CN113794583A - Configuration method and device - Google Patents

Configuration method and device Download PDF

Info

Publication number
CN113794583A
CN113794583A CN202110933796.6A CN202110933796A CN113794583A CN 113794583 A CN113794583 A CN 113794583A CN 202110933796 A CN202110933796 A CN 202110933796A CN 113794583 A CN113794583 A CN 113794583A
Authority
CN
China
Prior art keywords
configuration request
configuration
request
type
service module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110933796.6A
Other languages
Chinese (zh)
Other versions
CN113794583B (en
Inventor
熊志欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Security Technologies Co Ltd
Original Assignee
New H3C Security Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Security Technologies Co Ltd filed Critical New H3C Security Technologies Co Ltd
Priority to CN202110933796.6A priority Critical patent/CN113794583B/en
Publication of CN113794583A publication Critical patent/CN113794583A/en
Application granted granted Critical
Publication of CN113794583B publication Critical patent/CN113794583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0846Configuration by using pre-existing information, e.g. using templates or copying from other elements based on copy from other elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a configuration method and a configuration device, wherein the method is applied to network equipment and comprises the following steps: receiving at least one configuration request sent by a controller, wherein each configuration request in the at least one configuration request comprises a type identifier; when each type identification indicates that the corresponding configuration request is of a first type, verifying the at least one configuration request respectively; and if the at least one configuration request passes the verification processing, respectively sending each configuration request in the at least one configuration request to a corresponding service module so that the service module issues the configuration according to the configuration request.

Description

Configuration method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a configuration method and apparatus.
Background
At present, managing and configuring network devices can be realized in two ways, one is a command line way; the other is a UI-based Netconf approach. The mode of the command line is as follows: the administrator can directly input the command line to complete the configuration of the network equipment; mode of Netconf: and according to the Netconf protocol, sending the configured content to the network equipment in an XML data format, and after the network equipment passes the verification of the configured content, sending the configured content to the service module.
With the development of technology, more and more scenes are provided for configuring network devices by using Netconf operation, and higher requirements are provided for accuracy, efficiency and performance of Netconf processing.
As shown in fig. 1, fig. 1 is a schematic diagram of a process in which a conventional controller issues a Netconf configuration request to a network device. In fig. 1, the controller generates and sends a Netconf configuration request to the network device. The Netconf configuration request is in xml format. After receiving the Netconf configuration request, the network device first parses the Netconf configuration request in xml format. Then, the network device performs format conversion on the Netconf configuration request in the xml format to generate a configuration request which can be identified by the service module. And the network equipment sends the configuration request after the format conversion to a corresponding service module.
And after receiving the configuration request, the service module checks the configuration request. If the configuration is correct, the configuration is issued and the configuration is effective. If the configuration is wrong, the configuration is failed, and meanwhile, a corresponding processing process is triggered according to an error option (< error-option >).
In the Netconf protocol, an error option (< error-option >) is specified, and the error option specifies three error processing flows of "rollback-on-error", "stop-on-error", "continue-on-error", and the like.
rollback-on-error: specifying this option, the system collects the current configuration and generates a temporary configuration file. And when the Netconf configuration has an error, triggering the full configuration rollback according to the content of the temporary configuration file, and restoring the configuration to the prior configuration.
stop-on-error, continue-on-error: specifying both of these options, the current configuration is typically stored in a table within the Netconf framework to ensure configuration integrity. And issuing a get-config instruction and recording the current configuration in the table before issuing the edge-config instruction. And if the Netconf configuration fails, the current configuration is covered by the result obtained by get-config.
The above error options also cause the following drawbacks: 1) in the rollback-on-error mode, acquiring a temporary configuration file and configuring rollback consume a large amount of system resources, and especially the larger the configuration file is, the more obvious the performance and other functions of the network device are affected; 2) in the stop-on-error and continue-on-error modes, the current configuration in the table needs to be acquired, and when the Netconf configuration fails, the current configuration is covered.
Disclosure of Invention
In view of this, the present application provides a configuration method and apparatus, so as to solve the problems that when the Netconf configuration has an error, the existing several error option modes all consume network device resources and have an influence on the configuration of the network device in current operation.
In a first aspect, the present application provides a configuration method, which is applied to a network device, and includes:
receiving at least one configuration request sent by a controller, wherein each configuration request in the at least one configuration request comprises a type identifier;
when each type identification indicates that the corresponding configuration request is of a first type, verifying the at least one configuration request respectively;
and if the at least one configuration request passes the verification processing, respectively sending each configuration request in the at least one configuration request to a corresponding service module so that the service module issues the configuration according to the configuration request.
In a second aspect, the present application provides a configuration apparatus, which is applied to a network device, and includes:
a receiving unit, configured to receive at least one configuration request sent by a controller, where each configuration request in the at least one configuration request includes a type identifier;
the processing unit is used for respectively verifying the at least one configuration request when each type identifier indicates that the corresponding configuration request is of a first type;
and the sending unit is used for sending each configuration request in the at least one configuration request to the corresponding service module respectively if the at least one configuration request passes the verification processing, so that the service module issues the configuration according to the configuration request.
In a third aspect, the present application provides a network device comprising a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor, the processor being caused by the machine-executable instructions to perform the method provided by the first aspect of the present application.
Therefore, by applying the configuration method and the configuration device provided by the application, the network device receives at least one configuration request sent by the controller, wherein each configuration request in the at least one configuration request comprises a type identifier; when each type identification indicates that the corresponding configuration request is of a first type, the network equipment respectively checks at least one configuration request; if the at least one configuration request passes the verification processing, the network device sends each configuration request in the at least one configuration request to the corresponding service module respectively, so that the service module issues the configuration according to the configuration request.
Thus, the configuration verification is separated from the configuration issuing, and the configuration verification does not influence the execution of the current service; when at least one configuration request passes the configuration verification, the configuration request is issued to the service module, the operations of configuration rollback and rollback are avoided, and the consumption of the network equipment performance triggered by configuration errors is reduced. The actual configuration is not influenced in the configuration verification process, the service is not influenced, and meanwhile, the implementation cost is low.
Drawings
Fig. 1 is a schematic diagram of a process in which a conventional controller issues a Netconf configuration request to a network device;
fig. 2 is a flowchart of a configuration method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a process in which a controller issues a Netconf configuration request to a network device according to an embodiment of the present application;
fig. 4 is a structural diagram of a configuration device according to an embodiment of the present application;
fig. 5 is a hardware structure of a network device according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the corresponding listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The following describes the configuration method provided in the embodiments of the present application in detail. Referring to fig. 2, fig. 2 is a flowchart of a configuration method provided in an embodiment of the present application. The method is applied to a network device, and the configuration method provided by the embodiment of the application can comprise the following steps.
Step 210, receiving at least one configuration request sent by a controller, where each configuration request in the at least one configuration request includes a type identifier.
Specifically, the network device includes a configuration check (configuration check) module, which is configured to perform a verification process on the configuration request. The verification process may specifically be to perform parameter boundary verification, validity verification, conflict verification, and the like on the configuration request.
In this embodiment of the application, as shown in fig. 3, fig. 3 is a schematic diagram of a process in which a controller issues a Netconf configuration request to a network device according to this embodiment of the application.
In fig. 3, the controller pre-configures the network device for multiple services. The controller generates at least one Netconf configuration request. The format of each Netconf configuration request in the at least one Netconf configuration request is xml format, and each Netconf configuration request comprises type identification.
The controller sends at least one Netconf configuration request to the network device.
After receiving at least one Netconf configuration request, the network device firstly analyzes each Netconf configuration request in an xml format, and acquires a type identifier from each Netconf configuration request. The network equipment performs format conversion on each Netconf configuration request in the xml format to generate a configuration request which can be identified by the service module, wherein the configuration request comprises a type identifier.
The network device transmits at least one configuration request to the configuration checking module. After receiving at least one configuration request, the configuration checking module obtains the type identifier from each configuration request.
Step 220, when each type identifier indicates that the corresponding configuration request is of the first type, respectively performing verification processing on the at least one configuration request.
Specifically, according to the description in step 210, after obtaining the type identifier included in each configuration request, the configuration checking module identifies the type identifier included in each configuration request.
And when the type identification indicates that the corresponding configuration request is of the first type, the configuration checking module checks the allocation of at least one configuration request.
Further, the verifying at least one allocation request by the configuration checking module specifically comprises: the configuration checking module carries out parameter boundary check, validity check and conflict check on each configuration request in at least one configuration request respectively. The conflict check includes conflict check of configuration information, service conflict check, and the like.
Storing the conflict file of the service module configuration in the configuration checking module, wherein the conflict file of the service module configuration records the configuration information of conflicts among different service modules or among the same service modules. And when the configuration checking module performs conflict checking, the conflict checking is realized by reading the conflict file configured by the service module.
Further, the first type is specifically a create configuration request, or a modify configuration request, or an update configuration request.
Step 230, if the at least one configuration request passes the verification processing, sending each configuration request in the at least one configuration request to a corresponding service module, so that the service module issues the configuration according to the configuration request.
Specifically, according to the description in step 220, after the configuration checking module performs the verification processing on each configuration request, if each configuration request passes the verification processing, the configuration checking module sends each configuration request to the corresponding service module.
And the service module issues configuration according to the configuration request.
In the embodiment of the application, the configuration checking module organizes the checking functions of the existing service module on the configuration message together to realize the checking processing on the configuration message. And each service module strips the checking function and only reserves the configuration function.
The configuration check module provides an interface that can be called in the Netconf protocol and also under the commit view of the command line. For example, a check command line is added under the commit view. Commit configuration can only be done after the check is performed. And adding a check column in the Netconf protocol, checking the configuration request after the check column is appointed, and performing commit configuration after the check is passed. And after submitting at least one configuration request in the commit configuration, the configuration checking module respectively sends each configuration request to the corresponding service module.
Therefore, by applying the configuration method and the configuration device provided by the application, the network device receives at least one configuration request sent by the controller, wherein each configuration request in the at least one configuration request comprises a type identifier; when each type identification indicates that the corresponding configuration request is of a first type, the network equipment respectively checks at least one configuration request; if the at least one configuration request passes the verification processing, the network device sends each configuration request in the at least one configuration request to the corresponding service module respectively, so that the service module issues the configuration according to the configuration request.
Thus, the configuration verification is separated from the configuration issuing, and the configuration verification does not influence the execution of the current service; when at least one configuration request passes the configuration verification, the configuration request is issued to the service module, the operations of configuration rollback and rollback are avoided, and the consumption of the network equipment performance triggered by configuration errors is reduced. The actual configuration is not influenced in the configuration verification process, the service is not influenced, and meanwhile, the implementation cost is low.
Optionally, in this embodiment of the present application, the method further includes a process of processing, by the configuration checking module, the configuration request of the second type when the configuration request is of the second type.
Specifically, according to the description in step 210, after obtaining the type identifier included in each configuration request, the configuration checking module identifies the type identifier included in each configuration request.
When the type identifier indicates that the corresponding configuration request is of the second type, the configuration checking module sends each configuration request of the at least one configuration request to the corresponding service module respectively.
And the service module issues configuration according to the configuration request.
Further, the second type is specifically to query the configuration request, or delete the configuration request, or remove the configuration request.
Optionally, in this embodiment of the application, the method further includes a process that the configuration checking module processes the configuration request when the configuration request that fails the verification processing exists in the at least one configuration request.
Specifically, according to the description in step 220, after the configuration checking module checks each configuration request, if at least one configuration request has a configuration request that fails the check processing, the configuration checking module sends a notification message to the controller, where the notification message includes a type identifier of the configuration request that fails the check processing, so that the controller determines to issue a failed configuration request according to the type identifier.
The configuration checking module terminates the configuration operation of the at least one configuration request.
Based on the same inventive concept, the embodiment of the application also provides a configuration device corresponding to the configuration method. Referring to fig. 4, fig. 4 is a structural diagram of a configuration apparatus according to an embodiment of the present application. The device is applied to network equipment, and comprises:
a receiving unit 410, configured to receive at least one configuration request sent by a controller, where each configuration request in the at least one configuration request includes a type identifier;
a processing unit 420, configured to, when each type identifier indicates that the corresponding configuration request is of the first type, perform check processing on the at least one configuration request respectively;
a sending unit 430, configured to send each configuration request of the at least one configuration request to a corresponding service module if the at least one configuration request passes the verification processing, so that the service module issues the configuration according to the configuration request.
Optionally, the sending unit 430 is further configured to, when each type identifier indicates that the corresponding configuration request is of the second type, send each configuration request of the at least one configuration request to the corresponding service module, so that the service module issues the configuration according to the configuration request.
Optionally, the sending unit 430 is further configured to send a notification message to the controller if there is a configuration request that fails the verification processing in the at least one configuration request, where the notification message includes a type identifier of the configuration request that fails the verification processing, so that the controller determines to issue a configuration request that fails according to the type identifier;
the device further comprises: a terminating unit (not shown in the figure) for terminating the configuration operation of the at least one configuration request.
Optionally, the processing unit 420 is specifically configured to perform parameter boundary checking, validity checking, and collision checking on the at least one configuration request respectively.
Optionally, the first type is specifically a request for creating a configuration, a request for modifying a configuration, or a request for updating a configuration;
the second type is specifically a query configuration request, or a delete configuration request, or a remove configuration request.
Therefore, by applying the configuration apparatus provided in the present application, the network device receives at least one configuration request sent by the controller, where each configuration request in the at least one configuration request includes a type identifier; when each type identification indicates that the corresponding configuration request is of a first type, the network equipment respectively checks at least one configuration request; if the at least one configuration request passes the verification processing, the network device sends each configuration request in the at least one configuration request to the corresponding service module respectively, so that the service module issues the configuration according to the configuration request.
Thus, the configuration verification is separated from the configuration issuing, and the configuration verification does not influence the execution of the current service; when at least one configuration request passes the configuration verification, the configuration request is issued to the service module, the operations of configuration rollback and rollback are avoided, and the consumption of the network equipment performance triggered by configuration errors is reduced. The actual configuration is not influenced in the configuration verification process, the service is not influenced, and meanwhile, the implementation cost is low.
Based on the same inventive concept, the embodiment of the present application further provides a network device, as shown in fig. 5, including a processor 510, a transceiver 520, and a machine-readable storage medium 530, where the machine-readable storage medium 530 stores machine-executable instructions capable of being executed by the processor 510, and the processor 510 is caused by the machine-executable instructions to perform the configuration method provided by the embodiment of the present application. The communication apparatus shown in fig. 4 can be implemented by using the hardware structure of the network device shown in fig. 5.
The machine-readable storage medium 530 may include a Random Access Memory (RAM) or a Non-volatile Memory (NVM), such as at least one disk Memory. Optionally, the computer-readable storage medium 330 may also be at least one memory device located remotely from the processor 510.
The Processor 510 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In the embodiment of the present application, the processor 510 is caused by machine executable instructions, which are read from the machine readable storage medium 530, to implement the processor 510 itself and invoke the transceiver 520 to perform the configuration method described in the embodiment of the present application.
Additionally, the present application provides a machine-readable storage medium 530, the machine-readable storage medium 530 storing machine-executable instructions, which when invoked and executed by the processor 510, cause the processor 510 itself and the invoking transceiver 520 to perform the configuration methods described in the present application embodiments.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
For the configuration device and the machine-readable storage medium embodiment, since the contents of the related method are substantially similar to those of the foregoing method embodiment, the description is relatively simple, and for the relevant points, reference may be made to part of the description of the method embodiment.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. A configuration method is applied to a network device, and comprises the following steps:
receiving at least one configuration request sent by a controller, wherein each configuration request in the at least one configuration request comprises a type identifier;
when each type identification indicates that the corresponding configuration request is of a first type, verifying the at least one configuration request respectively;
and if the at least one configuration request passes the verification processing, respectively sending each configuration request in the at least one configuration request to a corresponding service module so that the service module issues the configuration according to the configuration request.
2. The method of claim 1, further comprising:
and when each type identifier indicates that the corresponding configuration request is of the second type, each configuration request in the at least one configuration request is respectively sent to the corresponding service module, so that the service module issues the configuration according to the configuration request.
3. The method of claim 1, further comprising:
if the configuration request which does not pass the verification processing exists in the at least one configuration request, sending a notification message to the controller, wherein the notification message comprises a type identifier of the configuration request which does not pass the verification processing, so that the controller determines to issue the failed configuration request according to the type identifier;
terminating the configuration operation of the at least one configuration request.
4. The method according to claim 1, wherein the respectively verifying the at least one configuration request specifically includes:
and respectively carrying out parameter boundary check, validity check and conflict check on the at least one configuration request.
5. The method according to claim 2, wherein the first type is specifically a create configuration request, or a modify configuration request, or an update configuration request;
the second type is specifically a query configuration request, or a delete configuration request, or a remove configuration request.
6. A configuration apparatus, wherein the apparatus is applied to a network device, the apparatus comprising:
a receiving unit, configured to receive at least one configuration request sent by a controller, where each configuration request in the at least one configuration request includes a type identifier;
the processing unit is used for respectively verifying the at least one configuration request when each type identifier indicates that the corresponding configuration request is of a first type;
and the sending unit is used for sending each configuration request in the at least one configuration request to the corresponding service module respectively if the at least one configuration request passes the verification processing, so that the service module issues the configuration according to the configuration request.
7. The apparatus according to claim 6, wherein the sending unit is further configured to, when each type identifier indicates that the corresponding configuration request is of the second type, send each configuration request of the at least one configuration request to the corresponding service module, respectively, so that the service module issues the configuration according to the configuration request.
8. The apparatus according to claim 6, wherein the sending unit is further configured to send a notification message to the controller if there is a configuration request that fails the checking process in the at least one configuration request, where the notification message includes a type identifier of the configuration request that fails the checking process, so that the controller determines to issue the failed configuration request according to the type identifier;
the device further comprises: a terminating unit, configured to terminate the configuration operation of the at least one configuration request.
9. The apparatus according to claim 6, wherein the processing unit is specifically configured to perform a parameter boundary check, a validity check, and a collision check on the at least one configuration request, respectively.
10. The apparatus according to claim 7, wherein the first type is specifically a create configuration request, or a modify configuration request, or an update configuration request;
the second type is specifically a query configuration request, or a delete configuration request, or a remove configuration request.
CN202110933796.6A 2021-08-15 2021-08-15 Configuration method and device Active CN113794583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110933796.6A CN113794583B (en) 2021-08-15 2021-08-15 Configuration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110933796.6A CN113794583B (en) 2021-08-15 2021-08-15 Configuration method and device

Publications (2)

Publication Number Publication Date
CN113794583A true CN113794583A (en) 2021-12-14
CN113794583B CN113794583B (en) 2023-12-29

Family

ID=79181829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110933796.6A Active CN113794583B (en) 2021-08-15 2021-08-15 Configuration method and device

Country Status (1)

Country Link
CN (1) CN113794583B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125276A (en) * 2014-07-21 2014-10-29 中兴通讯股份有限公司 Upgrading method and device
CN105591819A (en) * 2015-12-24 2016-05-18 杭州华三通信技术有限公司 Method and device of configuring network equipment
CN107633016A (en) * 2017-08-23 2018-01-26 阿里巴巴集团控股有限公司 Data processing method and device and electronic equipment
CN107888434A (en) * 2017-12-29 2018-04-06 杭州迪普科技股份有限公司 Network equipments configuration synchronous method and device
WO2019037775A1 (en) * 2017-08-24 2019-02-28 新华三信息安全技术有限公司 Issuance of service configuration file
CN109428752A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 Method of calibration and device
CN109636317A (en) * 2018-11-23 2019-04-16 山东中创软件工程股份有限公司 Service control method, device, system and storage medium
WO2019120160A1 (en) * 2017-12-18 2019-06-27 华为技术有限公司 Method and device for data storage, and distributed storage system
CN111082953A (en) * 2018-10-19 2020-04-28 华为技术有限公司 Configuration method, device and related equipment
CN111770211A (en) * 2020-06-17 2020-10-13 北京百度网讯科技有限公司 SNAT method, SNAT device, electronic equipment and storage medium
CN112615727A (en) * 2020-11-16 2021-04-06 新华三技术有限公司 Method and device for acquiring default configuration of equipment
CN112636973A (en) * 2020-12-22 2021-04-09 南方电网深圳数字电网研究院有限公司 NETCONF protocol-based automatic cloud network fusion method
CN113141390A (en) * 2021-03-11 2021-07-20 新华三技术有限公司合肥分公司 Netconf channel management method and device
CN113179266A (en) * 2021-04-26 2021-07-27 口碑(上海)信息技术有限公司 Service request processing method and device, electronic equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125276A (en) * 2014-07-21 2014-10-29 中兴通讯股份有限公司 Upgrading method and device
CN105591819A (en) * 2015-12-24 2016-05-18 杭州华三通信技术有限公司 Method and device of configuring network equipment
CN107633016A (en) * 2017-08-23 2018-01-26 阿里巴巴集团控股有限公司 Data processing method and device and electronic equipment
WO2019037775A1 (en) * 2017-08-24 2019-02-28 新华三信息安全技术有限公司 Issuance of service configuration file
CN109428752A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 Method of calibration and device
WO2019120160A1 (en) * 2017-12-18 2019-06-27 华为技术有限公司 Method and device for data storage, and distributed storage system
CN107888434A (en) * 2017-12-29 2018-04-06 杭州迪普科技股份有限公司 Network equipments configuration synchronous method and device
CN111082953A (en) * 2018-10-19 2020-04-28 华为技术有限公司 Configuration method, device and related equipment
CN109636317A (en) * 2018-11-23 2019-04-16 山东中创软件工程股份有限公司 Service control method, device, system and storage medium
CN111770211A (en) * 2020-06-17 2020-10-13 北京百度网讯科技有限公司 SNAT method, SNAT device, electronic equipment and storage medium
CN112615727A (en) * 2020-11-16 2021-04-06 新华三技术有限公司 Method and device for acquiring default configuration of equipment
CN112636973A (en) * 2020-12-22 2021-04-09 南方电网深圳数字电网研究院有限公司 NETCONF protocol-based automatic cloud network fusion method
CN113141390A (en) * 2021-03-11 2021-07-20 新华三技术有限公司合肥分公司 Netconf channel management method and device
CN113179266A (en) * 2021-04-26 2021-07-27 口碑(上海)信息技术有限公司 Service request processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113794583B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
CN107608689B (en) Method and device for updating application program on client and electronic equipment
WO2017152633A1 (en) Port binding implementation method and device
CN110311831B (en) Container cloud-based system resource monitoring method and related equipment
CN111130825B (en) Network slice template generation method, device, equipment and storage medium
CN103647820B (en) Referee method and arbitration device for distributed cluster system
US9680930B2 (en) Data communication system for a storage management system and communication method thereof
CN107241315B (en) Access method and device of bank gateway interface and computer readable storage medium
US20210342178A1 (en) Method and device for instantiating virtualized network function
US20180191580A1 (en) Method and apparatus for on-boarding network service descriptor
CN105119736A (en) Data check method and device in network function virtualization architecture
EP3557445A1 (en) Transaction processing method and apparatus
CN110209529A (en) The guard method of radio frequency parameter and electronic equipment
EP3128715B1 (en) Resource creation method and apparatus
WO2016197688A1 (en) Data collection method and device
CN113794583A (en) Configuration method and device
CN112130900B (en) User information management method, system, equipment and medium for BMC
CN106708541A (en) Version upgrading processing method and apparatus
CN112099879B (en) Configuration information management method and device, computer equipment and storage medium
CN114036218A (en) Data model switching method and device, server and storage medium
CN112738181A (en) Method, device and server for cluster external IP access
CN113132152B (en) Method and device for generating Netconf real-time candidate database
CN112702735A (en) Registration information service method, equipment and computer readable storage medium
CN112737872B (en) ARINC664P7 end system cross-network testing system and method
WO2022247422A1 (en) Resource queue management interface verification method, electronic device, and storage medium
CN115827081A (en) Data operation method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant