CN104104573A - Method and system for controlling IPsec tunnel of network devices - Google Patents

Method and system for controlling IPsec tunnel of network devices Download PDF

Info

Publication number
CN104104573A
CN104104573A CN201410382421.5A CN201410382421A CN104104573A CN 104104573 A CN104104573 A CN 104104573A CN 201410382421 A CN201410382421 A CN 201410382421A CN 104104573 A CN104104573 A CN 104104573A
Authority
CN
China
Prior art keywords
ipsec tunnel
tunnel
ipsec
message
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410382421.5A
Other languages
Chinese (zh)
Inventor
陈海滨
于立洋
章敏
王禹
王智民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Opzoon Technology Co Ltd
Original Assignee
Opzoon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opzoon Technology Co Ltd filed Critical Opzoon Technology Co Ltd
Priority to CN201410382421.5A priority Critical patent/CN104104573A/en
Publication of CN104104573A publication Critical patent/CN104104573A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a system for controlling an IPsec (Internet Protocol security) tunnel of network devices. The method comprises the following steps of establishing the IPsec tunnel between the network devices and negotiating to generate the primary tunnel IKE SA (Internet Key Exchange Security Association) and the secondary tunnel IPsec SA of the IPsec tunnel, transmitting a negotiation message upon detecting that the expiration time of the primary tunnel IKE SA or that of the secondary tunnel IPsec SA reaches preset time, determining whether the message processing speed of outcoming physical interface of the negotiation message is equal to or greater than a preset upper limit if no response message is received, further determining whether the IPsec tunnel is capable of normally encrypting and decrypting the message if the message processing speed is equal to or greater than the preset upper limit, and if so, determining that the IPsec tunnel is available, and re-transmitting the negotiation message after waiting for a preset time interval. The method is capable of solving the oscillation problem of the IPsec tunnel.

Description

Be used for control method and the system in the IPsec tunnel of the network equipment
Technical field
The present invention relates to network communications technology field, particularly a kind of control method and system of the IPsec tunnel for the network equipment.
Background technology
When multi-core network device is processed message, first processing forward message, secondly processing host message, can ensure like this throughput of equipment increases performance.But for other functions, if taking defeat, can retransmit main frame message, do not have and have a strong impact on, but for IPsec (Internet Protocol Security, Internet protocol safety) tunnel, negotiation packet is main frame message, if now negotiation packet take defeat will cause IPsec tunnel disconnect.Because the reason of negotiation packet failure may be to be caused by many-side, and this reason also can be along with the change of network state disappears.Iff taking defeat and just disconnect IPsec tunnel because of negotiation packet, thereby can concerning user, there will be the situation of tunnel concussion, and careless disconnection IPsec tunnel, and there is no the recovery IPsec tunnel in good time according to the variation of current network state, can affect the normal function in IPsec tunnel.
Summary of the invention
The present invention In view of the foregoing makes, and its objective is the control method that a kind of IPsec tunnel for the network equipment is provided, and the method can solve the concussion problem in IPsec tunnel.
For achieving the above object, the invention provides a kind of control method of the IPsec tunnel for the network equipment, comprise the steps:
Set up the IPsec tunnel of LA Management Room, consult to generate one-level tunnel IKE SA and the secondary tunnel IPsec SA in IPsec tunnel;
Detecting that the time-out time of described one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA reach after Preset Time, sending negotiation packet;
If do not receive back message using, judge whether the message processing speed that physical interface of described negotiation packet is equal to or greater than preset upper limit;
If message processing speed is equal to or greater than preset upper limit, further judge whether described IPsec tunnel can be to the normal encryption and decryption of message;
If so, judge that described IPsec tunnel can use, wait for after default duration, resend described negotiation packet.
According to an aspect of the present invention, if the message processing speed that goes out physical interface of described negotiation packet is less than preset upper limit, disconnect described IPsec tunnel.
According to another aspect of the present invention, in the time detecting that described IPsec tunnel is provided with into encryption message, judge that described IPsec tunnel can normally encrypt message.
According to another aspect of the invention, if judge that described IPsec tunnel cannot, to the normal encryption of message or deciphering, disconnect described IPsec tunnel.
In accordance with a further aspect of the present invention, described default duration is configured according to network state by user.
The control method in the IPsec tunnel for the network equipment provided by the invention, after finding to consult unsuccessfully, do not carry out immediately the deletion of IPsec tunnel, but whether the speed that goes out physical interface and the IPsec tunnel that consider negotiation packet can be to the normal encryption and decryption of message, select to disconnect IPsec tunnel or time delay certain hour, miss flow peak and again consult again, thus the concussion problem in solution IPsec tunnel.
Another object of the present invention is to provide a kind of control system of the IPsec tunnel for the network equipment, and this system can solve the concussion problem in IPsec tunnel.
For achieving the above object, the invention provides a kind of control system of the IPsec tunnel for the network equipment, comprise: IPsec tunnel arranges module, also consult to generate one-level tunnel IKE SA and the secondary tunnel IPsec SA in IPsec tunnel for setting up the IPsec tunnel of LA Management Room; Whether time-out time detection module, reach Preset Time for detection of the time-out time of described one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA; Communication module, described communication module is connected to described time-out time detection module, for detecting that at described time-out time detection module the time-out time of described one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA reach after Preset Time, send negotiation packet; Judge module, described judge module is connected to described communication module and described IPsec tunnel arranges module, for not receiving after back message using in described communication module, whether the message processing speed that goes out physical interface that judges described negotiation packet is equal to or greater than preset upper limit, if it is further judge whether described IPsec tunnel can be to the normal encryption and decryption of message, if it is judge that described IPsec tunnel can use, wait for after default duration, resend described negotiation packet by described communication module.
According to an aspect of the present invention, be less than preset upper limit if described judge module judges the message processing speed that physical interface of negotiation packet, described IPsec tunnel arranges module and disconnects described IPsec tunnel.
According to another aspect of the invention, be less than preset upper limit if described judge module judges the message processing speed that physical interface of negotiation packet, described IPsec tunnel arranges module and disconnects described IPsec tunnel.
In accordance with a further aspect of the present invention, cannot encrypt or deciphering message is normal if described judge module judges described IPsec tunnel, described IPsec tunnel arranges module and disconnects described IPsec tunnel.
According to another aspect of the invention, described default duration is configured according to network state by user.
The control system in the IPsec tunnel for the network equipment provided by the invention, after finding to consult unsuccessfully, do not carry out immediately the deletion of IPsec tunnel, but whether the speed that goes out physical interface and the IPsec tunnel that consider negotiation packet can be to the normal encryption and decryption of message, select to disconnect IPsec tunnel or time delay certain hour, miss flow peak and again consult again, thus the concussion problem in solution IPsec tunnel.
Brief description of the drawings
Fig. 1 is according to the flow chart of the control method in the IPsec tunnel for the network equipment of first embodiment of the invention;
Fig. 2 is according to the flow chart of the control method in the IPsec tunnel for the network equipment of second embodiment of the invention;
The schematic diagram in the IPsec tunnel of the schematically illustrated LA Management Room of Fig. 3;
Fig. 4 is according to the structure chart of the control system in the IPsec tunnel for the network equipment of embodiment of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention more cheer and bright, below in conjunction with embodiment and with reference to accompanying drawing, the present invention is described in more detail.Should be appreciated that, these descriptions are exemplary, and do not really want to limit the scope of the invention.In addition, in the following description, omitted the description to known features and technology, to avoid unnecessarily obscuring concept of the present invention.
Because the priority of multi-core network device processing message is, first processing forward message, secondly processing host message, thus can ensure handling up of equipment, increase performance.But for IPsec tunnel, negotiation packet is main frame message, will cause IPsec tunnel to disconnect if now abandon negotiation packet, concerning user, just there will be the situation of tunnel concussion.Therefore, for multi-core network device, the invention provides a kind of control method and system of the IPsec tunnel for the network equipment, can prevent because the E-Packet network interface card that causes of priority treatment is busy, i.e. processing host message or negotiation packet in time, cause negotiation packet part to be lost, and then failure is heavily consulted in the IPsec tunnel causing, delete IPsec tunnel, cannot ensure the normal function in IPsec tunnel.
Fig. 1 is according to the flow chart of the control method in the IPsec tunnel for the network equipment of first embodiment of the invention.
As shown in Figure 1, the control method in the IPsec tunnel for the network equipment of first embodiment of the invention, comprises the steps:
Step S1, sets up the IPsec tunnel of LA Management Room, consults to generate one-level tunnel IKE SA and the secondary tunnel IPsec SA in IPsec tunnel.
Specifically, between the network equipment, set up IPsec tunnel.With reference to figure 3, taking firewall box Fw a and firewall box Fw b as example, firewall box Fw a and firewall box Fw b set up IPsec tunnel.In the process of establishing in IPsec tunnel, consult to generate one-level tunnel IKE SA and secondary tunnel IPsec SA.Wherein, IKE SA in one-level tunnel is for the protection of IKE protocol massages.Secondary tunnel IPsec SA encrypts for data message.
Step S2, is detecting that the time-out time of one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA reach after Preset Time, sends negotiation packet.
Whether detect one-level tunnel IKE SA or secondary tunnel IPsec SA occurs overtime, and whether time-out time reaches Preset Time, if it is the message of holding consultation sends, and the renewal that starts IKE SA and IPsec SA is consulted, and consults to generate new IKE SA and IPsec SA.
Step S3, if do not receive back message using, judges whether the message processing speed that physical interface of negotiation packet is equal to or greater than preset upper limit.
Send negotiation packet in step S2 after, if receive back message using, judgement is consulted successfully, generates new IKE SA and IPsec SA.If do not receive back message using, judgement is consulted unsuccessfully, does not now carry out immediately the deletion of IPsec tunnel, but checks the message processing speed that physical interface of this negotiation packet.Whether the message processing speed that goes out physical interface that particularly, judges negotiation packet is equal to or greater than preset upper limit.Because can utilizing message processing speed and unit duration calculation, obtains the flow that goes out physical interface of a period of time, therefore whether be equal to or greater than preset upper limit by the message processing speed that goes out physical interface that judges negotiation packet, can reach and judge to go out in unit duration whether the flow of physical interface exceedes the object of the upper limit.
Step S4, if message processing speed is equal to or greater than preset upper limit, further judges whether IPsec tunnel can be to the normal encryption and decryption of message.
If the message processing speed that goes out physical interface of negotiation packet is equal to or greater than preset upper limit, check whether IPsec tunnel can normally be encrypted message.
In embodiments of the present invention, by judging whether IPsec tunnel has into encryption message, judge whether message can be encrypted normally.Wherein, if IPsec tunnel has into encryption message, judge that IPsec tunnel can normally encrypt message, otherwise judge that IPsec tunnel can not normally encrypt message.
And, can carry out message in IPsec tunnel, on normal basis of encrypting, further judging whether message can normally be deciphered.Particularly, can be by searching the tlv triple of decrypted message in this step, wherein, tlv triple comprises SPI (Security Parameter Index, Security Parameter Index), encryption and decryption type and destination address.If can find corresponding deciphering SA (Security Association, security association) by SPI, these three elements of encryption and decryption type HE destination address, so just can regard as message and can normally decipher.
Step S5, if so, judges that IPsec tunnel can use, and waits for after default duration, resends negotiation packet.
If the message processing speed that goes out physical interface of negotiation packet is equal to or greater than preset upper limit, and IPsec tunnel can carry out normal encryption and decryption to message, think that tunnel is still can continue to use, just because causing negotiation packet in message repeating process, the reason of multinuclear equipment self loses, use current IP sec tunnel, after the default duration of wait (as: wait flow peak period to cross or wait for 10 minutes), again send negotiation packet, hold consultation, can normal negotiations IKE SA and when IPsec SA, re-use new IPsec tunnel, so just the renewal of IKE SA and IPsec SA being postponed to default duration upgrades again, can solve thus the concussion problem in IPsec tunnel.
In embodiments of the present invention, default duration is configured according to network state by user.Preferably, default duration is one-period, for example 10 minutes.
Fig. 2 is according to the flow chart of the control method in the IPsec tunnel for the network equipment of second embodiment of the invention.
In an embodiment of the invention, after step S3, also comprise the steps:, if the message processing speed that goes out physical interface of negotiation packet is less than preset upper limit, to perform step S6, disconnect IPsec tunnel.It should be noted that, the disconnection IPsec tunnel in step is the disconnection of implementing in the active meeting under certain condition, and is not due to the passive disconnection of consulting unsuccessfully to cause in prior art.Specifically, because the message processing speed that goes out physical interface of message is now less than preset upper limit, show that now network gets congestion.Under this opportunity, disconnect IPsec tunnel, the message in IPsec tunnel is not encrypted and is deciphered, the message in IPsec tunnel is temporarily stopped.This mode can fundamentally solve the problem of IPsec tunnel concussion, because do not set up IPsec tunnel, has cut off the source that the concussion of IPsec tunnel occurs.Can be understood as from another aspect, avoid the concussion of IPsec tunnel by the temporary transient shielding in IPsec tunnel is reached, ensure limited the passing through of background stream simultaneously.
And, IPsec tunnel is temporary transient disconnection under certain condition, when the message processing speed that goes out physical interface of message is equal to or greater than preset upper limit, be that network congestion situation is removed, when the flow bandwidth of port is enough, re-establish IPsec tunnel, recover the encryption and decryption of the message in IPsec tunnel, thereby accomplish not affect the normal function in IPsec tunnel as far as possible.
After step S4, also comprise the steps:, if judge that IPsec tunnel does not enter to encrypt message or Decryption failures, to perform step S6, disconnect IPsec tunnel.
According to the control method in the IPsec tunnel for the network equipment of embodiment of the present invention, after finding to consult unsuccessfully, do not carry out immediately the deletion of IPsec tunnel, but whether the message processing speed that goes out physical interface and the IPsec tunnel that consider negotiation packet can be to the normal encryption and decryption of message, select to disconnect the default duration of IPsec tunnel or time delay, miss flow peak and again consult again, thus the concussion problem in solution IPsec tunnel.
Fig. 4 is according to the structure chart of the control system in the IPsec tunnel for the network equipment of embodiment of the present invention.
As shown in Figure 4, the control system in the IPsec tunnel for the network equipment of embodiment of the present invention comprises: IPsec tunnel arranges module 1, time-out time detection module 2, communication module 3 and judge module 4.
Particularly, IPsec tunnel arranges module 1 for setting up also one-level tunnel IKE SA and the secondary tunnel IPsec SA in negotiation generation IPsec tunnel of IPsec tunnel of LA Management Room.
Specifically, IPsec tunnel arranges module 1 and between the network equipment, sets up IPsec tunnel.In the process of establishing in IPsec tunnel, consult to generate one-level tunnel IKE SA and secondary tunnel IPsec SA.Wherein, IKE SA in one-level tunnel is for the protection of IKE protocol massages.Secondary tunnel IPsec SA encrypts for data message.
Whether time-out time detection module 2 reaches Preset Time for detection of the time-out time of one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA.
Communication module 3 is connected to time-out time detection module 2, for detecting that at time-out time detection module 2 time-out time of one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA reach after Preset Time, send negotiation packet, the renewal that starts IKE SA and IPsec SA is consulted, and consults to generate new IKE SA and IPsec SA.
Judge module 4 is connected to communication module 3, and for not receiving after back message using in communication module 3, judgement is consulted unsuccessfully, does not now carry out immediately the deletion of IPsec tunnel.Judge module 4 further judges whether the message processing speed that physical interface of negotiation packet is equal to or greater than preset upper limit.Because can utilizing message processing speed and unit duration calculation, obtains the flow that goes out physical interface of a period of time, therefore whether be equal to or greater than preset upper limit by the message processing speed that goes out physical interface that judges negotiation packet, can reach and judge to go out in unit duration whether the flow of physical interface exceedes the object of the upper limit.If it is judge module 4 further judges whether IPsec tunnel can be to the normal encryption and decryption of message, if it is judges that IPsec tunnel can use, and waits for after default duration, resends negotiation packet by communication module 3.
It should be noted that, if communication module 3 is received back message using, can think and consult successfully, generate new IKE SA and IPsec SA.
In embodiments of the present invention, judge module 4, by judging whether IPsec tunnel has into encryption message, judges whether that message can be encrypted normally.Wherein, if IPsec tunnel has into encryption message, judge that IPsec tunnel can normally encrypt message, otherwise judge that IPsec tunnel can not normally encrypt message.
And, can carry out message on normal basis of encrypting in IPsec tunnel, judge module 4 further judges whether message can normally be deciphered.
If the message processing speed that goes out physical interface of negotiation packet is equal to or greater than preset upper limit, and IPsec tunnel can carry out normal encryption and decryption to message, judge module 4 thinks that tunnel is still can continue to use, just because causing protocol massages, the reason of multinuclear equipment self loses, use current IP sec tunnel, after the default duration of wait (as: wait flow peak period to cross or wait for 10 minutes), again send negotiation packet, hold consultation, can normal negotiations IKE SA and when IPsec SA, re-use new IPsec tunnel, so just the renewal of IKE SA and IPsec SA being postponed to default duration upgrades again, can solve thus the concussion problem in IPsec tunnel.
In embodiments of the present invention, default duration is configured according to network state by user.Preferably, default duration is one-period, for example 10 minutes.
In an embodiment of the invention, be less than preset upper limit if judge module 4 judges the message processing speed that physical interface of negotiation packet, IPsec tunnel arranges module 1 and disconnects IPsec tunnel.It should be noted that, IPsec tunnel arranges module 1, and to disconnect IPsec tunnel be the disconnection of implementing meeting active under certain condition, and not in prior art due to the passive disconnection of consulting unsuccessfully to cause.Specifically, because the message processing speed that goes out physical interface of message is now less than preset upper limit, show that now network gets congestion.Under this opportunity, disconnect IPsec tunnel, the message in IPsec tunnel is not encrypted and is deciphered, the message in IPsec tunnel is temporarily stopped.This to the temporary transient shielding measure in IPsec tunnel in avoiding tunnel concussion, ensure limited the passing through of background stream.
And, IPsec tunnel is temporary transient disconnection under certain condition, when the message processing speed that goes out physical interface of message is equal to or greater than preset upper limit, be that network congestion situation is removed, when the flow bandwidth of port is enough, re-establish IPsec tunnel, recover the encryption and decryption of the message in IPsec tunnel, thereby accomplish not affect the normal function in IPsec tunnel as far as possible.
Judge module 4, in the time detecting that IPsec tunnel is provided with into encryption message, judges that IPsec tunnel can normally encrypt message.If judge module 4 judges IPsec tunnel and do not enter to encrypt message or Decryption failures, IPsec tunnel arranges module 1 and disconnects IPsec tunnel.
According to the control system in the IPsec tunnel for the network equipment of embodiment of the present invention, after finding to consult unsuccessfully, do not carry out immediately the deletion of IPsec tunnel, but whether the message processing speed that goes out physical interface and the IPsec tunnel that consider negotiation packet can be to the normal encryption and decryption of message, select to disconnect the default duration of IPsec tunnel or time delay, miss flow peak and again consult again, thus the concussion problem in solution IPsec tunnel.
Should be understood that, above-mentioned embodiment of the present invention is only for exemplary illustration or explain principle of the present invention, and is not construed as limiting the invention.Therefore any amendment of, making, be equal to replacement, improvement etc., within protection scope of the present invention all should be included in without departing from the spirit and scope of the present invention in the situation that.In addition, claims of the present invention are intended to contain whole variations and the modification in the equivalents that falls into claims scope and border or this scope and border.

Claims (10)

1. for the control method in the IPsec tunnel of the network equipment, comprise the steps:
Set up the IPsec tunnel of LA Management Room, consult to generate one-level tunnel IKE SA and the secondary tunnel IPsec SA in IPsec tunnel;
Detecting that the time-out time of described one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA reach after Preset Time, sending negotiation packet;
If do not receive back message using, judge whether the message processing speed that physical interface of described negotiation packet is equal to or greater than preset upper limit;
If message processing speed is equal to or greater than preset upper limit, further judge whether described IPsec tunnel can be to the normal encryption and decryption of message;
If so, judge that described IPsec tunnel can use, wait for after default duration, resend described negotiation packet.
2. the control method in the IPsec tunnel for the network equipment according to claim 1, wherein, if the message processing speed that goes out physical interface of described negotiation packet is less than preset upper limit, disconnects described IPsec tunnel.
3. the control method in the IPsec tunnel for the network equipment according to claim 1, wherein, in the time detecting that described IPsec tunnel is provided with into encryption message, judges that described IPsec tunnel can normally encrypt message.
4. the control method in the IPsec tunnel for the network equipment according to claim 1, wherein, if judge that described IPsec tunnel cannot, to the normal encryption of message or deciphering, disconnect described IPsec tunnel.
5. the control method in the IPsec tunnel for the network equipment according to claim 1, wherein, described default duration is configured according to network state by user.
6. for the control system in the IPsec tunnel of the network equipment, comprising:
IPsec tunnel arranges module, also consults to generate one-level tunnel IKE SA and the secondary tunnel IPsec SA in IPsec tunnel for setting up the IPsec tunnel of LA Management Room;
Whether time-out time detection module, reach Preset Time for detection of the time-out time of described one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA;
Communication module, described communication module is connected to described time-out time detection module, for detecting that at described time-out time detection module the time-out time of described one-level tunnel IKE SA or the time-out time of secondary tunnel IPsec SA reach after Preset Time, send negotiation packet; And
Judge module, described judge module is connected to described communication module and described IPsec tunnel arranges module, for not receiving after back message using in described communication module, whether the message processing speed that goes out physical interface that judges described negotiation packet is equal to or greater than preset upper limit, if it is further judge whether described IPsec tunnel can be to the normal encryption and decryption of message, if it is judge that described IPsec tunnel can use, wait for after default duration, resend described negotiation packet by described communication module.
7. the control system in the IPsec tunnel of equipment according to claim 6, wherein, if described judge module judges the message processing speed that physical interface of negotiation packet and be less than preset upper limit, described IPsec tunnel arranges module and disconnects described IPsec tunnel.
8. the control system in the IPsec tunnel for the network equipment according to claim 6, wherein, described judge module, in the time detecting that described IPsec tunnel is provided with into encryption message, judges that described IPsec tunnel can normally encrypt message.
9. the control system in the IPsec tunnel for the network equipment according to claim 6, wherein, cannot encrypt or deciphering message is normal if described judge module judges described IPsec tunnel, described IPsec tunnel arranges module and disconnects described IPsec tunnel.
10. the control system in the IPsec tunnel for the network equipment according to claim 6, wherein, described default duration is configured according to network state by user.
CN201410382421.5A 2014-08-06 2014-08-06 Method and system for controlling IPsec tunnel of network devices Pending CN104104573A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410382421.5A CN104104573A (en) 2014-08-06 2014-08-06 Method and system for controlling IPsec tunnel of network devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410382421.5A CN104104573A (en) 2014-08-06 2014-08-06 Method and system for controlling IPsec tunnel of network devices

Publications (1)

Publication Number Publication Date
CN104104573A true CN104104573A (en) 2014-10-15

Family

ID=51672389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410382421.5A Pending CN104104573A (en) 2014-08-06 2014-08-06 Method and system for controlling IPsec tunnel of network devices

Country Status (1)

Country Link
CN (1) CN104104573A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610577A (en) * 2016-01-07 2016-05-25 成都卫士通信息产业股份有限公司 System and method for preventing IPSec (Internet Protocol Security) VPN (Virtual Private Network) device from multi-tunnel IKE (Internet Key Exchange) negotiation failure
CN106302248A (en) * 2016-08-31 2017-01-04 杭州华三通信技术有限公司 A kind of neighbours' method for building up and device
CN113438178A (en) * 2021-06-22 2021-09-24 北京天融信网络安全技术有限公司 Message forwarding method and device, computer equipment and storage medium
CN114553633A (en) * 2020-11-10 2022-05-27 华为技术有限公司 Tunnel negotiation method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100313023A1 (en) * 2008-01-03 2010-12-09 Hangzhou H3C Technologies Co., Ltd. Method, apparatus and system for internet key exchange negotiation
CN102025742A (en) * 2010-12-16 2011-04-20 成都市华为赛门铁克科技有限公司 Negotiation method and device of internet key exchange (IKE) message
CN103475647A (en) * 2013-08-23 2013-12-25 天津汉柏汉安信息技术有限公司 Method for preventing IPSEC (internet protocol security) tunnel re-negotiation from failing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100313023A1 (en) * 2008-01-03 2010-12-09 Hangzhou H3C Technologies Co., Ltd. Method, apparatus and system for internet key exchange negotiation
CN102025742A (en) * 2010-12-16 2011-04-20 成都市华为赛门铁克科技有限公司 Negotiation method and device of internet key exchange (IKE) message
CN103475647A (en) * 2013-08-23 2013-12-25 天津汉柏汉安信息技术有限公司 Method for preventing IPSEC (internet protocol security) tunnel re-negotiation from failing

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610577A (en) * 2016-01-07 2016-05-25 成都卫士通信息产业股份有限公司 System and method for preventing IPSec (Internet Protocol Security) VPN (Virtual Private Network) device from multi-tunnel IKE (Internet Key Exchange) negotiation failure
CN105610577B (en) * 2016-01-07 2018-09-14 成都卫士通信息产业股份有限公司 A kind of system and method preventing IPSec VPN device Multiple tunnel ike negotiations failure
CN106302248A (en) * 2016-08-31 2017-01-04 杭州华三通信技术有限公司 A kind of neighbours' method for building up and device
CN106302248B (en) * 2016-08-31 2021-10-12 新华三技术有限公司 Neighbor establishing method and device
CN114553633A (en) * 2020-11-10 2022-05-27 华为技术有限公司 Tunnel negotiation method and device
CN114553633B (en) * 2020-11-10 2023-06-02 华为技术有限公司 Tunnel negotiation method and device
CN113438178A (en) * 2021-06-22 2021-09-24 北京天融信网络安全技术有限公司 Message forwarding method and device, computer equipment and storage medium
CN113438178B (en) * 2021-06-22 2023-04-18 北京天融信网络安全技术有限公司 Message forwarding method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110996318B (en) Safety communication access system of intelligent inspection robot of transformer substation
US11757623B2 (en) Encryption method, decryption method, and related apparatus
CN102946333B (en) A kind of DPD method based on IPsec and equipment
US20200228977A1 (en) Parameter Protection Method And Device, And System
CN102420770B (en) Method and equipment for negotiating internet key exchange (IKE) message
CN106571907A (en) Method and system for securely transmitting data between upper computer and USB flash disk
CN104104573A (en) Method and system for controlling IPsec tunnel of network devices
CN106254231A (en) A kind of industrial safety encryption gateway based on state and its implementation
CN102891848A (en) Method for carrying out encryption and decryption by using IPSec security association
CN102571488B (en) Failure processing method, device and system for encryption card
KR20090012248A (en) Method and system for the manipulation-protected generation of a cryptographic key
US11006346B2 (en) X2 service transmission method and network device
KR101847636B1 (en) Method and apprapatus for watching encrypted traffic
CN110166410B (en) Method and terminal for safely transmitting data and multimode communication terminal
CN102868523A (en) IKE (Internet Key Exchange) negotiation method
KR20190045575A (en) Method and apparatus for autonomous mutual authentication between devices in wireless communication system
CN113973000A (en) Method and device for processing pre-shared key PSK
CN111526018A (en) Communication encryption system and communication encryption method based on power distribution
CN113765900B (en) Protocol interaction information output transmission method, adapter device and storage medium
CN107547478B (en) Message transmission method, device and system
CN102891766B (en) Internet protocol security (IPSec) state recovery method
CN113965462A (en) Service transmission method, device, network equipment and storage medium
CN113709069B (en) Lossless switching method and device for data transmission
CN103118017B (en) Safeguard that the local terminal of IKE SA sends method and the device of the MessageID of message
WO2017118269A1 (en) Method and apparatus for protecting air interface identity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141015