CN109327462A - A kind of MAC address authentication method based on L2VPN network - Google Patents

A kind of MAC address authentication method based on L2VPN network Download PDF

Info

Publication number
CN109327462A
CN109327462A CN201811350331.2A CN201811350331A CN109327462A CN 109327462 A CN109327462 A CN 109327462A CN 201811350331 A CN201811350331 A CN 201811350331A CN 109327462 A CN109327462 A CN 109327462A
Authority
CN
China
Prior art keywords
mac address
enabled
address authentication
port
vlan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811350331.2A
Other languages
Chinese (zh)
Other versions
CN109327462B (en
Inventor
顾伟
赵子苍
王文刚
徐海青
赵茂聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Centec Communications Co Ltd
Original Assignee
Centec Networks Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Centec Networks Suzhou Co Ltd filed Critical Centec Networks Suzhou Co Ltd
Priority to CN201811350331.2A priority Critical patent/CN109327462B/en
Publication of CN109327462A publication Critical patent/CN109327462A/en
Application granted granted Critical
Publication of CN109327462B publication Critical patent/CN109327462B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Present invention discloses a kind of MAC address authentication methods based on L2VPN network, including receiving message and obtaining the source MAC, source port number and VLAN ID of the message, virtual port control table entry is searched according to the source port number and VLAN ID and obtains virtual port number;Data forwarding list item is searched according to MAC Address, if searching, virtual port control table entry is searched according to virtual port number, it is determined whether MAC Address is reported CPU to carry out MAC address authentication by the enabled MAC address authentication based on virtual port if enabled;CPU authenticates the MAC Address, and marks the MAC Address when certification passes through to have authenticated.The present invention can be realized MAC address learning, aging and the security control of port drift based on virtual link.

Description

A kind of MAC address authentication method based on L2VPN network
Technical field
The present invention relates to computer network communication technology fields, more particularly, to a kind of MAC Address based on L2VPN network Authentication method.
Background technique
MAC (Media Access Control, media access control) address be have network device manufacturers production be to write Inside hardware, for determining the address of network equipment position.In the prior art, MAC address authentication be it is a kind of based on port and MAC Address or based on VLAN and MAC Address to for the authentication mode that is controlled of network access authority, do not need user Any client software is installed.By taking the MAC address authentication based on port as an example, when switching equipment enables MAC address authentication, After port detects the MAC Address of user for the first time, that is, enable the authentication operation to the user's MAC address.In verification process, It is manually entered user name and/or password without user, if authenticating successfully, allows it to access Internet resources by port, otherwise The MAC Address of the user is added to silent MAC.In the silence period, switching equipment loses the message from identical MAC Address Abandoning processing.However existing MAC address authentication mode cannot achieve the certification of the MAC Address based on virtual link.
Summary of the invention
It is an object of the invention to overcome the deficiencies of existing technologies, a kind of MAC address authentication based on L2VPN network is provided Method.
To achieve the above object, the following technical solutions are proposed: a kind of MAC address authentication based on L2VPN network by the present invention Method, including
It receives message and obtains the source MAC, source port number and VLAN ID of the message, further according to the source Port numbers and VLAN ID search virtual port control table entry and obtain a virtual port number;
Data forwarding list item is searched according to the MAC Address, and when not finding, further according to the virtual port Number searching virtual port control table entry determines whether the enabled MAC address authentication based on virtual port, and when enabled by MAC Location reports CPU to carry out MAC address authentication, and is the MAC address authentication based on virtual port the reason of report CPU;
CPU authenticates the MAC Address, and marks the MAC Address when certification passes through to have authenticated.
It is preferably, described that whether the enabled MAC address authentication based on virtual port is corresponding by the virtual port number The value of enabled MAC address authentication field determines that the enabled MAC address authentication field is set in virtual port control table entry, uses In identifying whether the enabled MAC certification based on virtual port.
Preferably, when being not enabled on the MAC address authentication based on virtual port, end is further searched according to the source port number Mouth control table entry determines whether the enabled MAC address authentication based on port, and reports CPU to carry out MAC MAC Address when enabled Address verification, and be the MAC address authentication based on port the reason of report CPU.
It is preferably, described that whether the enabled MAC address authentication based on port passes through the corresponding enabled MAC of the source port number The value of address verification field determines that the enabled MAC address authentication field is set in port controlling list item, makes for identifying whether It can be authenticated based on the MAC of port.
Preferably, when being not enabled on the MAC address authentication based on port, VLAN control is further searched according to the VLAN ID Tabulation item determines whether the enabled MAC address authentication based on VLAN, and reports CPU to carry out MAC Address MAC Address when enabled The reason of authenticating, and reporting CPU is the MAC address authentication based on VLAN.
It is preferably, described that whether the enabled MAC address authentication based on VLAN passes through the corresponding enabled MAC of the VLAN ID The value of address verification field determines that the enabled MAC address authentication field is set in VLAN control table entry, makes for identifying whether It can be authenticated based on the MAC of VLAN.
Preferably, the CPU marks the MAC by the way that the value of MAC authentication field is arranged in having authenticated MAC address entries Whether address has authenticated.
Preferably, the CPU is also the configurable ageing timer of MAC Address setting one that certification passes through.
The beneficial effects of the present invention are:
MAC address authentication method of the present invention, can be realized MAC address learning based on virtual link, aging and The security control of port drift, is applicable not only to L2VPN network, applies also for VxLAN network, Tunnel network etc..
Detailed description of the invention
Fig. 1 is flow chart of the method for the present invention schematic diagram;
Fig. 2 is exchange chip process flow diagram schematic diagram;
Fig. 3 is CPU process flow diagram schematic diagram.
Specific embodiment
Below in conjunction with attached drawing of the invention, clear, complete description is carried out to the technical solution of the embodiment of the present invention.
As shown in Figure 1, a kind of disclosed MAC address authentication method based on L2VPN network, including
S100 receives message and obtains the source MAC, source port number and vlan number of the message, further according to institute It states source port number and vlan number searches virtual port control table entry and obtains a virtual port number;
Specifically, exchange chip is mainly used for the processing of network packet, and when implementation, exchange chip is to the message received Dissection process is carried out, the letter of (Media Access Control, the media access control) address source MAC entrained by message is obtained Breath, source port number information and VLAN id information.Exchange chip includes but is not limited to ASIC (Application Specific Integrated Circuit, specific integrated circuit) chip, it is of course also possible to be FPGA (Field-Programmable Gate Array, field programmable gate array) chip or NP (Network Processor, network processing unit) chip etc..
Further, multiple list items, including data forwarding list item (FDB, Forwarding are also configured in exchange chip DataBase), port (Port) control table entry and VLAN control table entry.Wherein, FDB address list item is used for the forwarding of message, when When exchange chip receives message, the mac address information according to entrained by message searches data forwarding list item, according to lookup result Determination is filtered or forwards to the message.Port controlling list item is used to determine the whether enabled base of the data from certain Single port MAC address authentication in port when implementation, can increase by an enabled MAC address authentication field in port controlling list item (macAuthEn), the enabled MAC address authentication based on port is determined whether by the way that the value of enabled MAC address authentication field is arranged, The value for such as configuring the corresponding enabled MAC address authentication field in port 1 (Port1) is 1, and configuration port 2 (Port2) is corresponding enabled The value of MAC address authentication field is 0, when exchange chip receives message from port 1 and port 2, for the message from port 1 The MAC address authentication based on port is enabled, therefore exchange chip is reported CPU to carry out MAC address authentication, for from end The message of mouth 2 is not enabled on the MAC address authentication based on port, therefore exchange chip is recognized without being reported CPU to carry out MAC Address Card.VLAN control table entry is used to determine the whether enabled MAC address authentication based on VLAN of the message from a certain VLAN, implements When, it can increase by an enabled MAC address authentication field in VLAN control table entry, by the way that enabled MAC address authentication field is arranged Value determines whether the enabled MAC address authentication based on VLAN, such as the corresponding enabled MAC address authentication field of configuration VLAN 100 Value is 1, enables the MAC address authentication based on port for the message from VLAN 100, therefore exchange chip is reported CPU carries out MAC address authentication.
Further, a virtual port control table entry is also configured in exchange chip, it includes source port number field, Vlan number (VLAN ID) field and virtual port number (Virtual Port) field, for by the source port number of message and Vlan number is mapped as a virtual port number, and such as configurable source port is 1, the corresponding virtual port number of message that vlan number is 100 It is 20.Further, it can increase by an enabled MAC address authentication field (macAuthEn) in virtual port control table entry, pass through The value that enabled MAC address authentication field is arranged determines whether the enabled MAC address authentication based on virtual port, when implementation, exchange Chip carries out parsing to the message received and obtains source port number and vlan number information entrained by the message, according to source port number Virtual port control table entry is searched with vlan number, virtual port number corresponding to the message is obtained, further can be determined whether to make Can MAC address authentication based on virtual port report CPU to carry out MAC address authentication MAC Address if enabled.
S200 searches data forwarding table according to the MAC Address, and when not finding, according to the virtual port number Search virtual port control table entry, it is determined whether the enabled MAC address authentication based on virtual port, and when enabled by MAC Location reports CPU to carry out MAC address authentication.
Specifically, referring to figs. 1 and 2, after exchange chip analytic message obtains source MAC, according to source MAC Data forwarding table is searched, if not finding, virtual port control table entry is further searched according to virtual port number, according to lookup As a result determine whether the enabled MAC address authentication based on virtual port, if enabling the MAC address authentication based on virtual port, It then reports CPU to carry out MAC address authentication the source MAC, and virtual port will be configured to the reason of reporting CPU MAC address authentication further searches port control according to source port number if being not enabled on the MAC address authentication based on virtual port Tabulation item determines whether the enabled MAC address authentication based on port according to lookup result, if with enabling the MAC based on port The reason of location authenticates, then reports CPU to carry out MAC address authentication the source MAC, and will report CPU is configured to port MAC address authentication, if being not enabled on the MAC address authentication based on port, further according to vlan number search VLAN control table , determined whether to enable the MAC address authentication based on VLAN according to lookup result, if enabling the MAC Address based on VLAN The source MAC is then reported CPU to carry out MAC address authentication, and will be configured to VLAN's the reason of reporting CPU by certification MAC address authentication is handled message using other modes if being not enabled on the MAC address authentication based on VLAN.
When implementation, if enabling the MAC address authentication based on port and the MAC address authentication based on VLAN, base simultaneously In port MAC address authentication prior to the MAC address authentication based on VLAN, the source MAC report CPU carry out MAC Address The reason of CPU is reported when certification is the MAC address authentication based on port.
As shown in Fig. 2, if finding, further judgement is when searching data forwarding table according to the source MAC of message Whether no originating port migrates and has authenticated.Specifically, it is also configured with and corresponding with data forwarding table has recognized in exchange chip It demonstrate,proves MAC address entries (DsMAC list item), DsMAC list item has authenticated mac address information for storing, and when implementation, sets in DsMAC list item There is MAC authentication field (macAuth field), marks whether MAC Address has authenticated by the way that the value of macAuth field is arranged. When judging whether to have authenticated, DsMAC list item is searched according to source MAC and shows that the MAC Address has authenticated if finding; When judging whether originating port migration, by source port number or virtual terminal in source port number or virtual port number and data forwarding table Slogan is inconsistent, then shows originating port offset.For the migration of originating port and the message that has authenticated of MAC Address, usually There are four types of processing modes, respectively abandon, forward and do not learn, forward and learn and report CP U, wherein for reporting CPU Message, the reason of being reported CPU configuration has authenticated MAC originating port migration (MacAuthStationMove), for losing The message of abandoning, the reason of being abandoned, which is configured to abandon, has authenticated MAC message (MacAuthDiscard).
S300, CPU authenticate the MAC Address, and mark the address the M AC when certification passes through to have authenticated.
Specifically, as shown in figure 3, CPU authenticates the MAC Address for reporting it, by the MAC when certification passes through Location is added in data forwarding table, meanwhile, the value of the corresponding macAuth field of the MAC Address is set in DsMAC list item to mark Remember that the MAC Address has authenticated.Further, CPU is also that this has authenticated MAC Address one settable ageing timer of configuration (timeI dx), to be opposed to the ageing time of common MAC Address.For it is unverified by MAC Address, then use its other party Formula handles it
MAC address authentication method of the present invention, can be realized MAC address learning based on virtual link, aging and The security control of port drift, is applicable not only to L2VPN network, applies also for VxLAN network, Tunnel network etc..
Technology contents and technical characteristic of the invention have revealed that as above, however those skilled in the art still may base Make various replacements and modification without departing substantially from spirit of that invention, therefore, the scope of the present invention in teachings of the present invention and announcement It should be not limited to the revealed content of embodiment, and should include various without departing substantially from replacement and modification of the invention, and be this patent Shen Please claim covered.

Claims (8)

1. a kind of MAC address authentication method based on L2VPN network, which is characterized in that including
It receives message and obtains the source MAC, source port number and VLAN ID of the message, further according to the source port Number and VLAN ID search virtual port control table entry obtain virtual port number;
Data forwarding list item is searched according to the MAC Address, and when not finding, is further looked into according to the virtual port number Virtual port control table entry is looked for determine whether the enabled MAC address authentication based on virtual port, and will be on MAC Address when enabled The reason of reporting CPU to carry out MAC address authentication, and reporting CPU is the MAC address authentication based on virtual port;
CPU authenticates the MAC Address, and marks the MAC Address when certification passes through to have authenticated.
2. the method according to claim 1, wherein described, whether the enabled MAC Address based on virtual port is recognized Card determines that the enabled MAC address authentication field is set to by the value of the corresponding enabled MAC address authentication field of virtual port number In virtual port control table entry, for identifying whether the enabled MAC certification based on virtual port.
3. the method according to claim 1, wherein when being not enabled on the MAC address authentication based on virtual port, into One step searches port controlling list item according to the source port number and determines whether the enabled MAC address authentication based on port, and makes The reason of reporting CPU to carry out MAC address authentication MAC Address when energy, and reporting CPU is the MAC address authentication based on port.
4. according to the method described in claim 3, it is characterized in that, described whether the enabled MAC address authentication based on port is logical The value for crossing the corresponding enabled MAC address authentication field of source port number determines that the enabled MAC address authentication field is controlled set on port In tabulation item, for identifying whether the enabled MAC certification based on port.
5. according to the method described in claim 3, it is characterized in that, when being not enabled on the MAC address authentication based on port, further VLAN control table entry is searched according to the VLAN ID and determines whether the enabled MAC address authentication based on VLAN, and will when enabled MAC Address reports CPU to carry out MAC address authentication, and is the MAC address authentication based on VLAN the reason of report CPU.
6. according to the method described in claim 5, it is characterized in that, described whether the enabled MAC address authentication based on VLAN is logical The value for crossing the corresponding enabled MAC address authentication field of VLAN ID determines that the enabled MAC address authentication field is controlled set on VLAN In tabulation item, for identifying whether the enabled MAC certification based on VLA N.
7. the method according to claim 1, wherein the CPU in having authenticated MAC address entries by being arranged MAC The value of authentication field marks whether the MAC Address has authenticated.
8. the method according to claim 1, wherein the CPU is also that the MAC Address setting one that certification passes through can The ageing timer of configuration.
CN201811350331.2A 2018-11-14 2018-11-14 MAC address authentication method based on L2VPN network Active CN109327462B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811350331.2A CN109327462B (en) 2018-11-14 2018-11-14 MAC address authentication method based on L2VPN network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811350331.2A CN109327462B (en) 2018-11-14 2018-11-14 MAC address authentication method based on L2VPN network

Publications (2)

Publication Number Publication Date
CN109327462A true CN109327462A (en) 2019-02-12
CN109327462B CN109327462B (en) 2020-10-27

Family

ID=65260957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811350331.2A Active CN109327462B (en) 2018-11-14 2018-11-14 MAC address authentication method based on L2VPN network

Country Status (1)

Country Link
CN (1) CN109327462B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113727222A (en) * 2021-08-16 2021-11-30 烽火通信科技股份有限公司 Method and device for detecting MAC address drift in PON system

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889430A (en) * 2006-06-21 2007-01-03 南京联创网络科技有限公司 Safety identification control method based on 802.1 X terminal wideband switching-in
JP2007074209A (en) * 2005-09-06 2007-03-22 Ntt Data Corp Authentication vlan system, authentication server, and program
JP2007208323A (en) * 2006-01-30 2007-08-16 Fujitsu Ltd Authentication vlan switch
CN101197785A (en) * 2008-01-04 2008-06-11 杭州华三通信技术有限公司 MAC authentication method and apparatus
CN101860551A (en) * 2010-06-25 2010-10-13 神州数码网络(北京)有限公司 Multi-user authentication method and system under single access port
CN103441932A (en) * 2013-08-30 2013-12-11 福建星网锐捷网络有限公司 Host routing table entry generating method and device
CN103731355A (en) * 2013-12-31 2014-04-16 迈普通信技术股份有限公司 Method and system for avoiding Hash collision during MAC address learning
CN103929461A (en) * 2013-08-12 2014-07-16 杭州华三通信技术有限公司 MAC address information synchronization method and device in stacking system
CN104144095A (en) * 2014-08-08 2014-11-12 福建星网锐捷网络有限公司 Terminal authentication method and interchanger
CN104333552A (en) * 2014-11-04 2015-02-04 福建星网锐捷网络有限公司 Authentication determination method and accessing equipment
CN106131066A (en) * 2016-08-26 2016-11-16 杭州华三通信技术有限公司 A kind of authentication method and device
CN107294711A (en) * 2017-07-11 2017-10-24 国网辽宁省电力有限公司 A kind of power information Intranet message encryption dissemination method based on VXLAN technologies
CN107547336A (en) * 2017-05-15 2018-01-05 新华三技术有限公司 A kind of authentication port adds the method and device for authorizing VLAN
CN108683660A (en) * 2018-05-14 2018-10-19 杭州迪普科技股份有限公司 A kind of MAC address authentication processing method and processing device

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007074209A (en) * 2005-09-06 2007-03-22 Ntt Data Corp Authentication vlan system, authentication server, and program
JP2007208323A (en) * 2006-01-30 2007-08-16 Fujitsu Ltd Authentication vlan switch
CN1889430A (en) * 2006-06-21 2007-01-03 南京联创网络科技有限公司 Safety identification control method based on 802.1 X terminal wideband switching-in
CN101197785A (en) * 2008-01-04 2008-06-11 杭州华三通信技术有限公司 MAC authentication method and apparatus
CN101860551A (en) * 2010-06-25 2010-10-13 神州数码网络(北京)有限公司 Multi-user authentication method and system under single access port
CN103929461A (en) * 2013-08-12 2014-07-16 杭州华三通信技术有限公司 MAC address information synchronization method and device in stacking system
CN103441932A (en) * 2013-08-30 2013-12-11 福建星网锐捷网络有限公司 Host routing table entry generating method and device
CN103731355A (en) * 2013-12-31 2014-04-16 迈普通信技术股份有限公司 Method and system for avoiding Hash collision during MAC address learning
CN104144095A (en) * 2014-08-08 2014-11-12 福建星网锐捷网络有限公司 Terminal authentication method and interchanger
CN104333552A (en) * 2014-11-04 2015-02-04 福建星网锐捷网络有限公司 Authentication determination method and accessing equipment
CN106131066A (en) * 2016-08-26 2016-11-16 杭州华三通信技术有限公司 A kind of authentication method and device
CN107547336A (en) * 2017-05-15 2018-01-05 新华三技术有限公司 A kind of authentication port adds the method and device for authorizing VLAN
CN107294711A (en) * 2017-07-11 2017-10-24 国网辽宁省电力有限公司 A kind of power information Intranet message encryption dissemination method based on VXLAN technologies
CN108683660A (en) * 2018-05-14 2018-10-19 杭州迪普科技股份有限公司 A kind of MAC address authentication processing method and processing device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113727222A (en) * 2021-08-16 2021-11-30 烽火通信科技股份有限公司 Method and device for detecting MAC address drift in PON system
CN113727222B (en) * 2021-08-16 2023-11-03 烽火通信科技股份有限公司 Method and device for detecting MAC address drift in PON system

Also Published As

Publication number Publication date
CN109327462B (en) 2020-10-27

Similar Documents

Publication Publication Date Title
US9729547B2 (en) Systems and methods for credential management between electronic devices
US10291408B2 (en) Generation of Merkle trees as proof-of-work
US20180278636A1 (en) System and method for malware detection learning
CN102624705B (en) A kind of intelligent image verification method and system
EP3011713B1 (en) Method and system protecting against identity theft or replication abuse
US10904218B2 (en) Secure proxy to protect private data
US7360086B1 (en) Communications control method and information relaying device for communications network system
US9282120B2 (en) Securing communication over a network using client integrity verification
US9202173B1 (en) Using link analysis in adversarial knowledge-based authentication model
US20090300707A1 (en) Method of Optimizing Policy Conformance Check for a Device with a Large Set of Posture Attribute Combinations
JP2003046533A (en) Network system, authentication method therefor and program thereof
CN105490997B (en) Safe checking method, device, terminal and server
CN105847245A (en) Electronic mail box login authentication method and device
US20220253520A1 (en) Methods and systems for verifying applications
WO2018145546A1 (en) Authentication method, device and storage medium
EP3991074A1 (en) Security certificate identity analysis
EP4115583A1 (en) Identifying trusted service set identifiers for wireless networks t
CN109040124A (en) The method and apparatus of processing message for interchanger
CN109327462A (en) A kind of MAC address authentication method based on L2VPN network
CN113992387B (en) Resource management method, device, system, electronic equipment and readable storage medium
BR102020003105A2 (en) METHOD FOR DETECTION OF FAKE DNS SERVERS USING MACHINE LEARNING TECHNIQUES
WO2019169982A1 (en) Url abnormality positioning method and device, and server and storage medium
Kim et al. Puf-based iot device authentication scheme on iot open platform
CN107547390B (en) The method and device of flow table creation and inquiry
AU2022203844A1 (en) Method for detecting anomalies in ssl and/or tls communications, corresponding device, and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 215101 unit 13 / 16, 4th floor, building B, No. 5, Xinghan street, Suzhou Industrial Park, Jiangsu Province

Patentee after: Suzhou Shengke Communication Co.,Ltd.

Address before: Unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, 215000 Jiangsu Province

Patentee before: CENTEC NETWORKS (SU ZHOU) Co.,Ltd.