CN102523221A - Detection method of data message and network safety detection device - Google Patents

Detection method of data message and network safety detection device Download PDF

Info

Publication number
CN102523221A
CN102523221A CN2011104303809A CN201110430380A CN102523221A CN 102523221 A CN102523221 A CN 102523221A CN 2011104303809 A CN2011104303809 A CN 2011104303809A CN 201110430380 A CN201110430380 A CN 201110430380A CN 102523221 A CN102523221 A CN 102523221A
Authority
CN
China
Prior art keywords
network security
equipment
detection messages
checkout equipment
security checkout
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104303809A
Other languages
Chinese (zh)
Other versions
CN102523221B (en
Inventor
邹昕
鲁松
张良
张晓明
王勇
王维晟
王万振
云长江
雷新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
National Computer Network and Information Security Management Center
Original Assignee
Huawei Technologies Co Ltd
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd, National Computer Network and Information Security Management Center filed Critical Huawei Technologies Co Ltd
Priority to CN201110430380.9A priority Critical patent/CN102523221B/en
Publication of CN102523221A publication Critical patent/CN102523221A/en
Application granted granted Critical
Publication of CN102523221B publication Critical patent/CN102523221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The invention provides a detection method of data message and a network safety detection device. The network safety detection device generates detection message containing inlet port information of the network safety detection device according to obtained data message transmitted by a network device and transmits the detection message to an analyzing device to enable the analyzing device to locate the corresponding network device according to the inlet port information. The detection method and the network safety detection device resolve the problem in the prior art that the analyzing device cannot accurately locate the network device where the data message comes and achieve the effect that the analyzing device can accurately locate the network device where the data message comes, thereby improving manageability and maintainability of the network device, improving management and maintenance efficiency of the network device or the network safety detection device and simultaneously reducing management and maintenance cost of the network device or the network safety detection device.

Description

The detection method of data message and network security checkout equipment
Technical field
The present invention relates to detection technique, relate in particular to a kind of detection method and network security checkout equipment of data message.
Background technology
In existing network, safe consideration Network Based needs to analyze data message.For example: the network security checkout equipment is with point-to-point protocol (the Point-to-Point Protocol of network equipment transmission; Abbreviation PPP) data message or High-Level Data Link Control (the High-Level Data Link Control of protocol massages form; Abbreviation HDLC) data message of protocol massages form converts the data message of Ethernet message format to; And send to analytical equipment; Whether by analytical equipment the data message of the Ethernet message format that receives is carried out data analysis, be legal data message.
Yet; When analytical equipment detects data message; Can't accurately locate this data message from the network equipment, caused the difficulty that administers and maintains of the network equipment or network security checkout equipment, thereby reduced the efficient that administers and maintains of the network equipment or network security checkout equipment.
Summary of the invention
The present invention provides a kind of detection method and network security checkout equipment of data message, in order to solve the accurately problem of the network equipment that belongs to of locator data message of analytical equipment in the prior art.
According to an aspect of the embodiment of the invention, a kind of detection method of data message comprises:
The network security checkout equipment obtains the data message of network equipment transmission;
Said network security checkout equipment generates detection messages according to said data message, comprises the ingress port information of said network security checkout equipment in the said detection messages;
Said network security checkout equipment sends said detection messages to analytical equipment, so that said analytical equipment is according to the corresponding network equipment in said ingress port information location.
According to the embodiment of the invention on the other hand, a kind of network security checkout equipment comprises:
Acquiring unit is used to obtain the data message of network equipment transmission;
Generation unit is used for according to said data message, generates detection messages, comprises the ingress port information of said network security checkout equipment in the said detection messages;
Transmitting element is used for sending to analytical equipment the detection messages of said generation unit, so that said analytical equipment is according to the corresponding network equipment in said ingress port information location.
Can know by technique scheme; The embodiment of the invention is through the data message of network security checkout equipment according to the network equipment transmission of obtaining; Generation comprises the detection messages of the ingress port information of this network security checkout equipment; And send to analytical equipment, and make that above-mentioned analytical equipment can be according to the corresponding network equipment in above-mentioned ingress port information location, can solve the accurately problem of the network equipment that belongs to of locator data message of analytical equipment in the prior art; Realized analytical equipment accurately the locator data message from the network equipment; Thereby improved the manageability and the maintainability of the network equipment, improved the efficient that administers and maintains of the network equipment or network security checkout equipment, reduced the cost that administers and maintains of the network equipment or network security checkout equipment simultaneously.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply; Obviously, the accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work property, can also obtain other accompanying drawing according to these accompanying drawings.
The schematic flow sheet of the detection method of the data message that Fig. 1 provides for one embodiment of the invention;
The structural representation of the network security checkout equipment that Fig. 2 provides for another embodiment of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer; To combine the accompanying drawing in the embodiment of the invention below; Technical scheme in the embodiment of the invention is carried out clear, intactly description; Obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
The schematic flow sheet of the detection method of the data message that Fig. 1 provides for one embodiment of the invention, as shown in Figure 1, the detection method of the data message of present embodiment can comprise:
101, the network security checkout equipment obtains the data message of network equipment transmission;
Alternatively, the network security checkout equipment can obtain data message or the data message of HDLC protocol massages form of the ppp protocol message format of network equipment transmission; Perhaps can also obtain the data message of the Ethernet message format of network equipment transmission, present embodiment does not limit this.
102, above-mentioned network security checkout equipment generates detection messages according to above-mentioned data message, comprises the ingress port information of above-mentioned network security checkout equipment in the above-mentioned detection messages;
Wherein, the ingress port information of above-mentioned network security checkout equipment can include but not limited to
The inbound port sign of the link that the network security checkout equipment is detected on the network security checkout equipment; Perhaps
The inbound port sign of the link that link information that network security checkout equipment information, network security checkout equipment are detected and network security checkout equipment are detected on the network security checkout equipment.
Alternatively; Above-mentioned network security checkout equipment can be according to the above-mentioned data message that obtains; Generate the detection messages of Ethernet message format; The ingress port information that comprises above-mentioned network security checkout equipment in the Ethernet message head of the detection messages of above-mentioned Ethernet message format, for example: the media interviews control of the inbound port of network security checkout equipment (Media Access Control is called for short MAC) address; Again for example: the device identification of network security checkout equipment (ID), veneer ID, subcard ID and inbound port ID.
Alternatively, in the present embodiment, above-mentioned network security checkout equipment can utilize the field that increases newly in the above-mentioned Ethernet message head to carry above-mentioned ingress port information according to the above-mentioned data message that obtains, and generates above-mentioned detection messages.
Alternatively, in the present embodiment, above-mentioned network security checkout equipment can also utilize the hashed field in the above-mentioned Ethernet message head to carry above-mentioned ingress port information according to the above-mentioned data message that obtains, and generates above-mentioned detection messages.It is understandable that: owing in the above-mentioned Ethernet message head some fields are arranged; For example: source MAC (the Source MAC that carries out the MAC Address of port; Be called for short SMAC) field such as address field, be nonsensical for analytical equipment, can think hashed field.
For example: if above-mentioned network security checkout equipment is connected with above-mentioned analytical equipment through switching equipment, hashed field then can be the SMAC address field in the above-mentioned Ethernet message head; So, correspondingly, above-mentioned network security checkout equipment can utilize the SMAC address field in the above-mentioned Ethernet message head according to the above-mentioned data message that obtains, and carries above-mentioned ingress port information, generates above-mentioned detection messages.
Again for example: if above-mentioned network security checkout equipment is not connected with above-mentioned analytical equipment through any switching equipment; Be that above-mentioned network security checkout equipment directly is connected with above-mentioned analytical equipment; Hashed field then can be the SMAC address field in the above-mentioned Ethernet message head, purpose MAC (Destination MAC is called for short DMAC) address field or type of message field; So; Correspondingly, above-mentioned network security checkout equipment can utilize SMAC address field, dmac address field or type of message field in the above-mentioned Ethernet message head according to the above-mentioned data message that obtains; Carry above-mentioned ingress port information, generate above-mentioned detection messages.
103, above-mentioned network security checkout equipment sends above-mentioned detection messages to analytical equipment, so that above-mentioned analytical equipment is according to the corresponding network equipment in above-mentioned ingress port information location.
In an application scenarios of present embodiment; If above-mentioned network security checkout equipment is connected with above-mentioned analytical equipment through switching equipment; The outbound port information that can also further comprise above-mentioned network security checkout equipment in the Ethernet message head of the detection messages of so above-mentioned Ethernet message format; So that above-mentioned analytical equipment can be confirmed the forward-path of above-mentioned detection messages according to above-mentioned ingress port information and above-mentioned outbound port information, thereby can effectively improve the reliability of detection.For example: above-mentioned network security checkout equipment then can utilize the SMAC address field in the above-mentioned Ethernet message head according to the above-mentioned data message that obtains, and carries above-mentioned outbound port information, generates above-mentioned detection messages.
Wherein, the outbound port information of above-mentioned network security checkout equipment can include but not limited to
The outbound port sign of detection messages on the network security checkout equipment; Perhaps
Hash information of using when detection messages is selected port on the network security checkout equipment and the detection messages outbound port sign on the network security checkout equipment.
In the Another application scene of present embodiment; The rule match information that can also further comprise above-mentioned detection messages in the Ethernet message head of the detection messages of above-mentioned Ethernet message format; For example: ACL (Access Control List; Be called for short ACL) sign (ID) and corresponding rule number (Rulenumber); So that above-mentioned analytical equipment can be carried out administering and maintaining of the network equipment or network security checkout equipment according to above-mentioned rule match information, thereby can further effectively improve the reliability that detects.For example: above-mentioned network security checkout equipment then can utilize SMAC address field, dmac address field or type of message field in the above-mentioned Ethernet message head according to above-mentioned data message, carries above-mentioned rule match information, generates above-mentioned detection messages.
In the present embodiment; Through the data message of network security checkout equipment according to the network equipment transmission of obtaining; Generation comprises the detection messages of the ingress port information of this network security checkout equipment; And send to analytical equipment, and make that above-mentioned analytical equipment can be according to the corresponding network equipment in above-mentioned ingress port information location, can solve the accurately problem of the network equipment that belongs to of locator data message of analytical equipment in the prior art; Realized analytical equipment accurately the locator data message from the network equipment; Thereby improved the manageability and the maintainability of the network equipment, improved the efficient that administers and maintains of the network equipment or network security checkout equipment, reduced the cost that administers and maintains of the network equipment or network security checkout equipment simultaneously.
Need to prove: for aforesaid each method embodiment; For simple description; So it all is expressed as a series of combination of actions, but those skilled in the art should know that the present invention does not receive the restriction of described sequence of movement; Because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in the specification all belongs to preferred embodiment, and related action and module might not be that the present invention is necessary.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, do not have the part that details among certain embodiment, can be referring to the associated description of other embodiment.
The structural representation of the network security checkout equipment that Fig. 2 provides for another embodiment of the present invention, as shown in Figure 2, the network security checkout equipment of present embodiment can comprise acquiring unit 21, generation unit 22 and transmitting element 23.Wherein, acquiring unit 21 is used to obtain the data message of network equipment transmission; Generation unit 22 is used for the above-mentioned data message that obtains according to acquiring unit 21, generates detection messages, comprises the ingress port information of above-mentioned network security checkout equipment in the above-mentioned detection messages; Transmitting element 23 is used for sending to analytical equipment the detection messages of generation unit 22, so that above-mentioned analytical equipment is according to the corresponding network equipment in above-mentioned ingress port information location.
The function of network security checkout equipment can be realized by the network security checkout equipment that present embodiment provides among the embodiment of above-mentioned Fig. 1 correspondence.
Alternatively; The data message that generation unit 22 in the present embodiment specifically can obtain according to above-mentioned acquiring unit; Generate the detection messages of Ethernet message format, comprise the ingress port information of above-mentioned network security checkout equipment in the Ethernet message head of the detection messages of above-mentioned Ethernet message format.
Alternatively, in the present embodiment, generation unit 22 can utilize the hashed field in the above-mentioned Ethernet message head to carry above-mentioned ingress port information according to the above-mentioned data message that obtains, and generates above-mentioned detection messages.It is understandable that: owing in the above-mentioned Ethernet message head some fields are arranged; For example: source MAC (the Source MAC that carries out the MAC Address of port; Be called for short SMAC) field such as address field, be nonsensical for analytical equipment, can think hashed field.Be that generation unit 22 specifically can utilize SMAC address field, dmac address field or type of message field in the above-mentioned Ethernet message head according to above-mentioned data message, carry above-mentioned ingress port information, generate above-mentioned detection messages.
For example: if above-mentioned network security checkout equipment is connected with above-mentioned analytical equipment through switching equipment, hashed field then can be the SMAC address field in the above-mentioned Ethernet message head; So, correspondingly, generation unit 22 can utilize the SMAC address field in the above-mentioned Ethernet message head according to the above-mentioned data message that obtains, and carries above-mentioned ingress port information, generates above-mentioned detection messages.
Again for example: if above-mentioned network security checkout equipment is not connected with above-mentioned analytical equipment through any switching equipment; Be that above-mentioned network security checkout equipment directly is connected with above-mentioned analytical equipment, hashed field then can be the SMAC address field in the above-mentioned Ethernet message head, dmac address field or type of message field; So, correspondingly, generation unit 22 can utilize SMAC address field, dmac address field or type of message field in the above-mentioned Ethernet message head according to the above-mentioned data message that obtains, and carries above-mentioned ingress port information, generates above-mentioned detection messages.
In an application scenarios of present embodiment; If above-mentioned network security checkout equipment is connected with above-mentioned analytical equipment through switching equipment; The outbound port information that can also further comprise above-mentioned network security checkout equipment so in the Ethernet message head of the detection messages of generation unit 22 generations; So that above-mentioned analytical equipment can be confirmed the forward-path of above-mentioned detection messages according to above-mentioned ingress port information and above-mentioned outbound port information, thereby can effectively improve the reliability of detection.For example: 22 of generation units can utilize the SMAC address field in the above-mentioned Ethernet message head according to the above-mentioned data message that obtains, and carry above-mentioned outbound port information, generate above-mentioned detection messages.
In the Another application scene of present embodiment; The rule match information that can also further comprise above-mentioned detection messages in the Ethernet message head of the detection messages that generation unit 22 generates; For example: ACL ID and corresponding rule number (Rule number); So that above-mentioned analytical equipment can be carried out administering and maintaining of the network equipment or network security checkout equipment according to above-mentioned rule match information, thereby can further effectively improve the reliability that detects.For example: 22 of generation units can utilize SMAC address field, dmac address field or type of message field in the above-mentioned Ethernet message head according to above-mentioned data message, carry above-mentioned rule match information, generate above-mentioned detection messages.
In the present embodiment; The data message that the network equipment that the network security checkout equipment obtains according to acquiring unit through generation unit transmits; Generation comprises the detection messages of the ingress port information of this network security checkout equipment; And send to analytical equipment by transmitting element, and make that above-mentioned analytical equipment can be according to the corresponding network equipment in above-mentioned ingress port information location, can solve the accurately problem of the network equipment that belongs to of locator data message of analytical equipment in the prior art; Realized analytical equipment accurately the locator data message from the network equipment; Thereby improved the manageability and the maintainability of the network equipment, improved the efficient that administers and maintains of the network equipment or network security checkout equipment, reduced the cost that administers and maintains of the network equipment or network security checkout equipment simultaneously.
The those skilled in the art can be well understood to, for the convenience described with succinct, the system of foregoing description, the concrete course of work of device and unit can repeat no more at this with reference to the corresponding process among the preceding method embodiment.
In several embodiment that the application provided, should be understood that, the system that is disclosed, apparatus and method can realize through other mode.For example, device embodiment described above only is schematically, for example; The division of said unit; Only be that a kind of logic function is divided, during actual the realization other dividing mode can be arranged, for example a plurality of unit or assembly can combine or can be integrated into another system; Or some characteristics can ignore, or do not carry out.Another point, the coupling each other that shows or discuss or directly coupling or communication to connect can be through some interfaces, the INDIRECT COUPLING of device or unit or communication connect, and can be electrically, machinery or other form.
Said unit as separating component explanation can or can not be physically to separate also, and the parts that show as the unit can be or can not be physical locations also, promptly can be positioned at a place, perhaps also can be distributed on a plurality of NEs.Can realize the purpose of present embodiment scheme according to the needs selection some or all of unit wherein of reality.
In addition, each functional unit in each embodiment of the present invention can be integrated in the processing unit, also can be that the independent physics in each unit exists, and also can be integrated in the unit two or more unit.Above-mentioned integrated unit both can adopt the form of hardware to realize, the form that also can adopt hardware to add SFU software functional unit realizes.
The above-mentioned integrated unit of realizing with the form of SFU software functional unit can be stored in the computer read/write memory medium.Above-mentioned SFU software functional unit is stored in the storage medium, comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the part steps of the said method of each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, read-only memory (Read-Only Memory; Abbreviation ROM), various media that can be program code stored such as random access memory (Random Access Memory is called for short RAM), magnetic disc or CD.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.

Claims (14)

1. the detection method of a data message is characterized in that, comprising:
The network security checkout equipment obtains the data message of network equipment transmission;
Said network security checkout equipment generates detection messages according to said data message, comprises the ingress port information of said network security checkout equipment in the said detection messages;
Said network security checkout equipment sends said detection messages to analytical equipment, so that said analytical equipment is according to the corresponding network equipment in said ingress port information location.
2. method according to claim 1 is characterized in that, said network security checkout equipment generates detection messages according to said data message, comprising:
Said network security checkout equipment generates the detection messages of Ethernet message format according to said data message, comprises the ingress port information of said network security checkout equipment in the Ethernet message head of the detection messages of said Ethernet message format.
3. method according to claim 2 is characterized in that, said network security checkout equipment generates the detection messages of Ethernet message format according to said data message, comprising:
Said network security checkout equipment utilizes SMAC address field, dmac address field or type of message field in the said Ethernet message head according to said data message, carries said ingress port information, generates said detection messages.
4. according to claim 2 or 3 described methods, it is characterized in that said network security checkout equipment is connected with said analytical equipment through switching equipment; The outbound port information that also comprises said network security checkout equipment in the Ethernet message head of the detection messages of said Ethernet message format is so that said analytical equipment is confirmed the forward-path of said detection messages according to said ingress port information and said outbound port information.
5. method according to claim 4 is characterized in that, said network security checkout equipment generates the detection messages of Ethernet message format according to said data message, also comprises:
Said network security checkout equipment utilizes SMAC address field, dmac address field or type of message field in the said Ethernet message head according to said data message, carries said outbound port information, generates said detection messages.
6. according to the described method of the arbitrary claim of claim 2~5; It is characterized in that; The rule match information that also comprises said detection messages in the Ethernet message head of the detection messages of said Ethernet message format is so that said analytical equipment is carried out administering and maintaining of the network equipment or network security checkout equipment according to said rule match information.
7. method according to claim 6 is characterized in that, said network security checkout equipment generates the detection messages of Ethernet message format according to said data message, also comprises:
Said network security checkout equipment utilizes SMAC address field, dmac address field or type of message field in the said Ethernet message head according to said data message, carries said rule match information, generates said detection messages.
8. a network security checkout equipment is characterized in that, comprising:
Acquiring unit is used to obtain the data message of network equipment transmission;
Generation unit is used for according to said data message, generates detection messages, comprises the ingress port information of said network security checkout equipment in the said detection messages;
Transmitting element is used for sending to analytical equipment the detection messages of said generation unit, so that said analytical equipment is according to the corresponding network equipment in said ingress port information location.
9. network security checkout equipment according to claim 8 is characterized in that said generation unit specifically is used for
According to the data message that said acquiring unit obtains, generate the detection messages of Ethernet message format, comprise the ingress port information of said network security checkout equipment in the Ethernet message head of the detection messages of said Ethernet message format.
10. network security checkout equipment according to claim 9 is characterized in that said generation unit specifically is used for
According to said data message, utilize SMAC address field, dmac address field or type of message field in the said Ethernet message head, carry said ingress port information, generate said detection messages.
11., it is characterized in that said network security checkout equipment is connected with said analytical equipment through switching equipment according to claim 9 or 10 described network security checkout equipments; The outbound port information that also comprises said network security checkout equipment in the Ethernet message head of the detection messages that said generation unit generates is so that said analytical equipment is confirmed the forward-path of said detection messages according to said ingress port information and said outbound port information.
12. network security checkout equipment according to claim 11 is characterized in that said generation unit also is used for
According to said data message, utilize SMAC address field, dmac address field or type of message field in the said Ethernet message head, carry said outbound port information, generate said detection messages.
13. according to the described network security checkout equipment of the arbitrary claim of claim 9~12; It is characterized in that; The rule match information that also comprises said detection messages in the Ethernet message head of the detection messages that said generation unit generates is so that said analytical equipment is carried out administering and maintaining of the network equipment or network security checkout equipment according to said rule match information.
14. network security checkout equipment according to claim 13 is characterized in that said generation unit also is used for
Said network security checkout equipment utilizes SMAC address field, dmac address field or type of message field in the said Ethernet message head according to said data message, carries said rule match information, generates said detection messages.
CN201110430380.9A 2011-12-20 2011-12-20 Detection method of data message and network safety detection device Active CN102523221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110430380.9A CN102523221B (en) 2011-12-20 2011-12-20 Detection method of data message and network safety detection device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110430380.9A CN102523221B (en) 2011-12-20 2011-12-20 Detection method of data message and network safety detection device

Publications (2)

Publication Number Publication Date
CN102523221A true CN102523221A (en) 2012-06-27
CN102523221B CN102523221B (en) 2014-11-19

Family

ID=46294013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110430380.9A Active CN102523221B (en) 2011-12-20 2011-12-20 Detection method of data message and network safety detection device

Country Status (1)

Country Link
CN (1) CN102523221B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856975A (en) * 2012-12-04 2014-06-11 中国电信股份有限公司 Method and system for detecting accuracy of network analysis device
WO2014169765A1 (en) * 2013-04-19 2014-10-23 中兴通讯股份有限公司 Network device detecting method and apparatus, and cloud detection system
CN104268165A (en) * 2014-09-09 2015-01-07 华为技术有限公司 Online query method and equipment
CN106330597A (en) * 2015-07-10 2017-01-11 杭州华三通信技术有限公司 Path reachability detection method and device between VTEPs (VXLAN Tunnel End Points) of VXLAN (Virtual Extensible Local Area Network)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030172289A1 (en) * 2000-06-30 2003-09-11 Andrea Soppera Packet data communications
CN1968082A (en) * 2006-10-27 2007-05-23 华为技术有限公司 Multicast authentication method, system and application
CN101404599A (en) * 2008-11-12 2009-04-08 华为技术有限公司 Network fault detection method, primary device, slave device, control terminal and system
US20090238084A1 (en) * 2008-03-18 2009-09-24 Cisco Technology, Inc. Network monitoring using a proxy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030172289A1 (en) * 2000-06-30 2003-09-11 Andrea Soppera Packet data communications
CN1968082A (en) * 2006-10-27 2007-05-23 华为技术有限公司 Multicast authentication method, system and application
US20090238084A1 (en) * 2008-03-18 2009-09-24 Cisco Technology, Inc. Network monitoring using a proxy
CN101404599A (en) * 2008-11-12 2009-04-08 华为技术有限公司 Network fault detection method, primary device, slave device, control terminal and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蔡玮珺 等: "DDoS攻击IP追踪及攻击源定位技术研究", 《计算机工程》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856975A (en) * 2012-12-04 2014-06-11 中国电信股份有限公司 Method and system for detecting accuracy of network analysis device
CN103856975B (en) * 2012-12-04 2017-10-17 中国电信股份有限公司 The detection method and system of Network analyzing equipment accuracy
WO2014169765A1 (en) * 2013-04-19 2014-10-23 中兴通讯股份有限公司 Network device detecting method and apparatus, and cloud detection system
US10063412B2 (en) 2013-04-19 2018-08-28 Zte Corporation Network device detecting method and apparatus, and cloud detection system
CN104268165A (en) * 2014-09-09 2015-01-07 华为技术有限公司 Online query method and equipment
CN104268165B (en) * 2014-09-09 2017-12-29 华为技术有限公司 A kind of online query method and apparatus
CN106330597A (en) * 2015-07-10 2017-01-11 杭州华三通信技术有限公司 Path reachability detection method and device between VTEPs (VXLAN Tunnel End Points) of VXLAN (Virtual Extensible Local Area Network)
CN106330597B (en) * 2015-07-10 2019-07-26 新华三技术有限公司 Path between VXLAN endpoint of a tunnel VTEP is up to detection method and device

Also Published As

Publication number Publication date
CN102523221B (en) 2014-11-19

Similar Documents

Publication Publication Date Title
CN101630270B (en) Data processing system and method therefor
CN103595790B (en) The remote access method of equipment, thin-client and virtual machine
CN112560078B (en) Block chain data processing method, device, equipment and medium
CN103647777B (en) Safety certificate method and bidirectional forwarding detection BFD equipment
CN104199654A (en) Open platform calling method and device
CN104170323A (en) Fault handling method, device and system based on network function virtualization
CN104426885A (en) Method and device for providing abnormal account
CN113301568B (en) Network distribution method and device and intelligent household equipment
CN103164523A (en) Inspection method, device and system of data consistency inspection
CN103138988A (en) Positioning treatment method and positioning treatment device of network faults
CN102523221B (en) Detection method of data message and network safety detection device
CN110324416B (en) Download path tracking method, device, server, terminal and medium
CN103559124A (en) Fast fault detection method and device
CN103347031B (en) A kind of method and apparatus taking precautions against ARP message aggression
US20190042161A1 (en) Hard Disk Operation Method and Hard Disk Manager
CN114338527B (en) IPv6 active identifier processing method and system
CN102801686A (en) Equipment control method, main equipment, secondary equipment as well as main-secondary equipment group
CN102916967B (en) The method and apparatus of protocol analysis
CN103516705B (en) Communication method of virtual machine and server end system
CN102801575A (en) Loopback detecting method and device
CN107861821B (en) Mining method and device for module call relation and computer readable medium
CN105210043A (en) Information processing device
WO2021133254A1 (en) Method and system for robotic process automation
CN103973534A (en) Method and device for simulating sharing of USB flash disk
CN104142882A (en) Test method, test device and test system based on data processing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant