CN101043355A - Method for preventing MAC address cheat - Google Patents
Method for preventing MAC address cheat Download PDFInfo
- Publication number
- CN101043355A CN101043355A CNA2006100608205A CN200610060820A CN101043355A CN 101043355 A CN101043355 A CN 101043355A CN A2006100608205 A CNA2006100608205 A CN A2006100608205A CN 200610060820 A CN200610060820 A CN 200610060820A CN 101043355 A CN101043355 A CN 101043355A
- Authority
- CN
- China
- Prior art keywords
- mac address
- port
- list item
- item
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Small-Scale Networks (AREA)
Abstract
The disclosed method for preventing the cheat of MAC address comprises: CPU system sets the dynamic MAC address transmission list item on up port as static state, and simulates the aging mechanism of chip MAC address for former up port list item to prevent cheating MAC address. This invention can record user port suffered malevolent attack and the attack time to notify user through CPU system man-machine interface and network management system in time.
Description
Technical field
The present invention relates to the data communication field, specifically, relate to a kind of method that prevents MAC address spoofing.
Background technology
The IEEE802.3 standard code in the ethernet mac frame of a standard, has target MAC (Media Access Control) address and source MAC, and length all is 6 bytes, and Fig. 1 is the ethernet mac frame format of standard, wherein:
Destination Address: target MAC (Media Access Control) address, 6Bytes
Source Address: source MAC, 6Bytes
Length/type: data length or type of message, 2Bytes
DATA: ethernet frame data carried by data territory
FCS: Frame Check Sequence
Which platform physical equipment target MAC (Media Access Control) address will be sent in order to the sign ethernet frame, and which platform physical equipment source MAC is sent by in order to the sign ethernet frame.First bit position of target MAC (Media Access Control) address (the minimum bit position of first byte) expression target MAC (Media Access Control) address is unicast address or multicast address, if 0, the expression target MAC (Media Access Control) address is a unicast address, if 1, the expression target MAC (Media Access Control) address is a multicast address.
If the target MAC (Media Access Control) address of ethernet frame is a unicast mac address, ethernet frame is behind access arrangement, equipment can be searched the mac address forwarding table item according to the target MAC (Media Access Control) address and the VLAN ID (Virtual LAN ID) of ethernet frame, if find, then according to the port numbers in the forwarding-table item, ethernet frame is forwarded from this port,, then all of the port of ethernet frame in this VLAN can be broadcasted if do not find.
IEEE 802.1Q (Virtual Bridged Local Area Networks) has stipulated the implementation of VLAN in the Ethernet.After the source MAC of the ethernet frame of standard, increase the 802.1Q label of one 4 byte, Fig. 2 is the 802.1Q frame format of standard, 802.1Q label comprises the tag protocol identifier (TPID of 2 bytes, Tag Protocol Identifier) and the tag control information of two bytes (TCI, TagControl Information).The TPID value is hexadecimal 8100, is used to identify the ethernet frame that this ethernet frame is the 802.1Q label; The detailed content of TCL as shown in Figure 3, wherein (VLAN ID VLANIdentifier) is one 12 territory to VID, identifies different VLAN, and value is 0~4095, is used to distinguish 4096 VLAN.Each data message of supporting the equipment of 802.1Q agreement to send out all can comprise this territory, to indicate own affiliated VLAN.
If equipment is received one not with the ethernet frame of 802.1Q label, can increase the label of 802.1Q according to port (or according to source MAC or message protocol type etc.); If receive the ethernet frame that has the 802.1Q label, ethernet frame is not made any modification.After receiving ethernet frame, equipment can increase corresponding forwarding-table item, and source MAC, VLAN ID and the port numbers of ethernet frame are noted, and this is called the study of MAC Address, and the basic format of ethernet mac address forwarding-table item as shown in Figure 4.
Source MAC is before study, equipment can be searched the mac address forwarding table item according to source MAC and VLAN ID, if find identical list item, and the port numbers difference, can upgrade forwarding-table item according to new port numbers, this is called website and shifts (station movement).If do not find identical list item, can increase a new forwarding-table item.The mac address forwarding table item can be divided into static mac address forwarding-table item and dynamic MAC address forwarding-table item, the static mac address forwarding-table item can only manual configuration in equipment, can not carry out website shifts, be that the port numbers of static mac address forwarding-table item can not enter automatically from different ports according to ethernet frame and upgrades, and dynamic MAC address can carry out the website transfer, be that the port numbers of dynamic MAC address forwarding-table item can enter automatically from different ports according to ethernet frame and upgrades, dynamic MAC address can wear out within a certain period of time, promptly can be deleted by network exchanging chip.
Usually can support the learning state of multiple MAC Address in the port attribute of network exchanging chip; commonly used is that MAC Address can be learnt to shift with website automatically; port can also be arranged to learn slave mode in addition: port can not learnt MAC Address automatically; if the source MAC in the ethernet frame does not exist on this port; hardware is not transmitted this ethernet frame, and delivers cpu system.
Because in access device, port can be divided into uplink port and user port, uplink port is meant the port that links to each other with upstream plant, upstream plant typically refers to three-tier switch or BAS (Broadband AccessServer, BAS Broadband Access Server), user port is meant the port that links to each other with subscriber computer or other two, three-tier switch.May learn the MAC Address of upstream plant at uplink port, may learn the MAC Address of subscriber equipment at user port, the ethernet frame that subscriber equipment sends, target MAC (Media Access Control) address is the MAC Address of upstream plant, after this ethernet frame arrival equipment, equipment can be searched the mac address forwarding table item, because the port numbers in the upstream plant mac address forwarding table item is a uplink port, institute's ethernet frame can be forwarded from uplink port by equipment, as shown in Figure 5.
If the MAC Address of subscriber equipment 1 is identical with the MAC Address of upstream plant, the perhaps MAC Address of the counterfeit upstream plant of subscriber equipment 1 malice, at this moment the MAC Address of upstream plant will be learnt at user port 1, the ethernet frame that subscriber equipment 2 sends to upstream plant, will be forwarded to user port 1 mistakenly, thereby cause subscriber equipment 2 to send ethernet frame to upstream plant, subscriber equipment 2 can't normally be surfed the Net, as shown in Figure 6.
Simultaneously, when the MAC Address of upstream plant was carried out the website transfer, equipment can not notify cpu system to handle, so can't detect the MAC Address of the counterfeit upstream plant of which subscriber equipment.
Do not support the situation of MAC Address collision detection in the prior art for common chip, common way is:
In uplink port configuring static MAC Address, described MAC Address is the MAC Address of upstream plant; If have a plurality of VLAN to exist, need in each VLAN, dispose a static mac address.When the source MAC of the ethernet frame that enters from user port is identical with the upstream plant MAC Address,, shift so website can not take place such MAC Address because uplink port has disposed static MAC Address.
But prior art has following shortcoming:
(1) because static configuration need be known the MAC Address of upstream plant earlier, do not knowing to realize static configuration under the upstream plant MAC Address situation;
(2) when a plurality of VLAN exist, need be in each VLAN the configuring static MAC Address, configuration is complicated;
(3) the website transfer that static mac address can only limit MAC Address is set, can't detect is which port has caused the MAC Address conflict.
Summary of the invention
Described in view of this, the method and apparatus that prevents MAC address spoofing provided by the invention has solved the MAC Address that need know upstream plant when uplink port configuring static MAC Address of the prior art, and configuration is complicated; And the MAC Address website problem of not notifying CPU to handle when shifting.
A kind of method that prevents MAC address spoofing provided by the invention, comprise: the dynamic MAC address forwarding-table item by the cpu system uplink port is set to static state, and the aging mechanism of the MAC Address of analog chip is that the mac address forwarding table item of uplink port carries out burin-in process and prevents MAC address spoofing to port.
Described burin-in process process comprises:
(1) cpu system is the cycle with the ageing time of MAC Address, the port numbers of regularly inquiring about in the mac address forwarding table is the mac address forwarding table item of uplink port, when state when being dynamic, be static state with the status modifier of this list item, the HIT position is set, and this list item is recorded in the software mac address table.
(2) if the port of the mac address forwarding table item that inquires is a uplink port, state is static, and this list item has been recorded in the software mac address table, then checks the HIT position of this list item, if the HIT position is eliminated, deletes this mac address forwarding table item.Otherwise, remove the HIT position.
Also comprise: after message enters from user port, when detecting in mac address forwarding table source MAC and the identical list item of VLAN ID thereof that has its MAC Address and VLAN ID thereof and message, and the port numbers that port numbers in the list item and message enter is inequality, and this list item is dynamic, port numbers in this mac address forwarding table item is changed to the user port number that message enters, remove the HIT position, and message is normally transmitted; And if this list item is static, what prove that this message has is illegal MAC Address.
If the port of the mac address forwarding table item that inquires is a uplink port, state is static, but this list item is not recorded in the software mac address table, this forwarding-table item is not handled.
Also comprise described illegal MAC Address and port information record, and by man-machine interface output or informing network management system.
Utilize the present invention, can solve because the subscriber equipment that MAC address spoofing or MAC Address repeat to cause can't send the problem of ethernet frame to upstream plant.Dynamic MAC address forwarding-table item by the cpu system uplink port is set to static state, and the aging mechanism of the MAC Address of analog chip, to port is that the mac address forwarding table item of uplink port carries out burin-in process, even the MAC Address of a certain list item is identical with VLAN ID the source MAC of the message that enters from user port and VLAN ID and the mac address forwarding table like this, because the mac address forwarding table item of uplink port all is set to static, the MAC Address website can not take place shift, so the message that can avoid mailing to uplink port for fear of subscriber equipment is forwarded on other user port by mistake;
And utilize and the invention solves the configuration complicated problems;
Simultaneously further when detecting user port the MAC Address identical with upstream plant arranged, can write down the user port number that malicious attack takes place, and the time of carrying out malicious attack, can in time notify the user in case of necessity.
Description of drawings
Fig. 1 is an ethernet mac frame schematic diagram;
Fig. 2 is the ethernet frame schematic diagram that has the 802.1Q label;
Fig. 3 is the TCL part schematic diagram in the 802.1Q label;
Fig. 4 ethernet mac address forwarding-table item schematic diagram;
Fig. 5 correctly is forwarded to the uplink port schematic diagram for the user port ethernet frame;
Fig. 6 is forwarded to other port schematic diagram for user port ethernet frame mistake;
Fig. 7 carries out the burin-in process flow chart for the present invention to the mac address forwarding table item of uplink port;
Fig. 8 is the process chart to message of the present invention.
Embodiment
The present invention is set to static state by the dynamic MAC address forwarding-table item of cpu system uplink port, and the aging mechanism of the MAC Address of analog chip, is that the mac address forwarding table item of uplink port carries out burin-in process to port.
Owing to have a HIT position usually in each mac address forwarding table item, be used to represent whether this list item is hit, and that is to say, when the source MAC in the message was identical with a mac address forwarding table item with VLAN ID, the HIT position of this list item can be set.
Network exchanging chip can be checked the dynamic MAC address list item in the mac address forwarding table according to the ageing time of setting, if the position, HIT position in the list item, then with the HIT bit clear, after the HIT position is eliminated, if continue to have source MAC and the VLAN ID message identical with VLAN ID with this list item MAC Address to enter, the HIT position of this list item is put again; If HIT please be removed the position when detecting, then prove in a digestion period do not have the message of identical sources MAC Address and VLAN ID to enter, this MAC Address list item is with deleted, just by aging.
Wherein the MAC address aging mechanism of cpu system analog chip is carried out the burin-in process flow process as shown in Figure 7 to the mac address forwarding table item of uplink port:
Step 701: regularly after the inquiry beginning, at first finding port numbers is the mac address forwarding table item of uplink port;
Step 702: judge then whether the mac address forwarding table item that is found is dynamic;
Step 703: if the mac address forwarding table item that is found is dynamic, just the status modifier with this list item is static, and establishes the HIT position;
Step 704: and described list item recorded in the software mac address table, this flow process finished;
Step 705:, check then whether this list item has been recorded in the software mac address table if the mac address forwarding table item that is found is static;
Step 706: if this list item is not noted down in the software mac address table, the MAC Address that is not setting in step 703 being described, is other static mac address (such as by the order line configuration), this list item is not handled, and finishes this flow process.
Step 707:, just check further whether the HIT position of this list item is eliminated if this list item is recorded in the software mac address table;
Step 708: if the HIT position of this list item also exists, remove this HIT position, finish this flow process;
Step 709:, then in mac address forwarding table, delete this mac address forwarding table item if the HIT position of this list item is to be eliminated.
Therefore, cpu system is the cycle with the ageing time of MAC Address, regularly inquire about mac address forwarding table, if the port of mac address forwarding table item is a uplink port, and state is dynamic, then the status modifier with this list item is static, the HIT position is set, and this list item is recorded in the software mac address table.At this moment, if the MAC Address of a certain list item is identical with VLAN ID the source MAC of the message that enters from user port and VLAN ID and the mac address forwarding table, because the mac address forwarding table item of uplink port all is set to static,, do not shift the MAC Address website so can not taking place.
Below in conjunction with Fig. 8 the handling process to message of the present invention is specifically described:
Step 801: message enters from user port;
Step 802: detect source MAC and the corresponding identical list item of VLAN ID thereof in mac address forwarding table, whether have its MAC Address and VLANID thereof and message;
Step 803: the if there is no source MAC and the corresponding identical list item of VLAN ID thereof of its MAC Address and VLAN ID thereof and message, user port is learnt this MAC Address, and normally transmits this message;
Step 804:, judge further that then the port numbers in this list item is whether identical with the port numbers that message enters if having the source MAC and the corresponding identical list item of VLAN ID thereof of its MAC Address and VLAN ID thereof and message;
Step 805: if the port numbers in this list item is identical with the port numbers that message enters, illustrate that this message is a normal message, can normal process;
Step 806:, judge further whether the state of this list item is dynamic if the port numbers that port numbers in this list item and message enter is inequality;
Step 807:, then the port numbers in this mac address forwarding table item is changed to the user port number that message enters, and the HIT position is set, and message is normally transmitted if this list item is dynamic;
Step 808: if this list item is static, proves with the MAC Address of upstream plant and repeat, is illegal MAC Address;
Step 809: send cpu system to handle message, the relevant invalid information of cpu system record, such as the user port number that malicious attack takes place, and the time of carrying out malicious attack, can in time notify the user in case of necessity.
Also have other that mac address forwarding table item of uplink port is carried out the means of burin-in process, but similar substantially with the technological means of above exposure.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.
Claims (6)
1. method that prevents MAC address spoofing, it is characterized in that, the dynamic MAC address forwarding-table item of cpu system uplink port is set to static state, and the aging mechanism of the MAC Address of analog chip is that the forwarding-table item of the MAC Address of uplink port carries out burin-in process and prevents MAC address spoofing to port.
2. method according to claim 1 is characterized in that, the aging mechanism of the MAC Address of described analog chip comprises:
(1) cpu system is the cycle with the ageing time of MAC Address, regularly the port numbers of inquiring about in the mac address forwarding table is the state of the mac address forwarding table item of uplink port, when state when being dynamic, with the status modifier of this list item is static, the HIT position is set, and this list item is recorded in the software mac address table.
(2) if the port of the mac address forwarding table item that inquires is a uplink port, state is static, and this list item has been recorded in the software mac address table, then checks the HIT position of this list item, if the HIT position is eliminated, deletes this mac address forwarding table item.Otherwise, remove the HIT position.
3. method according to claim 2 is characterized in that if the port of the mac address forwarding table item that inquires is a uplink port, and state is static, but this list item is not recorded in the software mac address table, this forwarding-table item is not handled.
4. method according to claim 2, it is characterized in that, also comprise: after message enters from user port, when detecting in mac address forwarding table source MAC and the identical list item of VLAN ID thereof that has its MAC Address and VLAN ID thereof and message, and the port numbers that port numbers in the list item and message enter is inequality, and this list item is dynamic, the port numbers in this mac address forwarding table item is changed to the user port number that message enters, and message is normally transmitted.
5. method according to claim 3, it is characterized in that, after message enters from user port, when detecting in mac address forwarding table source MAC and the identical list item of VLAN ID thereof that has its MAC Address and VLAN ID thereof and message, and the port numbers that port numbers in the list item and message enter is inequality, and this list item is static, and what prove that this message has is illegal MAC Address.
6. method according to claim 5 is characterized in that, comprises described illegal MAC Address and port information record, and by man-machine interface output or informing network management system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100608205A CN100438439C (en) | 2006-05-19 | 2006-05-19 | Method for preventing MAC address cheat |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100608205A CN100438439C (en) | 2006-05-19 | 2006-05-19 | Method for preventing MAC address cheat |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101043355A true CN101043355A (en) | 2007-09-26 |
CN100438439C CN100438439C (en) | 2008-11-26 |
Family
ID=38808586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100608205A Expired - Fee Related CN100438439C (en) | 2006-05-19 | 2006-05-19 | Method for preventing MAC address cheat |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100438439C (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010020103A1 (en) * | 2008-08-22 | 2010-02-25 | 中兴通讯股份有限公司 | Method and device for providing service for the duplicate mac address users |
WO2010025647A1 (en) * | 2008-09-02 | 2010-03-11 | 中兴通讯股份有限公司 | Implementation method for binding the mac address in the broadband access system |
CN101911648A (en) * | 2008-01-11 | 2010-12-08 | 阿尔卡特朗讯公司 | Facilitating defense against MAC table overflow attacks |
CN101232447B (en) * | 2008-02-28 | 2011-11-30 | 中兴通讯股份有限公司 | Method for controlling learning MAC address preaging |
CN102420762A (en) * | 2011-12-05 | 2012-04-18 | 北京星网锐捷网络技术有限公司 | Message forwarding method, message forwarding system, network equipment and firewall wire card |
CN101674309B (en) * | 2009-09-23 | 2012-05-09 | 中兴通讯股份有限公司 | Ethernet access method and device thereof |
CN102571564A (en) * | 2011-12-19 | 2012-07-11 | 福建星网锐捷网络有限公司 | Method, apparatus and device for aging static medium access control address |
CN103139074A (en) * | 2013-02-07 | 2013-06-05 | 杭州华三通信技术有限公司 | Method and device used for handling media access control (MAC) address conflict |
CN101800741B (en) * | 2010-01-25 | 2014-08-20 | 中兴通讯股份有限公司 | Device and method for preventing illegal media access control (MAC) address transfer |
CN105704046A (en) * | 2014-11-27 | 2016-06-22 | 中兴通讯股份有限公司 | Multicast routing table entry processing method and device |
CN108184176A (en) * | 2017-12-30 | 2018-06-19 | 武汉长光科技有限公司 | A kind of method for preventing illegal optical module access OLT |
CN108712449A (en) * | 2018-07-12 | 2018-10-26 | 新华三技术有限公司 | Prevent the method, apparatus and electronic equipment of MAC Address extensive aggression |
CN108965131A (en) * | 2018-07-27 | 2018-12-07 | 新华三技术有限公司 | A kind of method and device of message forwarding |
WO2019183987A1 (en) * | 2018-03-31 | 2019-10-03 | 华为技术有限公司 | Method for transmitting data, and forwarding device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1152517C (en) * | 2002-04-23 | 2004-06-02 | 华为技术有限公司 | Method of guarding network attack |
WO2004023732A1 (en) * | 2002-09-06 | 2004-03-18 | Infineon Technologies Ag | Method and apparatus for storing a port identifier in a lan switch |
CN1291341C (en) * | 2003-01-30 | 2006-12-20 | 烽火通信科技股份有限公司 | Method and apparatus for realizing Ethernet passive optical network system dynamic filtration data base |
US20050141537A1 (en) * | 2003-12-29 | 2005-06-30 | Intel Corporation A Delaware Corporation | Auto-learning of MAC addresses and lexicographic lookup of hardware database |
-
2006
- 2006-05-19 CN CNB2006100608205A patent/CN100438439C/en not_active Expired - Fee Related
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101911648A (en) * | 2008-01-11 | 2010-12-08 | 阿尔卡特朗讯公司 | Facilitating defense against MAC table overflow attacks |
CN101911648B (en) * | 2008-01-11 | 2013-10-16 | 阿尔卡特朗讯公司 | Method for facilitating defense against MAC table overflow attacks and Ethernet exchanger |
CN101232447B (en) * | 2008-02-28 | 2011-11-30 | 中兴通讯股份有限公司 | Method for controlling learning MAC address preaging |
CN101340445B (en) * | 2008-08-22 | 2011-05-11 | 中兴通讯股份有限公司 | Method and apparatus for providing service to MAC address duplicate customer |
WO2010020103A1 (en) * | 2008-08-22 | 2010-02-25 | 中兴通讯股份有限公司 | Method and device for providing service for the duplicate mac address users |
WO2010025647A1 (en) * | 2008-09-02 | 2010-03-11 | 中兴通讯股份有限公司 | Implementation method for binding the mac address in the broadband access system |
CN101674309B (en) * | 2009-09-23 | 2012-05-09 | 中兴通讯股份有限公司 | Ethernet access method and device thereof |
CN101800741B (en) * | 2010-01-25 | 2014-08-20 | 中兴通讯股份有限公司 | Device and method for preventing illegal media access control (MAC) address transfer |
CN102420762A (en) * | 2011-12-05 | 2012-04-18 | 北京星网锐捷网络技术有限公司 | Message forwarding method, message forwarding system, network equipment and firewall wire card |
CN102571564A (en) * | 2011-12-19 | 2012-07-11 | 福建星网锐捷网络有限公司 | Method, apparatus and device for aging static medium access control address |
CN103139074A (en) * | 2013-02-07 | 2013-06-05 | 杭州华三通信技术有限公司 | Method and device used for handling media access control (MAC) address conflict |
CN103139074B (en) * | 2013-02-07 | 2015-09-30 | 杭州华三通信技术有限公司 | For the treatment of the method and apparatus of MAC Address conflict |
CN105704046A (en) * | 2014-11-27 | 2016-06-22 | 中兴通讯股份有限公司 | Multicast routing table entry processing method and device |
CN108184176A (en) * | 2017-12-30 | 2018-06-19 | 武汉长光科技有限公司 | A kind of method for preventing illegal optical module access OLT |
WO2019183987A1 (en) * | 2018-03-31 | 2019-10-03 | 华为技术有限公司 | Method for transmitting data, and forwarding device |
US11387940B2 (en) | 2018-03-31 | 2022-07-12 | Huawei Technologies Co., Ltd. | Transmitting fragments of ethernet frame with indicating error occurring in ethernet frame |
US11799587B2 (en) | 2018-03-31 | 2023-10-24 | Huawei Technologies Co., Ltd. | Transmitting fragments of ethernet frame with indicating error occurring in ethernet |
CN108712449A (en) * | 2018-07-12 | 2018-10-26 | 新华三技术有限公司 | Prevent the method, apparatus and electronic equipment of MAC Address extensive aggression |
CN108965131A (en) * | 2018-07-27 | 2018-12-07 | 新华三技术有限公司 | A kind of method and device of message forwarding |
Also Published As
Publication number | Publication date |
---|---|
CN100438439C (en) | 2008-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101043355A (en) | Method for preventing MAC address cheat | |
CN102263774B (en) | Method and device for processing source role information | |
CN1132347C (en) | Method for maintaining routing between selected network station and mobile station | |
CN1863133A (en) | Method and apparatus for transmitting message | |
CN101043356A (en) | Method for preventing MAC address cheat | |
CN1312631A (en) | Privileged reprojection of data communication exchanger | |
CN1809032A (en) | Method of dynamically learning address on MAC layer | |
CN1866910A (en) | Data message transmission method and Ethernet bridge apparatus based on VLAN | |
CN101080903A (en) | Network node unit and method for forwarding data packets | |
CN1402480A (en) | Method for managing address of medium access control bridge, and said bridge | |
CN100518142C (en) | Method for preventing network interruption caused by address aging and time inconformity | |
CN1929449A (en) | Method of processing packet of virtual lan for network switch | |
CN1859304A (en) | Method for realizing neighbour discovery | |
JP2011508551A5 (en) | ||
CN101741855A (en) | Maintenance method of address resolution protocol cache list and network equipment | |
CN101123529A (en) | Multicast implementation method, system and device based on PCIE switching network | |
CN103036794A (en) | Learning method, device and system of message | |
TWI310272B (en) | A network switch and a method for forwarding an incoming frame in a network switch | |
CN1691629A (en) | Method for implementing layer-2 equipment interconnection in resilient packet ring (RPR) based network | |
CN1773949A (en) | Switching in method for virtual special network and realizing apparatus | |
CN1913470A (en) | Information transmitting method and system between Ethernet equipment | |
CN102263679B (en) | Source role information processing method and forwarding chip | |
CN1185831C (en) | Method for managing users in wide hand city network | |
CN1249956C (en) | Method for virtual Ethernet adapter card | |
CN1767495A (en) | Method for assuring two-layer Ethernet exchanger data safety in city area transmission equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081126 Termination date: 20160519 |
|
CF01 | Termination of patent right due to non-payment of annual fee |