CN1208927C - Control method for connecting network based on proxy mode in network equipment - Google Patents

Control method for connecting network based on proxy mode in network equipment Download PDF

Info

Publication number
CN1208927C
CN1208927C CNB021212724A CN02121272A CN1208927C CN 1208927 C CN1208927 C CN 1208927C CN B021212724 A CNB021212724 A CN B021212724A CN 02121272 A CN02121272 A CN 02121272A CN 1208927 C CN1208927 C CN 1208927C
Authority
CN
China
Prior art keywords
user
characteristic
message
address
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021212724A
Other languages
Chinese (zh)
Other versions
CN1466312A (en
Inventor
侯超
常悦
李力
吴海军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB021212724A priority Critical patent/CN1208927C/en
Publication of CN1466312A publication Critical patent/CN1466312A/en
Application granted granted Critical
Publication of CN1208927C publication Critical patent/CN1208927C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention discloses a control method for being accessed to a network based on a proxy mode in a network device. The method comprises that an access device receives a message of a user access, extracts the characteristic data of the message, and makes a judgement according to the characteristic data, if suitable characteristic data exists in the access device, the access message is forwarded, and the timestamp of the characteristic data to which the access message is corresponding is refreshed; else, the attribute of a user to whom the message belongs is looked up in the access device by using the source address of the access message, and the authority of the user is determined according to the attribute and whether the user has the right to add new characteristic data or not is judged according to the authority of the user; if the user has no right to add new characteristic data, the access message is discarded, else, the characteristic data of the access message is added to the access device, then the access message is forwarded, and the timestamp of the characteristic data to which the access message is corresponding is refreshed. By using the proposal, the access service of an illegal proxy can be prevented, so that the reasonableness and the validity of the use of network resources are improved.

Description

In the network equipment based on the control method of agent way access network
Technical field:
The present invention relates to the connection control method in the communication system, relate in particular to the control method of the network equipment by the mode access network of agency service.
Background technology:
Along with popularizing that wideband data inserts, a lot of Internet Service Providers (ISP) can run into such problem, be exactly after the equipment access network, again by the equipment of agent way with its user, for example computer also is linked on the network, to reduce Internet utilization fee usefulness, for ISP, just lost the income that the client that originally should directly insert brings like this.So, prevent that the user from inserting other users privately by agent way and seeming very important for ISP without approval the time.
At present, the control method commonly used of ISP restriction disabled user access network, just be to use some as modes such as PPP (point-to-point protocol) authentication, WEB authentications, source IP address inspection to user's message, the method of perhaps using user's Internet protocol (IP) address and media interviews control (MAC) address and user's virtual network signs (VLANID) binding limits user's illegal access, uses Internet resources in the network to prevent that the disabled user is linked under unauthorized situation.Though the main frame that said method can be operatively connected on the network must be the main frame of legal authentication, can't discern the legal user who reaches the standard grade and serve as acting server and insert the disabled user.That is to say that existing method can not be discerned validated user and whether fill acting server, can not make control at user's act of agency.Therefore, existing access control method can't prevent that the equipment of access network inserts other illegal access device by agent way, thereby causes the reasonability that Internet resources use and the reduction of efficient.
Summary of the invention:
The object of the present invention is to provide in a kind of network equipment based on the control method of agent way access network, use this method can effectively limit the disabled user, thereby improve reasonability and the validity that Internet resources use by the agent way un-authorised access to network.
For achieving the above object, based on the control method of agent way access network, comprising in the network equipment provided by the invention:
(1) in the network equipment, sets up the characteristic information table, the characteristic that is used to store validated user;
In the network equipment, set up user attribute table, be used to store user's operating right, comprise whether the user has the right to increase new characteristic and the setting of characteristic refresh time;
(2) network equipment receives user's message, and extracts the characteristic in this message;
Whether (3) network equipment is searched in described user's characteristic information table has and the corresponding record of characteristic that extracts, if having, changes step (7); Otherwise, execution in step 4;
(4) in described user attribute table, search the authority of user under this message;
(5) judge according to described user right whether this user has the right to increase new characteristic,, then abandon described message if having no right to increase; Otherwise, execution in step 6;
(6) characteristic with described message is increased in the described characteristic information table;
(7) transmit described message, refresh the timestamp of message characteristic of correspondence data described in the described characteristic information table.
Characteristic of the present invention comprises protocol type, source IP address, source port number, purpose IP address, destination slogan.
Characteristic of the present invention also can comprise protocol type, source IP address and purpose IP address.
The characteristic information table of setting up in described step (1) comprises following field:
IP address: the IP address that is used to store validated user;
Information: be used to store the characteristic of validated user, and the refresh time of this characteristic.
The user attribute table of setting up in described step (1) comprises following field:
The IP group of addresses: be used to store the user's IP address group, this IP group of addresses is used to describe the set with identical authority user's IP address;
Attribute: the operating right that is used to store the different IP addresses group.
Described method also comprises the aging process of characteristic in the network equipment, and this process comprises:
(A1) determine the user property of each characteristic in the network equipment according to described user attribute table;
(A2) determine the setting refresh time of each user's characteristic of correspondence data according to described user property;
(A3) according to the setting refresh time of user's characteristic of correspondence data, judge whether the refresh time of each characteristic in the described characteristic information table surpasses the setting refresh time, if surpass, delete this characteristic; Otherwise do not carry out any processing.
Because the present invention extracts the characteristic in the five-tuple data that receive message, utilize the affiliated user's of this characteristic or this message authority to judge that receiving message is the legal message that agent way inserts that passes through, if normally transmit this message, otherwise abandon this message; Adopt such scheme, can on higher degree, prevent illegal agency's access service, thereby improve reasonability and validity that Internet resources use.
Description of drawings:
Fig. 1 is the embodiment flow chart of the method for the invention;
Fig. 2 uses network diagram of the present invention.
Embodiment:
The present invention is described in further detail below in conjunction with drawings and Examples.
The present invention can be applied in the diverse network connecting system, with reference to figure 2.User 1 to user N among the figure is connected with metropolitan area network or backbone network by access server, connects and Internet connection by metropolitan area network or backbone network again.When user access network, carry out user's access control by access server, when certain access device that inserts the user during, limit by access server as connected other subscriber equipment access network of illegal agent equipment agency.
In data insertion system, the access device of subscriber equipment and network, for example transmission information is not direct transmission " naked " IP message usually between the access server, and be based on TCP (TransferControl Protocol, transmission control protocol) or UDP (User Datagram Protocol, User Datagram Protoco (UDP)) message, when using TCP or UDP, user side operating system network protocol stack can distribute one less than several port numbers of 65535, the operating system server protocol stack of the access server of user capture also can distribute a port numbers, above-mentioned port numbers can be used for distinguishing same user and the server different application between straight, formation is by protocol type (TCP or UDP etc.), source IP address, source port number, purpose IP address, these 5 information combination of destination slogan characteristic together, be Wuyuan group data, be used as the unique identifier that a communications applications on the expression Internet connects.
Because the user is when carrying out network insertion, to provide the five-tuple data inevitably, therefore, the user is not have vestige when using agency's mode to insert the disabled user, and what can't hide a bit is exactly that the Wuyuan group used of the message that sends in than short time interval of user is more.According to this fact, the present invention is on access server, by the Wuyuan group number of discerning and the statistics user used in a relatively shorter time, find whether to exist the access device that uses agent way to insert other disabled users, and in a relatively shorter time, use the number of Wuyuan group and user Wuyuan group refreshing frequency to come limited subscriber to use agent way to insert the disabled user by the control user.
According to the method for the invention, at first in access device, set up the five-tuple information table, be used to store the five-tuple information of validated user, this table comprises following field:
IP address: the IP address that is used to store validated user;
Information: be used to store the five-tuple data of validated user, also store the refresh time of corresponding five-tuple data.
Also will set up user attribute table in access device, be used to store user's operating right, this table comprises following field:
The IP group of addresses: be used to store the user's IP address group, this IP group of addresses is used to describe the set with identical authority user's IP address;
Attribute: the operating right that is used to store the different IP addresses group.
According to above table, can be on the access device of network, use above-mentioned list item to preserve the Wuyuan group information that the user uses, when receiving user's Wuyuan group information, the forwarding module of access device is according to receiving that message information searches at the five-tuple information table, if found corresponding list item, then think legal message, normally transmit, if do not find, then give the agent authority of power administration module of access device and handle, act on behalf of control module and find the user profile allocation list, whether allow this type of Wuyuan group message to pass through according to number in the authority of administrator configurations and the user Wuyuan group information table in the table and time refreshing information decision according to source IP address, if pass through, then in the group information table of Wuyuan, add corresponding list item, and continue to E-Packet, if do not allow by just directly abandoning user's message.The user profile allocation list is pre-configured by the administration module configuration by the keeper in advance.
Fig. 1 is the embodiment flow chart of the method for the invention.According to Fig. 1, at first carry out step 1, access device receives the message that the user inserts, and extracts the characteristic in the five-tuple data of carrying in this message then.Promptly extract protocol type, source IP address, source port number, purpose IP address and 5 data of destination slogan in the five-tuple data.If illegal agency's control precision is not required too high, also can only extract protocol type, 3 data of source IP address and purpose IP address in the five-tuple data.Then utilize in the five-tuple information table of above-mentioned characteristic at access device to search whether the five-tuple data that adapt are arranged in this table in step 2, if have, illustrate that inserting message is the message with customer access equipment access of legal proxy qualification, therefore directly transmit and insert message, and refresh the timestamp that inserts the five-tuple data of message correspondence in the five-tuple information table of access device in step 7; Otherwise illustrate that inserting message is not the message with customer access equipment access of legal proxy qualification, will continue to search this user's authority this moment, whether has legal proxy qualification with the message of judging this user.Therefore in step 3, the source address that utilize to insert message is searched attribute of user under this message in the user attribute table of access device, determine this user's authority according to described user property in step 4, judge according to user right whether this user has the right to increase new five-tuple in step 5 then, increase if having no right, then abandon the access message in step 8, otherwise the five-tuple data that will insert message in step 6 are increased in the access device, transmit to insert message in step 7 at last, refresh the timestamp that inserts the five-tuple data of message correspondence in the five-tuple information table of access device.
In the reality, having the right, the user of increase five-tuple data might not have legal proxy qualification in the five-tuple information table of access device, therefore also will regularly carry out burin-in process to the five-tuple data in the five-tuple information table, this is handled specifically can be with reference to following step:
The 1st goes on foot, and determines the user property of each the five-tuple data in the access device five-tuple information table; The 2nd step was determined the regulation refresh time of the five-tuple of each user's correspondence according to described user property; The 3rd step is according to the refresh time of the five-tuple data of user's correspondence, whether the refresh time of judging each the five-tuple data in the access device five-tuple information table surpasses setting-up time, if surpass, the user network that this five-tuple correspondence is described inserts the frequent degree that surpasses setting, can judge and not have legal proxy qualification, the five-tuple data of therefore deletion correspondence, otherwise the five-tuple data that do not surpass setting-up time are not processed.
Also need explanation, the retrieval of user profile and five-tuple information can adopt Hash lookup algorithm, binary search tree, CAM methods such as (Content addressable memory, Content Addressable Memories) to realize in this example.

Claims (6)

1, in a kind of network equipment based on the control method of agent way access network, it is characterized in that, may further comprise the steps:
(1) in the network equipment, sets up the characteristic information table, the characteristic that is used to store validated user;
In the network equipment, set up user attribute table, be used to store user's operating right, comprise whether the user has the right to increase new characteristic and the setting of characteristic refresh time;
(2) network equipment receives user's message, and extracts the characteristic in this message;
Whether (3) network equipment is searched in described characteristic information table has and the corresponding record of characteristic that extracts, if having, changes step (7); Otherwise, execution in step 4;
(4) in described user attribute table, search the authority of user under this message;
(5) judge according to described user right whether this user has the right to increase new characteristic,, then abandon described message if having no right to increase; Otherwise execution in step 6;
(6) characteristic with described message is increased in the described characteristic information table;
(7) transmit described message, refresh the timestamp of message characteristic of correspondence data described in the described characteristic information table.
2, the control method based on the agent way access network according to claim 1 is characterized in that: described characteristic comprises protocol type, source IP address, source port number, purpose IP address, destination slogan.
3, the control method based on the agent way access network according to claim 1 is characterized in that: described characteristic comprises protocol type, source IP address and purpose IP address.
4, the control method based on the agent way access network according to claim 1 is characterized in that: described characteristic information table comprises following field:
IP address: the IP address that is used to store validated user;
Information: the characteristic and the refresh time thereof that are used to store validated user.
5, the control method based on the agent way access network according to claim 1, it is characterized in that: described user attribute table comprises following field:
The IP group of addresses: be used to store the user's IP address group, this IP group of addresses is used to describe the set with identical authority user's IP address;
Attribute: the operating right that is used to store the different IP addresses group.
6, the control method based on the agent way access network according to claim 1 is characterized in that described method also comprises the aging process of characteristic in the network equipment, and this process comprises:
(A1) determine the user property of each characteristic in the network equipment according to described user attribute table;
(A2) determine the setting refresh time of each user's characteristic of correspondence data according to described user property;
(A3) according to the setting refresh time of user's characteristic of correspondence data, judge whether the refresh time of each characteristic in the described characteristic information table surpasses the setting refresh time, if surpass, delete this characteristic; Otherwise do not carry out any processing.
CNB021212724A 2002-06-12 2002-06-12 Control method for connecting network based on proxy mode in network equipment Expired - Fee Related CN1208927C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021212724A CN1208927C (en) 2002-06-12 2002-06-12 Control method for connecting network based on proxy mode in network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021212724A CN1208927C (en) 2002-06-12 2002-06-12 Control method for connecting network based on proxy mode in network equipment

Publications (2)

Publication Number Publication Date
CN1466312A CN1466312A (en) 2004-01-07
CN1208927C true CN1208927C (en) 2005-06-29

Family

ID=34142161

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021212724A Expired - Fee Related CN1208927C (en) 2002-06-12 2002-06-12 Control method for connecting network based on proxy mode in network equipment

Country Status (1)

Country Link
CN (1) CN1208927C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100338915C (en) * 2005-08-19 2007-09-19 杭州华三通信技术有限公司 Message mirroring method and network equipment with message mirroring function
CN101212375B (en) * 2006-12-30 2014-07-23 方正宽带网络服务股份有限公司 Method and system for controlling network access via agent

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167079B (en) * 2006-03-29 2010-11-17 日本三菱东京日联银行股份有限公司 User affirming device and method
CN101106508B (en) * 2006-07-14 2012-06-20 华为技术有限公司 A method for obtainment user specification in isomerous system
CN101399749B (en) * 2007-09-27 2012-04-04 华为技术有限公司 Method, system and device for packet filtering
CN101453308B (en) * 2008-12-31 2011-09-14 华为技术有限公司 IP clock packet processing method, equipment and system
CN101729311B (en) * 2009-11-18 2013-01-09 中兴通讯股份有限公司 Method and device for detecting effectiveness of local active source
CN105939357A (en) * 2016-06-13 2016-09-14 杭州迪普科技有限公司 Method and device for obtaining corresponding relation of user IP (Internet Protocol) address and user group information

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100338915C (en) * 2005-08-19 2007-09-19 杭州华三通信技术有限公司 Message mirroring method and network equipment with message mirroring function
CN101212375B (en) * 2006-12-30 2014-07-23 方正宽带网络服务股份有限公司 Method and system for controlling network access via agent

Also Published As

Publication number Publication date
CN1466312A (en) 2004-01-07

Similar Documents

Publication Publication Date Title
CN1177439C (en) Method of acting address analytic protocol Ethernet Switch in application
US8001254B1 (en) Translating switch and method
CN1146809C (en) Integrated IP network
US7366728B2 (en) System for compressing a search tree structure used in rule classification
CN1118167C (en) System and method for using domain names to route data sent to a destination on a network
CN1852297A (en) Network data flow recognizing system and method
US7916656B2 (en) Providing a symmetric key for efficient session identification
CN1713593A (en) Security system and method using server security solution and network security solution
US7577151B2 (en) Method and apparatus for providing a network connection table
CN1252961C (en) Method for authenticating group broadcast service
CN1655533A (en) Filter based on longest prefix match algorithm
CN1505338A (en) User identifying technique on networks having different address systems
US6980550B1 (en) Method and apparatus for server load balancing
CN1208927C (en) Control method for connecting network based on proxy mode in network equipment
CN1194502C (en) System and method for managing access authority of network users
CN101056306A (en) Network device and its access control method
CN1653760A (en) Method and apparatus to improve network routing
CN1917512A (en) Method for establishing direct connected peer-to-peer channel
CN1152531C (en) Network addressing control method of zone message
CN1176540C (en) Method for realizing switch in with mixed multiple users'types in Ethernet network switch in devices
CN1210919C (en) Data flow control method in data insertion equipment
CN101039223A (en) DHCP monitoring method and apparatus thereof
CN1464703A (en) Method for increasing IP message transferring speed
CN1612537A (en) Method for preventing main computer from being counterfeited in IP ethernet
US7191168B1 (en) Fast prefix matching of bounded strings

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050629

Termination date: 20150612

EXPY Termination of patent right or utility model