CN112367252A - Method and device for realizing disaster recovery backup - Google Patents

Method and device for realizing disaster recovery backup Download PDF

Info

Publication number
CN112367252A
CN112367252A CN202011023227.XA CN202011023227A CN112367252A CN 112367252 A CN112367252 A CN 112367252A CN 202011023227 A CN202011023227 A CN 202011023227A CN 112367252 A CN112367252 A CN 112367252A
Authority
CN
China
Prior art keywords
vbras
address
user service
service message
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011023227.XA
Other languages
Chinese (zh)
Other versions
CN112367252B (en
Inventor
邱元香
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd Hefei Branch
Original Assignee
New H3C Technologies Co Ltd Hefei Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd Hefei Branch filed Critical New H3C Technologies Co Ltd Hefei Branch
Priority to CN202011023227.XA priority Critical patent/CN112367252B/en
Publication of CN112367252A publication Critical patent/CN112367252A/en
Application granted granted Critical
Publication of CN112367252B publication Critical patent/CN112367252B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a method and a device for realizing disaster recovery backup, wherein the method is applied to a first vBRAS-CP device and comprises the following steps: receiving a user service message, wherein the user service message comprises a destination IP address; when the destination IP address is a group IP address of a vBRAS-CP device group, and after the disaster-tolerant main vBRAS-CP device is switched, the user service message is encapsulated, and the encapsulated user service message is sent to a second vBRAS-CP device through a tunnel between the second vBRAS-CP device and the user service message, so that the second vBRAS-CP device decapsulates the encapsulated user service message, acquires and performs service processing on the user service message.

Description

Method and device for realizing disaster recovery backup
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for implementing disaster recovery backup.
Background
With the expansion of enterprise scale, the stand-alone backup of user data cannot meet the requirements of key services on the availability, real-time performance and safety of the system. Backup data is often destroyed by various factors, such as earthquake, fire, loss, etc. The occurrence of the remote disaster recovery scheme can further improve the disaster recovery capability of the data against various safety factors by establishing backup systems at different places.
For a Broadband Remote Access Server (BRAS) forwarding Control separation system, a Control Plane (CP) of the BRAS, namely a virtual Broadband Remote Access Server-Control Plane (vBRAS-CP) device for realizing the Control Plane function is arranged in a Data Center (DC). The remote disaster recovery scheme refers to that dual-computer backup is carried out on vBRAS-CP equipment in two different DCs. The two vBRAS-CP devices belong to different DCs respectively, and are configured to be in a master/standby state. Therefore, when the main vBRAS-CP equipment fails or a link between the main vBRAS-CP equipment and User Plane (UP) equipment of the BRAS fails, User services can be quickly switched to the standby vBRAS-CP equipment.
For a network (Web) authentication server and a radius server in the BRAS forwarding control separation system, both the servers need to record the IP address of the vBRAS-CP equipment accessed by a user terminal, and when the servers receive a Web authentication request message or the radius server needs to inform the vBRAS-CP equipment of changing user authority (such as DAE/COA message), both the servers use the recorded IP address of the vBRAS-CP equipment to inform the vBRAS-CP equipment of Web authentication or refreshing the user authority.
In order to realize that the original user service is not interrupted after the primary and standby vBRAS-CP devices are switched, and the change of the Web authentication request message and the online user authority of the user terminal is not influenced by the switching of the primary and standby vBRAS-CP devices, the commonly adopted scheme in the prior art is as follows:
for vbars-CP devices that do not support issuing dynamic routes, static routes may be configured at the gateway of the DC. And the DC gateway issues the route reaching the primary and standby vBRAS-CP equipment into the network so that the Web authentication server and the radius server store the route reaching the primary and standby vBRAS-CP equipment. In practical application, a route reaching a main vBRAS-CP device is often set to be high priority, and a route reaching a standby vBRAS-CP device is often set to be low priority, so that the main vBRAS-CP device processes user services.
When the primary and secondary vBRAS-CP devices are switched, the switching is not triggered only when the primary vBRAS-CP device completely fails, but also the switching of the primary vBRAS-CP device can be triggered at the connection failure rate between the primary vBRAS-CP device and a plurality of UP devices managed by the primary vBRAS-CP device. Therefore, after the primary and secondary vBRAS-CP devices are switched, if the original primary vBRAS-CP device has not failed, the route of the original primary vBRAS-CP device can still be reached, and the service messages sent by the Web authentication server and the radius server are still sent to the original primary vBRAS-CP device.
However, since the user service has been switched to the original backup vbrs-CP device, the original primary vbrs-CP device cannot continue to process the service packet, which will cause that the accessed user terminal cannot pass the authentication of the Web authentication server, and the radius server cannot dynamically refresh the user right.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for implementing a disaster recovery backup, so as to solve the problem in the prior art that, due to a high priority level of a route of an original primary vbrs-CP device, even after a service is switched between the primary and secondary vbrs-CP devices, a service packet still reaches the original primary vbrs-CP device, so that a user service is interrupted.
In a first aspect, the present application provides a method for implementing a disaster recovery backup, where the method is applied to a first vbrs-CP device, where the first vbrs-CP device is in a vbrs-CP device group, the vbrs-CP device group further includes a second vbrs-CP device, and a tunnel is established between the first vbrs-CP device and the second vbrs-CP device, and the method includes:
receiving a user service message, wherein the user service message comprises a destination IP address;
when the target IP address is a group IP address of a vBRAS-CP device group and after disaster-tolerant main and standby vBRAS-CP devices are switched, encapsulating the user service message to obtain an encapsulated user service message;
and sending the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the second vBRAS-CP equipment and the second vBRAS-CP equipment, so that the second vBRAS-CP equipment obtains and performs service processing on the user service message after de-encapsulating the encapsulated user service message.
In a second aspect, the present application provides a device for implementing disaster recovery backup, where the device is applied to a first vbrs-CP device, where the first vbrs-CP device is in a vbrs-CP device group, the vbrs-CP device group further includes a second vbrs-CP device, and a tunnel is established between the first vbrs-CP device and the second vbrs-CP device, and the device includes:
a receiving unit, configured to receive a user service packet, where the user service packet includes a destination IP address;
the encapsulation unit is used for encapsulating the user service message to obtain an encapsulated user service message when the target IP address is the group IP address of the vBRAS-CP equipment group and after the disaster-tolerant main and standby vBRAS-CP equipment is switched;
and the sending unit is used for sending the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the sending unit and the second vBRAS-CP equipment, so that the second vBRAS-CP equipment obtains the encapsulated user service message and performs service processing on the user service message after de-encapsulating the encapsulated user service message.
In a third aspect, the present application provides a network device comprising a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor, the processor being caused by the machine-executable instructions to perform the method provided by the first aspect of the present application.
Therefore, by applying the method and the device for implementing disaster recovery backup provided by the present application, the first vbrs-CP device receives the user service packet, and when the destination IP address included in the user service packet is the group IP address of the vbrs-CP device group, and after the disaster recovery main/standby vbrs-CP device is switched, the first vbrs-CP device encapsulates the user service packet to obtain the encapsulated user service packet. And the first vBRAS-CP equipment sends the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the first vBRAS-CP equipment and the second vBRAS-CP equipment, so that the second vBRAS-CP equipment obtains the encapsulated user service message and performs service processing on the user service message after de-encapsulating the encapsulated user service message.
By establishing a reliable transmission tunnel between the first vBRAS-CP equipment and the second vBRAS-CP equipment, when a target IP address included in a user service message is a group IP address of a vBRAS-CP equipment group, and after disaster-tolerant main and standby vBRAS-CP equipment is switched, the first vBRAS-CP equipment forwards the encapsulated user service message to the second vBRAS-CP equipment through the established tunnel. Therefore, the problem that in the prior art, due to the fact that the priority level of the route of the primary vBRAS-CP device is high, even after the primary vBRAS-CP device switches services, the service message still reaches the primary vBRAS-CP device, and the service of a user is interrupted is solved. The uninterrupted user service is realized.
Drawings
Fig. 1 is a flowchart of a method for implementing disaster recovery backup according to an embodiment of the present application;
fig. 2 is a schematic networking diagram of disaster recovery backup according to an embodiment of the present application;
fig. 3 is a structural diagram of an implementation apparatus for disaster recovery backup according to an embodiment of the present application;
fig. 4 is a hardware structure diagram of a network device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the corresponding listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The implementation method of disaster recovery backup provided in the embodiments of the present application is described in detail below. Referring to fig. 1, fig. 1 is a flowchart of a method for implementing disaster recovery backup according to an embodiment of the present application. The method is applied to a first vbrs-CP device, and the implementation method of the disaster recovery backup provided in the embodiment of the present application may include the following steps.
Step 110, receiving a user service message, wherein the user service message comprises a destination IP address.
Specifically, as shown in fig. 2, fig. 2 is a schematic networking diagram of disaster recovery backup provided in the embodiment of the present application. The first vBRAS-CP device is in a vBRAS-CP device group, and the vBRAS-CP device group further comprises a second vBRAS-CP device. A disaster tolerance heartbeat channel is established between the first vBRAS-CP device and the second vBRAS-CP device. The channel can be used for exchanging disaster recovery heartbeat messages between the first vBRAS-CP equipment and the second vBRAS-CP equipment so as to mutually know the current state and the synchronous data of the opposite terminal.
The first vBRAS-CP equipment and the second vBRAS-CP equipment respectively establish a tunnel port, and establish a disaster recovery protection tunnel. The tunnel may be specifically a GRE tunnel, an MPLS tunnel, a VXLAN tunnel, etc. The embodiments of the present application do not limit a specific tunneling technique.
Wherein. The source and destination IP addresses of the tunnel may be source and destination IP addresses of the disaster recovery heartbeat channel, or may be separately designated. The tunnel portal may also be the loopback portal of each vbars-CP device itself.
In one example, the source IP address of the tunnel is the IP address of a first vbars-CP device at one end of the disaster recovery heartbeat channel, and the destination IP address of the tunnel is the IP address of a second vbars-CP device at the other end of the disaster recovery heartbeat channel. The VPN parameter used for establishing the tunnel may be a VPN to which each vbars-CP device currently belongs.
In another example, the first vbrs-CP device receives a configuration instruction input by a user, where the configuration instruction includes address information for setting a source IP address or a destination IP address of the disaster recovery protection tunnel. And after receiving the configuration instruction, the first vBRAS-CP equipment acquires the address information from the configuration instruction and configures the address information into a source IP address or a destination IP address of the tunnel.
It is understood that the second vbars-CP device may also receive a configuration instruction input by a user, and configure the address information as a source IP address or a destination IP address of the tunnel. Each vbars-CP device may configure address information included in the configuration instruction on its own loopback port.
And the configuration instruction can also comprise VPN parameters configured by the user for each vBRAS-CP device. And each vBRAS-CP device records the VPN parameter, and the VPN parameter is used for establishing a VPN to which a loopback port of the tunnel belongs for the vBRAS-CP device configured by a user.
Further, before this step, the second vbrs-CP device sends a disaster recovery heartbeat message to the first vbrs-CP device through the disaster recovery heartbeat channel. The disaster recovery heartbeat message comprises VPN information to which the second vBRAS-CP device belongs.
It is to be understood that the VPN information to which the second vbrs-CP device belongs may also be, in the foregoing configuration instruction, the VPN to which the second vbrs-CP device configured by the user for the second vbrs-CP device belongs to the loopback port for establishing the tunnel.
The following description will take the source and destination IP addresses of the tunnel as the source and destination IP addresses of the disaster recovery heartbeat channel, and the VPN to which the VPN parameter is the vbars-CP device belongs as an example.
After receiving the disaster recovery heartbeat message sent by the second vBRAS-CP equipment, the first vBRAS-CP equipment acquires VPN information to which the second vBRAS-CP equipment belongs from the disaster recovery heartbeat message. The first vBRAS-CP device stores VPN information to which the second vBRAS-CP device belongs.
Furthermore, the second vbars-CP device expands the existing disaster recovery heartbeat message, so that the second vbars-CP device carries VPN information to which the second vbars-CP device belongs. For example, a TLV is extended in the existing disaster recovery heartbeat message. The TLV populates VPN information to which the second vbars-CP device belongs.
In fig. 2, the primary vbrs-CP device and the backup vbrs-CP device are respectively located in different DCs. Each DC has a gateway, e.g., GW1 for DC1, GW2 for DC 2. Fig. 2 further includes a Core Router (CR), a Web authentication server, and a radius server.
In the embodiment of the application, static routes are configured at the GW1 and the GW2, and routes respectively reaching the first vBRAS-CP device and the second vBRAS-CP device are issued into the network by the GW1 and the GW2 through the CR, so that the Web authentication server and the radius server store the routes reaching the first vBRAS-CP device and the second vBRAS-CP device. It will be appreciated that the route to the first vbrs-CP device is set to a high priority and the route to the second vbrs-CP device is set to a low priority to enable the first vbrs-CP device to handle user traffic.
In the step, the Web authentication server and the radius server send a user service message to the first vBRAS-CP device through the CR. The user service message includes a destination IP address.
And the first vBRAS-CP equipment receives the user service message.
In an example, the user service packet specifically includes a Web authentication request message sent by a Web authentication server, or a radius change authority packet (e.g., a DAE/COA packet) sent by a radius server, and the embodiment of the present application does not limit a specific type of the user service packet.
In the embodiment of the application, the first vBRAS-CP device is a primary vBRAS-CP device, and the second vBRAS-CP device is a standby vBRAS-CP device.
The primary and standby roles of the first and second vBRAS-CP devices can be determined by user configuration. If the user configures the first and second vBRAS-CP devices as the active vBRAS-CP device or the standby vBRAS-CP device, each vBRAS-CP device can compare the fixed information at the two ends of the disaster recovery heartbeat channel. For example, an IP address, a MAC address, and the like are further listed as the primary vbrs-CP device, and for example, the vbrs-CP device with the largest IP address is determined as the primary vbrs-CP device.
And step 120, when the destination IP address is the group IP address of the vbrs-CP device group and after the disaster recovery main and standby vbrs-CP devices are switched, encapsulating the user service packet to obtain an encapsulated user service packet.
Specifically, after receiving a user service message, the first vbrs-CP device acquires a destination IP address from the user service message. The first vbrs-CP device identifies whether the destination IP address is a group IP address of the vbrs-CP group of devices.
And if the destination IP address is the group IP address of the vBRAS-CP equipment group, the first vBRAS-CP equipment judges whether the switching of disaster-tolerant main and standby vBRAS-CP equipment occurs currently. If the disaster-tolerant primary and standby vBRAS-CP equipment is switched at present and is located after the disaster-tolerant primary and standby vBRAS-CP equipment is switched, the first vBRAS-CP equipment generates a redirection rule, and the redirection rule comprises a matching item and an action item.
In the embodiment of the application, whether the matching item, that is, the destination IP address is the group IP address of the vbrs-CP device group, and whether the disaster recovery primary and secondary vbrs-CP device switching is currently performed, is determined. And the action item is to encapsulate the user service message and forward the encapsulated user service message to the standby vBRAS-CP equipment through the tunnel port.
Of course, a redirection rule may also be understood as a routing policy. That is, the user service packet satisfying the destination IP address and the handover condition is forwarded to the next hop (i.e., the backup vbars-CP device) through the outgoing interface (i.e., the tunnel portal).
Further, the first vbrs-CP device performs encapsulation processing on the user service packet, and the specific process of obtaining the encapsulated user service packet is as follows: and the first vBRAS-CP equipment acquires the VPN information to which the second vBRAS-CP equipment belongs through the stored VPN information. The first vbars-CP device generates a tunnel header. The tunnel header comprises VPN information, and the VPN information is VPN information to which the second vBRAS-CP device belongs. And the first vBRAS-CP equipment adds the tunnel head part to the outer layer of the user service message to obtain the encapsulated user service message.
Further, the tunnel header further includes a source IP address and a destination IP address. The source IP address is the IP address of a first vBRAS-CP device at one end of the disaster recovery heartbeat channel, and the destination IP address is the IP address of a second vBRAS-CP device at the other end of the disaster recovery heartbeat channel.
It should be noted that, in an example, the condition for switching the disaster recovery primary and secondary vbrs-CP device may specifically include: and triggering switching when the primary vBRAS-CP equipment fails, or triggering switching when the connection failure rate between the primary vBRAS-CP equipment and a plurality of UP equipment managed by the primary vBRAS-CP equipment exceeds a failure threshold value.
Step 130, sending the encapsulated user service packet to the second vbrs-CP device through the tunnel between the second vbrs-CP device and the second vbrs-CP device, so that the second vbrs-CP device decapsulates the encapsulated user service packet, acquires the user service packet, and performs service processing on the user service packet.
Specifically, according to the description of step 120, since the disaster recovery primary and secondary vbrs-CP devices have been switched currently, at this time, the second vbrs-CP device is upgraded to the primary vbrs-CP device, and the first vbrs-CP device is downgraded to the secondary vbrs-CP device.
After the first vBRAS-CP device generates the encapsulated user service message, according to the redirection rule, the output interface for forwarding the user service message is acquired as the established tunnel interface between the first vBRAS-CP device and the second vBRAS-CP device, and the next hop is the second vBRAS-CP device.
And the first vBRAS-CP equipment sends the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the first vBRAS-CP equipment and the second vBRAS-CP equipment.
And after receiving the encapsulated user service message, the second vBRAS-CP equipment decapsulates the encapsulated user service message. And the second vBRAS-CP equipment acquires the user service message and acquires VPN information from the user service message.
And the second vBRAS-CP equipment carries out service processing on the user service message in the VPN corresponding to the VPN information. For example, if the user service message is a Web authentication request message, the second vbrs-CP device performs Web authentication on the user terminal; and if the user service message is a radius authority change message, the second vBRAS-CP equipment dynamically updates the radius authority.
Therefore, by applying the implementation method of the disaster recovery backup provided by the present application, the first vbrs-CP device receives the user service packet, and when the destination IP address included in the user service packet is the group IP address of the vbrs-CP device group, and after the disaster recovery primary and secondary vbrs-CP devices are switched, the first vbrs-CP device performs encapsulation processing on the user service packet, so as to obtain an encapsulated user service packet. And the first vBRAS-CP equipment sends the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the first vBRAS-CP equipment and the second vBRAS-CP equipment, so that the second vBRAS-CP equipment obtains the encapsulated user service message and performs service processing on the user service message after de-encapsulating the encapsulated user service message.
By establishing a reliable transmission tunnel between the first vBRAS-CP equipment and the second vBRAS-CP equipment, when a target IP address included in a user service message is a group IP address of a vBRAS-CP equipment group, and after disaster-tolerant main and standby vBRAS-CP equipment is switched, the first vBRAS-CP equipment forwards the encapsulated user service message to the second vBRAS-CP equipment through the established tunnel. Therefore, the problem that in the prior art, due to the fact that the priority level of the route of the primary vBRAS-CP device is high, even after the primary vBRAS-CP device switches services, the service message still reaches the primary vBRAS-CP device, and the service of a user is interrupted is solved. The uninterrupted user service is realized.
Based on the same inventive concept, the embodiment of the present application further provides an implementation apparatus of disaster recovery backup corresponding to the implementation method of disaster recovery backup. Referring to fig. 3, fig. 3 is a structural diagram of an implementation apparatus for disaster recovery backup provided in the embodiment of the present application, where the apparatus is applied to a first vbrs-CP device, the first vbrs-CP device is in a vbrs-CP device group, the vbrs-CP device group further includes a second vbrs-CP device, a tunnel has been established between the first vbrs-CP device and the second vbrs-CP device, and the apparatus includes:
a receiving unit 310, configured to receive a user service packet, where the user service packet includes a destination IP address;
an encapsulating unit 320, configured to, when the destination IP address is a group IP address of a vbrs-CP device group and after a disaster-tolerant primary/secondary vbrs-CP device is switched, encapsulate the user service packet, and obtain an encapsulated user service packet;
a sending unit 330, configured to send the encapsulated user service packet to the second vbrs-CP device through a tunnel between the second vbrs-CP device and the second vbrs-CP device, so that the second vbrs-CP device decapsulates the encapsulated user service packet, acquires the user service packet, and performs service processing on the user service packet.
Optionally, the encapsulating unit 320 is specifically configured to obtain VPN information to which the second vbrs-CP device belongs;
generating a tunnel head part, wherein the tunnel head part comprises VPN information, and the VPN information is VPN information to which the second vBRAS-CP device belongs;
and adding the tunnel head to the outer layer of the user service message to obtain the encapsulated user service message.
Optionally, the sending unit 330 is specifically configured to send the encapsulated user service packet to the second vbrs-CP device, so that after the second vbrs-CP device decapsulates the encapsulated user service packet, the second vbrs-CP device performs service processing on the user service packet in a VPN corresponding to VPN information to which the second vbrs-CP device belongs.
Optionally, a disaster recovery heartbeat channel is further included between the first vbrs-CP device and the second vbrs-CP device;
the receiving unit 310 is further configured to receive, through the disaster recovery heartbeat channel, a disaster recovery heartbeat packet sent by the second vbrs-CP device, where the disaster recovery heartbeat packet includes VPN information to which the second vbrs-CP device belongs;
the device further comprises: and the storage unit (not shown in the figure) is used for storing the VPN information of the second vBRAS-CP device.
Optionally, the tunnel header further includes a source IP address and a destination IP address;
the source IP address is the IP address of a first vBRAS-CP device at one end of the disaster recovery heartbeat channel, and the destination IP address is the IP address of a second vBRAS-CP device at the other end of the disaster recovery heartbeat channel.
Therefore, by applying the implementation device for disaster recovery backup provided by the application, the device receives the user service message, and when the destination IP address included in the user service message is the group IP address of the vbrs-CP device group, and after the disaster recovery main backup vbrs-CP device is switched, the device encapsulates the user service message to obtain the encapsulated user service message. And the device sends the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the device and the second vBRAS-CP equipment, so that the second vBRAS-CP equipment obtains and performs service processing on the user service message after decapsulating the encapsulated user service message.
By establishing a reliable transmission tunnel between the first vBRAS-CP equipment and the second vBRAS-CP equipment, when a target IP address included in a user service message is a group IP address of a vBRAS-CP equipment group and after disaster-tolerant main and standby vBRAS-CP equipment is switched, the device forwards the encapsulated user service message to the second vBRAS-CP equipment through the established tunnel. Therefore, the problem that in the prior art, due to the fact that the priority level of the route of the primary vBRAS-CP device is high, even after the primary vBRAS-CP device switches services, the service message still reaches the primary vBRAS-CP device, and the service of a user is interrupted is solved. The uninterrupted user service is realized.
Based on the same inventive concept, the embodiment of the present application further provides a network device, as shown in fig. 4, including a processor 410, a transceiver 420, and a machine-readable storage medium 430, where the machine-readable storage medium 430 stores machine-executable instructions capable of being executed by the processor 410, and the processor 410 is caused by the machine-executable instructions to perform the implementation method of disaster recovery backup provided by the embodiment of the present application. The apparatus for implementing disaster recovery backup shown in fig. 3 can be implemented by using a hardware structure of a network device shown in fig. 4.
The computer-readable storage medium 430 may include a Random Access Memory (RAM) or a Non-volatile Memory (NVM), such as at least one disk Memory. Alternatively, the computer-readable storage medium 430 may also be at least one memory device located remotely from the processor 410.
The Processor 410 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), etc.; the Integrated Circuit can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In the embodiment of the present application, the processor 410 reads the machine executable instructions stored in the machine readable storage medium 430, and the machine executable instructions cause the processor 410 itself and the transceiver 420 to perform the implementation method of the disaster recovery backup described in the embodiment of the present application.
In addition, the embodiment of the present application provides a machine-readable storage medium 430, where the machine-readable storage medium 430 stores machine executable instructions, and when the machine executable instructions are called and executed by the processor 410, the machine executable instructions cause the processor 410 itself and the calling transceiver 420 to perform the implementation method of disaster recovery backup described in the embodiment of the present application.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
As for the implementation apparatus of disaster recovery backup and the machine-readable storage medium embodiment, since the contents of the related methods are substantially similar to those of the foregoing method embodiments, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiments.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. A method for implementing disaster recovery backup is characterized in that the method is applied to a first vBRAS-CP device, the first vBRAS-CP device is in a vBRAS-CP device group, the vBRAS-CP device group further comprises a second vBRAS-CP device, a tunnel is established between the first vBRAS-CP device and the second vBRAS-CP device, and the method comprises the following steps:
receiving a user service message, wherein the user service message comprises a destination IP address;
when the target IP address is a group IP address of a vBRAS-CP device group and after disaster-tolerant main and standby vBRAS-CP devices are switched, encapsulating the user service message to obtain an encapsulated user service message;
and sending the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the second vBRAS-CP equipment and the second vBRAS-CP equipment, so that the second vBRAS-CP equipment obtains and performs service processing on the user service message after de-encapsulating the encapsulated user service message.
2. The method according to claim 1, wherein the encapsulating the user service packet to obtain an encapsulated user service packet specifically comprises:
acquiring VPN information to which the second vBRAS-CP equipment belongs;
generating a tunnel head part, wherein the tunnel head part comprises VPN information, and the VPN information is VPN information to which the second vBRAS-CP device belongs;
and adding the tunnel head to the outer layer of the user service message to obtain the encapsulated user service message.
3. The method according to claim 2, wherein the sending the encapsulated user service packet to the second vbrs-CP device specifically includes:
and sending the encapsulated user service message to the second vBRAS-CP equipment, so that the second vBRAS-CP equipment decapsulates the encapsulated user service message and performs service processing on the user service message in a VPN corresponding to VPN information to which the second vBRAS-CP equipment belongs.
4. The method of claim 2, further comprising a disaster recovery heartbeat channel between the first vbars-CP device and the second vbars-CP device;
before receiving the user service message, the method further includes:
receiving a disaster recovery heartbeat message sent by the second vBRAS-CP device through the disaster recovery heartbeat channel, wherein the disaster recovery heartbeat message comprises VPN information to which the second vBRAS-CP device belongs;
and storing the VPN information of the second vBRAS-CP equipment.
5. The method of claim 2, wherein the tunnel header further comprises a source IP address, a destination IP address;
the source IP address is the IP address of a first vBRAS-CP device at one end of the disaster recovery heartbeat channel, and the destination IP address is the IP address of a second vBRAS-CP device at the other end of the disaster recovery heartbeat channel;
or;
the method further comprises the following steps:
receiving a configuration instruction, wherein the configuration instruction comprises address information used for setting the tunnel source IP address or the destination IP address;
and configuring the address information as a source IP address or a destination IP address of the tunnel.
6. The device for implementing disaster recovery backup is characterized in that the device is applied to a first vbars-CP device, the first vbars-CP device is in a vbars-CP device group, the vbars-CP device group further includes a second vbars-CP device, and a tunnel is established between the first vbars-CP device and the second vbars-CP device, and the device includes:
a receiving unit, configured to receive a user service packet, where the user service packet includes a destination IP address;
the encapsulation unit is used for encapsulating the user service message to obtain an encapsulated user service message when the target IP address is the group IP address of the vBRAS-CP equipment group and after the disaster-tolerant main and standby vBRAS-CP equipment is switched;
and the sending unit is used for sending the encapsulated user service message to the second vBRAS-CP equipment through a tunnel between the sending unit and the second vBRAS-CP equipment, so that the second vBRAS-CP equipment obtains the encapsulated user service message and performs service processing on the user service message after de-encapsulating the encapsulated user service message.
7. The device according to claim 6, characterized in that the encapsulation unit is particularly adapted to,
acquiring VPN information to which the second vBRAS-CP equipment belongs;
generating a tunnel head part, wherein the tunnel head part comprises VPN information, and the VPN information is VPN information to which the second vBRAS-CP device belongs;
and adding the tunnel head to the outer layer of the user service message to obtain the encapsulated user service message.
8. The device according to claim 7, characterized in that the sending unit is specifically configured to,
and sending the encapsulated user service message to the second vBRAS-CP equipment, so that the second vBRAS-CP equipment decapsulates the encapsulated user service message and performs service processing on the user service message in a VPN corresponding to VPN information to which the second vBRAS-CP equipment belongs.
9. The apparatus of claim 7, further comprising a disaster recovery heartbeat channel between the first vbars-CP device and the second vbars-CP device;
the receiving unit is further configured to receive, through the disaster recovery heartbeat channel, a disaster recovery heartbeat message sent by the second vbrs-CP device, where the disaster recovery heartbeat message includes VPN information to which the second vbrs-CP device belongs;
the device further comprises: and the storage unit is used for storing the VPN information to which the second vBRAS-CP equipment belongs.
10. The apparatus of claim 7, wherein the tunnel header further comprises a source IP address, a destination IP address;
the source IP address is the IP address of a first vBRAS-CP device at one end of the disaster recovery heartbeat channel, and the destination IP address is the IP address of a second vBRAS-CP device at the other end of the disaster recovery heartbeat channel;
or,
the receiving unit is further configured to receive a configuration instruction, where the configuration instruction includes a plurality of address information for setting the tunnel source IP address and the destination IP address;
the device further comprises:
a configuration unit, configured to configure the plurality of address information as a source IP address and a destination IP address of the tunnel.
CN202011023227.XA 2020-09-25 2020-09-25 Method and device for realizing disaster recovery backup Active CN112367252B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011023227.XA CN112367252B (en) 2020-09-25 2020-09-25 Method and device for realizing disaster recovery backup

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011023227.XA CN112367252B (en) 2020-09-25 2020-09-25 Method and device for realizing disaster recovery backup

Publications (2)

Publication Number Publication Date
CN112367252A true CN112367252A (en) 2021-02-12
CN112367252B CN112367252B (en) 2022-05-27

Family

ID=74507441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011023227.XA Active CN112367252B (en) 2020-09-25 2020-09-25 Method and device for realizing disaster recovery backup

Country Status (1)

Country Link
CN (1) CN112367252B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691435A (en) * 2021-08-23 2021-11-23 新华三信息安全技术有限公司 Message processing method, system and device
CN114095342A (en) * 2021-10-21 2022-02-25 新华三大数据技术有限公司 Method and device for realizing backup
WO2023274164A1 (en) * 2021-06-28 2023-01-05 中兴通讯股份有限公司 Automatic main/standby switching method, control plane device, vbras system and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100172237A1 (en) * 2009-01-05 2010-07-08 Cisco Technology, Inc. Building backup tunnels for fast reroute in communications networks
CN103368806A (en) * 2012-03-26 2013-10-23 华为技术有限公司 Method and system for processing data flow and device
CN103684951A (en) * 2012-08-31 2014-03-26 中国移动通信集团公司 Ring network protection method and system
WO2015018069A1 (en) * 2013-08-09 2015-02-12 华为技术有限公司 Method, device and system for acquiring service by network terminal
CN104798342A (en) * 2014-11-17 2015-07-22 华为技术有限公司 Service migration method of data center, device and system thereof
CN105577417A (en) * 2014-11-06 2016-05-11 杭州华三通信技术有限公司 VXLAN (virtual extensible local area network)-based massage forwarding method and device
CN108512703A (en) * 2018-03-28 2018-09-07 新华三技术有限公司 BRAS turns backup method, device, equipment and the machine readable storage medium of control separation
CN108616431A (en) * 2018-04-20 2018-10-02 新华三技术有限公司 A kind of message processing method, device, equipment and machine readable storage medium
CN110430115A (en) * 2019-07-25 2019-11-08 新华三大数据技术有限公司 Service restoration method, system, the network equipment and computer readable storage medium
CN111130982A (en) * 2019-12-31 2020-05-08 迈普通信技术股份有限公司 Message forwarding method and device, gateway equipment and readable storage medium
CN111698142A (en) * 2020-05-26 2020-09-22 新华三信息安全技术有限公司 Message forwarding method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100172237A1 (en) * 2009-01-05 2010-07-08 Cisco Technology, Inc. Building backup tunnels for fast reroute in communications networks
CN103368806A (en) * 2012-03-26 2013-10-23 华为技术有限公司 Method and system for processing data flow and device
CN103684951A (en) * 2012-08-31 2014-03-26 中国移动通信集团公司 Ring network protection method and system
WO2015018069A1 (en) * 2013-08-09 2015-02-12 华为技术有限公司 Method, device and system for acquiring service by network terminal
CN105577417A (en) * 2014-11-06 2016-05-11 杭州华三通信技术有限公司 VXLAN (virtual extensible local area network)-based massage forwarding method and device
CN104798342A (en) * 2014-11-17 2015-07-22 华为技术有限公司 Service migration method of data center, device and system thereof
CN108512703A (en) * 2018-03-28 2018-09-07 新华三技术有限公司 BRAS turns backup method, device, equipment and the machine readable storage medium of control separation
CN108616431A (en) * 2018-04-20 2018-10-02 新华三技术有限公司 A kind of message processing method, device, equipment and machine readable storage medium
CN110430115A (en) * 2019-07-25 2019-11-08 新华三大数据技术有限公司 Service restoration method, system, the network equipment and computer readable storage medium
CN111130982A (en) * 2019-12-31 2020-05-08 迈普通信技术股份有限公司 Message forwarding method and device, gateway equipment and readable storage medium
CN111698142A (en) * 2020-05-26 2020-09-22 新华三信息安全技术有限公司 Message forwarding method and device, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023274164A1 (en) * 2021-06-28 2023-01-05 中兴通讯股份有限公司 Automatic main/standby switching method, control plane device, vbras system and storage medium
CN113691435A (en) * 2021-08-23 2021-11-23 新华三信息安全技术有限公司 Message processing method, system and device
CN114095342A (en) * 2021-10-21 2022-02-25 新华三大数据技术有限公司 Method and device for realizing backup
CN114095342B (en) * 2021-10-21 2023-12-26 新华三大数据技术有限公司 Backup realization method and device

Also Published As

Publication number Publication date
CN112367252B (en) 2022-05-27

Similar Documents

Publication Publication Date Title
CN112367252B (en) Method and device for realizing disaster recovery backup
CN107547366B (en) Message forwarding method and device
CN105657748B (en) Communication method and network equipment based on tunnel binding
US8908537B2 (en) Redundant network connections
CN109861913B (en) Method and device for advertising prefix identification of cross-interior gateway protocol
EP3675431B1 (en) Core isolation for logical tunnels stitching multi-homed evpn and l2 circuit
EP3641241A1 (en) Node protection for bum traffic for multi-homed node failure
US9438433B1 (en) Efficient multicast across multiple virtual local area network (VLANs)
CN107040441B (en) Cross-data-center data transmission method, device and system
KR102117434B1 (en) Method for improved handling of at least one communication exchange between a telecommunication network and at least one user equipment, telecommunication network, user equipment, systems, programs and computer program products
JP2016103724A (en) Relay system and switch device
CN112910704B (en) Local area network system, method and device supporting dynamic self-adaptive network configuration
US20230336467A1 (en) Standby access gateway function signaling for a dynamic host configuration protocol
CN107682261B (en) Flow forwarding method and device
US10511544B2 (en) Path computation element protocol response and simple network management protocol confirmation for tunnel configuration
CN108833272A (en) A kind of route management method and device
US10887207B2 (en) System and method for determining branch gateway device availability in computer networks
WO2022088931A1 (en) Information processing method and apparatus, broadband access server, and storage medium
WO2021093863A1 (en) Information processing method and apparatus, and computer-readable storage medium
US10251105B2 (en) Dynamic mobility management system
CN108616908B (en) Network system and data transmission method based on network system
CN112737946A (en) Route advertisement method, device, storage medium and system for IPv6 network
US20240129151A1 (en) Multicast local breakout for customer premise equipment in a 5g wireless wireline convergence at an access gateway function
US20240129974A1 (en) Local breakout for customer premise equipment in a 5g wireless wireline convergence at an access gateway function
US12015544B1 (en) Backup route for network devices in multihoming configuration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant