CN103220273A - Method and system for central processing unit (CPU) to forward message rapidly - Google Patents

Method and system for central processing unit (CPU) to forward message rapidly Download PDF

Info

Publication number
CN103220273A
CN103220273A CN2013100880577A CN201310088057A CN103220273A CN 103220273 A CN103220273 A CN 103220273A CN 2013100880577 A CN2013100880577 A CN 2013100880577A CN 201310088057 A CN201310088057 A CN 201310088057A CN 103220273 A CN103220273 A CN 103220273A
Authority
CN
China
Prior art keywords
fire compartment
compartment wall
message
port
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100880577A
Other languages
Chinese (zh)
Other versions
CN103220273B (en
Inventor
陈海滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Opzoon Technology Co Ltd
Original Assignee
Opzoon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opzoon Technology Co Ltd filed Critical Opzoon Technology Co Ltd
Priority to CN201310088057.7A priority Critical patent/CN103220273B/en
Publication of CN103220273A publication Critical patent/CN103220273A/en
Application granted granted Critical
Publication of CN103220273B publication Critical patent/CN103220273B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a system for a central processing unit (CPU) to forward a message rapidly. The method comprises the steps: S1: the message is sent to a first firewall by a test unit; S2: the message is encrypted by a first encryption and decryption chip in the first firewall according to a preset internet protocol security (IPSEC) encryption key of the message and the encrypted message is sent to a second firewall; and S3: the encrypted message is decrypted by a second encryption and decryption chip in the second firewall according to a preset IPSEC decryption key of the message and the decrypted message is sent to the test unit. According to the method and the system for the CPU to forward the message rapidly, the speed of the CPU in forwarding the message is higher than the speed of the encryption and decryption chips in processing the message.

Description

The method and system that a kind of CPU E-Packets fast
Technical field
The present invention relates to technical field of the computer network, the method and system that particularly a kind of CPU E-Packets fast.
Background technology
In multi-core network device, as the fire compartment wall network equipment, usually adopt 8 nuclear CPU, 16 nuclear CPU and 32 these three models of nuclear CPU are as low mid-to high-end product, per 4 CPU are encapsulated on the chip, and each chip attaches a hardware encipher decrypting device, just with respect to the network equipment at low mid-to high-end product respectively by 2,4,8 hardware encipher decrypting device, when using each CPU to handle message by stream, owing to use CPU by the stream method, the message of identical IP five-tuple will be distributed on the same CPU, therefore will be super busy owing to single forwarding CPU occurring, and for ESP(Encapsulate Security Payload, secure package load)/AH(Authenticaton Header, authentication header) message, CPU is busy with flowing searching of coupling and tlv triple, has just formed deciphering chip this moment and has transmitted the performance bottleneck that CPU carries out, and it is slow that CPU processing forward message is handled message than deciphering chip.
Summary of the invention
(1) technical problem of Xie Jueing
The technical problem that the present invention solves is to solve CPU to E-Packet and be lower than the speed that deciphering chip is handled message.
(2) technical scheme
The invention provides the method that a kind of CPU E-Packets fast, described method comprises:
S1: test cell sends message to first fire compartment wall;
S2: first deciphering chip in described first fire compartment wall is encrypted described message according to the default IPSEC encryption key of described message, and will encrypt message and send to second fire compartment wall;
S3: second deciphering chip in described second fire compartment wall is decrypted described encryption message according to the default IPSEC decruption key of described message, and decrypted message is sent to described test cell.
Preferably, step S2 specifically comprises:
S21: the CPU0 in first fire compartment wall sends to described first deciphering chip with the default IPSEC encryption key of described message and described message; CPU0 in described first fire compartment wall and the binding of the first fire compartment wall ingress port; The described first fire compartment wall ingress port is the port that described first fire compartment wall links to each other with test cell;
S22: described first deciphering chip is encrypted described message according to the IPSEC encryption key of described message, and described encryption message is sent to CPU1 in first fire compartment wall;
S23: the CPU1 in described first fire compartment wall receives described encryption message, and described encryption message is sent to second fire compartment wall; CPU1 in described first fire compartment wall and described first fire compartment wall outlet port binding; Described first fire compartment wall outlet port is the port that described first fire compartment wall links to each other with vpn tunneling.
Preferably, CPU2 in first fire compartment wall and described first fire compartment wall ingress port binding;
CPU3 in first fire compartment wall and described first fire compartment wall outlet port binding.
Preferably, step S3 specifically comprises:
S31: the CPU3 in second fire compartment wall sends to described second deciphering chip with the default IPSEC decruption key of described encryption message and described encryption message; CPU3 in described second fire compartment wall and the binding of the second fire compartment wall ingress port; The described second fire compartment wall ingress port is the port that described second fire compartment wall links to each other with vpn tunneling;
S32: described second deciphering chip is decrypted described encryption message according to the IPSEC decruption key of described encryption message, and described decrypted message is sent to CPU2 in second fire compartment wall;
S33: the CPU2 in described second fire compartment wall sends to described test cell with described decrypted message; CPU2 in described second fire compartment wall and second fire compartment wall outlet port binding; Described second fire compartment wall outlet port is the port that described second fire compartment wall links to each other with test cell.
Preferably, CPU1 in second fire compartment wall and described second fire compartment wall ingress port binding;
CPU0 in second fire compartment wall and described second protecting wall outlet port binding.
The present invention also proposes the system that a kind of CPU E-Packets fast, and described system comprises:
Test cell is used for sending message to first fire compartment wall;
Described first fire compartment wall is used to receive the message that described test cell sends;
First deciphering chip is positioned at described first fire compartment wall, is used for according to the default IPSEC encryption key of described message described message being encrypted, and will encrypts message and send to second fire compartment wall;
Described second fire compartment wall is used to receive the described encryption message that first deciphering chip sends;
Second deciphering chip is positioned at described second fire compartment wall, is used for according to the default IPSEC decruption key of described message described encryption message being decrypted, and decrypted message is sent to described test cell.
Preferably, described system also comprises:
CPU0 in first fire compartment wall is positioned at described first fire compartment wall, and binds with the first fire compartment wall ingress port, is used for the default IPSEC encryption key of described message and described message is sent to described first deciphering chip; The described first fire compartment wall ingress port is the port that described first fire compartment wall links to each other with test cell;
Described first deciphering chip also is used for described encryption message is sent to CPU1 in first fire compartment wall;
CPU1 in described first fire compartment wall is positioned at described first fire compartment wall, and exports port binding with first fire compartment wall, is used to receive described encryption message, and described encryption message is sent to second protecting wall; Described first fire compartment wall outlet port is the port that described first fire compartment wall links to each other with vpn tunneling.
Preferably, described system also comprises:
CPU2 in first fire compartment wall is with described first fire compartment wall ingress port binding;
CPU3 in first fire compartment wall is with described first fire compartment wall outlet port binding.
Preferably, described system also comprises:
CPU3 in second fire compartment wall, be positioned at described second fire compartment wall, and bind with the second fire compartment wall ingress port, be used for the default IPSEC decruption key of described encryption message is sent to described second deciphering chip, the described second fire compartment wall ingress port is the port that described second fire compartment wall links to each other with vpn tunneling;
Described second deciphering chip also is used for described decrypted message is sent to CPU2 in second fire compartment wall;
CPU2 in described second fire compartment wall, be positioned at described second fire compartment wall, and with second fire compartment wall outlet port binding, be used for described decrypted message is sent to described test cell, described second fire compartment wall outlet port is the port that described second fire compartment wall links to each other with test cell.
Preferably, described system also comprises:
CPU1 in second fire compartment wall is with described second fire compartment wall ingress port binding;
CPU0 in second fire compartment wall is with described second protecting wall outlet port binding.
(3) beneficial effect
The method and system of the present invention by providing a kind of CPU to E-Packet fast, the speed that makes CPU E-Packet is handled the speed of message faster than deciphering chip.
Description of drawings
Fig. 1 is the CPU provided by the invention process schematic diagram that E-Packets fast;
Fig. 2 is a method flow diagram provided by the invention;
Fig. 3 is a system construction drawing provided by the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described.
Embodiment one
The invention provides the method that a kind of CPU E-Packets fast, by deciphering chip and CPU are divided the work to optimize to the message processing procedure, the speed that makes CPU E-Packet is handled the speed of message faster than deciphering chip.2,4 and 8 hardware enciphering and deciphering chips are arranged respectively in basic, normal, high three product for deciphering chip, are example with the low-end product, only use 4 CPU and 2 deciphering chips.
As shown in Figure 1, for CPU carries out message repeating process schematic diagram, on fire compartment wall fwa, the ingress port g0/0/0 of CPU0 and CPU2 and fwa binding, the outlet port g0/0/1 binding of CPU1 and CPU3 and fwa; On fire compartment wall fwb, the ingress port g0/0/1 of CPU1 and CPU3 and fwb binding, the outlet port g0/0/0 binding of CPU0 and CPU2 and fwb.From the tester to fwa to fwb again to test cell, be a cyclic process.
As shown in Figure 2, the method that E-Packets fast of CPU comprises:
S1: test cell sends message to first fire compartment wall;
S2: first deciphering chip in described first fire compartment wall is encrypted described message according to the default IPSEC encryption key of described message, and will encrypt message and send to second fire compartment wall;
S3: second deciphering chip in described second fire compartment wall is decrypted described encryption message according to the default IPSEC decruption key of described message, and decrypted message is sent to described test cell.
Step S2 specifically comprises:
S21: the CPU0 in first fire compartment wall sends to described first deciphering chip with the default IPSEC encryption key of described message and described message; CPU0 in described first fire compartment wall and the binding of the first fire compartment wall ingress port; The described first fire compartment wall ingress port is the port that described first fire compartment wall links to each other with test cell;
S22: described first deciphering chip is encrypted described message according to the IPSEC encryption key of described message, and described encryption message is sent to CPU1 in first fire compartment wall;
S23: the CPU1 in described first fire compartment wall receives described encryption message, and described encryption message is sent to second fire compartment wall; CPU1 in described first fire compartment wall and described first fire compartment wall outlet port binding; Described first fire compartment wall outlet port is the port that described first fire compartment wall links to each other with vpn tunneling.
CPU2 in first fire compartment wall and the binding of the described first fire compartment wall ingress port;
CPU3 in first fire compartment wall and described first fire compartment wall outlet port binding.
Step S3 specifically comprises:
S31: the CPU3 in second fire compartment wall sends to described second deciphering chip with the default IPSEC decruption key of described encryption message and described encryption message; CPU3 in described second fire compartment wall and the binding of the second fire compartment wall ingress port; The described second fire compartment wall ingress port is the port that described second fire compartment wall links to each other with vpn tunneling;
S32: described second deciphering chip is decrypted described encryption message according to the IPSEC decruption key of described encryption message, and described decrypted message is sent to CPU2 in second fire compartment wall;
S33: the CPU2 in described second fire compartment wall sends to described test cell with described decrypted message; CPU2 in described second fire compartment wall and second fire compartment wall outlet port binding; Described second fire compartment wall outlet port is the port that described second fire compartment wall links to each other with test cell.
CPU1 in second fire compartment wall and the binding of the described second fire compartment wall ingress port;
CPU0 in second fire compartment wall and described second protecting wall outlet port binding.
By the method that adopts CPU to E-Packet fast, CPU1 and CPU3 bind with the outlet port of encryption chip and the outlet port of deciphering chip respectively, saved the process of searching route, and directly message is transmitted, the speed that makes CPU E-Packet is lower than the speed that deciphering chip is handled message.
Embodiment two
The present invention also proposes the system that a kind of CPU E-Packets fast, and as shown in Figure 2, described system comprises:
Test cell is used for sending message to first fire compartment wall;
Described first fire compartment wall is used to receive the message that described test cell sends;
First deciphering chip is positioned at described first fire compartment wall, is used for according to the default IPSEC encryption key of described message described message being encrypted, and will encrypts message and send to second fire compartment wall;
Described second fire compartment wall is used to receive the described encryption message that first deciphering chip sends;
Second deciphering chip is positioned at described second fire compartment wall, is used for according to the default IPSEC decruption key of described message described encryption message being decrypted, and decrypted message is sent to described test cell.
Preferably, described system also comprises:
CPU0 in first fire compartment wall is positioned at described first fire compartment wall, and binds with the first fire compartment wall ingress port, is used for the default IPSEC encryption key of described message and described message is sent to described first deciphering chip; The described first fire compartment wall ingress port is the port that described first fire compartment wall links to each other with test cell;
Described first deciphering chip also is used for described encryption message is sent to CPU1 in first fire compartment wall;
CPU1 in described first fire compartment wall is positioned at described first fire compartment wall, and exports port binding with first fire compartment wall, is used to receive described encryption message, and described encryption message is sent to second protecting wall; Described first fire compartment wall outlet port is the port that described first fire compartment wall links to each other with vpn tunneling.
Preferably, described system also comprises:
CPU2 in first fire compartment wall is with described first fire compartment wall ingress port binding;
CPU3 in first fire compartment wall is with described first fire compartment wall outlet port binding.
Preferably, described system also comprises:
CPU3 in second fire compartment wall, be positioned at described second fire compartment wall, and bind with the second fire compartment wall ingress port, be used for the default IPSEC decruption key of described encryption message is sent to described second deciphering chip, the described second fire compartment wall ingress port is the port that described second fire compartment wall links to each other with vpn tunneling;
Described second deciphering chip also is used for described decrypted message is sent to CPU2 in second fire compartment wall;
CPU2 in described second fire compartment wall, be positioned at described second fire compartment wall, and with second fire compartment wall outlet port binding, be used for described decrypted message is sent to described test cell, described second fire compartment wall outlet port is the port that described second fire compartment wall links to each other with test cell.
Preferably, described system also comprises:
CPU1 in second fire compartment wall is with described second fire compartment wall ingress port binding;
CPU0 in second fire compartment wall is with described second protecting wall outlet port binding.
Above execution mode only is used to illustrate the present invention; and be not limitation of the present invention; the those of ordinary skill in relevant technologies field; under the situation that does not break away from the spirit and scope of the present invention; can also make various variations and modification; therefore all technical schemes that are equal to also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (10)

1. the method that CPU E-Packets fast is characterized in that, described method comprises:
S1: test cell sends message to first fire compartment wall;
S2: first deciphering chip in described first fire compartment wall is encrypted described message according to the default IPSEC encryption key of described message, and will encrypt message and send to second fire compartment wall;
S3: second deciphering chip in described second fire compartment wall is decrypted described encryption message according to the default IPSEC decruption key of described message, and decrypted message is sent to described test cell.
2. method according to claim 1 is characterized in that step S2 specifically comprises:
S21: the CPU0 in first fire compartment wall sends to described first deciphering chip with the default IPSEC encryption key of described message and described message; CPU0 in described first fire compartment wall and the binding of the first fire compartment wall ingress port; The described first fire compartment wall ingress port is the port that described first fire compartment wall links to each other with test cell;
S22: described first deciphering chip is encrypted described message according to the IPSEC encryption key of described message, and described encryption message is sent to CPU1 in first fire compartment wall;
S23: the CPU1 in described first fire compartment wall receives described encryption message, and described encryption message is sent to second fire compartment wall; CPU1 in described first fire compartment wall and described first fire compartment wall outlet port binding; Described first fire compartment wall outlet port is the port that described first fire compartment wall links to each other with vpn tunneling.
3. method according to claim 2 is characterized in that, CPU2 in first fire compartment wall and the binding of the described first fire compartment wall ingress port;
CPU3 in first fire compartment wall and described first fire compartment wall outlet port binding.
4. method according to claim 1 is characterized in that step S3 specifically comprises:
S31: the CPU3 in second fire compartment wall sends to described second deciphering chip with the default IPSEC decruption key of described encryption message and described encryption message; CPU3 in described second fire compartment wall and the binding of the second fire compartment wall ingress port; The described second fire compartment wall ingress port is the port that described second fire compartment wall links to each other with vpn tunneling;
S32: described second deciphering chip is decrypted described encryption message according to the IPSEC decruption key of described encryption message, and described decrypted message is sent to CPU2 in second fire compartment wall;
S33: the CPU2 in described second fire compartment wall sends to described test cell with described decrypted message; CPU2 in described second fire compartment wall and second fire compartment wall outlet port binding; Described second fire compartment wall outlet port is the port that described second fire compartment wall links to each other with test cell.
5. method according to claim 4 is characterized in that, CPU1 in second fire compartment wall and the binding of the described second fire compartment wall ingress port;
CPU0 in second fire compartment wall and described second protecting wall outlet port binding.
6. the system that CPU E-Packets fast is characterized in that, described system comprises:
Test cell is used for sending message to first fire compartment wall;
Described first fire compartment wall is used to receive the message that described test cell sends;
First deciphering chip is positioned at described first fire compartment wall, is used for according to the default IPSEC encryption key of described message described message being encrypted, and will encrypts message and send to second fire compartment wall;
Described second fire compartment wall is used to receive the described encryption message that first deciphering chip sends;
Second deciphering chip is positioned at described second fire compartment wall, is used for according to the default IPSEC decruption key of described message described encryption message being decrypted, and decrypted message is sent to described test cell.
7. system according to claim 6 is characterized in that, described system also comprises:
CPU0 in first fire compartment wall is positioned at described first fire compartment wall, and binds with the first fire compartment wall ingress port, is used for the default IPSEC encryption key of described message and described message is sent to described first deciphering chip; The described first fire compartment wall ingress port is the port that described first fire compartment wall links to each other with test cell;
Described first deciphering chip also is used for described encryption message is sent to CPU1 in first fire compartment wall;
CPU1 in described first fire compartment wall is positioned at described first fire compartment wall, and exports port binding with first fire compartment wall, is used to receive described encryption message, and described encryption message is sent to second protecting wall; Described first fire compartment wall outlet port is the port that described first fire compartment wall links to each other with vpn tunneling.
8. system according to claim 7 is characterized in that, described system also comprises:
CPU2 in first fire compartment wall is with described first fire compartment wall ingress port binding;
CPU3 in first fire compartment wall is with described first fire compartment wall outlet port binding.
9. system according to claim 6 is characterized in that, described system also comprises:
CPU3 in second fire compartment wall, be positioned at described second fire compartment wall, and bind with the second fire compartment wall ingress port, be used for the default IPSEC decruption key of described encryption message is sent to described second deciphering chip, the described second fire compartment wall ingress port is the port that described second fire compartment wall links to each other with vpn tunneling;
Described second deciphering chip also is used for described decrypted message is sent to CPU2 in second fire compartment wall;
CPU2 in described second fire compartment wall, be positioned at described second fire compartment wall, and with second fire compartment wall outlet port binding, be used for described decrypted message is sent to described test cell, described second fire compartment wall outlet port is the port that described second fire compartment wall links to each other with test cell.
10. system according to claim 9 is characterized in that, described system also comprises:
CPU1 in second fire compartment wall is with described second fire compartment wall ingress port binding;
CPU0 in second fire compartment wall is with described second protecting wall outlet port binding.
CN201310088057.7A 2013-03-19 2013-03-19 A kind of method and system of CPU fast-forwarding message Expired - Fee Related CN103220273B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310088057.7A CN103220273B (en) 2013-03-19 2013-03-19 A kind of method and system of CPU fast-forwarding message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310088057.7A CN103220273B (en) 2013-03-19 2013-03-19 A kind of method and system of CPU fast-forwarding message

Publications (2)

Publication Number Publication Date
CN103220273A true CN103220273A (en) 2013-07-24
CN103220273B CN103220273B (en) 2016-01-06

Family

ID=48817738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310088057.7A Expired - Fee Related CN103220273B (en) 2013-03-19 2013-03-19 A kind of method and system of CPU fast-forwarding message

Country Status (1)

Country Link
CN (1) CN103220273B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204965A (en) * 2016-03-18 2017-09-26 阿里巴巴集团控股有限公司 The hold-up interception method and system of a kind of password cracking behavior
CN109639721A (en) * 2019-01-08 2019-04-16 郑州云海信息技术有限公司 IPsec message format processing method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100191958A1 (en) * 2006-09-29 2010-07-29 Panasonic Corporation Method and network device for processing nested internet protocol security tunnels
CN102404339A (en) * 2011-12-16 2012-04-04 山石网科通信技术(北京)有限公司 Fire wall system and data processing method based on fire wall system
CN102694808A (en) * 2012-05-31 2012-09-26 汉柏科技有限公司 Processing system and method for internet key exchange (IKE) remote access
CN102891848A (en) * 2012-09-25 2013-01-23 汉柏科技有限公司 Method for carrying out encryption and decryption by using IPSec security association

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100191958A1 (en) * 2006-09-29 2010-07-29 Panasonic Corporation Method and network device for processing nested internet protocol security tunnels
CN102404339A (en) * 2011-12-16 2012-04-04 山石网科通信技术(北京)有限公司 Fire wall system and data processing method based on fire wall system
CN102694808A (en) * 2012-05-31 2012-09-26 汉柏科技有限公司 Processing system and method for internet key exchange (IKE) remote access
CN102891848A (en) * 2012-09-25 2013-01-23 汉柏科技有限公司 Method for carrying out encryption and decryption by using IPSec security association

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204965A (en) * 2016-03-18 2017-09-26 阿里巴巴集团控股有限公司 The hold-up interception method and system of a kind of password cracking behavior
CN109639721A (en) * 2019-01-08 2019-04-16 郑州云海信息技术有限公司 IPsec message format processing method, device, equipment and storage medium
CN109639721B (en) * 2019-01-08 2022-02-22 郑州云海信息技术有限公司 IPsec message format processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN103220273B (en) 2016-01-06

Similar Documents

Publication Publication Date Title
CN100594690C (en) Method and device for safety strategy uniformly treatment in safety gateway
CN102882789B (en) A kind of data message processing method, system and equipment
US9660963B2 (en) Adaptive encryption optimization
CN102549998B (en) Aggregation of cryptography engines
CN104601550B (en) Reverse isolation file transmission system and method based on cluster array
AU2018389883B2 (en) Device and method for transmitting data between a first and a second network
CN103139222A (en) Internet protocol security (IPSEC) tunnel data transmission method and device thereof
CN103491573A (en) Tunnel acceleration for wireless access points
CN106301765B (en) Encryption and decryption chip and method for realizing encryption and decryption
CN101222512A (en) Enciphering and deciphering card, enciphering and deciphering method
CN102891848A (en) Method for carrying out encryption and decryption by using IPSec security association
CN111385259A (en) Data transmission method, data transmission device, related equipment and storage medium
Cho et al. Securing ethernet-based optical fronthaul for 5g network
US10951520B2 (en) SDN, method for forwarding packet by SDN, and apparatus
CN115174482B (en) Message distribution method and device of network equipment
WO2016165277A1 (en) Ipsec diversion implementing method and apparatus
Liu et al. Secure Video Streaming with Lightweight Cipher PRESENT in an SDN Testbed.
CN211352206U (en) IPSec VPN cryptographic machine based on quantum key distribution
US10015208B2 (en) Single proxies in secure communication using service function chaining
CN103607417A (en) Network server supporting SSL protocol
CN111669374B (en) Encryption and decryption performance expansion method for single tunnel software of IPsec VPN
CN103220273A (en) Method and system for central processing unit (CPU) to forward message rapidly
CN117254976A (en) National standard IPsec VPN realization method, device and system based on VPP and electronic equipment
CN106385423A (en) Data encrypting transmission method and system
CN113542309B (en) Data processing system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160106

Termination date: 20180319