CN1852135A - Method for protecting access-in user safety - Google Patents

Method for protecting access-in user safety Download PDF

Info

Publication number
CN1852135A
CN1852135A CN 200510084088 CN200510084088A CN1852135A CN 1852135 A CN1852135 A CN 1852135A CN 200510084088 CN200510084088 CN 200510084088 CN 200510084088 A CN200510084088 A CN 200510084088A CN 1852135 A CN1852135 A CN 1852135A
Authority
CN
China
Prior art keywords
message
access
charging
user
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510084088
Other languages
Chinese (zh)
Other versions
CN100395997C (en
Inventor
侯志鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2005100840880A priority Critical patent/CN100395997C/en
Publication of CN1852135A publication Critical patent/CN1852135A/en
Application granted granted Critical
Publication of CN100395997C publication Critical patent/CN100395997C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses method for protecting safety of access users. Through access gateway and firewall, access users access external network. In procedure for users to access external network, the firewall executes following steps: (1) filtering message received by access gateway, and determining whether the obtained message contains end message of address of access user; if yes, then executing step (2); otherwise, carrying out process according to normal flow of firewall; (2) obtaining address information of user in the end message; (3) deleting conversations corresponding to address information obtained in step (2) in firewall. The invention repairs safety hole caused when network is configured through cooperation between firewall and access gateway so as to make new access user decrease possibility of suffering the attack. The invention raises safety of access users, possessing features of simple implementation and small influence on existing network devices.

Description

A kind of method of protecting access-in user safety
Technical field
The present invention relates to network security technology, refer to a kind of method of protecting access-in user safety especially.
Background technology
IAD is to insert the user to adopt different access technologies to insert the gateway device of IP network, as x Digital Subscriber Line (x Digital Subscriber Line, xDSL) user's access device BAS Broadband Access Server (Broadband Access Server, BAS), WLAN (wireless local area network) (Wireless Local AreaNetwork, WLAN) user's access device access control (Access Control, AC) gateway, Wideband Code Division Multiple Access (WCDMA) (Wideband CDMA, WCDMA), Universal Mobile Telecommunications System (GeneralPacket Radio Service, GPRS), GPRS (Universal MobileTelecommunications System, UMTS) user's access device Gateway GPRS Support Node (Gateway GPRS Support Node, GGSN), code division multiple access (Code Division MultipleAccess, CDMA) user's access device group data service node (Packet Data ServingNode, PDSN) or the like.
Fig. 1 is for inserting the user by IAD visit external IP network diagram.As shown in Figure 1, insert user 11 by access network 12 visit IADs 13, because what IAD 13 connected is the IP network 15 of outside non-place of safety, for guaranteeing the access network 12 and the safety that inserts user 11 in the place of safety, IAD 13 is connected with external IP network 15 by fire compartment wall 14.As shown in Figure 1, insert user 11 and can pass through IAD 12, the 15 visit remote authentication dial access services of external IP network (Remote Authentication Dial In User Service, Radius) server 16 realization charging and access authentication functions.
Wherein, the protection mode that fire compartment wall uses is present popular application layer packet filtering (ApplicationSpecific Packet Filter, ASPF), its groundwork is the IP message five-tuple that non-place of safety is imported in the record security district into, and generates the session of the corresponding five-tuple of this message of management.The IP message five-tuple of fire compartment wall record comprises source IP address, purpose IP address, protocol type, source port number and the destination slogan of IP message.When the IP message from non-place of safety when transmit the place of safety, fire compartment wall can be searched the session whether coupling is arranged according to importing the five-tuple of place of safety message in conversational list, if having then allow message to pass through, if do not have corresponding session then abandon this message.The application layer protocol that the ASPF function can detect mainly contain FTP, HTTP, SMTP, RSTP, H.323, TCP, UDP etc.But for Radius message, owing to be the UDP carrying, fire compartment wall is only handled Radius message as common UDP message, rather than the Radius protocol message is handled.
Be illustrated in figure 2 as in the prior art Radius server and provide the service of charging for inserting the user, insert the flow chart of user by IAD visit external IP network, step is described in detail as follows:
Step 201~202: insert the user and insert request message to IAD transmission user, IAD is accepted to insert the user and is inserted the external IP network, and for inserting user's distributing IP address, this user and this IP address binding.
Step 203~204: IAD is after acceptance access user inserts the external IP network, the charging that sends this access user to the Radius server begins request message, the Radius server is receiving after charging that IAD sends begins request message, for this access user begins to charge, and return to charge to IAD and begin the request response.Wherein, fire compartment wall is directly transmitted Radius charging message message, does not write down the five-tuple of this message, and corresponding, the response message that returns does not need to search the five-tuple session that whether has coupling yet.
Step 205: insert the user after receiving the IAD IP address allocated,, send the IP message to external network with this IP address visit external IP network.
Step 206: fire compartment wall obtains to insert the IP message that the user is mail to the external IP network, writes down the five-tuple of this IP message, generates the session of this five-tuple of management.
Step 207~208: fire compartment wall is transmitted the IP message that inserts the user to outside IP network, and the external IP network is received and returned response message to inserting the user.
Step 209: fire compartment wall obtains the external IP network to inserting the response message that the user returns, source IP address and the purpose IP address returned in the IP message five-tuple are exchanged, search the session whether coupling is arranged in the conversational list in fire compartment wall then, if the session of coupling is arranged then carry out step 210, fire compartment wall is transmitted this message according to the destination address of receiving the IP message to inserting the user; If do not have the session of coupling, then do not E-Packet.
Step 211: insert the user and, send the user to IAD and withdraw from request message after a period of time in accesses network, expression no longer needs to visit at this moment the external IP network.
Step 212~213: IAD receive insert the user withdraw from request after, send user's ending request message of chargeing to the Radius server, indication finishes charging to this accesss user.The Radius server responds this charging end, stops the charging to this user, and returns the response of charging ending request to IAD.
Step 214: IAD is accepted the user and is withdrawed from after receiving the charging ending request response that Radius returns, and discharges and insert user's IP address, and binding is untied in user and this IP address.
IAD is for inserting the mode that user's IP address allocated generally all adopts dynamic assignment.That is to say, during user offline, the employed IP of this user address will be released, therefore when other users when the IAD request inserts, the IP address that last user has just discharged probably is access in the access user that gateway is distributed to new application access network.Like this, IP address synchronization can only be distributed to one and insert the user, can not cause the address confusion that inserts between the user, the utilance of address that improved IP.
In the prior art, exit network when inserting the user, and when having discharged IP address with its binding, do not notify fire compartment wall, at this moment, fire compartment wall is also keeping the session of the five-tuple corresponding with this IP address.Generally, session is deleted by fire compartment wall after only understanding wait timeout, and the time-out time of fire compartment wall acquiescence is generally between tens seconds to hundreds of seconds at present.During this period of time,, when IAD send to insert request, may increase as new user, cause the address space left in dynamic address pond to reduce owing to the quantity that access network is visited IP network, in this case, new user is given in the IAD IP address assignment that probably will just discharge.The session of the IP message five-tuple that produces when fire compartment wall did not discharge the original subscriber and had this IP address this moment, if the external IP network still sends the IP message to the original subscriber, because fire compartment wall can find the session of IP message coupling therewith, therefore can not filter this message, this message can enter access network, arrives the new user who has former IP address.If the continual transmission message of external IP network, fire compartment wall then can keep this session always, and not therefore this session of overtime deletion.Therefore, for the user of new access, the junk traffic paying that he has nothing for it but and does not belong to him.Moreover, a large amount of IP flows that do not belong to access network pour in access network, seriously influenced the access bandwidth that inserts the user, the performance of access network device, if flowing of this IP address utilized by the bad user in the external IP network, then can be directly the user of new access be attacked.
Also can adopt Dynamic Host Configuration Protocol server in the prior art is to insert user's distributing IP address.Receive user's access request at IAD after, propose to be the request of this user's distributing IP address by IAD to Dynamic Host Configuration Protocol server, Dynamic Host Configuration Protocol server then is notified to for this access user distributing IP address and by IAD after the request of receiving and inserts the user, finishes the distribution of IP address.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method of protecting access-in user safety, uses this method and can improve the fail safe that the user inserts.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method of protecting access-in user safety, described access user inserts external network by IAD and fire compartment wall, and described fire compartment wall inserts in the external network process the user, carries out following steps:
A, the message that receives from IAD is filtered, obtain message packet, and judge whether this message is to comprise the end that inserts station address information, if execution in step B then, otherwise still according to the normal flow processing of fire compartment wall;
B, obtain the station address information in this end;
The pairing session of address information that obtains with step B in C, the deletion fire compartment wall.
Wherein, the message packet that obtains in the steps A is a remote authentication dial-up access charging message message; Steps A is described judges whether this message is that the method that comprises the end that inserts station address information is: judge whether this message is the charging ending request message of remote authentication dial-up access charging message; Described step B is: the address information that obtains the access user of charging ending request message correspondence.
Wherein, steps A is described filters the message that receives from IAD, and the method that obtains message packet is: set in advance filtering rule, fire compartment wall filters message according to filtering rule, obtains remote authentication dial-up access charging message message.
Wherein, described filtering rule is: whether the port numbers according to the message that receives is identical with the port numbers of IAD transmission remote authentication dial-up access charging message, judges whether to be remote authentication dial-up access charging message.
Wherein, steps A is described judges that whether it be that the method for the charging ending request message of remote authentication dial-up access charging message is: remote authentication dial-up access charging message is resolved, obtain the wherein content of type of message unit, judge the charging ending request message whether this message charge for the remote authentication dial-up access according to this content.
Wherein, described step B comprises: B1, continuation are resolved the charging ending request message of remote authentication dial-up access charging message, obtain the address parameter of this request message content; B2, obtain the access user's of charging ending request message correspondence address information according to this address parameter.
Wherein, described in the steps A message that receives from IAD is filtered, the method that obtains message packet is: configuration remote authentication dial access service end address in fire compartment wall; After fire compartment wall receives message, whether be that remote authentication dial-up access charging end address comes message is filtered, directly act on behalf of receiving remote authentication dial-up access charging message, obtain remote authentication dial-up access charging message according to wherein destination address.
The method of this protection access-in user safety proposed by the invention; rely on fire compartment wall that message is filtered; obtain message packet, if the message packet that obtains is the end that comprises station address information, just according to corresponding session in this address information deletion fire compartment wall.Like this, make the session status and the state consistency of access user in IAD of firewall management.That is to say that when the access user exitted network, fire compartment wall can in time be deleted the session corresponding with this access user.Therefore, this method has been repaired the security breaches that caused when fire compartment wall cooperates networking with IAD, also makes new accesss user when the former access user's IP address of use, can not make the new access user receive self unwanted flow, avoid being attacked, improved the fail safe that the user inserts.Because the present invention only needs filter at the fire compartment wall place and simple operations such as deletion, and is therefore little to the conventional network equipment influence, and do not need any modification to use to dissimilar access users and IAD.
Description of drawings
Fig. 1 is for inserting the user by IAD visit external network schematic diagram;
Fig. 2 is the prior art flow chart;
Fig. 3 is one embodiment of the invention flow chart;
Fig. 4 is further embodiment of this invention flow chart.
Embodiment
The core concept of the method for this protection access-in user safety of the present invention is: by fire compartment wall message is filtered; obtain message packet; if the message packet that obtains is the end that comprises station address information, just according to corresponding session in this address information deletion fire compartment wall.
That is to say that the present invention has utilized the end that comprises station address information, determine to require the user of winding-up, according to this end, in time with dialogue deletion corresponding in the fire compartment wall.In the practical application, can utilize Radius charging ending request message or other to comprise the end of address information, the five-tuple session corresponding with the address information in this message in the deletion fire compartment wall makes the session status of firewall management and inserts the state of user in IAD to be consistent.
Have following two kinds of situations in actual application: a kind of situation is: inserting the user needs Radius that the service of charging is provided, and IAD sends the Radius charging message to the Radius server; Another kind of situation is: inserting the user does not need Radius that the situation of the service of charging is provided, and IAD does not send the Radius charging message to the Radius server.Below enumerate embodiment respectively, the specific implementation process of both of these case is described.
Embodiment one
Present embodiment needs Radius that the service of charging is provided at inserting the user, and IAD sends the situation of Radius charging message to the Radius server.Fire compartment wall sends the employed port numbers of Radius charging message according to IAD, and Radius charging message filtering rule is set.For example: at present the port numbers of the Radius charging message of agreement regulation is 1813, so firewall filtering destination slogan is 1813 message, obtains corresponding Radius charging message, and other filtering rules.After fire compartment wall obtains the Radius charging message, content according to the type of message unit in this message judges whether to be Radius charging ending request message, if Radius charging ending request message, resolve this message and obtain the content of this message, content search according to message obtains the Framed-IP-Address parameter, in the deletion fire compartment wall with the five-tuple session of this parameter matching; If not, then this Radius charging message is not handled.Detailed process is as shown in Figure 3:
Step 301~302: identical with treatment step of the prior art 201~202, IAD allows user access network, and is new user's distributing IP address, and detailed process no longer describes in detail.
Step 303: IAD sends the beginning request message that charges to the Radius server.
Step 304~305: fire compartment wall obtains this Radius charging message according to the filtering rule that sets in advance.After fire compartment wall is obtained the Radius charging message, content according to the type of message unit in this message judges whether to be Radius charging end, when fire compartment wall judges that obtaining this message is not charging ending request message, then to this message of Radius server forwards.That is to say that judging this message when fire compartment wall is not when comprising the end that inserts station address information, then according to the normal flow processing of fire compartment wall.
The charging that step 306:Radius server response IAD sends begins request message, and this access user is begun to charge.
Step 307~312: insert the user and use IAD IP address allocated visit external IP network, concrete steps are identical with step 205 of the prior art~210.
Step 313~314: insert the user and withdraw from request message to the IAD transmission, IAD sends Radius charging ending request message to the Radius server after receiving the access messages sent by users.
Step 315~316: fire compartment wall according to the filtering rule that is provided with, obtains this Radius charging message to message.After fire compartment wall is obtained the Radius charging message, judge whether to be Radius charging end according to the content of the type of message unit in this message.After fire compartment wall judges that obtaining this message is Radius charging ending request message, this Radius charging ending request message is resolved, obtain the content of this message, content search according to message obtains the Framed-IP-Address parameter, and this parameter is that IAD is to insert user's IP address allocated.Therefore, fire compartment wall learns that the access user who has this IP address has prepared to withdraw from access network, so fire compartment wall is searched in self conversational list, the session that source IP address in the five-tuple is identical with Framed-IP-Address is all deleted.Then, transmit the charging ending request to Radius.
Step 317~318: identical with step 213 of the prior art~214.
Fire compartment wall is by being provided with Radius charging message filtering rule, obtain the Radius charging message, to type of message is that the message of charging ending request is resolved, obtain the Framed-IP-Address parameter, with the message five-tuple session of Framed-IP-Address parameter matching, realize the session status of firewall management and insert the state consistency of user in IAD in the deletion fire compartment wall.
Embodiment two
Embodiment two does not need Radius that the situation of the service of charging is provided at inserting the user, and IAD does not send the Radius charging message to the Radius server.
In the present embodiment, fire compartment wall is provided with the Radius end address, accept and agent processes Radius charging message, to type of message is that the message of charging ending request is resolved, obtain the Framed-IP-Address parameter, with the message five-tuple session of Framed-IP-Address parameter matching, realize the session status of firewall management and insert the state consistency of user in IAD in the deletion fire compartment wall.
Because IAD does not send the Radius charging message to the Radius server, therefore present embodiment does not need to be provided with Radius charging message filtering rule in fire compartment wall described in embodiment one, but need be at fire compartment wall end configuration Radius end address, whether come message is filtered according to the destination address that receives message for the Radius end address.The Radius end address is that IAD is the Radius server address that is disposed when inserting user's charging and authentication, with visiting the Radius server.When inserting user capture external IP network, IAD sends and receives the Radius charging message for the Radius server for inserting the user as usual, and the destination address of this moment is the Radius end address of firewall configuration, and receives, handles, replys the Radius charging message by the fire compartment wall agency.When fire compartment wall receives the Radius charging message, judge the News Category of this message according to the content in the type of message unit in this message, if Radius charging ending request message, then resolve the Framed-IP-Address parameter in this message, in the deletion fire compartment wall with the five-tuple session of this parameter matching; The beginning request message if Radius charges then responds Radius charging beginning request message, to the Radius charging message of other types, handles according to the fire compartment wall normal flow.Concrete steps are as shown in Figure 4:
Step 401~402: identical with treatment step of the prior art 201~202, IAD allows user access network, and is new user's distributing IP address, and detailed process describes in detail at this.
Step 403: IAD does not need the access user under the situation of the service of chargeing after accepting to insert the request of user capture external IP network, sends Radius charging beginning request message as usual, and destination address is the Radius end address of firewall configuration.
Step 404~405: since in the Radius charging message destination address fills in is the Radius end address of firewall configuration, so fire compartment wall directly receives this Radius message.Fire compartment wall judges that according to the content of the type of message unit in this message this message is Radius charging beginning request message, or Radius charging ending request message, through being judged as Radius charging beginning request message, therefore create Radius charging beginning request response, destination address is filled in access gateway address, source address is filled in the Radius end address of firewall configuration, and sends to IAD.
Step 406~411: insert the user and use IAD IP address allocated visit external IP network, concrete steps are identical with step 205 of the prior art~210.
Step 412~413: insert the user and withdraw from request message to the IAD transmission, IAD sends Radius charging ending request message to the Radius server after receiving the access messages sent by users.
Step 414~415: fire compartment wall receives this Radius message, judge that according to the content of the type of message unit in this message this message is Radius charging beginning request message or Radius charging ending request message, through being judged as Radius charging ending request message, therefore Radius charging ending request message is resolved, obtain the content of this message, obtain the Framed-IP-Address parameter according to the content search of message.At this moment, fire compartment wall learns that the access user who has this IP address has prepared to withdraw from access network, and therefore, fire compartment wall is searched in self conversational list, and source IP address in the five-tuple is all deleted with the identical session of Framed-IP-Address.Then, create Radius charging ending request response message, destination address is filled in access gateway address, and source address is filled in the Radius end address of firewall configuration, and sends to IAD.
Step 416: IAD is accepted to insert the user and is exitted network, and discharge the IP address that it has after receiving the Radius charging ending request response message that fire compartment wall transmits.
In addition, when using Dynamic Host Configuration Protocol server in the real network for access user distributing IP address, by IAD request Dynamic Host Configuration Protocol server is to insert user's distributing IP address, after the access user obtains the IP address, also can adopt the method for the invention to realize the session status of firewall management and insert the state of user in IAD being consistent, specific implementation process is with above two embodiment.

Claims (7)

1, a kind of method of protecting access-in user safety, described access user inserts external network by IAD and fire compartment wall, it is characterized in that described fire compartment wall inserts in the external network process the user, carries out following steps:
A, the message that receives from IAD is filtered, obtain message packet, and judge whether this message is to comprise the end that inserts station address information, if execution in step B then, otherwise still according to the normal flow processing of fire compartment wall;
B, obtain the station address information in this end;
The pairing session of address information that obtains with step B in C, the deletion fire compartment wall.
2, method according to claim 1 is characterized in that, the message packet that obtains in the steps A is a remote authentication dial-up access charging message message;
Steps A is described judges whether this message is that the method that comprises the end that inserts station address information is: judge whether this message is the charging ending request message of remote authentication dial-up access charging message;
Described step B is: the address information that obtains the access user of charging ending request message correspondence.
3, method according to claim 2 is characterized in that, steps A is described filters the message that receives from IAD, and the method that obtains message packet is:
Set in advance filtering rule, fire compartment wall filters message according to filtering rule, obtains remote authentication dial-up access charging message message.
4, method according to claim 3, it is characterized in that, described filtering rule is: whether the port numbers according to the message that receives is identical with the port numbers of IAD transmission remote authentication dial-up access charging message, judges whether to be remote authentication dial-up access charging message.
5, method according to claim 2 is characterized in that, steps A is described judges that whether it be that the method for the charging ending request message of remote authentication dial-up access charging message is:
Remote authentication dial-up access charging message is resolved, obtain the wherein content of type of message unit, judge the charging ending request message whether this message charge for the remote authentication dial-up access according to this content.
6, method according to claim 5 is characterized in that, described step B comprises:
B1, continuation are resolved the charging ending request message of remote authentication dial-up access charging message, obtain the address parameter of this request message content;
B2, obtain the access user's of charging ending request message correspondence address information according to this address parameter.
7, method according to claim 2 is characterized in that, described in the steps A message that receives from IAD is filtered, and the method that obtains message packet is: configuration remote authentication dial access service end address in fire compartment wall;
After fire compartment wall receives message, whether be that remote authentication dial-up access charging end address comes message is filtered, directly act on behalf of receiving remote authentication dial-up access charging message, obtain remote authentication dial-up access charging message according to wherein destination address.
CNB2005100840880A 2005-07-12 2005-07-12 Method for protecting access-in user safety Active CN100395997C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100840880A CN100395997C (en) 2005-07-12 2005-07-12 Method for protecting access-in user safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100840880A CN100395997C (en) 2005-07-12 2005-07-12 Method for protecting access-in user safety

Publications (2)

Publication Number Publication Date
CN1852135A true CN1852135A (en) 2006-10-25
CN100395997C CN100395997C (en) 2008-06-18

Family

ID=37133605

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100840880A Active CN100395997C (en) 2005-07-12 2005-07-12 Method for protecting access-in user safety

Country Status (1)

Country Link
CN (1) CN100395997C (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014029307A1 (en) * 2012-08-24 2014-02-27 中兴通讯股份有限公司 Accounting method and device
CN104683319A (en) * 2013-12-03 2015-06-03 中国移动通信集团广东有限公司 Method and device for clearing firewall conversation and network equipment
CN107347074A (en) * 2017-08-09 2017-11-14 中国信息通信研究院 A kind of method for determining network equipment security
CN109922163A (en) * 2017-12-13 2019-06-21 中国电信股份有限公司 File transmitting method, access gateway of internet of things and Internet of things system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028806A1 (en) * 2001-08-06 2003-02-06 Rangaprasad Govindarajan Dynamic allocation of ports at firewall
CN1232922C (en) * 2002-02-20 2005-12-21 华北计算机系统工程研究所 Method for improving fire wall performance
AUPS339102A0 (en) * 2002-07-04 2002-08-01 Three Happy Guys Pty Ltd Method of monitoring volumes of data between multiple terminals and an external communication network
CN1555170A (en) * 2003-12-23 2004-12-15 沈阳东软软件股份有限公司 Flow filtering fine wall

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014029307A1 (en) * 2012-08-24 2014-02-27 中兴通讯股份有限公司 Accounting method and device
US9408057B2 (en) 2012-08-24 2016-08-02 Zte Corporation Accounting method and device
CN104683319A (en) * 2013-12-03 2015-06-03 中国移动通信集团广东有限公司 Method and device for clearing firewall conversation and network equipment
CN107347074A (en) * 2017-08-09 2017-11-14 中国信息通信研究院 A kind of method for determining network equipment security
CN107347074B (en) * 2017-08-09 2019-09-06 中国信息通信研究院 A kind of method of determining network equipment safety
CN109922163A (en) * 2017-12-13 2019-06-21 中国电信股份有限公司 File transmitting method, access gateway of internet of things and Internet of things system
CN109922163B (en) * 2017-12-13 2022-05-03 中国电信股份有限公司 Message sending method, Internet of things access gateway and Internet of things system

Also Published As

Publication number Publication date
CN100395997C (en) 2008-06-18

Similar Documents

Publication Publication Date Title
US6687252B1 (en) Dynamic IP address allocation system and method
EP1557977A1 (en) A method for adding devices to management system
US7620808B2 (en) Security of a communication system
CN101047618A (en) Method and system for acquiring network route information
CN1838636A (en) Method and apparatus for packet traversal of a network address translation device
CN1416239A (en) Method for switching in virtual local area network of the access network with mixed optical fiber and coaxial line
US20130132264A1 (en) Bid-Based Control of Networks
CN101404650A (en) Method and system for sub-dividing network application service quality
CN1647451A (en) Monitoring of information in a network environment
CN1753390A (en) Method of implementing business discrimination and business service quality control on broadband network
CN1773920A (en) On-line charge processing method
CN1852135A (en) Method for protecting access-in user safety
CN101179449B (en) Monitoring system, apparatus and method in IP network
GB2327317A (en) Access control and resource reservation in a communications network
CN1592210A (en) Device for processing the measurements of parameters and/or of traffic stream
CN101888370B (en) Device and method for preventing IPv6 (Internet Protocol version 6) from being deceptively attached
CN101043465A (en) Dynamic host configuration protocol service managing method and system thereof
CN100338909C (en) Method for discriminating service flow
CN1210919C (en) Data flow control method in data insertion equipment
CN1751472A (en) Terminating a session in a network
CN1719799A (en) Method for fusing wireless local area network and 3GPP network
CN101945143A (en) Method and device for preventing message address spoofing on mixed network
CN100433667C (en) Method for assigning user access resources of private network in conversion of network addresses
CN1553662A (en) Method for preventing refusal service attack
Cisco Commands: access-mode to gprs canonical premium mean-throughput-deviation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant