CN107959611A - A kind of method to E-Packet, apparatus and system - Google Patents

A kind of method to E-Packet, apparatus and system Download PDF

Info

Publication number
CN107959611A
CN107959611A CN201610902960.6A CN201610902960A CN107959611A CN 107959611 A CN107959611 A CN 107959611A CN 201610902960 A CN201610902960 A CN 201610902960A CN 107959611 A CN107959611 A CN 107959611A
Authority
CN
China
Prior art keywords
network equipment
message
l3vpn
equipment
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610902960.6A
Other languages
Chinese (zh)
Other versions
CN107959611B (en
Inventor
王雪伟
夏寅贲
董杰
陈国义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201610902960.6A priority Critical patent/CN107959611B/en
Publication of CN107959611A publication Critical patent/CN107959611A/en
Application granted granted Critical
Publication of CN107959611B publication Critical patent/CN107959611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/20Hop count for routing purposes, e.g. TTL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/35Switches specially adapted for specific applications
    • H04L49/354Switches specially adapted for specific applications for supporting virtual local area networks [VLAN]

Abstract

This application provides the methods, devices and systems to E-Packet in a kind of L3VPN.This method includes:Configuration strategy is route in the VPN instance of Provider Edge PE equipment so that the message that PE equipment is received according to policybased routing forwarding.Therefore, the message forwarding method that the application provides can guide L3VPN tunnel communication of the message by splicing, meet the communication requirement across multiple L3VPN tunnels.And then realize access control of the tenant to network so that networking is more flexible.

Description

A kind of method to E-Packet, apparatus and system
Technical field
This application involves field of communication technology, more particularly to a kind of method, apparatus and system to E-Packet.
Background technology
VPN is Virtual Private Network (the Virtual Private that operator is provided a user by its public network Network, VPN), i.e., the angle in user, VPN are the proprietary networks of user.For operator, public network includes public affairs Common backbone network and public operator edge device.The VPN member stations being geographically separated from one another pass through customer edge (Customer Edge, CE) equipment is connected to corresponding Provider Edge (Provider Edge, PE) equipment, passes through operator Public network composition client VPN network.
Three-layer VPN (Layer 3Virtual Private Network, L3VPN) is applied to the private network industry for having L3 demands Business.L3VPN business carries out Internet protocol (Internet Protocol, IP) packet by the way of traditional routing is similar to Forwarding.After router receives IP data packets, the destination address of IP data packets is searched in forwarding table, using pre-establishing Passage carry out IP data packets transmission.
Existing L3VPN technologies are the implementations of a virtual network, and the signaling protocol of L3VPN is Border Gateway Protocol (Border Gateway Protocol, BGP), is Internal BGP (Internal Border between PE equipment Gateway Protocol, IBGP) peer-to-peer (PEER) relation.Path black hole in order to prevent, bgp protocol regulation, PE equipment from One received route of IBGP peer-to-peers cannot be issued to another IBGP peer-to-peer again.Therefore, PE equipment only has oneself IBGP The route of peer-to-peer, the route of the PE equipment outside being jumped without one.
For business networking for the user realized using L3VPN, if led between service node by L3VPN tunnels Letter, then not establishing between the node in direct-connected L3VPN tunnels to communicate.
The content of the invention
This application provides the methods, devices and systems to E-Packet in a kind of L3VPN, disclosure satisfy that across multiple Communication requirement between the node in L3VPN tunnels.
In a first aspect, this application provides a kind of method to E-Packet in L3VPN.The L3VPN is set including first network Standby, second network equipment and the 3rd network equipment, first is established between the first network equipment and second network equipment L3VPN tunnels, the 2nd L3VPN tunnels are established between second network equipment and the 3rd network equipment.First, this first The network equipment receives message, then according to receive the incoming interface of the message and the destination address of the message with it is described enter Searched and matched first policybased routing of the message in the VPN instance of interface binding.First policybased routing is used to indicate The next-hop for reaching the destination address of the message is second network equipment.Find and the message matched described After one policybased routing, according to the instruction of first policybased routing, which will by the first L3VPN tunnels The message is sent to second network equipment.Wherein, second network equipment is stored with the purpose for reaching the message The forwarding-table item of address, the forwarding-table item are used to indicate described in second network equipment to the 3rd network equipment forwarding Message, the 2nd L3VPN tunnels are used for second network equipment and send the message to the 3rd network equipment.
With reference to first aspect, in the first possible implementation of first aspect, the first network equipment is PE Equipment, the PE equipment receive the message that CE equipment is sent.
With reference to first aspect, in second of possible implementation of first aspect, the first network equipment receives The message that 4th network equipment is sent.4th network equipments configuration has the second policybased routing, the described second tactful road Next-hop by the destination address for indicating to reach the message is the first network equipment.4th network equipment and Being established between the first network equipment has the 3rd L3VPN tunnels.4th network equipment passes through the 3rd L3VPN tunnels The message is sent to the first network equipment.
With reference to first aspect and above-mentioned possible mode, in the third possible implementation of first aspect, Before the first network equipment receives the message, the first network equipment receives the configuration that control management equipment is sent and disappears Breath.The configuration message carries first policybased routing.The first network equipment, according to obtaining the configuration message First policybased routing.
By configuring first policybased routing in the VPN instance of the first network equipment, guiding message passes through spelling The first L3VPN tunnels and the 2nd L3VPN tunnel communications connect, realizes access control of the tenant to network.Tenant is in VPN It can realize and communicate between interior each website.Business networking in VPN can carry out topology according to the demand of user, without Traditional whole station point full mesh or wheel hub-spoke hub-spoke networkings are confined to, therefore, networking mode is more flexible.
Second aspect, this application provides a kind of method to E-Packet in L3VPN.The L3VPN includes first network Equipment, second network equipment and the 3rd network equipment, establish between the first network equipment and second network equipment One L3VPN tunnels, the 2nd L3VPN tunnels are established between second network equipment and the 3rd network equipment.First, control management Equipment generation configuration message.The configuration message is used in the VPN instance with the binding of the first interface of the first network equipment Middle configuration strategy route, the next-hop that the policybased routing is used to indicate to reach the destination address of the message is second net Network equipment.Then, which sends the configuration message to the first network equipment.Wherein, the first L3VPN Tunnel is used for the first network equipment and sends the message to second network equipment.Second network equipment is stored with Reach the forwarding-table item of the destination address of the message, the forwarding-table item is used to indicating second network equipment to described the Three network equipments forward the message.The 2nd L3VPN tunnels are set for second network equipment to the 3rd network Preparation send the message.
By controlling management equipment configuration strategy in the VPN instance of first network equipment to route, guiding message passes through spelling The first L3VPN tunnels and the 2nd L3VPN tunnel communications connect, realizes access control of the tenant to network.Tenant may be used also To optimize network bandwidth according to demand, individual business chain etc. is set, and tenant can realize between each website in VPN and mutually communicate Believe, the business networking in VPN can carry out topology according to the demand of user so that networking is more flexible.
The third aspect, this application provides a kind of device to E-Packet, which is applied in L3VPN, for performing The module of first aspect and the method in the arbitrarily possible implementation of first aspect.
Fourth aspect, this application provides a kind of communication system, and the communication system applications are in Layer3 Virtual Private Network L3VPN In, the communication system includes control management equipment, first network equipment, second network equipment and the 3rd network equipment.It is described The first L3VPN tunnels are established between first network equipment and second network equipment.Second network equipment and described The 2nd L3VPN tunnels are established between three network equipments.Wherein,
The control management equipment, for sending the first configuration message to the first network equipment.First configuration Message carries the first policybased routing, the first configuration message be used for the binding of the first interface of the first network equipment First policybased routing is configured in first VPN instance.First policybased routing is used to indicate the purpose for reaching the message The next-hop of address is second network equipment.The first network equipment, for receiving the report from the first interface Text, and according to the destination address of the message, searched and matched first plan of the message in first VPN instance Slightly it route.The first network equipment, is additionally operable to the instruction according to first policybased routing, passes through the first L3VPN tunnels Road sends the message to second network equipment.Second network equipment is stored with the destination address for reaching the message Forwarding-table item.The forwarding-table item is used to indicate that second network equipment forwards the report to the 3rd network equipment Text.The 2nd L3VPN tunnels are used for second network equipment and send the message to the 3rd network equipment.It is optional , the control management equipment can be controller or network management device.
The communication system provided according to the application, by controlling management equipment in the VPN instance of the first network equipment Interior configuration strategy route, the first L3VPN tunnel and twoth L3VPN tunnel communication of the guiding message by splicing, realize Access control of the tenant to network.Tenant can realize between each website in VPN and communicate, the business networking energy in VPN It is enough that topology is carried out according to the demand of user so that networking is more flexible.
With reference to fourth aspect, in the first possible implementation of fourth aspect, the communication system further includes Four network equipments, being established between the 4th network equipment and the first network equipment has the 3rd L3VPN tunnels.Wherein, institute Control management equipment is stated, is additionally operable to send the second configuration message to the 4th network equipment.The second configuration message carries Second policybased routing, the second configuration message are used in the 2nd VPN with the binding of the second interface of the 4th network equipment Second policybased routing is bound in example.Second policybased routing is used under the destination address that instruction reaches the message One jump is the first network equipment.4th network equipment, for receiving the message from the second interface, and according to The destination address of the message, is searched and matched second policybased routing of the message in second VPN instance.Institute The 4th network equipment is stated, is additionally operable to the instruction according to second policybased routing, by the 3rd L3VPN tunnels to described One network equipment forwards the message.The first network equipment, the institute specifically for receiving the 4th network equipment forwarding State message.
5th aspect, this application provides a kind of device to E-Packet, which is applied in L3VPN, the device bag Include:Input interface, output interface, processor and memory.Wherein, input interface, output interface, processor and the storage It can be connected between device by bus system.The memory is used for storage program, instruction or code, and the processor is used to perform Program, instruction or code in the memory, complete first aspect, the side of any possible implementation of first aspect Method.
6th aspect, this application provides one kind to control management equipment, which is used in L3VPN, the control Management equipment processed includes:Input interface, output interface, processor and memory.Wherein, input interface, output interface, processor And it can be connected between the memory by bus system.The memory is used for storage program, instruction or code, the place Reason device is used to perform program, instruction or the code in the memory, the method for completing second aspect.
7th aspect, the embodiment of the present application provides a kind of computer-readable recording medium, for storing computer program, The computer program is used to perform first aspect, the method for any possible implementation and second aspect of first aspect Instruction.
Brief description of the drawings
, below will be to needed in the embodiment attached in order to illustrate more clearly of the technical solution of the embodiment of the present application Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present application, for this area For those of ordinary skill, without creative efforts, other attached drawings can also be obtained according to these attached drawings.
Fig. 1 is the application scenarios schematic diagram according to the embodiment of the present application;
Fig. 2 (a) is according to a kind of for the flow diagram of the method to E-Packet of the embodiment of the present application;
Fig. 2 (b) is according to a kind of for the flow diagram of the method to E-Packet of the embodiment of the present application;
Fig. 3 is for the flow diagram of the method to E-Packet according to the another kind of the embodiment of the present application
Fig. 4 is according to a kind of for the schematic diagram of the device to E-Packet of the embodiment of the present application;
Fig. 5 is according to a kind of for the schematic diagram of the device to E-Packet of the embodiment of the present application;
Fig. 6 is according to a kind of for the hardware architecture diagram of the device to E-Packet of the embodiment of the present application;
Fig. 7 is according to a kind of for the hardware architecture diagram of the device to E-Packet of the embodiment of the present application.
Embodiment
The embodiment of the present application description application scenarios be in order to more clearly explanation the embodiment of the present application technical solution, The restriction for technical solution provided by the embodiments of the present application is not formed, those of ordinary skill in the art understand, with network The differentiation of framework and the appearance of new business scene, technical solution provided by the embodiments of the present application is for similar technical problem, together Sample is applicable in.
Unless indicated to the contrary, the embodiment of the present application refers to " first ", " second ", " the 3rd ", " the 4th " and " The ordinal numbers such as five " are used to distinguish multiple objects, are not used in the order for limiting multiple objects.
" VPN instance (VPN Instance) " described in the embodiment of the present application is that PE equipment is the VPN stations being connected directly The entity that point is established and safeguarded, each VPN site has oneself independent VPN instance in PE equipment, i.e., in PE equipment VPN instance has been safeguarded respectively for different VPN sites.In general, VPN instance is also referred to as VPN route forwarding tables (VPN Routing and Forwarding table, VRF), each VRF corresponds to a VPN, have independent routing table, forwarding table, Corresponding interface and management information etc..The management information includes but not limited to member interface list, route filtering strategy.It is logical Cross and affix one's name to VRF in PE its upper sides, the route of different VPN is stored in different VRF, can reach VPN routes or flow isolation Purpose.
" control management equipment " described in the embodiment of the present application, for being controlled to the resource of forwarding unit in network And/or management, include but not limited to software defined network (Software-Defined network, SDN) controller, network pipe Manage equipment (hereinafter referred to as " webmaster ").The forwarding unit is used to be forwarded to message processing, is specifically as follows tradition Path-calculating element (English:Path Computation Element, PCE) road such as conventional router in network, interchanger By forwarding unit or based on the routing forwarding equipment such as the router in the separated SDN of control forwarding, interchanger, this Shen Please embodiment this is not limited.
Exemplary explanation is carried out to the application scenarios of the embodiment of the present application with reference to Fig. 1.
Fig. 1 shows the L3VPN networks 100 of the embodiment of the present application application, and the network 100 includes the bone that service provider provides Dry net and multiple VPN sites.The backbone network includes first network equipment PE1, the second network equipment PE2, the 3rd network equipment PE3, the 4th network equipment PE4, the 5th network equipment PE5 and multiple P (Provider) equipment 110.The multiple VPN site Including site1-site6.Wherein, site1, site2, site3 and site4 belong to VPN1, site5 and site6 and belong to VPN2. PE1 is Provider Edge (Provider Edge, PE) equipment direct-connected with CE1;PE2 is PE direct-connected with CE2 and CE5 respectively Equipment;PE3 is the PE equipment direct-connected with CE3;PE4 is the PE equipment direct-connected with CE4;PE5 is the PE equipment direct-connected with CE6. IP address is that the host A of 1.1.1.1 is communicated by CE1 with PE1 in site1.IP address is that the host B of 1.1.1.2 leads in Site3 CE3 is crossed to communicate with PE3.PE1 and PE2 is that IBGP peer-to-peers, PE1 and PE2 pass through L3VPN tunnel communications.PE1 and PE4 is IBGP Peer-to-peer, PE1 and PE4 pass through L3VPN tunnel communications.PE2 and PE3 is that IBGP peer-to-peers, PE2 and PE3 are led to by L3VPN tunnels Letter.PE2 and PE4 is that IBGP peer-to-peers, PE2 and PE4 pass through L3VPN tunnel communications.There is no direct-connected L3VPN between PE1 and PE3 Tunnel, also without direct-connected L3VPN tunnels between PE4 and PE3.According to the regulation of bgp protocol, PE2 receives IBGP peer-to-peers PE3 After the route of issue, it is impossible to the route is distributed to another IBGP peer-to-peer PE1, similarly, the route can not be distributed to IBGP peer-to-peers PE4.Therefore, PE1 and PE4 only has the route for reaching PE2, but without the route for reaching PE3.In PE1 and PE3 Between there is no direct-connected L3VPN tunnels in the case of, even if there is bandwidth resources between PE2 and PE3, host A can not also access master Machine B.Arbitrary access control can not be realized between website in VPN1.
" L3VPN tunnels " described herein refer to be used for the tunnel for carrying L3VPN business between PE equipment, such as can To be static label switched path (Lable Switched Path, LSP) tunnel, based on Generic Routing Encapsulation The tunnel of (Generic Routing Encapsulation, GRE), MPLS label distribution protocol (Lable Distribution Protocol, LDP) lsp tunnel, and MPLS be directed to Traffic Engineering extensions Resource Reservation Protocol (Resource Reservation Protocol-Traffic Engineering, RSVP-TE) tunnel etc., the embodiment of the present application does not do this It is specific to limit.
Multiple P equipment 110 shown in Fig. 1, such as P routers, are the backbone router in backbone network, not with user's CE equipment is connected directly.P equipment possesses basic MPLS transfer capabilities, is maintained into the route of PE, it is not necessary to understand any VPN's Routing iinformation.
CE equipment is user network boundary device, has interface to be directly connected with PE equipment.CE equipment can be router or Interchanger or a host.The presence of CE equipment " perception " less than VPN, without support multiprotocol label switching (Multiprotocol Label Switching, MPLS).
PE equipment is the edge device of service provider network, is typically a router.It is direct with the CE equipment of user It is connected, all processing to VPN all occur on PE.After CE and the PE being connected directly establish syntople, CE is this node VPN routes be distributed to PE, and from PE study to the route of distal end VPN.BGP or Interior Gateway Protocol are used between CE and PE (Interior Gateway Protocol, IGP) exchanges routing iinformation, can also use static routing.PE acquires CE's from CE After VPN routing iinformations, by BGP and other PE switched vpcs N routing iinformations, pe router safeguards the VPN being connected directly with it The VPN routing iinformations that routing iinformation and far-end PE issue come, but VPN roads all in service provider network are not safeguarded By information.
It is to be understood that merely exemplary in Fig. 1 show 5 PE equipment, 2 VPN, 5 P equipment, 6 CE equipment and 6 A VPN site, the network can include any other number of PE equipment, VPN, P equipment, CE equipment and VPN site, this Shen Please embodiment this is not limited.
The method 200 to E-Packet in a kind of L3VPN provided by the embodiments of the present application is carried out in detail with reference to Fig. 2 (a) Describe in detail bright.This method 200 can be applied to the network 100 shown in Fig. 1.But the embodiment of the present application not limited to this.Such as Fig. 2 (a) institutes Show, the method 200 includes:
S201, control management equipment generation the first configuration message.
Specifically, which includes first network equipment, second network equipment and the 3rd network equipment, and described first The first L3VPN tunnels are established between the network equipment and second network equipment, second network equipment and the 3rd network are set The 2nd L3VPN tunnels are established between standby.Management equipment generation the first configuration message is controlled, which carries the first plan Slightly it route.The first configuration message is used to match somebody with somebody in the first VPN instance bound with the first interface of the first network equipment Put first policybased routing.Deserve first network equipment from the first interface receive message when, according to first policybased routing Instruction forward the message.Hereinafter, the first VPN instance is referred to as VRF1.First policybased routing is used to indicate institute State first network equipment will be received from the first interface be sent to the matched message of the first policybased routing it is described Second network equipment.The message is sent to second net by the first network equipment by the first L3VPN tunnels Network equipment.Second network equipment is stored with the forwarding-table item for the destination address for reaching the message, and second network is set The standby instruction according to the forwarding-table item, the 3rd network equipment is transmitted to by the message.Second network equipment leads to Cross the 2nd L3VPN tunnels and the message is transmitted to the 3rd network equipment.
In a specific embodiment, with reference to Fig. 1, which for example can be the PE1 shown in Fig. 1. In another particular embodiment of the invention, with reference to Fig. 1, which for example can be the PE4 shown in Fig. 1.First The first interface of the network equipment, such as interface 1, bind VRF1, and the network equipment configures first policybased routing in the VRF1. First policybased routing for example can be:It is the message of 1.1.1.2 for destination address, from second interface, such as interface 2, hair It is sent to second network equipment.Second network equipment for example can be the PE2 shown in Fig. 1.Optionally, can also be in first plan The bandwidth that can be taken when communicating between first network equipment and second network equipment is configured in slightly routeing.Art technology Personnel, which are appreciated that, to carry out concrete configuration to the first policybased routing according to the actual demand of user, and the application does not make this It is specific to limit.
In a specific embodiment, the control management equipment can be software defined network (Software- Defined Networking, SDN) controller.Controller is further referred to as control device, control system, control node etc.. Alternatively, which can be specially intelligent network controller (Smart Network Controller, SNC).Another In a specific embodiment, the control management equipment can be webmaster.But the embodiment of the present application not limited to this.With reference to Fig. 1, The demand across multiple L3VPN tunnel communications is needed for tenant, such as, host A will access host B, it is necessary to splice multiple Its requirements for access is realized in L3VPN tunnels.First policybased routing is configured in first network equipment by controller or webmaster, is referred to First network equipment is led to forward the packet to second network equipment.
It is to be understood that in the embodiment of the present application, the controller can pass through southbound interface with the first network equipment Agreement, for example, open flows OpenFlow agreements, bgp protocol or path-calculating element interaction protocol (Path Computation Element Communication Protocol, PCEP), to send the configuration message, to configure the described first tactful road By, but the application not limited to this.
Further, in the embodiment of the present application, can be based between the webmaster and the first network equipment simple Network Management Protocol (Simple network management protocol, SNMP) or network configuration protocol (Network Configuration Protocol, NETCONF) the configuration message is sent, to configure first policybased routing, but this Apply for not limited to this.
S202, control management equipment send the first configuration message to the first network equipment.
S203, first network equipment receive the first configuration message.
S204, the first network equipment obtain first policybased routing according to the described first configuration message.
The first network equipment obtains first policybased routing according to the described first configuration message, by the first tactful road By being saved in the policybased routing table of VRF1, message is instructed to forward.The policybased routing tableau format for example can be such as the institute of table 1 Show.
Route prefix Agreement Outgoing interface Next-hop
192.168.2.0/24 Direct GE0/0/3 192.168.2.254
1.1.1.2/24 Direct GE0/0/4 192.168.200.1
It is to be understood that with reference to Fig. 1, when host A desires access to host B, controller or webmaster can only configure institute on PE1 The first policybased routing is stated, at this time, PE1 corresponds to above-mentioned first network equipment, and first policybased routing instructs the message PE2 is forwarded to via PE1.There is the route for reaching host B on PE2, therefore, after PE2 receives the message of PE1 transmissions, The forwarding-table item prestored by being inquired about in VPN instance, determines to forward the packet to PE3, to complete host A to host B Access.Optionally, the controller or webmaster can also configure first policybased routing on the PE4, in the PE1 The second policybased routing of upper configuration, the next-hop which is used to indicate to reach the destination address of the message is PE4. At this time, PE4 corresponds to above-mentioned first network equipment.When PE1 receives the message that CE1 is sent, according to the described second tactful road By forwarding the packet to PE4.After PE4 receives the message of PE1 transmissions, according to the instruction of first policybased routing, by message PE2 is forwarded to, is finally forwarded the packet via PE2 to PE3, to complete access of the host A to host B.
In the embodiment of the present application, the first L3VPN tunnels are passed through between the first network equipment and second network equipment Road communicates, and by the 2nd L3VPN tunnel communications between second network equipment and the 3rd network equipment, and the first network is set It is standby there is no direct-connected L3VPN tunnels between the 3rd network equipment in the case of.By controlling management equipment in first network Configuration strategy is route in the VPN instance of equipment, the first L3VPN tunnel and twoth L3VPN tunnel of the guiding message by splicing Road communicates, and realizes access control of the tenant to network.Tenant can also optimize network bandwidth according to demand, set personalized industry Business chain etc., tenant can realize between each website in VPN and communicate, and the business networking in VPN can be according to the need of user Seek progress topology so that networking is more flexible.
Optionally, the L3VPN can also include the 4th network equipment.4th network equipment and the first network The 3rd L3VPN tunnels are established between equipment.In a specific embodiment, with reference to Fig. 1, the first network equipment is PE4, second network equipment is PE2, and the 3rd network equipment is PE3, and the 4th network equipment is PE1.Such as Fig. 2 (b) shown in, the method 200 can also include S205-S208.
S205, control management equipment generation the second configuration message.
Specifically, control management equipment generates the second configuration message, which carries the second policybased routing. The first configuration message is used to configure described the in the second VPN instance bound with the second interface of the 4th network equipment Two policybased routings.Deserve the 4th network equipment from the second interface receive message when, according to the instruction of second policybased routing turn Send out message described.Second policybased routing be used for indicate the 4th network equipment will be received from the second interface with The matched message of second policybased routing is sent to the first network equipment.4th network equipment passes through the described 3rd The message is sent to the first network equipment by L3VPN tunnels.
S206, control management equipment send the second configuration message to the 4th network equipment.
S207, the 4th network equipment receive the second configuration message.
S208, the 4th network equipment obtain second policybased routing according to the described second configuration message.
Specific implementation on S205-S208 is similar with S201-S204, and details are not described herein again.The application is to S205- The execution sequence of S208 and S201-S204 is not especially limited, i.e. S205-S208 can be performed before S201-S204, also may be used To be performed after S201-S204.
The method 300 to E-Packet in a kind of L3VPN provided by the embodiments of the present application is carried out specifically with reference to Fig. 3 Bright, which includes first network equipment, second network equipment and the 3rd network equipment, the first network equipment with it is described The first L3VPN tunnels are established between second network equipment, are established between second network equipment and the 3rd network equipment 2nd L3VPN tunnels.This method can be used for the network 100 shown in Fig. 1, but not apply for embodiment not limited to this.Such as Fig. 3 institutes Show, the described method includes:S301-S303.
S301, first network equipment receive message.
In a specific embodiment, the first network equipment is PE equipment, receives what the first CE equipment was sent The message.The first CE equipment and the first network equipment are direct-connected.With reference to Fig. 1, the first PE equipment specifically can be with It is PE1, the first CE equipment can be specifically CE1.
In another particular embodiment of the invention, the first network equipment receives the report that the 4th network equipment is sent Text.4th network equipments configuration has the second policybased routing, and second policybased routing is used to indicate to reach the message The next-hop of destination address is the first network equipment.Established between 4th network equipment and the first network equipment There are the 3rd L3VPN tunnels, the 3rd L3VPN tunnels are used for the 4th network equipment and send institute to the first network equipment State message.With reference to Fig. 1, the 4th network equipment can be specifically PE1, and the first network equipment can be specifically PE4.
S302, the first network equipment are looked into according to the incoming interface for receiving the message and the destination address of the message Look for and matched first policybased routing of the message.
Specifically, the first network equipment receives the incoming interface of the message, such as interface 1, and the first VPN of binding is real Example, abbreviation VRF1, is configured with first policybased routing in VRF1.First policybased routing for example can be:For purpose Address is the message of 1.1.1.2, from second interface, such as interface 2, is sent to second network equipment.The first network equipment Receive after stating message, according to the destination address of the message, searched and the message matched first in the VRF1 Policybased routing.
S303, the first network equipment forward the message to second network equipment.
Specifically, which determines to send the outgoing interface of the message according to first policybased routing, and It is second network equipment to determine next-hop device.The first network equipment is by the first L3VPN tunnels by described in Message is sent to second network equipment.For example, when transmitting the message using MPLS network, which is The message encapsulation outer layer MPLS label and internal layer VPN label, MPLS network utilize the outer layer label of message, pass through described first L3VPN tunnels, the message is sent to second network equipment.When second network equipment receives the first network equipment hair During the message sent, forwarding-table item is searched according to the purpose IP address of message, the message is forwarded to the 3rd network equipment. The message is sent to the 3rd network equipment by second network equipment by the 2nd L3VPN tunnels.When described After 3rd network equipment receives the message that second network equipment is sent, send the messages to direct-connected with it 2nd CE equipment.After the 2nd CE equipment receives the message, message is sent out according to the forwarding process of normal IP packet It is sent to destination.With reference to Fig. 1, second network equipment can be specifically the PE2 shown in Fig. 1, the 3rd network equipment tool Body can be the PE3 shown in Fig. 1, and the 2nd CE equipment can be specifically the CE3 shown in Fig. 1.
According to the above method provided by the embodiments of the present application, described in being configured in the VRF of the first network equipment First policybased routing, the first L3VPN tunnel and twoth L3VPN tunnel communication of the guiding message by splicing, realizes rent Access control of the family to network.Tenant can realize between each website in VPN and communicate.Business networking in VPN can Topology is carried out according to the demand of user, without being confined to traditional the whole network point full mesh or wheel hub-spoke hub- Spoke networkings, therefore, networking mode is more flexible.
Fig. 4 is for the schematic diagram of the control management equipment to E-Packet in L3VPN according to one embodiment of the application. The L3VPN includes first network equipment, second network equipment and the 3rd network equipment, the first network equipment and described second The first L3VPN tunnels are established between the network equipment, the 2nd L3VPN is established between second network equipment and the 3rd network equipment Tunnel.The equipment can be used for performing the method 200 shown in Fig. 2.As shown in figure 4, the equipment includes:Processing module 401 and hair Send module 402.
The processing module 401, for generate first configuration message, it is described first configuration message be used for first net First policybased routing is configured in the VPN instance of the first interface binding of network equipment, which arrives for instruction Next-hop up to the destination address of the message is second network equipment.
The sending module 402, for sending the first configuration message to the first network equipment.
The first L3VPN tunnels are used for the first network equipment and send the message to second network equipment, Second network equipment is stored with the forwarding-table item for the destination address for reaching the message, and the forwarding-table item is used to indicate institute State second network equipment and forward the message to the 3rd network equipment, the 2nd L3VPN tunnels are used for second net Network equipment sends the message to the 3rd network equipment.
According to above-mentioned control management equipment provided by the embodiments of the present application, by the VRF of the first network equipment First policybased routing is configured, guides the first L3VPN tunnel and twoth L3VPN tunnel communication of the message by splicing, Realize access control of the tenant to network.Tenant can realize between each website in VPN and communicate.Business in VPN Networking can carry out topology according to the demand of user, without being confined to traditional full mesh or hub-spoke networkings, Therefore, networking mode is more flexible.
In the embodiment of the present application, the first L3VPN tunnels are passed through between the first network equipment and second network equipment Road communicates, and by the 2nd L3VPN tunnel communications between second network equipment and the 3rd network equipment, and the first network is set It is standby there is no direct-connected L3VPN tunnels between the 3rd network equipment in the case of.By controlling management equipment in first network Configuration strategy is route in the VPN instance of equipment, the first L3VPN tunnel and twoth L3VPN tunnel of the guiding message by splicing Road communicates, and realizes access control of the tenant to network.Tenant can also optimize network bandwidth according to demand, set personalized industry Business chain etc., tenant can realize between each website in VPN and communicate, and the business networking in VPN can be according to the need of user Seek progress topology so that networking is more flexible.
Optionally, the L3VPN further includes the 4th network equipment, the 4th network equipment and the first network equipment Between establish the 3rd L3VPN tunnels.The processing module 401, is additionally operable to the configuration message of generation second, and the second configuration message is used The second policybased routing is configured in second VPN instance of the second interface binding of the 4th network equipment described in Yu Yu.Described second The next-hop that policybased routing is used to indicate to reach the destination address of the message is the first network equipment.4th network Equipment receives the message by the second interface, according to the destination address of the message, is looked into second VPN instance Look for and matched second policybased routing of the message.According to the instruction of second policybased routing, the 4th network is set It is standby that the message is sent to by the first network equipment by the 3rd L3VPN tunnels.
Fig. 5 is for the schematic diagram of the device 500 to E-Packet according to another embodiment offer of the application.The device 500 are applied in L3VPN, and the L3VPN includes first network equipment, second network equipment and the 3rd network equipment.Described The first L3VPN tunnels, second network equipment and the described 3rd are established between one network equipment and second network equipment The 2nd L3VPN tunnels are established between the network equipment.Described device 500 is located in the first network equipment.The first network is set Standby for example can be the equipment PE1 or PE4 shown in Fig. 1, which can be used for performing the method 300 shown in Fig. 3.The dress Putting 500 includes:Receiving module 501, processing module 502 and sending module 503.
The receiving module 501 is used to receive message.The processing module 502, for entering according to the reception message The destination address of interface and the message, is searched matched with the message in the VPN instance bound with the incoming interface First policybased routing.The next-hop that first policybased routing is used to indicate to reach the destination address of the message is described second The network equipment.The sending module 503, for by the first L3VPN tunnels, the message to be sent to second net Network equipment.In a specific embodiment, the receiving module 501, the institute sent specifically for receiving the first CE equipment State message.I.e. described first network equipment is the first PE equipment direct-connected with the CE equipment.In another specific embodiment party In formula, the L3VPN further includes the 4th network equipment, and the receiving module is used to receive what the 4th network equipment was sent The message, wherein, the 4th network equipments configuration has the second policybased routing, and second policybased routing is used to indicate to reach The next-hop of the destination address of the message is the first network equipment, and the 4th network equipment and the first network are set Being established between standby has the 3rd L3VPN tunnels, and the 3rd L3VPN tunnels are used for the 4th network equipment to the first network Equipment sends the message.Specifically, in the embodiment of the present application, the first network equipment can be to be set with the first CE Standby the first direct-connected PE equipment, second network equipment can be the twoth PE equipment direct-connected with the 2nd CE equipment, and the 3rd network is set Standby can be the threeth PE equipment direct-connected with the 3rd CE equipment, and the 4th network equipment can be four direct-connected with the 4th CE equipment PE equipment.The first to fourth CE equipment is respectively in 4 different VPN sites, but belong to same VPN.
Fig. 6 is according to a kind of schematic diagram of the device 600 to E-Packet provided by the embodiments of the present application.The device 600 should For in L3VPN.The device 600 can be used for performing the method 200 shown in Fig. 2.As shown in fig. 6, the device 600 includes:It is defeated Incoming interface 601, output interface 602, processor 603 and memory 604.The input interface 601,602 processor 603 of output interface It can be connected with memory 604 by bus system 605.
The memory 604, which is used to store, includes program, instruction or code.The processor 603, for performing described deposit Program, instruction or code in reservoir 604, receive signal, control output interface 602 sends signal with control input interface 601 With the relevant operation in Method Of Accomplishment 200.
Fig. 7 is according to a kind of schematic diagram of the device 700 to E-Packet provided by the embodiments of the present application.The device 700 should For in L3VPN.The L3VPN includes first network equipment, second network equipment and the 3rd network equipment.The first network The first L3VPN tunnels are established between equipment and second network equipment, second network equipment and the 3rd network are set The 2nd L3VPN tunnels are established between standby.Described device 700 is located in the first network equipment.The first network equipment is for example Can be the PE1 or PE4 shown in Fig. 1, which can be used for performing the method 200 shown in Fig. 2 and the side shown in Fig. 3 Method 300.The device 700 includes:Input interface 701, output interface 702, processor 703 and memory 704.The input interface 701st, 702 processor 703 of output interface can be connected with memory 704 by bus system 705.
The memory 704, which is used to store, includes program, instruction or code.The processor 703, for performing described deposit Program, instruction or code in reservoir 704, receive signal, control output interface 702 sends signal with control input interface 701 And the relevant operation in Method Of Accomplishment 200 and method 300.
It is to be understood that in the embodiment of the present application, above-mentioned processor 603 and processor 703 can be central processing unit (Central Processing Unit, referred to as " CPU "), can also be other general processors, digital signal processor (DSP), application-specific integrated circuit (ASIC), ready-made programmable gate array (FPGA) or other programmable logic device, discrete gate Or transistor logic, discrete hardware components etc..General processor can be that microprocessor or the processor can also It is any conventional processor etc..
Memory 604 and memory 704 can include read-only storage and random access memory, and respectively to each right The processor answered provides instruction and data.A memory part can also include nonvolatile RAM.For example, deposit Reservoir can be with the information of storage device type.
Bus system 605 and bus system 705 can also include power bus, control always in addition to including data/address bus Line and status signal bus in addition etc..But for the sake of clear explanation, various buses are all designated as bus system in figure.
During realization, each step of method 200 and 300 can be by hard in processor 603 and processor 703 The integrated logic circuit of part or the instruction of software form are completed.The step of localization method with reference to disclosed in the embodiment of the present application Hardware processor can be embodied directly in and perform completion, or completion is performed with the hardware in processor and software module combination. Software module can be located at random access memory, flash memory, read-only storage, programmable read only memory or electrically erasable programmable In the storage medium of this areas such as memory, register maturation.The storage medium is located in above-mentioned each memory respectively, above-mentioned each Processor reads the information in corresponding memory, with reference to the step of its hardware completion above method 200 and 300.To avoid Repeat, be not detailed herein.
It should be noted that the device that Fig. 4-7 is provided, applied in the network 100 shown in Fig. 1, realizes what is E-Packeted Method.In one concrete implementation mode, the processing module 401 in Fig. 4 can be realized with the processor 603 in Fig. 6, send mould Block 402 can be realized by the output interface 602 in Fig. 6.Processing module 502 in Fig. 5 can use the processor 703 in Fig. 7 real Existing, sending module 503 can be realized that receiving module 501 can be by the input interface in Fig. 7 by the output interface 702 in Fig. 7 701 realize.
Present invention also provides a kind of communication system, including for the control management equipment of PE device configuration policybased routings And PE equipment.The control management equipment can be the equipment that the corresponding embodiment of Fig. 4, Fig. 6 is provided.The PE equipment can To be device that the corresponding embodiment of Fig. 5, Fig. 7 is provided.The communication system is used to perform the corresponding embodiments of Fig. 2-Fig. 3 Method 200 and method 300.
It is to be understood that in the various embodiments of the application, the size of the sequence number of each process is not meant to execution sequence Successively, the execution sequence of each process should be determined with its function and internal logic, the implementation process without tackling the embodiment of the present application Form any restriction.
Those of ordinary skill in the art may realize that each exemplary mould described with reference to the embodiments described herein Block and method and step, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, application-specific and design constraint depending on technical solution.Professional technician Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and module, may be referred to the corresponding process in preceding method embodiment, details are not described herein.
Those skilled in the art are it will be appreciated that in said one or multiple examples, work(described herein It is able to can be realized with hardware, software or their any combination.If the function is realized in the form of software function module And as independent production marketing or in use, it can be stored in a computer read/write memory medium.Based on such Understand, the part or the part of the technical solution that the technical solution of the application substantially in other words contributes the prior art It can be embodied in the form of software product, which is stored in a storage medium, including some fingers Order is used so that computer equipment (can be personal computer, server, or network equipment an etc.) execution the application is each The all or part of step of a embodiment the method.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD Etc. it is various can be with the medium of store program codes.
The various pieces of this specification are described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment introduced is and other embodiment difference.Especially for device and it is For embodiment of uniting, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is real referring to method Apply the explanation of example part.
Finally, it is necessary to which explanation is:The foregoing is merely the preferred embodiment of technical scheme, it is not intended to Limit the protection domain of the application.Obviously, those skilled in the art can carry out the application various modification and variations without de- From scope of the present application.If these modifications and variations of the application belong to the scope of the application claim and its equivalent technologies Within, then any modification, equivalent replacement, improvement and so on, should be included within the protection domain of the application.

Claims (10)

1. a kind of method to E-Packet in Layer3 Virtual Private Network L3VPN, it is characterised in that the L3VPN includes the first net Network equipment, second network equipment and the 3rd network equipment, are established between the first network equipment and second network equipment First L3VPN tunnels, establish the 2nd L3VPN tunnels, the side between second network equipment and the 3rd network equipment Method includes::
The first network equipment receives message, and according to the incoming interface and the destination address of the message for receiving the message Searched in the VPN instance bound with the incoming interface and matched first policybased routing of the message, the described first tactful road Next-hop by the destination address for indicating to reach the message is second network equipment;
The message is sent to second network equipment by the first network equipment by the first L3VPN tunnels;Its In,
Second network equipment is stored with the forwarding-table item for the destination address for reaching the message, and the forwarding-table item is used to refer to Show that second network equipment forwards the message to the 3rd network equipment, the 2nd L3VPN tunnels are used for described the Two network equipments send the message to the 3rd network equipment.
2. according to the method described in claim 1, it is characterized in that, the first network equipment is Provider Edge PE equipment, The first network equipment receives message, specifically includes:
The PE equipment receives the message that customer edge CE equipment is sent.
3. according to the method described in claim 1, it is characterized in that, first network equipment reception message, specifically includes:
The first network equipment receives the message that the 4th network equipment is sent, and the 4th network equipments configuration has second Policybased routing, the next-hop that second policybased routing is used to indicate to reach the destination address of the message is the first network Equipment, being established between the 4th network equipment and the first network equipment has the 3rd L3VPN tunnels, the 3rd L3VPN Tunnel is used for the 4th network equipment and sends the message to the first network equipment.
4. according to claim 1-3 any one of them methods, it is characterised in that receive the report in the first network equipment Before text, the method further includes:
The first network equipment receives the configuration message that control management equipment is sent, and the configuration message carries first plan Slightly it route;
The first network equipment, first policybased routing is obtained according to the configuration message.
5. a kind of device to E-Packet, it is characterised in that described device is applied in Layer3 Virtual Private Network L3VPN, described L3VPN includes first network equipment, second network equipment and the 3rd network equipment, the first network equipment and second net The first L3VPN tunnels are established between network equipment, second is established between second network equipment and the 3rd network equipment L3VPN tunnels, described device are located in the first network equipment, which includes receiving module, processing module and transmission mould Block, wherein,
The receiving module, for receiving message;
The processing module, for according to the incoming interface and the destination address of the message for receiving the message, with it is described Searched in the VPN instance of incoming interface binding and be used to refer to matched first policybased routing of the message, first policybased routing The next-hop for showing the destination address for reaching the message is second network equipment;
The sending module, for by the first L3VPN tunnels, the message to be sent to second network equipment; Wherein,
Second network equipment is stored with the forwarding-table item for the destination address for reaching the message, and the forwarding-table item is used to refer to Show that second network equipment forwards the message to the 3rd network equipment, the 2nd L3VPN tunnels are used for described the Two network equipments send the message to the 3rd network equipment.
6. device according to claim 5, it is characterised in that:The first network equipment is Provider Edge PE equipment, The receiving module is specifically used for receiving the message that customer edge CE equipment is sent.
7. device according to claim 5, it is characterised in that the L3VPN further includes the 4th network equipment, the reception Module is used to receive the message that the 4th network equipment is sent, wherein, the 4th network equipments configuration has the second plan Slightly it route, the next-hop that second policybased routing is used to indicate to reach the destination address of the message sets for the first network Standby, being established between the 4th network equipment and the first network equipment has the 3rd L3VPN tunnels, the 3rd L3VPN tunnels Road is used for the 4th network equipment and sends the message to the first network equipment.
8. a kind of communication system to E-Packet, the communication system applications are in Layer3 Virtual Private Network L3VPN, the communication system System includes controlling management equipment, first network equipment, second network equipment and the 3rd network equipment, the first network equipment and The first L3VPN tunnels are established between second network equipment, between second network equipment and the 3rd network equipment The 2nd L3VPN tunnels are established, wherein,
The control management equipment, for sending the first configuration message, the first configuration message to the first network equipment The first policybased routing is carried, the first configuration message is used in first with the binding of the first interface of the first network equipment First policybased routing is configured in VPN instance;
The first network equipment, for receiving message from the first interface, and according to the destination address of the message, in institute State to search in the first VPN instance and be used to indicate with matched first policybased routing of the message, first policybased routing The next-hop for reaching the destination address of the message is second network equipment;
The first network equipment, is additionally operable to the instruction according to first policybased routing, by the first L3VPN tunnels to Second network equipment sends the message;Wherein,
Second network equipment is stored with the forwarding-table item for the destination address for reaching the message, and the forwarding-table item is used to refer to Show that second network equipment forwards the message to the 3rd network equipment, the 2nd L3VPN tunnels are used for described the Two network equipments send the message to the 3rd network equipment.
9. communication system according to claim 8, it is characterised in that the first network equipment sets for Provider Edge PE Standby, the first network equipment is specifically used for receiving the message that customer edge CE equipment is sent.
10. the communication system according to right wants 8, it is characterised in that the communication system further includes the 4th network equipment, institute State and establish the 3rd L3VPN tunnels between the 4th network equipment and the first network equipment, wherein,
The control management equipment, is additionally operable to send the second configuration message to the 4th network equipment, second configuration disappears Breath carries the second policybased routing, and the second configuration message is used in the with the binding of the second interface of the 4th network equipment Second policybased routing is bound in two VPN instance;
4th network equipment, for receiving the message from the second interface, and according to the destination address of the message, Search in second VPN instance and be used for matched second policybased routing of the message, second policybased routing The next-hop for indicating to reach the destination address of the message is the first network equipment;
4th network equipment, is additionally operable to the instruction according to second policybased routing, by the 3rd L3VPN tunnels to Message described in the first network device forwards;
The first network equipment, the message specifically for receiving the 4th network equipment forwarding.
CN201610902960.6A 2016-10-17 2016-10-17 Method, device and system for forwarding message Active CN107959611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610902960.6A CN107959611B (en) 2016-10-17 2016-10-17 Method, device and system for forwarding message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610902960.6A CN107959611B (en) 2016-10-17 2016-10-17 Method, device and system for forwarding message

Publications (2)

Publication Number Publication Date
CN107959611A true CN107959611A (en) 2018-04-24
CN107959611B CN107959611B (en) 2021-03-23

Family

ID=61953830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610902960.6A Active CN107959611B (en) 2016-10-17 2016-10-17 Method, device and system for forwarding message

Country Status (1)

Country Link
CN (1) CN107959611B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768861A (en) * 2018-06-29 2018-11-06 新华三信息安全技术有限公司 A kind of method and device sending service message
CN109617814A (en) * 2019-01-11 2019-04-12 安徽皖兴通信息技术有限公司 A kind of method of packet access network strategy forwarding
WO2020083016A1 (en) * 2018-10-23 2020-04-30 华为技术有限公司 Data transmission method and device
WO2022042547A1 (en) * 2020-08-28 2022-03-03 华为技术有限公司 Traffic forwarding processing method, and device
CN115118655A (en) * 2022-06-21 2022-09-27 阿里巴巴(中国)有限公司 Cross-network message forwarding method and device, electronic equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100284305A1 (en) * 2008-01-09 2010-11-11 Oktavian Papp Setting up a virtual private network
CN102394804A (en) * 2011-11-02 2012-03-28 中兴通讯股份有限公司 VPN system building method and VPN system
CN102449964A (en) * 2011-07-22 2012-05-09 华为技术有限公司 Three-layer virtual exclusive network routing control method, apparatus and system
WO2013154813A1 (en) * 2012-04-13 2013-10-17 Nicira, Inc. Extension of logical networks across layer 3 virtual private networks
CN104980347A (en) * 2014-04-04 2015-10-14 华为技术有限公司 Tunnel establishing method and tunnel establishing device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100284305A1 (en) * 2008-01-09 2010-11-11 Oktavian Papp Setting up a virtual private network
CN102449964A (en) * 2011-07-22 2012-05-09 华为技术有限公司 Three-layer virtual exclusive network routing control method, apparatus and system
CN102394804A (en) * 2011-11-02 2012-03-28 中兴通讯股份有限公司 VPN system building method and VPN system
WO2013154813A1 (en) * 2012-04-13 2013-10-17 Nicira, Inc. Extension of logical networks across layer 3 virtual private networks
CN104980347A (en) * 2014-04-04 2015-10-14 华为技术有限公司 Tunnel establishing method and tunnel establishing device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768861A (en) * 2018-06-29 2018-11-06 新华三信息安全技术有限公司 A kind of method and device sending service message
CN108768861B (en) * 2018-06-29 2021-01-08 新华三信息安全技术有限公司 Method and device for sending service message
WO2020083016A1 (en) * 2018-10-23 2020-04-30 华为技术有限公司 Data transmission method and device
CN113411243A (en) * 2018-10-23 2021-09-17 华为技术有限公司 Data transmission method and device
US11750515B2 (en) 2018-10-23 2023-09-05 Huawei Technologies Co., Ltd. Data transmission method and apparatus
CN113411243B (en) * 2018-10-23 2024-03-19 华为技术有限公司 Data transmission method and device
CN109617814A (en) * 2019-01-11 2019-04-12 安徽皖兴通信息技术有限公司 A kind of method of packet access network strategy forwarding
WO2022042547A1 (en) * 2020-08-28 2022-03-03 华为技术有限公司 Traffic forwarding processing method, and device
CN115118655A (en) * 2022-06-21 2022-09-27 阿里巴巴(中国)有限公司 Cross-network message forwarding method and device, electronic equipment and readable storage medium
CN115118655B (en) * 2022-06-21 2023-12-12 阿里巴巴(中国)有限公司 Cross-network message forwarding method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN107959611B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
EP3300317B1 (en) Method, device and system for realizing service link
CN103607349B (en) Method for determining route in virtual network and provider edge equipment
CN107306222B (en) Method and equipment for establishing traffic engineering tunnel on label switching path
CN107959611A (en) A kind of method to E-Packet, apparatus and system
CN106982157B (en) Traffic engineering tunnel establishment method and device
CN102291307B (en) An inter-VPN multicast implementation method, apparatus and network device
CN107026796B (en) VPN route notification method, data flow forwarding method and related equipment
CN108702328A (en) The IS-IS extensions of the splicing of flexible path and the selection of business for passing through Segment routing and MPLS network
CN103621022B (en) For Virtual Private LAN Service to use influenza to know the system and method for pseudo-wire
US20100329252A1 (en) Method and Apparatus for Enabling Multicast Route Leaking Between VRFs in Different VPNs
CN102724117A (en) Multi-protocol label switching (MPLS) traffic engineering (TE) tunnel building method and device
CN102739501B (en) Message forwarding method and system in two three layer virtual private networks
CN107547333B (en) Method and apparatus for implementing a combined virtual private network VPN
CN103326940A (en) Method for forwarding message in network and edge device of operator
CN106936713A (en) A kind of label management method, data flow processing method and equipment
EP3863233A1 (en) Method and device used for ethernet virtual private network
CN102571375B (en) Multicast forwarding method and device as well as network device
CN103326944B (en) A kind of multicast transmission method, device and network system
CN107483338A (en) A kind of method, apparatus and system for determining cross-domain label switched path tunnel
CN106936714A (en) The processing method and PE equipment and system of a kind of VPN
CN114465920A (en) Method, device and system for determining corresponding relation
CN103795630B (en) The message transmitting method and device of a kind of label exchange network
CN104092554A (en) Multicast distribution tree establishment method and device
CN103634210B (en) Find the method and apparatus of the opposite end PE equipment of VPLS example
CN102487351A (en) Establishment method of end-to-end multicast label switched path, apparatus thereof and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant