CN102904902B - A kind of based on DHCP method for blocking bypass by - Google Patents

A kind of based on DHCP method for blocking bypass by Download PDF

Info

Publication number
CN102904902B
CN102904902B CN201210427377.6A CN201210427377A CN102904902B CN 102904902 B CN102904902 B CN 102904902B CN 201210427377 A CN201210427377 A CN 201210427377A CN 102904902 B CN102904902 B CN 102904902B
Authority
CN
China
Prior art keywords
network
logging
dhcp
bag
bypass
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210427377.6A
Other languages
Chinese (zh)
Other versions
CN102904902A (en
Inventor
曹爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruian Technology Co Ltd
Original Assignee
Beijing Ruian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruian Technology Co Ltd filed Critical Beijing Ruian Technology Co Ltd
Priority to CN201210427377.6A priority Critical patent/CN102904902B/en
Publication of CN102904902A publication Critical patent/CN102904902A/en
Application granted granted Critical
Publication of CN102904902B publication Critical patent/CN102904902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of DHCP method for blocking bypass by, its step comprises: in the DHCP network segment of needs monitoring, 1) arrange the switch with mirror image interface, obtain the packet of all device for logging on network in this DHCP network segment; 2) MAC Address that obtains device for logging on network is processed to packet and list of surfing the Net with user-defined safe machine contrasts, find out dangerous device for logging on network; 3) when dangerous device for logging on network give out a contract for a project carry out access network request time, give out a contract for a project according to the process of described networking request method, forge DHCPACK bag or DHCPOFFER bag, dangerous device for logging on network is blocked; 4) circulation carry out step 2)-3), the device for logging on network in the DHCP network segment is blocked continuously.In the present invention, the characteristic of underlying protocol is taked to implement to block, portable good, and for the blocking way based on application protocol, maintenance cost is low, real-time good, can use under any network environment, does not need to change original network configuration.Strong security, when device for logging on network cannot be discovered, implements effectively to block.

Description

A kind of based on DHCP method for blocking bypass by
Technical field
The present invention relates to computer network security field, specifically, is at particular place, and particularly the local area network (LAN) of public place is interior implements the blocking-up of effective network to specific device for logging on network, stops its any network service.
Background technology
For the local area network (LAN) in public place or noncommercial place, generally take certain measure to block the device for logging on network in local area network (LAN), fire compartment wall is set exactly, sets up filter table.The method that this measure adopts is: install the access control apparatus such as fire compartment wall on the border of network.The effect of fire compartment wall arranges certain access rights, only has the user within access rights can be conducted interviews by fire compartment wall, if not within access rights, just lived by fire compartment wall shelves.The shortcoming of this method is: the blocking-up that can only realize the device for logging on network preset, and cannot realize real-time blocking to device for logging on network; Portability is poor, cannot meet customer need.
In order to realize the blocking-up to the device for logging on network in the local area network (LAN) of particular place, the mode of employing is generally that bypass blocks, and generally has two kinds of modes: one is the characteristic by Transmission Control Protocol, connects implement to block to TCP.The shortcoming of this method can only tell on to the network application based on Transmission Control Protocol, and helpless to the network application based on udp protocol.Further, along with the development of science and technology, various network application emerges in an endless stream, and a lot of network application can solve some characteristic of Transmission Control Protocol, thus connection can be performed smoothly.Another kind method is by ICMP agreement, sends blocking-up information to specific device for logging on network, thus realizes blocking the connection of corresponding network.The shortcoming of this method can ignore ICMP information except a lot of network application, outside continuing to connect, also adds offered load largely, network performance is declined.
DynamicHost arranges agreement (Dynamic Host Configuration Protocol, DHCP) be the procotol of a local area network (LAN), use udp protocol works, and mainly contains two purposes: to internal network or Internet service provider's automatic IP address allocation to user to internal network keeper as the means all computers being made to central management.
No matter the IP of dynamic assignment or the IP of manual configuration all will carry out certification by Dynamic Host Configuration Protocol server to IP.According to result for retrieval, also do not have in the art and use DHCP procotol to monitor the computer on local area network (LAN), and it is implemented to the method for blocking-up.
Summary of the invention
The object of this invention is to provide a kind of network service content by specific device for logging on network in bypass real-time blocking local area network (LAN), and block the method for its all-network service.
For achieving the above object, solution of the present invention is:
A kind of based on DHCP method for blocking bypass by, its step comprises:
1) switch with mirror image interface is set in the DHCP network segment needing monitoring, obtains the packet of all device for logging on network in this DHCP network segment;
2) MAC Address that obtains device for logging on network is processed to described packet and list of surfing the Net with user-defined safe machine contrasts, find out dangerous device for logging on network;
3) when described dangerous device for logging on network give out a contract for a project carry out access network request time, give out a contract for a project according to the process of described networking request method, forge DHCPACK bag or DHCPOFFER bag, described dangerous device for logging on network is blocked.
When described networking request method is for employing Dynamic Acquisition network configuration information, blocking-up method is as follows:
2-1) dangerous device for logging on network sends DISCOVER packet, searches Dynamic Host Configuration Protocol server in the network segment;
2-2) bypass server is before described Dynamic Host Configuration Protocol server sends OFFER, sends forge DHCPOFFER bag to this dangerous device for logging on network;
2-3) described dangerous device for logging on network sends request bag request network configuration to bypass server, after described bypass server intercepts and captures request bag, forge DHCP ACK bag according to the request package informatin intercepted and captured, distribute an IP address existed to this dangerous device for logging on network simultaneously;
2-4) described dangerous device for logging on network is after receiving forgery DHCP ACK bag, and whether checking distributing IP address exists;
2-5) described device for logging on network cannot get correct IP address, and bypass realizes blocking.
When described networking request method is the manual configuration network information, blocking-up method is as follows:
3-1) dangerous device for logging on network sends inform bag, searches Dynamic Host Configuration Protocol server in the network segment;
3-2) bypass server is before described Dynamic Host Configuration Protocol server sends inform, sends forge DHCPinform bag to this dangerous device for logging on network;
3-3) described dangerous device for logging on network receives this forgery DHCP inform bag and sends request bag request network configuration to bypass server, after described bypass server intercepting and capturing request wraps, forges DHCP NACK bag according to the request package informatin intercepted and captured,
After 3-4) described dangerous device for logging on network receives and forges DHCP NACK bag, IP address requesting again;
3-5) described device for logging on network cannot get correct IP address, and bypass realizes blocking.
Described have the switch mirror image bag extracted in the switch of mirror image interface and need meet: the packet comprising physical layer.
Same bypass server can be placed on for the processing procedure that described device for logging on network two kinds is different to process separately, or be divided into two bypass server to process respectively.
After described dangerous device for logging on network receives and forges DHCP inform bag, this dangerous device for logging on network accepts first and arrives OFFER bag and coupling XID value, abandons other and gives out a contract for a project, forge DHCP ACK bag until receive.
Described step 2-5) different processing modes is adopted for different device for logging on network: cannot surf the Net, need manual configuration network again; Or restart the IP address that DHCP request procedure request is correct, described bypass server can take Dynamic Acquisition network configuration information to realize blocking dangerous device for logging on network.
Described dangerous device for logging on network adopts the udp protocol forms of broadcasting to give out a contract for a project.
Described bypass server forges the packet of Dynamic Host Configuration Protocol server two type: ACK bag and NACK bag; Acting as of described ACK bag informs that the IP address of described dangerous device for logging on network setting and network configuration can use,
The IP address that the acting as of described NACK bag informs that described dangerous device for logging on network is arranged and network configuration unavailable, need again to apply for.
In described needs, in the DHCP network segment of monitoring, the switch that one or more has mirror image interface is set, at least comprises more than one bypass server.
Advantage of the present invention and good effect
Due in the present invention, take the characteristic of underlying protocol to implement to block, so portable good, and for the blocking way based on application protocol, maintenance cost is low, does not need the renewal according to application protocol and upgrades.
Real-time is good, can use under any network environment, does not need to change original network configuration.Strong security, when device for logging on network cannot be discovered, implements effectively to block.
Accompanying drawing explanation
Fig. 1 is based on DHCP blocking-up method schematic flow sheet in one embodiment of the invention;
Fig. 2 a is DHCP protocol header structural representation in one embodiment of the invention;
OPTION form schematic diagram in Fig. 2 b one embodiment of the invention;
Fig. 3 is for the present invention is based on DHPC method for blocking bypass by flow chart.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, remove, intactly describe, be understandable that the one's duty technical scheme of buying in that embodiment, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those skilled in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
As shown in Figure 3, a kind of method flow diagram realizing bypass blocking-up based on DHCP, it comprises:
A., the switch with mirror port is set in the network segment needing monitoring, the mirror port of switch is connected to the detection mouth of bypass server, for analyser as packet, by the upper united mouth of switch, namely going up network interface is connected in series in network topology, guarantee that the packet of the device for logging on network of needs monitoring all will by having the switch of mirror port, for obtaining the packet of monitored all device for logging on network, the transmission mouth of bypass server is received on the port of switch, if condition is permitted, also can receive on the port of route.(there is the switch of mirror port without any need for configuration)
B. the bypass server of the switch with mirror port is connected to, for processing the packet of device for logging on network.According to the reaLtime user data bag obtained from switch, the MAC Address of recording internet machine, and compare with the secure internet connection machine list that user can customize, if in list, then packet is left intact, if not in list, then effectively blocks according to the type of data packet intercepted and captured.Device for logging on network asks there are two kinds of modes when surfing the Net at the beginning: one is automatic acquisition IP address, and another kind manually obtains IP address.For the device for logging on network of automatic acquisition IP address, forging DHCP OFFER bag by bypass server makes device for logging on network ignore real DHCP OFFER bag, then device for logging on network can send request packet to bypass server, bypass server can send NACK bag to device for logging on network again and make device for logging on network cannot obtain correct IP address and online configuration, thus reaches the effect of blocking-up.For the device for logging on network manually obtaining IP address, make device for logging on network cannot obtain correct IP address and online configuration by forging DHCP NACK bag, thus reach the effect of blocking-up.
Flow process is blocked as shown in Figure 1 for DHCP, is described as follows:
For the device for logging on network request do not belonged in secure internet connection machine list, the device for logging on network for firm access network has two kinds of network accesses: one is Dynamic Acquisition network configuration information; Another kind is the manual configuration network information.For the device for logging on network taking Dynamic Acquisition network configuration, first device for logging on network uses udp protocol, by port 68, sends DISCOVER packet with the form broadcasted, and its objective is to search Dynamic Host Configuration Protocol server in the local area network (LAN) at its place.According to DHCP agreement, can have multiple Dynamic Host Configuration Protocol server in a local area network (LAN), after Dynamic Host Configuration Protocol server receives the DISCOVER packet of device for logging on network transmission, these Dynamic Host Configuration Protocol server all can reply an OFFER bag to device for logging on network.Device for logging on network is according to the time sequencing of OFFER bag received and the value of XID, only accept the OFFER bag that first value that is that arrive and XID matches with it, the OFEER sent by other Dynamic Host Configuration Protocol server bag of other rear arrival will be dropped, and in reciprocal process subsequently, only identify this Dynamic Host Configuration Protocol server, until this Dynamic Host Configuration Protocol server sends NACK bag.After device for logging on network receives NACK bag, will again broadcast DISCOVER packet.Because the true Dynamic Host Configuration Protocol server be present in network broadcasts the service condition determining IP in network before responding in the mode of ARP, so for bypass server, the sufficient time is had to send offer bag to device for logging on network before real Dynamic Host Configuration Protocol server.As long as device for logging on network confirms the OFFER bag receiving blocking server, for the offer bag that other follow-up Dynamic Host Configuration Protocol server sends, device for logging on network can be ignored, and like this, device for logging on network can think that bypass server is the Dynamic Host Configuration Protocol server of current network.Afterwards, device for logging on network will send request bag, to bypass server request network configuration, after blocking server intercepts and captures request bag, according to the request package informatin intercepted and captured, structure ACK bag, distributes an IP address existed to device for logging on network, and device for logging on network is after receiving ACK bag, can verify whether the IP address of distribution exists by the mode of ARP, at this moment, because IP address exists, device for logging on network constantly can resend request bag.Finally, device for logging on network because cannot get correct IP address, thus can reach the object of blocking-up.
For the device for logging on network of manual configuration network settings, device for logging on network can send inform bag with the form of broadcast after setting up, and its object is to ask Dynamic Host Configuration Protocol server to verify the correctness of its IP address.According to DHCP agreement, after Dynamic Host Configuration Protocol server receives inform bag, Dynamic Host Configuration Protocol server can reply the packet of two types, is respectively ACK bag and NACK bag.Device for logging on network is told in the effect of ACK bag, and its IP address arranged and network configuration can use, and device for logging on network is told in the effect of NACK bag, and IP address and the network configuration of its setting are unavailable, need again to apply for.The inform bag of bypass server by intercepting and capturing, NACK bag is sent to device for logging on network, device for logging on network is after receiving NACK bag, can think that IP address is used, can have different processing modes for different device for logging on network, a kind of is directly cause the effect that cannot surf the Net, need manual configuration network again, another kind of then be restart the correct IP address of DHCP request procedure request, at this moment, the blocking-up that bypass server can take the operation same with Dynamic Acquisition IP to realize device for logging on network.
The protocol format of DHCP is as shown in Figure 2 a:
Op is information operating code, be used for expression be request or response, htype is hardware address type, hlen is hardware address length, hops uses when there being transfer, 0 is set in the present invention, xid is random number, be used for identifying the different session phases, sec is IP useful life, when exceeding this time limit, device for logging on network can send request to Dynamic Host Configuration Protocol server again, flags is flag bit, when using with when transfer, 0 is set in the present invention, ciaddr is device for logging on network IP address, use under device for logging on network special state, option, 0.0.0.0 is set in the present invention.Yiaddr is the IP address of user, replys, for device for logging on network provides IP address for Dynamic Host Configuration Protocol server.Siaddr, giaddr use when there being transfer, are set to 0.0.0.0 in the present invention.Chaddr is device for logging on network MAC Address, and sname is Dynamic Host Configuration Protocol server title, optional.File is optional territory, is set to NULL in the present invention.
OPTION is config option as shown in Figure 2 b, and device for logging on network arranges network by reading config option information, and its form is as shown in below Fig. 2.Config option must start with the magic number of 4 bytes, and its decimal value is 99.130.83.99, terminates with end option, and its decimal value is 255.The different code of different options identifies, and its size is 1 byte, thereafter followed by the size of 1 this option configuration information of byte representation, with 1 byte representation.Info represents configuration information, and length is len.
For the structure that DHCP OFFER wraps, according to the packet intercepted and captured, op type is set to response, and xid is set to identical with the packet intercepted and captured.For option field, wherein code 53message type must comprise, for representing information type, numerical value 2 represents that DHCP OFFER wraps, in addition code 54DHCP server Identifier must also be comprised, for representing this Dynamic Host Configuration Protocol server, the DHCP OFFER of structure wraps, and this value can be revised as the value of needs.The DHCP OFFER receiving structure when device for logging on network wraps, and in this, as the IP address of the Dynamic Host Configuration Protocol server in local area network (LAN), can will ignore, thus reach the object of blocking-up to the DHCP OFFER bag of other Dynamic Host Configuration Protocol server.
For the structure that DHCP NACK wraps, except above-mentioned setting, the numerical value of code 53message type must be set to 6, represent DHCP NACK bag.The DHCP NACK receiving structure when device for logging on network wraps, and device for logging on network can acquisition request IP address again, then can realize blocking with aforesaid way.
The requirement of the present invention to switch mirror image bag is: be necessary for the packet comprising physical layer.Packet only in this way, can obtain MAC Address, and forges DHCP bag.Can be placed on same bypass server for the processing procedure that device for logging on network two kinds is different, also can be divided into two and process respective request respectively.

Claims (9)

1., based on a DHCP method for blocking bypass by, its step comprises:
1) switch with mirror image interface is set in the DHCP network segment needing monitoring, obtains the packet of all device for logging on network in this DHCP network segment;
2) MAC Address that obtains device for logging on network is processed to described packet and list of surfing the Net with user-defined safe machine contrasts, find out dangerous device for logging on network;
3) when described dangerous device for logging on network give out a contract for a project carry out access network request time, give out a contract for a project according to the process of described networking request method, forge DHCPACK bag or DHCPOFFER bag, described dangerous device for logging on network is blocked; When described networking request method is for employing Dynamic Acquisition network configuration information, blocking-up method is as follows:
Dangerous device for logging on network sends DISCOVER packet, searches Dynamic Host Configuration Protocol server in the network segment;
Bypass server, before described Dynamic Host Configuration Protocol server sends OFFER, sends to this dangerous device for logging on network and forges DHCP OFFER bag; Described dangerous device for logging on network sends request bag request network configuration to bypass server, after described bypass server intercepts and captures request bag, forge DHCP ACK bag according to the request package informatin intercepted and captured, distribute an IP address existed to this dangerous device for logging on network simultaneously;
By the mode of ARP, described dangerous device for logging on network, after receiving forgery DHCP ACK bag, verifies whether distributing IP address exists, because IP address exists, device for logging on network constantly can resend request bag;
Described device for logging on network cannot get correct IP address, and bypass realizes blocking.
2. as claimed in claim 1 based on DHCP method for blocking bypass by, it is characterized in that, when described networking request method is the manual configuration network information, blocking-up method is as follows:
2-1) dangerous device for logging on network sends inform bag, searches Dynamic Host Configuration Protocol server in the network segment;
2-2) bypass server is before described Dynamic Host Configuration Protocol server sends inform, sends forge DHCP inform bag to this dangerous device for logging on network;
2-3) described dangerous device for logging on network receives this forgery DHCP inform bag and sends request bag request network configuration to bypass server, after described bypass server intercepting and capturing request wraps, forges DHCP NACK bag according to the request package informatin intercepted and captured;
After 2-4) described dangerous device for logging on network receives and forges DHCP NACK bag, IP address requesting again;
2-5) described device for logging on network cannot get correct IP address, and bypass realizes blocking.
3. as claimed in claim 1 based on DHCP method for blocking bypass by, it is characterized in that, described in there is the switch mirror image bag extracted in the switch of mirror image interface need meet: the packet comprising physical layer.
4. as claimed in claim 1 based on DHCP method for blocking bypass by, it is characterized in that, same bypass server can be placed on for the processing procedure that described device for logging on network two kinds is different and process separately, or be divided into two bypass server to process respectively.
5. as claimed in claim 1 based on DHCP method for blocking bypass by, it is characterized in that, after described dangerous device for logging on network receives and forges DHCP inform bag, this dangerous device for logging on network accepts first and arrives OFFER bag and coupling XID value, abandon other to give out a contract for a project, forge DHCP ACK bag until receive.
6. as claimed in claim 2 based on DHCP method for blocking bypass by, it is characterized in that, described step 2-4) different processing modes is adopted for different device for logging on network: cannot surf the Net, need manual configuration network again; Or restart the IP address that DHCP request procedure request is correct, described bypass server can take Dynamic Acquisition network configuration information to realize blocking dangerous device for logging on network.
7. as claimed in claim 2 or claim 3 based on DHCP method for blocking bypass by, it is characterized in that, described dangerous device for logging on network adopts the udp protocol forms of broadcasting to give out a contract for a project.
8. as claimed in claim 2 based on DHCP method for blocking bypass by, it is characterized in that, bypass server forges the packet of Dynamic Host Configuration Protocol server two type: ACK bag and NACK bag; The IP address that the acting as of described ACK bag informs that described dangerous device for logging on network is arranged and network configuration can use, the IP address that the acting as of described NACK bag informs that described dangerous device for logging on network is arranged and network configuration unavailable, need again to apply for.
9. as claimed in claim 1 based on DHCP method for blocking bypass by, it is characterized in that, the switch that one or more has mirror image interface is set in the DHCP network segment needing monitoring, at least comprises more than one bypass server.
CN201210427377.6A 2012-10-31 2012-10-31 A kind of based on DHCP method for blocking bypass by Active CN102904902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210427377.6A CN102904902B (en) 2012-10-31 2012-10-31 A kind of based on DHCP method for blocking bypass by

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210427377.6A CN102904902B (en) 2012-10-31 2012-10-31 A kind of based on DHCP method for blocking bypass by

Publications (2)

Publication Number Publication Date
CN102904902A CN102904902A (en) 2013-01-30
CN102904902B true CN102904902B (en) 2015-08-19

Family

ID=47576938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210427377.6A Active CN102904902B (en) 2012-10-31 2012-10-31 A kind of based on DHCP method for blocking bypass by

Country Status (1)

Country Link
CN (1) CN102904902B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227515A (en) * 2014-05-28 2016-01-06 腾讯科技(深圳)有限公司 Network intrusions blocking-up method, Apparatus and system
CN107204965B (en) * 2016-03-18 2020-06-05 阿里巴巴集团控股有限公司 Method and system for intercepting password cracking behavior
CN107645470B (en) * 2016-07-20 2020-11-03 阿里巴巴集团控股有限公司 Bypass blocking method, device, system and electronic equipment
CN106921529B (en) * 2017-05-12 2020-04-28 成都锐帆网智信息技术有限公司 Bypass-based internet surfing behavior analysis method
CN109309628A (en) * 2018-09-19 2019-02-05 北京奇安信科技有限公司 A kind of obstruction processing method and processing device of shared access user

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1612537A (en) * 2003-10-29 2005-05-04 华为技术有限公司 Method for preventing main computer from being counterfeited in IP ethernet
CN1713584A (en) * 2004-06-25 2005-12-28 上海宝信软件股份有限公司 Discovering and blocking system and method for intranet IP address
CN101350743A (en) * 2007-07-20 2009-01-21 莱克斯信息技术(北京)有限公司 By-path interdiction UDP session
CN101350746A (en) * 2007-07-20 2009-01-21 莱克斯信息技术(北京)有限公司 By-path interdiction TCP connection
CN101415012A (en) * 2008-11-06 2009-04-22 杭州华三通信技术有限公司 Method and system for defending address analysis protocol message aggression
CN101483515A (en) * 2009-02-26 2009-07-15 杭州华三通信技术有限公司 DHCP attack guarding method and customer terminal equipment
CN101577729A (en) * 2009-06-10 2009-11-11 上海宝信软件股份有限公司 Method for blocking bypass by combining DNS redirection with Http redirection

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1612537A (en) * 2003-10-29 2005-05-04 华为技术有限公司 Method for preventing main computer from being counterfeited in IP ethernet
CN1713584A (en) * 2004-06-25 2005-12-28 上海宝信软件股份有限公司 Discovering and blocking system and method for intranet IP address
CN101350743A (en) * 2007-07-20 2009-01-21 莱克斯信息技术(北京)有限公司 By-path interdiction UDP session
CN101350746A (en) * 2007-07-20 2009-01-21 莱克斯信息技术(北京)有限公司 By-path interdiction TCP connection
CN101415012A (en) * 2008-11-06 2009-04-22 杭州华三通信技术有限公司 Method and system for defending address analysis protocol message aggression
CN101483515A (en) * 2009-02-26 2009-07-15 杭州华三通信技术有限公司 DHCP attack guarding method and customer terminal equipment
CN101577729A (en) * 2009-06-10 2009-11-11 上海宝信软件股份有限公司 Method for blocking bypass by combining DNS redirection with Http redirection

Also Published As

Publication number Publication date
CN102904902A (en) 2013-01-30

Similar Documents

Publication Publication Date Title
US7787455B2 (en) Technique for automated MAC address cloning
US9967738B2 (en) Methods and arrangements for enabling data transmission between a mobile device and a static destination address
CN102904902B (en) A kind of based on DHCP method for blocking bypass by
US11343224B2 (en) Method for renewing IP address and apparatus
EP2012485A1 (en) Management method, apparatus and system of session connection
CN102710811B (en) Realize method and the switch of dhcp address safety distribution
CN101895587B (en) Prevent the methods, devices and systems of users from modifying IP addresses privately
US20140282920A1 (en) Dynamically selecting a dhcp server for a client terminal
JP2006222929A (en) Network system
CN101184099B (en) Second IP address assignment method based on dynamic host machine configuration protocol access authentication
EP2615788A1 (en) Method for dual stack user management and broadband access server
CN104093149A (en) Wireless access method and device for monitoring equipment
CN104618522B (en) The method and Ethernet access equipment that IP address of terminal automatically updates
CN108306992B (en) Blind starting method of base station, base station and centralized DHCP server
CN101325587A (en) Method for monitoring DHCP conversation
US20140280467A1 (en) Method of managing port dhcp server protocol addresses
WO2013071803A1 (en) Vendor information of wireless network devices
CN105610994B (en) IP address allocation method, coaxial cable intermediate converter and system
CN106878481B (en) Method, device and system for acquiring Internet Protocol (IP) address
CN105591848A (en) Authentication method and device of IPv6 stateless automatic configuration
CN100461693C (en) Network system
TW201406103A (en) Server and service mode setting method
CN102710810A (en) Method for automatically assigning internet protocol (IP) address and relay equipment
CN108881178B (en) Information transmission method and apparatus, device, storage medium, and electronic apparatus
CN104780230A (en) Method of automatically acquiring cloud server IP address, system and cloud system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant