CN102164042A - Connectivity fault alarming method and device - Google Patents

Connectivity fault alarming method and device Download PDF

Info

Publication number
CN102164042A
CN102164042A CN2010101109677A CN201010110967A CN102164042A CN 102164042 A CN102164042 A CN 102164042A CN 2010101109677 A CN2010101109677 A CN 2010101109677A CN 201010110967 A CN201010110967 A CN 201010110967A CN 102164042 A CN102164042 A CN 102164042A
Authority
CN
China
Prior art keywords
ccm
message
secure authenticated
authenticated information
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101109677A
Other languages
Chinese (zh)
Inventor
岳坚飞
钱锋
韩涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2010101109677A priority Critical patent/CN102164042A/en
Publication of CN102164042A publication Critical patent/CN102164042A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the invention relates to a connectivity fault alarming method which belongs to the field of communication. The connectivity fault alarming method comprises the following steps: receiving a connectivity check message (CCM), and judging whether the CCM carries safety certification information or not; if so, verifying whether the CCM is a legal message according to the safety certification information; and detecting the verified legal message, and determining whether to trigger an alarm according to the detection results. The embodiment of the invention also provides a connectivity fault alarming device, an alarming message sending method and an alarming message sending device. According to the embodiment of the invention, the problem that the security of 802.1ag is poor is solved; and because of safety certification on the received CCM firstly, whether an alarm needs to be triggered can be determined under the condition that the CCM is verified to be a legal message, the application of the method in current networks can effectively prevent serious problems of other associated services, which are caused by alarms triggered by a CCM maliciously counterfeited by attackers or alarm triggered by abandoned configurations.

Description

A kind of failure of connectivity alarm method and device
Technical field
The present invention relates to communication technical field, relate in particular to a kind of failure of connectivity alarm method and device.
Background technology
Institute of Electrical and Electric Engineers (IEEE, Institute of Electrical and ElectronicsEngineers) the 802.1ag agreement mainly is to be used for ethernet operation, to manage and to safeguard (OAM, Operations, Administration and Maintenance) fault management in, wherein defined connectivity testing message (CCM, Continuity Check Message), be used to detect the failure of connectivity of link.802.1ag the CCM of definition detects, the alarm that reports after detecting fault has following several:
No. 1 alarm: far-end faulty indication (RDI, Remote Defect Indication) alarm.When receiving the CCM that carries RDI, report this alarm.
No. 2 alarms: bridge device MAC layer state (MAC Status) alarm.When receiving the CCM that carries Interface status TLV (interface status TLV comprises Up, states such as Down) or port status TLV (portstatus TLV, the blocked state of main demonstration forwarding layer or connected state etc.), can report this alarm.
No. 3 alarms: outage appears in link.
No. 4 alarms: the frequency at two ends is inconsistent or receive the inconsistent of source MAC among the CCM and expectation.
No. 5 alarms: the name configuration of maintenance field at two ends (MD, Maintenance Domain) and Maintenance Association (MA, Maintenane Association) is inconsistent.
No. 1, No. 2, No. 4 and No. 5 alarms; all be because some field of carrying among the CCM causes; and these alarms all can cause at last the session connection of agreement to interrupt (being session down), if disposed 802.1ag agreement and other protection agreements interlocks, then can the trigger protection agreement switch.
Safeguard destination node (MEP for an equipment in the scheme of prior art, Maintenanceassociation End Point), pre-configured remote maintenance destination node (RMEP, RemoteMaintenance association End Point) table, be used to receive the CCM that expectation receives that the MEP of other equipment sends, all bound MAC Address in advance for each RMEP, consistent with the MAC Address of the corresponding MEP of other equipment.When the MAC Address of source MAC among the CCM that RMEP receives and local terminal RMEP binding is inconsistent, think that then this CCM is illegal message.
Except owing to the above-mentioned alarm of fault triggered as normal, also have some other unexpected mode can cause triggering above-mentioned alarm, for example:
1) malicious attack: the counterfeit CCM of assailant is arranged on the network, revise some field wherein, such as MD and MA name, remote maintenance destination node (the RMEP that will cause the opposite end, RemoteMaintenance association End Point) connects interruption (being the RMEP display session Down of opposite equip. configuration), if disposed the interlock function, then mistake that also can trigger link is switched.As shown in fig. 1, A equipment all disposes identical MD+MA name with B equipment, for example is " Admin ", all carries the field of MD+MA for " Admin " between two equipment among the mutual CCM that sends.As the CCM of the counterfeit A equipment of assailant, only revise MD+MA and be " Hacker ", when sending to equipment B continuously, after B equipment was received attack message, verification and local terminal configuration were inconsistent, then report and alarm, trigger RMEP Down, the CCM that has destroyed between A equipment and the B equipment detects.
2) Fei Qi configuration can cause occurring unwanted alarm: described discarded configuration packet includes network upgrading or discarded when planning again, but because human error does not have the configuration of deletion, and should discarded configuration still can send CCM, because this configuration is discarded, source MAC (SMAC) can be received recognition of devices for wrong among the CCM of configuration transmission that should be discarded, MD and MA name can be received recognition of devices for wrong among the CCM of configuration transmission that perhaps should be discarded, therefore can send unnecessary alarm after receiving equipment receives this CCM, upset the normal CCM testing process of receiving equipment.
The inventor finds that there is following shortcoming at least in existing scheme in realizing process of the present invention:
Existing 802.1ag alarm scheme can produce some unnecessary alarms, for example, the alarm that discarded configuration causes, and the assailant intercepts the counterfeit MAC in back, revises other fields and attack the alarm that causes, these unnecessary alarms can cause that serious problems appear in other traffic associated, and influence normal CCM testing process.
Summary of the invention
The embodiment of the invention provides a kind of failure of connectivity alarm method and device, and the CCM testing process of 802.1ag is carried out safety certification, avoids triggering unnecessary alarm.
The embodiment of the invention is achieved through the following technical solutions:
The embodiment of the invention provides a kind of failure of connectivity alarm method, comprising:
Receive connectivity testing message CCM, whether judge among the described CCM authentication information safe to carry;
If authentication information safe to carry among the described CCM then verifies according to described secure authenticated information whether described CCM is legal message;
Detect being verified as legal CCM, determine whether to trigger alarm according to testing result.
The embodiment of the invention provides a kind of failure of connectivity alarm device, comprising:
Receiving element is used to receive connectivity testing message CCM;
First judging unit is used for judging whether authentication information safe to carry of described CCM;
Second judging unit is used for carrying under the situation of described secure authenticated information at the described CCM of described first judgment unit judges, verifies according to described secure authenticated information whether described CCM is legal message;
Legal message detecting unit is used for detecting being verified as legal CCM, determines whether to trigger alarm according to testing result.
The embodiment of the invention provides a kind of warning message sending method, comprising:
Structure connectivity testing message CCM adds secure authenticated information in described CCM; Described secure authenticated information is used to verify whether described CCM is legal message;
Send the CCM that adds secure authenticated information.
The embodiment of the invention provides a kind of warning message dispensing device, comprising:
Structural unit is used to construct connectivity testing message CCM, adds secure authenticated information in described CCM; Described secure authenticated information is used to verify whether described CCM is legal message;
Transmitting element is used to send the CCM that adds secure authenticated information.
The technical scheme that is provided by the invention described above embodiment as can be seen, the embodiment of the invention has solved the problem of 802.1ag fail safe weakness, the CCM that receives is carried out safety certification earlier, in authentication is under the legal situation, need to determine whether alarm again, in the application of existing network, can effectively defend to trigger other traffic associated that the alarm of alarm and discarded configure trigger causes and serious problems occur by the counterfeit CCM message of assailant's malice.
Description of drawings
Fig. 1 causes alarming schematic diagram for prior art malicious attack;
Fig. 2 is an one embodiment of the invention failure of connectivity alarm method flow chart;
Fig. 3 is an one embodiment of the invention CCM message structure schematic diagram;
Fig. 4 is an one embodiment of the invention TLV structural representation;
Fig. 5 is an one embodiment of the invention failure of connectivity alarm device structural representation;
Fig. 6 is the second judging unit structural representation in the one embodiment of the invention failure of connectivity alarm device;
Fig. 7 is an one embodiment of the invention warning message sending method flow chart;
Fig. 8 is an one embodiment of the invention warning message dispensing device structural representation;
Fig. 9 is a structural unit structural representation in the one embodiment of the invention warning message dispensing device.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, be understandable that described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
One embodiment of the invention provides a kind of failure of connectivity alarm method, and to be example shown in Fig. 2, this method comprises the steps:
Step 10: receive CCM;
This CCM is the message that is used to detect the failure of connectivity of link.
Step 11: judge whether there is secure authenticated information among the described CCM;
Embodiment of the invention CCM message structure as shown in Figure 3, wherein grey place field be for triggering the field of alarm, promptly when in these fields one or more with expect inconsistent the time then can trigger alarm.The described secure authenticated information of the embodiment of the invention is used to verify whether described CCM is legal message; Comprise summary in this secure authenticated information, this summary is the calculation of equipments of this CCM of transmission and is added among this CCM.
The described secure authenticated information of one embodiment of the invention can comprise a kind of TLV, and this TLV is a kind of coded system, by type, and length, the value tlv triple is encoded, and a kind of optional TLV structure comprises following field as shown in Figure 4:
Type Type:1 byte is used to represent that this TLV is the TLV that is used to carry out safety certification.
Length L ength field: 2 bytes, this Length field is used to represent the length altogether of encrypting and authenticating pattern and identifying code or abstract fields, promptly the CodeType field adds the length of Key or Digest field;
CodeType:1 byte, expression encrypting and authenticating pattern;
Key or Digest: elongated, length is Length-1 byte, and this field is carried identifying code or summary.
If do not have authentication information safe to carry among the described CCM, determine that then described CCM is an invalid packet, can abandon this invalid packet; If authentication information safe to carry among the described CCM, then execution in step 12;
Step 12: verify according to described secure authenticated information whether described CCM is legal message;
Secure authenticated information among the CCM that CCM recipient receives can comprise summary, and all fields that can trigger alarm are according to predetermined computational methods calculating among key that this summary is consulted for the both sides of CCM transmit leg utilization transmitting-receiving CCM and the CCM.The CCM transmit leg adds the secure authenticated information that comprises this summary in CCM, and this CCM is sent to CCM recipient.The key that the both sides of the described transmitting-receiving of embodiment of the invention CCM consult is the key at a kind of configuration, and just each renewal configuration will corresponding more new key.
The field that CCM recipient utilizes among key that the both sides of the described CCM of transmitting-receiving consult and the CCM all can trigger alarm is calculated summary according to predetermined computational methods, with the summary comparison that comprises in the summary that calculates and the secure authenticated information, if consistent, determine that then described CCM is legal message.For example, comprise TLV with secure authenticated information, and the digest calculations mode is that MD5 fixed key certification mode is an example, two ends consult to determine the key of configuration in advance, the SMAC field among the CCM is all adopted at two ends, Flag field (comprising the RDI bit), MD+MA name, Port status TLV, Interface status TLV, sequence number and the key of consulting in advance calculate summary together, an end that sends CCM adds the summary that calculates among the Keyor Digest to, receiving terminal is compared according to the summary in summary that calculates with quadrat method and the Key or Digest field, if unanimity shows that then the CCM of this reception is legal message, otherwise is invalid packet.
Above-mentioned cited only be a kind of embodiment, also can adopt other encrypting and authenticating patterns in the practical application, for example adopt the SHA-1 scheduling algorithm, its basic authentication thinking just substitutes the md5 encryption algorithm with other cryptographic algorithm such as SHA-1 with the scheme that adopts MD5.
The embodiment of the invention is with RDI, SMAC, the field that meetings such as MD+MA trigger alarm all adds the computations process, even the assailant revises these fields, but owing to there is not key, also can't generate the summary that is complementary, thereby can't be counterfeit, effectively realized attack protection, and sequence number has been added calculating, the summary that make to generate is also in dynamic change, and counterfeit again after the assailant intercepts is out-of-date message.For discarded configuration, because the key of its setting is invalid, so CCM recipient can verify out that the CCM that this discarded configuration sends is an invalid packet, makes discard processing alternatively, therefore can not trigger unnecessary alarm.
Can also adopt the plaintext authentication pattern, make in the concrete application scenarios of the embodiment of the invention that the CodeType value is 1 to show that the encrypting and authenticating pattern is the plaintext authentication pattern, the CodeType value is 2 to show that the encrypting and authenticating pattern is a MD5 fixed key certification mode.
If the encrypting and authenticating pattern among the TLV is indicated as the plaintext authentication pattern, then will comprise corresponding identifying code in the Key or Digest field, whether the identifying code that comprises among the checking TLV is consistent with the identifying code of local terminal configuration, if it is inconsistent, determine that then described CCM is an invalid packet, if unanimity determines that then described CCM is legal message; Just embodiment of the invention terminal device need pre-determine and dispose identical identifying code.This plaintext authentication pattern realizes simple, goes for the relatively low equipment of calculated performance.
Alternatively, embodiment of the invention transmitting-receiving CCM both sides can consult regular update and calculate the key that summary uses.
Intercept the CCM message of triggered as normal alarm for the assailant after, the message that long-time bogus attack sends can be prompted to the user.
Step 13: detect being verified as legal CCM, determine whether to trigger alarm according to testing result.
The embodiment of the invention can detect being verified as legal CCM, determine whether alarm, concrete detect legal CCM and determine whether that the method embodiment of the invention of alarming do not do concrete qualification to this, for example can detect whether carry RDI among the CCM, then trigger No. 1 alarm or the like if carry.Avoided because serious problems appear in other traffic associated that malicious attack or the alarm of address configuration erroneous trigger cause.
The failure of connectivity alarm method that the embodiment of the invention provides has solved the problem of 802.1ag fail safe weakness, the CCM that receives is carried out safety certification earlier, in authentication is under the legal situation, need to determine whether alarm again, in the application of existing network, can effectively defend to trigger other traffic associated that the alarm of alarm and discarded configure trigger causes and serious problems occur by the counterfeit CCM message of assailant's malice.
The embodiment of the invention can realize by hardware, for example utilize application-specific integrated circuit (ASIC) (ASIC, Application Specific Integrated Circuit) chip or element programmable gate array (FieldProgrammable Gate Array, FPGA) chip calculates skew according to field fixing among the CCM, because all fields that can trigger alarm all are constant offset and regular length among the CCM, at asic chip or the special MD5 computing module of fpga chip design, can realize fast encrypt calculating (calculating summary), make safety certification process reach Millisecond, perhaps also can adopt multinuclear central processing unit (CentralProcessing Unit, CPU), utilize the multinuclear resource of CPU to carry out MD5 calculating.
The embodiment of the invention also provides a kind of failure of connectivity alarm device, as shown in Figure 5, comprising:
Receiving element 50 is used to receive connectivity testing message CCM;
First judging unit 51 is used for judging whether authentication information safe to carry of described CCM;
Second judging unit 52 is used for judging under the described CCM authentication information situation safe to carry at described first judging unit 51, verifies according to described secure authenticated information whether described CCM is legal message;
Legal message detecting unit 53, being used for detection validation is legal CCM, determines whether to trigger alarm according to testing result.
As shown in Figure 6, described second judging unit 52 can further comprise:
Digest Authentication subelement 521, be used for utilizing all fields that can trigger alarm of key that the both sides of the described CCM of transmitting-receiving consult and CCM message to calculate summary according to predetermined computational methods, with the summary comparison that comprises among the summary that calculates and the secure authenticated information TLV, if consistent, determine that then described CCM is legal message.
Alternatively, this second judging unit 52 also comprises:
Key updating subelement 522 is used for regular update and calculates the used key of summary.
The failure of connectivity alarm device that the embodiment of the invention provides can be arranged at CCM message sink equipment.
The failure of connectivity alarm device that the embodiment of the invention provides has solved the problem of 802.1ag fail safe weakness, the CCM that receives is carried out safety certification earlier, in authentication is under the legal situation, need to determine whether alarm again, in the application of existing network, can effectively defend to trigger other traffic associated that the alarm of alarm and discarded configure trigger causes and serious problems occur by the counterfeit CCM message of assailant's malice.
The embodiment of the invention also provides a kind of warning message sending method, as shown in Figure 7, comprises the steps:
Step 70: structure CCM, add secure authenticated information in described CCM;
Described secure authenticated information is used to verify whether described CCM is legal message; The described secure authenticated information of specific embodiment specifically comprises: all can trigger the summary of the field of alarm according to predetermined computational methods calculating among key that the both sides of the described CCM of utilization transmitting-receiving consult and the CCM.The described secure authenticated information of one embodiment of the invention can comprise a kind of TLV, and this TLV optional TLV structure repeats no more as shown in Figure 4 herein.
The both sides of embodiment of the invention transmitting-receiving CCM can consult the key that uses in advance, can consult to use a key, also can consult the key that regular update is used, and can more effectively avoid message by counterfeit like this.
Step 71: send the CCM that adds secure authenticated information.
The embodiment of the invention is by adding secure authenticated information in the CCM that sends, solved the problem of 802.1ag fail safe weakness, make the CCM receiving terminal carry out safety certification earlier to the CCM that receives according to this secure authenticated information, in authentication is under the legal situation, need to determine whether alarm again, in the application of existing network, can effectively defend to trigger other traffic associated that the alarm of alarm and discarded configure trigger causes and serious problems occur by the counterfeit CCM message of assailant's malice.
Also a kind of warning message dispensing device of one embodiment of the invention, as shown in Figure 8, this device comprises:
Structural unit 80 is used to construct CCM, adds secure authenticated information in described CCM; Described secure authenticated information is used to verify whether described CCM is legal message; The described secure authenticated information of specific embodiment specifically comprises: all can trigger the summary of the field of alarm according to predetermined computational methods calculating among key that the both sides of the described CCM of utilization transmitting-receiving consult and the CCM.The described secure authenticated information of one embodiment of the invention can comprise a kind of TLV, and this TLV optional TLV structure repeats no more as shown in Figure 4 herein.
Transmitting element 81 is used to send the CCM that adds secure authenticated information.
As shown in Figure 9, this structural unit 80 may further include:
Computation subunit 801 is used for utilizing all fields that can trigger alarm of key that the both sides of the described CCM of transmitting-receiving consult and CCM to calculate summary according to predetermined computational methods, is added among the CCM as secure authenticated information.
Upgrade subelement 802, be used for regular update and calculate the key that summary uses.
The described warning message dispensing device of the embodiment of the invention is by adding secure authenticated information in the CCM that sends, solved the problem of 802.1ag fail safe weakness, make the CCM receiving terminal carry out safety certification earlier to the CCM that receives according to this secure authenticated information, in authentication is under the legal situation, need to determine whether alarm again, in the application of existing network, can effectively defend to trigger other traffic associated that the alarm of alarm and discarded configure trigger causes and serious problems occur by the counterfeit CCM message of assailant's malice.
In sum, the embodiment of the invention has solved the problem of 802.1ag fail safe weakness, the CCM that receives is carried out safety certification earlier, in authentication is under the legal situation, need to determine whether alarm again, in the application of existing network, can effectively defend to trigger other traffic associated that the alarm of alarm and discarded configure trigger causes and serious problems occur by the counterfeit CCM message of assailant's malice.
Simultaneously, the field that the embodiment of the invention will trigger alarm adds the computations process, even the assailant revises these fields, but owing to there is not key, also can't generate the summary that is complementary, thereby can't be counterfeit, has effectively realized attack protection.
In addition, the embodiment of the invention adds computations with sequence number, makes the summary that generates also in dynamic change, and counterfeit again after the assailant intercepts has been out-of-date message, has effectively realized attack protection.
One of ordinary skill in the art will appreciate that, realize that all or part of step in the foregoing description method is to instruct relevant hardware to finish by program, described program can be stored in the computer-readable recording medium, for example read-only memory (being called for short ROM), random access memory (being called for short RAM), disk, CD etc.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (10)

1. a failure of connectivity alarm method is characterized in that, comprising:
Receive connectivity testing message CCM, whether judge among the described CCM authentication information safe to carry;
If authentication information safe to carry among the described CCM then verifies according to described secure authenticated information whether described CCM is legal message;
Detect being verified as legal CCM, determine whether to trigger alarm according to testing result.
2. the method for claim 1 is characterized in that, comprises summary in the described secure authenticated information, describedly verifies according to described secure authenticated information whether described CCM is that legal message comprises:
The field of utilizing among key that the both sides of the described CCM of transmitting-receiving consult and the CCM all can trigger alarm is calculated summary according to predetermined computational methods, with the summary comparison that comprises in the summary that calculates and the secure authenticated information, if consistent, determine that then described CCM is legal message.
3. method as claimed in claim 2 is characterized in that, described method also comprises:
The both sides that receive and dispatch described CCM consult regular update and calculate the key that summary uses.
4. a failure of connectivity alarm device is characterized in that, comprising:
Receiving element is used to receive connectivity testing message CCM;
First judging unit is used for judging whether authentication information safe to carry of described CCM;
Second judging unit is used for carrying under the situation of described secure authenticated information at the described CCM of described first judgment unit judges, verifies according to described secure authenticated information whether described CCM is legal message;
Legal message detecting unit is used for detecting being verified as legal CCM, determines whether to trigger alarm according to testing result.
5. device as claimed in claim 4 is characterized in that, comprises summary in the described secure authenticated information, and described second judging unit further comprises:
The Digest Authentication subelement, be used for utilizing all fields that can trigger alarm of key that the both sides of the described CCM of transmitting-receiving consult and CCM message to calculate summary according to predetermined computational methods, with the summary comparison that comprises among the summary that calculates and the secure authenticated information TLV, if consistent, determine that then described CCM is legal message.
6. device as claimed in claim 5 is characterized in that, described second judging unit also comprises:
The key updating subelement is used for regular update and calculates the key that summary uses.
7. a warning message sending method is characterized in that, comprising:
Structure connectivity testing message CCM adds secure authenticated information in described CCM; Described secure authenticated information is used to verify whether described CCM is legal message;
Send the CCM that adds secure authenticated information.
8. method as claimed in claim 7 is characterized in that, described secure authenticated information specifically comprises:
All can trigger the summary of the field of alarm according to predetermined computational methods calculating among key that the both sides of the described CCM of utilization transmitting-receiving consult and the CCM.
9. a warning message dispensing device is characterized in that, comprising:
Structural unit is used to construct connectivity testing message CCM, adds secure authenticated information in described CCM; Described secure authenticated information is used to verify whether described CCM is legal message;
Transmitting element is used to send the CCM that adds secure authenticated information.
10. device as claimed in claim 9 is characterized in that, described structural unit further comprises:
Computation subunit is used for utilizing all fields that can trigger alarm of key that the both sides of the described CCM of transmitting-receiving consult and CCM to calculate summary according to predetermined computational methods, is added among the CCM as secure authenticated information;
Upgrade subelement, be used for regular update and calculate the key that summary uses.
CN2010101109677A 2010-02-21 2010-02-21 Connectivity fault alarming method and device Pending CN102164042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101109677A CN102164042A (en) 2010-02-21 2010-02-21 Connectivity fault alarming method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101109677A CN102164042A (en) 2010-02-21 2010-02-21 Connectivity fault alarming method and device

Publications (1)

Publication Number Publication Date
CN102164042A true CN102164042A (en) 2011-08-24

Family

ID=44465031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101109677A Pending CN102164042A (en) 2010-02-21 2010-02-21 Connectivity fault alarming method and device

Country Status (1)

Country Link
CN (1) CN102164042A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103780427A (en) * 2014-01-17 2014-05-07 加弘科技咨询(上海)有限公司 Method and system for generating multi-protocol fault management message based on FPGA
CN104468158A (en) * 2013-09-16 2015-03-25 华为技术有限公司 A method and apparatus for notifying status among nodes
CN108243034A (en) * 2016-12-26 2018-07-03 北京华为数字技术有限公司 A kind of fault determination method, receiver and transmitter
CN108306995A (en) * 2018-01-04 2018-07-20 北京特立信电子技术股份有限公司 Method and system for realizing mutual binding of MAC addresses of local MEP and remote MEP

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794648A (en) * 2005-06-27 2006-06-28 华为技术有限公司 Method of distinguishing playback management message
CN101141323A (en) * 2007-09-29 2008-03-12 华为技术有限公司 Method, system and equipment for controlling connectivity detection
CN101651582A (en) * 2009-09-24 2010-02-17 中兴通讯股份有限公司 Method and system for detecting link connectivity of multi-protocol label switching (MPLS) network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794648A (en) * 2005-06-27 2006-06-28 华为技术有限公司 Method of distinguishing playback management message
CN101141323A (en) * 2007-09-29 2008-03-12 华为技术有限公司 Method, system and equipment for controlling connectivity detection
CN101651582A (en) * 2009-09-24 2010-02-17 中兴通讯股份有限公司 Method and system for detecting link connectivity of multi-protocol label switching (MPLS) network

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468158A (en) * 2013-09-16 2015-03-25 华为技术有限公司 A method and apparatus for notifying status among nodes
CN104468158B (en) * 2013-09-16 2018-07-13 华为技术有限公司 The method and apparatus of state advertisement between a kind of node
CN103780427A (en) * 2014-01-17 2014-05-07 加弘科技咨询(上海)有限公司 Method and system for generating multi-protocol fault management message based on FPGA
CN108243034A (en) * 2016-12-26 2018-07-03 北京华为数字技术有限公司 A kind of fault determination method, receiver and transmitter
CN108243034B (en) * 2016-12-26 2021-09-03 北京华为数字技术有限公司 Fault determination method, receiver and transmitter
CN108306995A (en) * 2018-01-04 2018-07-20 北京特立信电子技术股份有限公司 Method and system for realizing mutual binding of MAC addresses of local MEP and remote MEP
CN108306995B (en) * 2018-01-04 2021-07-23 北京特立信电子技术股份有限公司 Method and system for realizing mutual binding of MAC addresses of local MEP and remote MEP

Similar Documents

Publication Publication Date Title
Ustun et al. A novel approach for mitigation of replay and masquerade attacks in smartgrids using IEC 61850 standard
CN103595530B (en) Software secret key updating method and device
Krejčí et al. Security survey of the IoT wireless protocols
Azzouni et al. sOFTDP: Secure and efficient topology discovery protocol for SDN
Azzouni et al. sOFTDP: Secure and efficient OpenFlow topology discovery protocol
Bose et al. Blockchain as a service for software defined networks: A denial of service attack perspective
Zhang et al. Secure and scalable fault localization under dynamic traffic patterns
Zhang et al. Network fault localization with small TCB
Naoui et al. Trusted third party based key management for enhancing LoRaWAN security
Tazi et al. Review on cyber-physical security of the smart grid: Attacks and defense mechanisms
Zhang et al. Shortmac: efficient data-plane fault localization.
Shaikh et al. LSec: Lightweight security protocol for distributed wireless sensor network
CN101282208B (en) Method for updating safety connection association master key as well as server and network system
CN102164042A (en) Connectivity fault alarming method and device
CN112822103B (en) Information reporting method, information processing method and equipment
CN103139219B (en) Based on the attack detection method of the Spanning-Tree Protocol of credible switchboard
CN104010310A (en) Heterogeneous network unified authentication method based on physical layer safety
CN113055361A (en) Secure communication method, device and system for DC interconnection
Esiner et al. Message authentication and provenance verification for industrial control systems
CN110290151B (en) Message sending method and device and readable storage medium
CN116170110A (en) Time synchronization architecture, security method and device for time sensitive network
Shrivastava et al. Detection of topology poisoning by silent relay attacker in SDN
CN104486082A (en) Authentication method and router
CN109039841A (en) The method, apparatus and girff of cascade network is added
Guo et al. Cyber-physical authentication for metro systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110824