CN117896350A - Address conflict detection method, device, equipment and computer readable storage medium - Google Patents

Address conflict detection method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN117896350A
CN117896350A CN202311762525.4A CN202311762525A CN117896350A CN 117896350 A CN117896350 A CN 117896350A CN 202311762525 A CN202311762525 A CN 202311762525A CN 117896350 A CN117896350 A CN 117896350A
Authority
CN
China
Prior art keywords
address
source
target
processor
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311762525.4A
Other languages
Chinese (zh)
Inventor
苏南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Rapid Innovation Technology Co ltd
Original Assignee
Shenzhen Rapid Innovation Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Rapid Innovation Technology Co ltd filed Critical Shenzhen Rapid Innovation Technology Co ltd
Priority to CN202311762525.4A priority Critical patent/CN117896350A/en
Publication of CN117896350A publication Critical patent/CN117896350A/en
Pending legal-status Critical Current

Links

Abstract

The application provides an address conflict detection method, an address conflict detection device and a computer readable storage medium, and relates to the technical field of communication, wherein the address conflict detection method comprises the steps that when detecting that a terminal device is accessed to a network device, an access control list on a target port accessed by the terminal device is configured, and the access control list is used for indicating a processor for redirecting a message received by the target port to the network device; under the condition that the processor receives the target message, matching the source address information in the target message with the learned address record; the target message is a message from a target port, and the source address information comprises a source IP address and/or a source MAC address; if the source address information is matched in the address record, the existence of address conflict is determined. The technical scheme provided by the application can realize address conflict detection before the terminal equipment is accessed into the local area network, so that the stability of the network can be improved.

Description

Address conflict detection method, device, equipment and computer readable storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a computer readable storage medium for detecting address collision.
Background
With the increasing development of network technology, most electronic devices currently have networking capability, and each electronic device has a Media Access control address (Media Access ControlAddress, MAC address) and an Internet protocol address (Internet ProtocolAddress, IP address) in an Access local area network.
Because of the large number of devices in the lan, if there is a conflict between the newly accessed terminal device and the MAC address and IP address of the existing device in the lan, the network may be paralyzed or some devices may not be used.
In the related art, in order to reduce address collision, network addresses within a local area network are typically monitored and managed by means of a network management tool. However, this approach has some hysteresis and thus network stability is low.
Disclosure of Invention
In view of the foregoing, the present application provides a method, apparatus, device and computer readable storage medium for address collision detection before a terminal device accesses a local area network, so as to improve the stability of the network.
In order to achieve the above object, in a first aspect, an embodiment of the present application provides an address conflict detection method, applied to a network device, where the method includes:
when detecting that the terminal equipment is accessed to the network equipment, configuring an access control list on a target port accessed by the terminal equipment, wherein the access control list is used for indicating a processor for redirecting a message received by the target port to the network equipment;
under the condition that the processor receives a target message, matching source address information in the target message with the learned address record; the target message is a message from the target port, and the source address information comprises a source IP address and/or a source MAC address;
if the source address information is matched in the address record, determining that address conflict exists.
In a possible implementation manner of the first aspect, it is determined that an address conflict exists in case of a match to the source IP address or to the source MAC address in the address record.
In a possible implementation manner of the first aspect, if the processor does not receive the target message within the target duration, sending an ARP request through the target port, where the ARP request is used to request MAC addresses of all IP addresses in the address record;
and if the processor receives an ARP response sent by the terminal equipment, determining that address conflict exists, wherein the ARP response is used for responding to the ARP request.
In a possible implementation manner of the first aspect, the sending, by the destination port, an ARP request includes:
and sequentially sending ARP requests corresponding to each IP address in the address record by taking the target port as an outlet port, wherein the ARP request corresponding to each IP address is used for requesting the MAC address corresponding to the IP address.
In a possible implementation manner of the first aspect, the method further includes:
and if the processor does not receive the ARP response sent by the terminal equipment, determining that no address conflict exists.
In a possible implementation manner of the first aspect, the method further includes:
and under the condition that no address conflict exists, updating an access control list configured on the target port to cancel redirection of the message received by the target port to a processor of the network equipment.
In a possible implementation manner of the first aspect, the method further includes: and under the condition that the address conflict exists, isolating the target port, and generating an alarm notification, wherein the alarm notification comprises source address information of the terminal equipment with the address conflict.
In a second aspect, an embodiment of the present application provides an address collision detection apparatus, including:
the configuration module is used for configuring an access control list on a target port accessed by the terminal equipment when the terminal equipment is detected to be accessed to the network equipment, wherein the access control list is used for indicating a processor for redirecting a message received by the target port to the network equipment;
the matching module is used for matching the source address information in the target message with the learned address record under the condition that the processor receives the target message; the target message is a message from the target port, and the source address information comprises a source IP address and/or a source MAC address;
and the determining module is used for determining that address conflict exists if the source address information is matched in the address record.
In a possible implementation manner of the second aspect, it is determined that there is an address conflict in case of a match to the source IP address or to the source MAC address in the address record.
In a possible implementation manner of the second aspect, the apparatus further includes: a communication module;
the communication module is used for sending an ARP request through the target port if the processor does not receive the target message within the target duration, wherein the ARP request is used for requesting the MAC addresses of all IP addresses in the address record;
the determining module is further configured to determine that there is an address conflict if the processor receives an ARP response sent by the terminal device, where the ARP response is used to respond to the ARP request.
In a possible implementation manner of the second aspect, the sending, by the destination port, an ARP request includes:
and sequentially sending ARP requests corresponding to each IP address in the address record by taking the target port as an outlet port, wherein the ARP request corresponding to each IP address is used for requesting the MAC address corresponding to the IP address.
In a possible implementation manner of the second aspect, the determining module is further configured to determine that there is no address conflict if the processor does not receive the ARP response sent by the terminal device.
In a possible implementation manner of the second aspect, the configuration module is further configured to update, in a case where it is determined that there is no address conflict, an access control list configured on the target port to cancel redirecting the packet received by the target port to the processor of the network device.
In a possible implementation manner of the second aspect, the apparatus further includes an alarm module;
the configuration module is further used for isolating the target port under the condition that address conflict exists;
the alarm module is used for generating an alarm notification, wherein the alarm notification comprises source address information of terminal equipment with address conflict.
In a third aspect, an embodiment of the present application provides an address conflict detection apparatus, including: a memory and a processor, the memory for storing a computer program; the processor is configured to perform the method of the first aspect or any implementation of the first aspect when the computer program is invoked.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of the first aspect or any implementation of the first aspect.
The address conflict detection method includes configuring an access control list on a target port accessed by terminal equipment when the terminal equipment is detected to be accessed to network equipment, wherein the access control list is used for indicating a processor for redirecting a message received by the target port to the network equipment; under the condition that the processor receives the target message, matching the source address information in the target message with the learned address record; the target message is a message from a target port, and the source address information comprises a source IP address and/or a source MAC address; if the source address information is matched in the address record, the existence of address conflict is determined. The technical scheme provided by the application can realize address conflict detection before the terminal equipment is accessed into the local area network, so that the situation of address conflict can be reduced, and the stability of the network can be improved.
Drawings
Fig. 1 is a flow chart of an address conflict detection method provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of an address conflict detection apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an address conflict detection apparatus according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the accompanying drawings in the embodiments of the present application. The terminology used in the description of the embodiments of the application is for the purpose of describing particular embodiments of the application only and is not intended to be limiting of the application. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
With the development of the internet and information technology, the network environment, especially the enterprise network, is more and more complicated, address conflict often occurs, especially the IP address conflict is more frequent, so that the network stability is lower, and the normal use of users is affected.
In view of this, the embodiment of the application provides an address conflict detection method, which is applied to a network device, and can realize address conflict detection on an electronic device before the electronic device accesses a local area network, so that the newly accessed electronic device cannot influence the normal operation of the existing device in the local area network, thereby reducing the occurrence of address conflict situations and improving the stability of the network.
The electronic device may be a device having networking capability, and the type of the electronic device is not particularly limited in this application. The network device may be a device such as an access switch and a convergence switch that may provide network access services for the electronic device. For convenience of description, the embodiment of the application takes an electronic device as an example of a terminal device, and performs an exemplary description.
Fig. 1 is a flow chart of an address conflict detection method provided in an embodiment of the present application, as shown in fig. 1, the method may include the following steps:
step S110, when the terminal equipment is detected to be accessed to the network equipment, an access control list on a target port accessed by the terminal equipment is configured.
For ease of description, the following uses existing devices to denote devices that have been connected to a local area network through a network device before a terminal device has been connected to the network device, and the device types of the existing devices may include, but are not limited to, the terminal device. For example, the existing device a has access to a network device and through the network device to a local area network.
The network device may identify whether a new terminal device is accessed through the monitoring port. For example, the network device may determine to access the network device for a new terminal device upon detecting that the port state switches from an off state (DOWN) to an on state (UP).
After the terminal device accesses the network device, the network device and the existing device are in the same virtual local area network (VirtualArea Network, VLAN), or called broadcast domain, in order to reduce the occurrence of address conflict, the network device can control the target port by configuring an access control list after detecting the terminal device access, and redirect the message received by the target port to the processor. The processor may include a central processing unit (Central Processing Unit, CPU), a digital signal processor (DigitalSignal Processor, DSP), etc., and the type of the processor is not particularly limited in this application.
Illustratively, the network device has a plurality of ports, each of which may be connected to one of the terminal devices, and the network device may obtain a destination port to which the terminal device accesses, e.g., the destination port is port 20, and configure the access control list on port 20. The access control list at the port 20 is indicated to redirect the message received by the port 20 to the processor of the network device, so that the terminal device can be restricted from entering the local area network, the terminal device under the port 20 can be isolated, and the processor can be convenient for processing the message sent by the terminal device at the port 20.
It will be appreciated that the network device may also implement redirecting the messages of the terminal device to the processor of the network device by way of port mirroring.
Step S120, determining whether the processor receives the target message within the target time length; if yes, go to step S130; if not, step S150 is performed.
Considering the influence of network fluctuation and other conditions, the network equipment can also wait for target time length to receive target messages after determining the access of the terminal equipment, so as to improve the judgment accuracy of the address conflict detection method.
Step S130, the source address information in the target message is matched with the learned address record.
After the terminal device is accessed to the network device, the terminal device can actively send the target message to the network device, and the embodiment of the application does not particularly limit the type and the content of the target message. Correspondingly, the processor of the network device analyzes the target message under the condition that the processor receives the target message from the target port, so that the source address information of the target message can be obtained. The source address information may include, among other things, a source IP address and/or a source MAC address indicating the terminal device. Illustratively, the processor may obtain the source MAC address by disassembling a two-layer header in the target message and/or obtain the source IP address by disassembling a three-layer header of the target message.
After the source address information is obtained, the network device may match the source address information with the address record learned by the network device. The address record may include an address resolution protocol (Address Resolution Protocol, or referred to as an ARP table) of the existing device and a MAC address table, where the ARP table may include an IP address and a MAC address having a mapping relationship with the IP address, and the MAC table may include a MAC address of the existing device. In some embodiments, the address record may also include a routing table. The address records may be stored in the network device.
It can be understood that, considering that the processing capability of the network device is weaker, when there are more existing devices, the network device may also send the learned address record to the control device for storage, after the source address information of the terminal device is obtained, the source address information is also sent to the control device, the control device matches the source address information in the target message with the address record learned by the network device, and returns the matching result to the network device.
Step S140, if the address record matches the source address information, it is determined that there is an address conflict.
In the event that there is a match to the source IP address or to the source MAC address in the address record, it is determined that there is an address conflict. Address conflicts may include IP address conflicts and MAC address conflicts.
Illustratively, in the case where the network device obtains the source IP address, if the source IP address is matched in an address record, e.g., an ARP table, it may be determined that an IP address conflict exists. The network device may also determine that there is a MAC address collision if an ARP table or a MAC address table matches the source MAC address in the address record, for example, in the case of acquiring the source MAC address.
Under the condition that the address conflict exists, the network device can isolate the target port by using a VLAN isolation technology and generate an alarm notification, wherein the alarm notification is used for notifying a manager of source address information of the terminal device with the address conflict, the form of the alarm notification can be used for generating an address conflict log, conflict information pushing, signal lamp flashing and the like, and the specific alarm form can be set according to actual needs, so that the method is not particularly limited.
Correspondingly, if the source address information is not matched in the address record, determining that no address conflict exists. In the absence of address collision, in one possible implementation, the network device may update the access control list configured on the destination port to cancel redirecting the message received by the destination port to the processor of the network device so that the terminal device may be used normally and may access the lan. In some embodiments, the network device may also learn the source address information of the terminal device and update the address records.
Step S150, an ARP request is sent through the target port.
Considering the situation that the processor does not receive the target message or the terminal equipment does not actively send the target message after accessing the network equipment due to possible fluctuation of the network, the network equipment can wait for the target time length after detecting that the terminal equipment is accessed, and if the target time length does not receive the target message, the network equipment sends an ARP request to the terminal equipment, wherein the ARP request is used for requesting the MAC addresses of all IP addresses in the address record.
For example, the processor may sequentially send ARP requests corresponding to the IP addresses in the address record to the terminal device with the destination port 20 as an output port, where the ARP request corresponding to each IP address is used to request the MAC address corresponding to the IP address.
Step S160, if the processor receives the ARP response sent by the terminal equipment, the processor determines that address conflict exists.
According to the ARP protocol, if the destination IP address contained in the ARP request received by the terminal equipment is the same as the IP address of the terminal equipment, an ARP response is sent to the network equipment and used for responding the ARP request, and the ARP response contains the source IP address and the source MAC address of the terminal equipment.
In this embodiment of the present application, the destination IP addresses in the ARP request are all IP addresses of the existing device, and after the processor receives the ARP response, it may be determined that an IP address conflict exists between the terminal device and the existing device.
In one possible implementation manner, after the network device sends the ARP request to the terminal device, if the processor does not receive the ARP response sent by the terminal device, the network device may continue to send the ARP request to the terminal device, so as to reduce an influence of a packet loss condition of network fluctuation on accuracy of the address collision detection method.
After the number of times the network device sends the ARP request reaches the target number of times, the ARP response sent by the terminal device is still not received, and in some embodiments, the network device may determine that there is no address conflict between the terminal device and an existing device.
In the above embodiment, if the processor of the network device does not receive the target message within the target duration, the network device sends an ARP request to the terminal device, and determines whether to receive an ARP response, which is described by taking an example as an example, in an optional implementation manner, the network device may further obtain source address information of the terminal device through a neighbor discovery protocol.
In one possible implementation manner, if the number of existing devices is zero, that is, the terminal device is the device that accesses the network device first, the network device may access the terminal device to the local area network after detecting the source address information of the terminal device according to the execution flow of the address conflict method, or may directly access the terminal device to the local area network, so as to improve the efficiency of address conflict detection.
The address conflict detection method includes configuring an access control list on a target port accessed by terminal equipment when the terminal equipment is detected to be accessed to network equipment, wherein the access control list is used for indicating a processor for redirecting a message received by the target port to the network equipment; under the condition that the processor receives the target message, matching the source address information in the target message with the learned address record; the target message is a message from a target port, and the source address information comprises a source IP address and/or a source MAC address; if the source address information is matched in the address record, the existence of address conflict is determined. The detection method provided by the application can realize address conflict detection before the terminal equipment is accessed to the local area network, and allows the terminal equipment to enter the local area network under the condition that the terminal equipment is determined to have no address conflict, so that the condition of the address conflict can be reduced, and the stability of the network can be improved.
Those skilled in the art will appreciate that the above embodiments are exemplary and not intended to limit the present application. The order of execution of one or more of the above steps may be modified, if possible, or may be combined selectively to yield one or more other embodiments. Those skilled in the art can select any combination from the above steps according to the need, and all the steps do not depart from the spirit of the scheme of the present application.
Based on the same inventive concept, as an implementation of the above method, the embodiment of the present application provides an address conflict detection apparatus, where the embodiment of the apparatus corresponds to the embodiment of the foregoing method, for convenience of reading, the embodiment of the present application does not describe details of the embodiment of the foregoing method one by one, but it should be clear that the apparatus in the present embodiment can correspondingly implement all the details of the embodiment of the foregoing method.
Fig. 2 is a schematic structural diagram of an address conflict detection apparatus provided in an embodiment of the present application, as shown in fig. 2, the apparatus provided in this embodiment may include:
a configuration module 110, configured to configure, when detecting that the terminal device accesses the network device, an access control list on a target port to which the terminal device accesses, where the access control list is used to instruct a processor that redirects a packet received by the target port to the network device;
the matching module 120 is configured to match the source address information in the target message with the learned address record when the processor receives the target message; the target message is a message from a target port, and the source address information comprises a source IP address and/or a source MAC address;
a determining module 130, configured to determine that an address conflict exists if the source address information is matched in the address record.
In one possible implementation, an address conflict is determined to exist if there is a match to the source IP address or to the source MAC address in the address record.
In one possible embodiment, the apparatus further comprises: a communication module 140;
the communication module 140 is configured to send an ARP request through the target port if the processor does not receive the target message within the target duration, where the ARP request is used to request MAC addresses of all IP addresses in the address record;
the determining module 130 is further configured to determine that there is an address conflict if the processor receives an ARP response sent by the terminal device, where the ARP response is used to respond to the ARP request.
In one possible implementation, sending an ARP request through a target port includes:
and sequentially sending ARP requests corresponding to the IP addresses in the address records by taking the target port as an outlet port, wherein the ARP request corresponding to each IP address is used for requesting the MAC address corresponding to the IP address.
In a possible implementation manner, the determining module 130 is further configured to determine that there is no address conflict if the processor does not receive the ARP response sent by the terminal device.
In a possible implementation manner, the configuration module 110 is further configured to update the access control list configured on the destination port to cancel redirecting the packet received by the destination port to the processor of the network device in the case where it is determined that there is no address collision.
In one possible implementation, the apparatus further includes an alert module 150;
the configuration module 110 is further configured to isolate the target port if it is determined that there is an address conflict;
the alarm module 150 is configured to generate an alarm notification, where the alarm notification includes source address information of a terminal device that generates an address conflict.
The address conflict detection apparatus provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Based on the same inventive concept, the embodiment of the application also provides an address conflict detection device. Fig. 3 is a schematic structural diagram of an address conflict detection apparatus provided in an embodiment of the present application, as shown in fig. 3, where the address conflict detection apparatus provided in the embodiment includes: a memory 210 and a processor 220, the memory 210 for storing a computer program; the processor 220 is configured to perform the method described in the method embodiments above when the computer program is invoked.
The address conflict detection apparatus provided in this embodiment may execute the above method embodiment, and its implementation principle is similar to that of the technical effect, and will not be described herein again.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method described in the above method embodiment.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted across a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, hard Disk, or magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), or the like.
Those of ordinary skill in the art will appreciate that implementing all or part of the above-described method embodiments may be accomplished by a computer program to instruct related hardware, the program may be stored in a computer readable storage medium, and the program may include the above-described method embodiments when executed. And the aforementioned storage medium may include: ROM or random access memory RAM, magnetic or optical disk, etc.
The naming or numbering of the steps in the present application does not mean that the steps in the method flow must be executed according to the time/logic sequence indicated by the naming or numbering, and the execution sequence of the steps in the flow that are named or numbered may be changed according to the technical purpose to be achieved, so long as the same or similar technical effects can be achieved.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/device and method may be implemented in other manners. For example, the apparatus/device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
In the description of the present application, unless otherwise indicated, "/" means that the associated object is an "or" relationship, e.g., a/B may represent a or B; the term "and/or" in this application is merely an association relation describing an association object, and means that three kinds of relations may exist, for example, a and/or B may mean: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural.
Also, in the description of the present application, unless otherwise indicated, "a plurality" means two or more than two. "at least one of the following" or similar expressions thereof, means any combination of these items, including any combination of single or plural items. For example, at least one of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. An address collision detection method, applied to a network device, comprising:
when detecting that the terminal equipment is accessed to the network equipment, configuring an access control list on a target port accessed by the terminal equipment, wherein the access control list is used for indicating a processor for redirecting a message received by the target port to the network equipment;
under the condition that the processor receives a target message, matching source address information in the target message with the learned address record; the target message is a message from the target port, and the source address information comprises a source IP address and/or a source MAC address;
if the source address information is matched in the address record, determining that address conflict exists.
2. The method of claim 1, wherein an address conflict is determined to exist if the address record matches the source IP address or matches the source MAC address.
3. The method of claim 1, wherein if the processor does not receive the target message within a target duration, sending an ARP request through the target port, the ARP request being used to request MAC addresses of all IP addresses in the address record;
and if the processor receives an ARP response sent by the terminal equipment, determining that address conflict exists, wherein the ARP response is used for responding to the ARP request.
4. The method of claim 1, wherein the sending an ARP request through the destination port comprises:
and sequentially sending ARP requests corresponding to each IP address in the address record by taking the target port as an outlet port, wherein the ARP request corresponding to each IP address is used for requesting the MAC address corresponding to the IP address.
5. A method according to claim 3, characterized in that the method further comprises:
and if the processor does not receive the ARP response sent by the terminal equipment, determining that no address conflict exists.
6. The method according to claim 1, wherein the method further comprises:
and under the condition that no address conflict exists, updating an access control list configured on the target port to cancel redirection of the message received by the target port to a processor of the network equipment.
7. The method according to claim 1, wherein the method further comprises: and under the condition that the address conflict exists, isolating the target port, and generating an alarm notification, wherein the alarm notification comprises source address information of the terminal equipment with the address conflict.
8. An address collision detection apparatus, comprising:
the configuration module is used for configuring an access control list on a target port accessed by the terminal equipment when the terminal equipment is detected to be accessed to the network equipment, wherein the access control list is used for indicating a processor for redirecting a message received by the target port to the network equipment;
the matching module is used for matching the source address information in the target message with the learned address record under the condition that the processor receives the target message; the target message is a message from the target port, and the source address information comprises a source IP address and/or a source MAC address;
and the determining module is used for determining that address conflict exists if the source address information is matched in the address record.
9. An address collision detection apparatus, characterized by comprising: a memory and a processor, the memory for storing a computer program; the processor is configured to perform the method of any of claims 1-7 when the computer program is invoked.
10. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the method according to any of claims 1-7.
CN202311762525.4A 2023-12-19 2023-12-19 Address conflict detection method, device, equipment and computer readable storage medium Pending CN117896350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311762525.4A CN117896350A (en) 2023-12-19 2023-12-19 Address conflict detection method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311762525.4A CN117896350A (en) 2023-12-19 2023-12-19 Address conflict detection method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN117896350A true CN117896350A (en) 2024-04-16

Family

ID=90640287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311762525.4A Pending CN117896350A (en) 2023-12-19 2023-12-19 Address conflict detection method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN117896350A (en)

Similar Documents

Publication Publication Date Title
CN110247784B (en) Method and device for determining network topology structure
US8479048B2 (en) Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained
US8767737B2 (en) Data center network system and packet forwarding method thereof
CN107528862B (en) Domain name resolution method and device
US9124621B2 (en) Security alert prioritization
JP3534305B2 (en) IP address duplication detection method using address resolution protocol
US7103712B2 (en) iSCSI storage management method and management system
US7908368B2 (en) Method and apparatus for redirecting data traffic based on external switch port status
US20100115132A1 (en) Address identifier scaling in converged networks
US7570625B1 (en) Detection of wireless devices
US7307962B2 (en) System for inference of presence of network infrastructure devices
JPH0612532B2 (en) Method and system for preventing unauthorized service in LAN
US10470111B1 (en) Protocol to detect if uplink is connected to 802.1D noncompliant device
JP5826320B2 (en) Network location service
CN114500467A (en) Address conflict detection method, address conflict detection device and electronic equipment
CN114244654B (en) URL forwarding method, device, equipment and computer storage medium
CN113098776B (en) Method, device, equipment and storage medium for determining network topology
CN110855810B (en) NAT (network Address translation) conversion method and device, network security equipment and storage medium
JP2002368781A (en) User location management domain name conversion system
CN109617817B (en) Method and device for generating forwarding table entry of MLAG networking
CN117896350A (en) Address conflict detection method, device, equipment and computer readable storage medium
CN112866107A (en) IP address notification method, traffic guiding method and network equipment
US20220182353A1 (en) Server connection resets based on domain name server (dns) information
CN113904980B (en) Channel switching method, device, switch and storage medium
WO2015057213A1 (en) Reflecting mdns packets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination