108184176A (en) * 2017-12-30 2018-06-19 武汉长光科技有限公司 A kind of method for preventing illegal optical module access OLT
CN108712449A (en) * 2018-07-12 2018-10-26 新华三技术有限公司 Prevent the method, apparatus and electronic equipment of MAC Address extensive aggression
CN108965131A (en) * 2018-07-27 2018-12-07 新华三技术有限公司 A kind of method and device of message forwarding
WO2019183987A1 (en) * 2018-03-31 2019-10-03 华为技术有限公司 Method for transmitting data, and forwarding device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1152517C (en) * 2002-04-23 2004-06-02 华为技术有限公司 Method of guarding network attack
WO2004023732A1 (en) * 2002-09-06 2004-03-18 Infineon Technologies Ag Method and apparatus for storing a port identifier in a lan switch
CN1291341C (en) * 2003-01-30 2006-12-20 烽火通信科技股份有限公司 Method and apparatus for realizing Ethernet passive optical network system dynamic filtration data base
US20050141537A1 (en) * 2003-12-29 2005-06-30 Intel Corporation A Delaware Corporation Auto-learning of MAC addresses and lexicographic lookup of hardware database

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101911648A (en) * 2008-01-11 2010-12-08 阿尔卡特朗讯公司 Facilitating defense against MAC table overflow attacks
CN101911648B (en) * 2008-01-11 2013-10-16 阿尔卡特朗讯公司 Method for facilitating defense against MAC table overflow attacks and Ethernet exchanger
CN101232447B (en) * 2008-02-28 2011-11-30 中兴通讯股份有限公司 Method for controlling learning MAC address preaging
CN101340445B (en) * 2008-08-22 2011-05-11 中兴通讯股份有限公司 Method and apparatus for providing service to MAC address duplicate customer
WO2010020103A1 (en) * 2008-08-22 2010-02-25 中兴通讯股份有限公司 Method and device for providing service for the duplicate mac address users
WO2010025647A1 (en) * 2008-09-02 2010-03-11 中兴通讯股份有限公司 Implementation method for binding the mac address in the broadband access system
CN101674309B (en) * 2009-09-23 2012-05-09 中兴通讯股份有限公司 Ethernet access method and device thereof
CN101800741B (en) * 2010-01-25 2014-08-20 中兴通讯股份有限公司 Device and method for preventing illegal media access control (MAC) address transfer
CN102420762A (en) * 2011-12-05 2012-04-18 北京星网锐捷网络技术有限公司 Message forwarding method, message forwarding system, network equipment and firewall wire card
CN102571564A (en) * 2011-12-19 2012-07-11 福建星网锐捷网络有限公司 Method, apparatus and device for aging static medium access control address
CN103139074A (en) * 2013-02-07 2013-06-05 杭州华三通信技术有限公司 Method and device used for handling media access control (MAC) address conflict
CN103139074B (en) * 2013-02-07 2015-09-30 杭州华三通信技术有限公司 For the treatment of the method and apparatus of MAC Address conflict
CN105704046A (en) * 2014-11-27 2016-06-22 中兴通讯股份有限公司 Multicast routing table entry processing method and device
CN108184176A (en) * 2017-12-30 2018-06-19 武汉长光科技有限公司 A kind of method for preventing illegal optical module access OLT
WO2019183987A1 (en) * 2018-03-31 2019-10-03 华为技术有限公司 Method for transmitting data, and forwarding device
US11387940B2 (en) 2018-03-31 2022-07-12 Huawei Technologies Co., Ltd. Transmitting fragments of ethernet frame with indicating error occurring in ethernet frame
US11799587B2 (en) 2018-03-31 2023-10-24 Huawei Technologies Co., Ltd. Transmitting fragments of ethernet frame with indicating error occurring in ethernet
CN108712449A (en) * 2018-07-12 2018-10-26 新华三技术有限公司 Prevent the method, apparatus and electronic equipment of MAC Address extensive aggression
CN108965131A (en) * 2018-07-27 2018-12-07 新华三技术有限公司 A kind of method and device of message forwarding

Also Published As

Publication number Publication date
CN100438439C (en) 2008-11-26

Similar Documents

Publication Publication Date Title
CN101043355A (en) Method for preventing MAC address cheat
CN102263774B (en) Method and device for processing source role information
CN1132347C (en) Method for maintaining routing between selected network station and mobile station
CN1863133A (en) Method and apparatus for transmitting message
CN101043356A (en) Method for preventing MAC address cheat
CN1312631A (en) Privileged reprojection of data communication exchanger
CN1809032A (en) Method of dynamically learning address on MAC layer
CN1866910A (en) Data message transmission method and Ethernet bridge apparatus based on VLAN
CN101080903A (en) Network node unit and method for forwarding data packets
CN1402480A (en) Method for managing address of medium access control bridge, and said bridge
CN100518142C (en) Method for preventing network interruption caused by address aging and time inconformity
CN1929449A (en) Method of processing packet of virtual lan for network switch
CN1859304A (en) Method for realizing neighbour discovery
JP2011508551A5 (en)
CN101741855A (en) Maintenance method of address resolution protocol cache list and network equipment
CN101123529A (en) Multicast implementation method, system and device based on PCIE switching network
CN103036794A (en) Learning method, device and system of message
TWI310272B (en) A network switch and a method for forwarding an incoming frame in a network switch
CN1691629A (en) Method for implementing layer-2 equipment interconnection in resilient packet ring (RPR) based network
CN1773949A (en) Switching in method for virtual special network and realizing apparatus
CN1913470A (en) Information transmitting method and system between Ethernet equipment
CN102263679B (en) Source role information processing method and forwarding chip
CN1185831C (en) Method for managing users in wide hand city network
CN1249956C (en) Method for virtual Ethernet adapter card
CN1767495A (en) Method for assuring two-layer Ethernet exchanger data safety in city area transmission equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081126

Termination date: 20160519

CF01 Termination of patent right due to non-payment of annual fee