US20210044456A1 - Method for implementing gre tunnel, access point and gateway - Google Patents
Method for implementing gre tunnel, access point and gateway Download PDFInfo
- Publication number
- US20210044456A1 US20210044456A1 US17/083,287 US202017083287A US2021044456A1 US 20210044456 A1 US20210044456 A1 US 20210044456A1 US 202017083287 A US202017083287 A US 202017083287A US 2021044456 A1 US2021044456 A1 US 2021044456A1
- Authority
- US
- United States
- Prior art keywords
- address
- packet
- gre tunnel
- attribute
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1033—Signalling gateways
- H04L65/1036—Signalling gateways at the edge
Definitions
- Embodiments of the present application relate to communications technologies, and in particular, to a method for implementing a GRE tunnel, an access point, and a gateway.
- an operator In actual network transmission, an operator usually implements service transmission for a user by configuring a tunnel, such as a virtual local area network (VLAN), and a pseudo wire (PW) tunnel.
- a network and a network device must meet certain functional requirements. For example, when a PW tunnel is configured, both a provider edge device (Provider Edge, PE for short) and a provider core device (P device) on a network need to support label forwarding.
- a generic routing encapsulation (GRE) tunnel is a simple data tunnel, in which the tunnel configurations can be ensured only when the edge device of the tunnel is ensured. Therefore, the GRE technology receives extensive attention from equipment vendors and operators.
- a WLAN network architecture includes an access point (AP), an access controller (AC), and a gateway (GW).
- the AP is a network element that is deployed on a side of a terminal and is accessed by the terminal.
- a wireless fidelity (WiFi) hot spot is an AP.
- the AC is configured to control an access network element, for example, configuration of AP information.
- the AC may be deployed in a data transmission path and is responsible for routing and forwarding and may also be connected only to the GW and is responsible for access control.
- the GW also referred to as a WLAN GW, is a WLAN gateway device and is responsible for managing a WLAN user.
- the WLAN GW includes functions of a broadband remote access server (BRAS)/a broadband network gateway (BNG) on an operator's network. It is a tendency in the future that a single WLAN GW is deployed to complete various management on the WLAN user, including accounting, policy, quality of service (QoS), and the like.
- BRAS broadband remote access server
- BNG broadband network gateway
- the WLAN GW serves as a default WLAN gateway.
- User data of a terminal device of the WLAN for example, user equipment (UE) or a personal computer (PC) is expected to be sent to the WLAN GW by using a Layer 2 network or a Layer 3 network.
- UE user equipment
- PC personal computer
- a generic data transmission mechanism needs to be provided. Because deployment of a PW and a VLAN has a certain functional requirement for the network and the network device between the AP and the WLAN GW, to reduce a requirement for a transmission network, many equipment vendors and operators all prefer implementing data routing between the AP and the WLAN GW by using the GRE technology.
- Embodiments of the present application provide a method for implementing a GRE tunnel, an access point, and a gateway.
- an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- AP access point
- GW gateway
- a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
- the receiving, by the AP, the first packet, where the first packet carries the address of a GW includes:
- CAPWAP Control And Provisioning of Wireless Access Points
- AC access controller
- the CAPWAP packet includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- the receiving, by the AP, the first packet, where the first packet carries the address of a GW includes:
- the Radius access response includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- AP access point
- GW gateway
- the fourth packet carries an address of the AP
- the fourth packet is used to instruct the GW to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP;
- the AP receiving, by the AP, a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- the sending, by the AP, the fourth packet to the GW, where the fourth packet carries the address of the AP includes:
- the AP initiating, by the AP, a Radius access request to an authentication server by using the GW, where the Radius access request carries the address of the AP, so that the GW obtains the address of the AP from the Radius access request.
- the Radius access request includes at least an AP address configuration attribute
- the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP.
- an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- a gateway GW
- AP access point
- the first packet carries an address of the GW
- the first packet is used to instruct the AP to configure a GRE tunnel to the GW
- a source address of the GRE tunnel is an address of the AP
- a destination address of the GRE tunnel is the address of the GW
- the GW receiving, by the GW, a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP.
- the sending, by the GW, the first packet to the AP, where the first packet carries the address of the GW includes:
- the Radius access response includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment.
- an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- GW gateway
- AP access point
- a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP;
- an embodiment of the present application provides an access point, including:
- a first receiving module configured to receive a first packet, where the first packet carries an address of a gateway GW;
- a first configuring module configured to configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
- a second receiving module configured to receive a second packet sent by user equipment
- an encapsulating module configured to perform GRE tunnel encapsulation for the second packet to form a third packet
- a first sending module configured to send the third packet to the GW by using the GRE tunnel, where the third packet carries the address of the AP.
- the first receiving module is specifically configured to receive a Control And Provisioning of Wireless Access Points (CAPWAP) packet sent by an access controller AC, and the CAPWAP packet carries the address of the GW.
- CAPWAP Control And Provisioning of Wireless Access Points
- the CAPWAP packet includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- the first receiving module is specifically configured to initiate a Radius access request to an authentication server by using the GW, and receive a Radius access response returned by the GW, where the Radius access response carries the address of the GW.
- the Radius access response includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- an embodiment of the present application provides an access point, including:
- a second sending module configured to send a fourth packet to a gateway (GW), where the fourth packet carries an address of an AP, and the fourth packet is used to instruct the GW to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP; and
- GW gateway
- a third receiving module configured to receive a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure the GRE tunnel to the GW.
- the second sending module is specifically configured to initiate a Radius access request to an authentication server by using the GW, where the Radius access request carries an address of the AP, so that the GW obtains the address of the AP from the Radius access request.
- the Radius access request includes at least an AP address configuration attribute
- the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP.
- an embodiment of the present application provides a gateway, including:
- a third sending module configured to send a first packet to an access point AP, where the first packet carries an address of a GW, and the first packet is used to instruct the AP to configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
- a fourth receiving module configured to receive a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP.
- the third sending module is specifically configured to receive a Radius access response returned by an authentication server, and send the Radius access response that carries the address of the GW to the AP directly or by using an access controller (AC).
- AC access controller
- the Radius access response includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment.
- an embodiment of the present application provides a gateway (GW), including:
- a fifth receiving module configured to receive a fourth packet sent by an access point (AP), where the fourth packet carries an address of the AP;
- a second configuring module configured to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP;
- a fourth sending module configured to send a fifth packet to the AP by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- Embodiments of the present application provide a method for implementing a GRE tunnel, an access point, and a gateway. There is no need to separately store an address of a peer end in an AP and a GW by using static configuration. Instead, the AP and the GW obtain and store the address of the peer end in a dynamic interaction process. In addition, data interacted in the GRE tunnel is encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- FIG. 1 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 1 of the present application;
- FIG. 2A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 2 of the present application;
- FIG. 2B to FIG. 2D are schematic diagrams of a network architecture that is applicable to Embodiment 2 of the present application.
- FIG. 3A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 3 of the present application;
- FIG. 3B is a schematic structural diagram of a heterogeneous access network that is applicable to Embodiment 3 of the present application;
- FIG. 4 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 4 of the present application;
- FIG. 5 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 5 of the present application.
- FIG. 6 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 6 of the present application.
- FIG. 7 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 7 of the present application.
- FIG. 8 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 8 of the present application.
- FIG. 9 is a schematic structural diagram of an access point according to Embodiment 9 of the present application.
- FIG. 10 is a schematic structural diagram of an access point according to Embodiment 10 of the present application.
- FIG. 11 is a schematic structural diagram of a gateway according to Embodiment 11 of the present application.
- FIG. 12 is a schematic structural diagram of a gateway according to Embodiment 12 of the present application.
- FIG. 13 is a schematic structural diagram of an access point according to Embodiment 13 of the present application.
- FIG. 14 is a schematic structural diagram of a gateway according to Embodiment 14 of the present application.
- FIG. 1 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 1 of the present application.
- the method may be applicable to establishment of a GRE tunnel between an AP and a GW.
- this embodiment is applicable to establishment of a GRE tunnel in a scenario of a heterogeneous access network, and is also applicable to establishment of a GRE tunnel in a scenario of a WLAN network. Specific implementation solutions under a variety of network architectures are described in detail in subsequent embodiments.
- the method of this embodiment may be implemented by an access point on a terminal side. As shown in FIG. 1 , the method may be performed according to the following process:
- the AP receives a first packet, where the first packet carries an address of the GW.
- the AP configures a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW.
- the AP receives a second packet sent by user equipment.
- the AP performs GRE tunnel encapsulation for the second packet to form a third packet.
- the AP sends the third packet to the GW by using the GRE tunnel, where the third packet carries the address of the AP.
- the first packet may be a newly-defined packet, and may also use a conventional packet that used in various interaction processes, for example, a packet based on the Control And Provisioning of Wireless Access Points (CAPWAP), and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses.
- CAPWAP Control And Provisioning of Wireless Access Points
- Radius authentication so long as the packet enables the AP and the GW to obtain corresponding addresses.
- data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- FIG. 2A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 2 of the present application.
- FIG. 2B to FIG. 2D are schematic diagrams of a network architecture that is applicable to Embodiment 2 of the present application.
- the network is a WLAN network that mainly includes an AP, an AC, and a GW.
- the AC is in bypass mode, and data is forwarded by each AP.
- FIG. 2C the AC is located in a data forwarding path, the data transmitted by each AP is collectively forwarded by the AC.
- the AC and the GW are integrated, which means that the GW combines a function of the AC; alternatively, the AC may be integrated with the AP, and the function of the AC is implemented by the AP.
- the AP specifically obtains an address of the GW by using a packet interacted between the AP and the AC.
- the AP initiates a CAPWAP discovery and registration process to the AC.
- the AP After the AP powers on and starts, the AP initiates the CAPWAP discovery and registration process to the AC.
- the AC sends a CAPWAP packet that carries the address of the GW to the AP.
- the AC configures the address of the GW for the AP by using a CAPWAP protocol.
- the AP obtains the address of the GW from the CAPWAP packet.
- the AP receives the CAPWAP packet sent by the AC, and obtains the address of the GW from the CAPWAP packet.
- the CAPWAP packet is equivalent to a first packet, and the AP may obtain the address of the GW from the first packet.
- the CAPWAP packet may be sent by the AC, or by a network element that functions as the AC.
- the AP receives the CAPWAP packet sent by the AC, where the CAPWAP packet carries the address of the GW.
- the CAPWAP packet is used to configure the address of the GW for the AP; therefore, no additional process is required, and this facilitates improvement and popularization.
- This embodiment may specifically implement the configuration of the address of the GW by adding an attribute to a CAPWAP packet.
- the CAPWAP packet includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- the CAPWAP packet may be a configuration state response packet in the CAPWAP.
- the packet carries the GW address configuration attribute, that is, a GW Address element.
- a format of the CAWWAP configuration state response packet is as follows:
- a format of the GW Address element is defined as follows: Type indicates that a type of the element is GW Address element, and a value that does not conflict with RFC5415 can be selected. Length indicates a length of the value.
- the value is, for example, an IP address of the GW.
- the IP address may be an IPv4 address or an IPv6 address.
- the value may be a plurality of GW addresses that implement the load balancing and a cost value of the GW.
- FIG. 3A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 3 of the present application. This embodiment provides another implementation manner that an AP obtains an address of a GW. As shown in FIG. 3A , the method includes the following:
- the AP sends a Radius access request to the GW.
- the AP when the AP powers on and starts, the AP initiates a user access authentication process, that is, the AP sends the Radius access request.
- the GW forwards the Radius access request to an authentication server.
- the authentication server sends a Radius access response to the GW.
- the GW sends the Radius access response that carries the address of the GW to the AP.
- the AP obtains the address of the GW from the Radius access response that carries the address of the GW.
- the AP initiates the Radius access request to the authentication server by using the GW; and the AP receives the Radius access response returned by the GW, where the Radius access response carries the address of the GW.
- the foregoing solution may be applicable to a WLAN network shown in FIG. 2B to FIG. 2D , and may also be applicable to a heterogeneous access network.
- FIG. 2C On the WLAN network shown in FIG. 2C , only a rule that the AC forwards a Radius access request to the GW and that the AC forwards a Radius access response to the AP need to be added. Details are not described herein again.
- the AP initiates a Radius access request to the authentication server by using the GW.
- the authentication server may be an authentication authorization accounting (AAA) proxy. That is, after the AP initiates a user authentication process to the GW, the GW initiates the Radius access request to the authentication server.
- AAA authentication authorization accounting
- the authentication server returns the Radius access response to the AP by using the GW, the GW includes its own address in the Radius access response, and the AP obtains the address of the GW from the Radius access response after the AP receives the Radius access response.
- FIG. 3B is a schematic structural diagram of the heterogeneous access network that is applicable to Embodiment 3 of the present application.
- the network includes: a home gateway (HG), an access network A and an access network B that run different network protocols, a gateway A, a gateway B, and an aggregation gateway (AG).
- the HG is equivalent to the AP
- the AG is equivalent to the GW.
- An independent AC may not be set; instead, a function of the AC may be integrated into another network element.
- the heterogeneous access network mainly refers to an access network of an aggregation architecture that is formed by interconnecting access networks running different network protocols, for example, an access network formed by interconnection of different protocol clusters such as the Transmission Control Protocol (TCP)/Internet Protocol (IP), and the Internetwork Packet Exchange protocol (IPX)/Sequenced Packet Exchange protocol (SPX).
- TCP Transmission Control Protocol
- IP Internet Protocol
- SPX Sequenced Packet Exchange protocol
- User access bandwidth may be enhanced by binding multiple links.
- the HG initiates the Radius access request to the authentication server by using the AG.
- the AG includes its own address in the Radius access response, and the HG obtains the address of the AG from the Radius access response.
- the Radius access response includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- An advantage in doing this is that it may reduce a signaling overhead for establishing a GRE tunnel, and improve efficiency in establishing the GRE tunnel.
- the GW address configuration attribute included in the Radius access response may be an extended Radius attribute that carries the address of the GW.
- a format of the attribute is:
- a value of Type is a reserved value.
- Length indicates a length of a string.
- String indicates, for example, an IP address of the GW.
- the address may be an IPv4 address or an IPv6 address.
- FIG. 4 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 4 of the present application.
- the method provides a manner for configuring an address of an AP for a GW.
- the method may include the following:
- User equipment sends a second packet to the AP.
- the AP performs GRE tunnel encapsulation for the second packet to form a third packet, where an address of the GW is a destination address of the GRE encapsulation.
- the AP sends the third packet to the GW.
- the GW learns the address of the AP from the third packet.
- the AP encapsulates and sends upstream data to be sent, so that the GW obtains the address of the AP from the upstream data, where the destination address of the GRE tunnel on the AP side is adopted as the destination address of the encapsulation.
- This embodiment may also be applicable to the scenarios shown in FIG. 2B to FIG. 2D , and may also be applicable to the heterogeneous access network shown in FIG. 3B .
- FIG. 5 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 5 of the present application. This method may also be applicable to a variety of network architectures of an AP and a GW. The method of this embodiment may be implemented by an access point on a terminal side. As shown in FIG. 5 , the method may be performed according to the following process:
- the AP sends a fourth packet to the GW, where the fourth packet carries an address of the AP, and the fourth packet is used to instruct the GW to configure a GRE tunnel to the AP, and a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP.
- the AP receives a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- the fourth packet may be a newly-defined packet, and may also use an existing packet in various interaction processes, for example, a CAPWAP-based packet, and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses.
- a CAPWAP-based packet for example, a CAPWAP-based packet
- a packet in a process of Radius authentication so long as the packet enables the AP and the GW to obtain corresponding addresses.
- data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- FIG. 6 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 6 of the present application. As shown in FIG. 6 , this embodiment provides a manner used by a GW to obtain an address of an AP. The method specially includes:
- the AP sends a Radius access request that carries the address of the AP to the GW.
- the GW obtains the address of the AP from the Radius access request.
- the GW forwards the Radius access request to an authentication server.
- the AP initiates the Radius access request to the authentication server by using the GW, where the Radius access request carries the address of the AP, so that the GW obtains the address of the AP from the Radius access request.
- the foregoing solution may be applicable to the WLAN network shown in FIG. 2B to FIG. 2D , and may also be applicable to the heterogeneous access network shown in FIG. 3B .
- An AC that is deployed in a data transmission path on a WLAN network and is responsible for route forwarding is used as an example.
- the AC completes a user authentication process. That is, the AP initiates, by using the AC, the Radius access request to the authentication server by using the GW, and the AP includes its own address in the Radius access request.
- the GW obtains the address of the AP from the Radius access request when the Radius access request passes the GW.
- the HG when an HG initiates the Radius access request to the authentication server by using an AG, the HG includes its own address in the Radius access request.
- the AG obtains the address of the HG from the Radius access request when the Radius access request passes the AG.
- the Radius access request includes at least an AP address configuration attribute
- the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP.
- An advantage in doing this is that it may reduce a signaling overhead for establishing the GRE tunnel, and improve efficiency in establishing the GRE tunnel.
- the AP address configuration attribute included in the Radius access request may be an extended Radius attribute that carries the address of the AP.
- a format of the attribute is:
- a value of Type is a reserved value.
- Length indicates a length of a string.
- String indicates, for example, an IP address of the AP.
- the address may be an IPv4 address or an IPv6 address.
- the AP obtains two or more addresses of the GW, the AP obtains an access cost of each GW from a first address configuration message, and selects a GW with a lower access cost.
- the AP configures an address of the GW with a lower access cost locally as a destination address of the GRE tunnel.
- FIG. 7 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 7 of the present application.
- the method may be applicable to establishment of a GRE tunnel between an AP and a GW.
- the network architectures may all be applicable to a technical solution of this embodiment.
- the method of this embodiment may be implemented by a GW on a network side. As shown in FIG. 7 , the method may be performed according to the following process:
- the GW sends a first packet to the AP, where the first packet carries an address of the GW, and the first packet is used to instruct the AP to configure a GRE tunnel to the GW.
- a source address of the GRE tunnel is an address of the AP
- a destination address of the GRE tunnel is the address of the GW.
- the GW receives a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP.
- the first packet may be a newly-defined packet, and may also use an existing packet in various interaction processes, for example, a CAPWAP-based packet and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses.
- a CAPWAP-based packet and a packet in a process of Radius authentication
- data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- That the GW sends a first packet to the AP may specifically be: the GW receives a Radius access response returned by an authentication server, and sends the Radius access response that carries the address of the GW to the AP directly or by using an AC. Refer to the process described in the foregoing Embodiment 3. Details are not described herein again.
- the Radius access response includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- That the GW receives a third packet sent by the AP may specifically be: the GW receives upstream data sent by the AP by using the GRE tunnel, where a destination address for encapsulating the upstream data is the address of the GW, and the GW obtains, by parsing, the address of the AP from the upstream data. That is, the third packet is formed by encapsulating the upstream data; in other words, the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment. Refer to the process described in the foregoing Embodiment 4. Details are not described herein again.
- FIG. 8 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 8 of the present application.
- the method may be applicable to establishment of the GRE tunnel between an AP and a GW.
- the method of this embodiment may be implemented by a GW on a network side. As shown in FIG. 8 , the method may be performed according to the following process:
- the GW receives a fourth packet sent by the AP, where the fourth packet carries an address of the AP.
- the GW configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address the GRE tunnel is the address of the AP.
- the GW sends a fifth packet to the AP by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure the GRE tunnel to the GW.
- the fourth packet may be a newly-defined packet, and may also use an existing packet in various interaction processes, for example, a CAPWAP-based packet, and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses.
- a CAPWAP-based packet for example, a CAPWAP-based packet
- a packet in a process of Radius authentication so long as the packet enables the AP and the GW to obtain corresponding addresses.
- data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- That the GW receives a fourth packet sent by the AP may specifically be: the GW receives a Radius access response returned by an authentication server, and the GW sends the Radius access response that carries the address of the GW to the AP directly or by using an AC, so that the AP obtains the address of the GW from the Radius access response.
- the GW receives a Radius access response returned by an authentication server, and the GW sends the Radius access response that carries the address of the GW to the AP directly or by using an AC, so that the AP obtains the address of the GW from the Radius access response.
- the method may further include: the GW sends its own access cost to the AP, so that the AP selects a GW according to access costs of at least two GWs.
- multiple GRE tunnels may be configured for the AP.
- the AP selects the GRE tunnel to transmit data, it may weigh and preferentially select, according to an access cost (for example, a cost value) of a GW at the peer end of the GRE tunnel, a GRE tunnel with a lower access cost.
- an access cost for example, a cost value
- the address of the AP or the address of the GW may be an IP address of the AP or an IP address of the GW.
- FIG. 9 is a schematic structural diagram of an access point according to Embodiment 9 of the present application.
- the access point may include: a first receiving module 91 , a first configuring module 92 , a second receiving module 93 , an encapsulating module 94 , and a first sending module 95 , where the first receiving module 91 may be configured to receive a first packet, and the first packet carries an address of a GW; the first configuring module 92 may be configured to configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW; the second receiving module 93 may be configured to receive a second packet sent by user equipment; the encapsulating module 94 may be configured to perform the GRE tunnel encapsulation for the second packet to form a third packet; and the first sending module 95 may be configured to send the third packet to the GW by using the GRE tunnel, where the third
- the first receiving module 91 is specifically configured to receive a Control and Provisioning of Wireless Access Points CAPWAP packet sent by an AC, where the CAPWAP packet carries the address of the GW.
- the CAPWAP packet includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW
- the first receiving module 91 is specifically configured to initiate a Radius access request to an authentication server by using the GW, and receive a Radius access response returned by the GW, where the Radius access response carries the address of the GW.
- the Radius access response includes at least the GW address configuration attribute, and the GW address configuration attribute includes the type field, the length field, and the attribute value field, where the value of the type field is used to identify the attribute as the GW address configuration attribute, and the value of the attribute value field is the address of the GW.
- An apparatus in this embodiment may be used to perform the technical solution in method embodiments shown in FIG. 1 to FIG. 4 .
- FIG. 10 is a schematic structural diagram of an access point according to Embodiment 10 of the present application.
- the access point may include: a second sending module 1001 and a third receiving module 1002 , where the second sending module 1001 may be configured to send a fourth packet to a GW, and the fourth packet carries an address of an AP and is used to instruct the GW to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address the GW, and a destination address of the GRE tunnel is the address of the AP.
- the third receiving module 1002 may be configured to receive a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- the second sending module 1001 is specifically configured to initiate a Radius access request to an authentication server via the GW, where the Radius access request carries the address of the AP, so that the GW obtains the address of the AP from the Radius access request.
- the Radius access request includes at least an AP address configuration attribute
- the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP.
- An apparatus of this embodiment may be used to perform the technical solution in method embodiments shown in FIG. 5 and FIG. 6 .
- FIG. 11 is a schematic structural diagram of a gateway according to Embodiment 11 of the present application.
- the gateway may include: a third sending module 1101 and a fourth receiving module 1102 , where the third sending module 1101 may be configured to send a first packet to an access point AP, and the first packet carries an address of the GW and is used to instruct the AP configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address the AP, and a destination address of the GRE tunnel is the address of the GW
- the fourth receiving module 1102 may be configured to receive a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP.
- the third sending module 1101 is specifically configured to receive a Radius access response returned by an authentication server, and send the Radius access response that carries the address of the GW to the AP directly or by using an access controller AC.
- the Radius access response includes at least a GW address configuration attribute
- the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment.
- An apparatus in this embodiment may be used to perform the technical solution in the method embodiment shown in FIG. 7 .
- An apparatus in this embodiment may be used to perform the technical solution in the method embodiment shown in FIG. 7 .
- FIG. 12 is a schematic structural diagram of a gateway according to Embodiment 12 of the present application.
- the gateway may include: a fifth receiving module 1201 , a second configuring module 1202 , and a fourth sending module 1203 .
- the fifth receiving module 1201 may be configured to receive a fourth packet sent by an access point AP, and the fourth packet carries an address of the AP.
- the second configuring module 1202 may be configured to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of a GW, and a destination address of the GRE tunnel is the address of the AP.
- the fourth sending module 1203 may be configured to send a fifth packet to the AP by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- An apparatus in this embodiment may be used to perform the technical solution in the method embodiment shown in FIG. 8 .
- An apparatus in this embodiment may be used to perform the technical solution in the method embodiment shown in FIG. 8 .
- FIG. 13 is a schematic structural diagram of an access point according to Embodiment 13 of the present application.
- the access point may include: a transmitter 1301 , a receiver 1302 , a memory 1303 , and a processor 1304 that is separately connected to the transmitter 1301 , the receiver 1302 , and the memory 1303 .
- the memory 1303 stores a group of program code
- the processor 1304 is configured to invoke the program code stored in the memory 1303 , which may perform the technical solution in the method embodiments shown in FIG. 1 to FIG. 6 .
- FIG. 13 For a specific function, refer to the foregoing method embodiments. Details are not described herein again.
- FIG. 14 is a schematic structural diagram of a gateway according to Embodiment 14 of the present application.
- the access point may include: a transmitter 1401 , a receiver 1402 , a memory 1403 , and a processor 1404 that is separately connected to the transmitter 1401 , the receiver 1402 , and memory 1403 .
- the memory 1403 stores a group of program code
- the processor 1404 is configured to invoke the program code stored in the memory 1403 , which may perform the technical solutions in the method embodiments shown in FIG. 7 and FIG. 8 .
- FIG. 7 and FIG. 8 For a specific function, refer to the foregoing method embodiments. Details are not described herein again.
- the foregoing program may be stored in a computer readable storage medium. When the program runs, the method embodiments are performed.
- the foregoing storage medium includes any medium that may store program code, such as a ROM, a RAM, a magnetic disk, or an optical disc.
Abstract
A method for implementing a GRE tunnel, an access point (AP), and a gateway (GW). The method includes: the AP receives a first packet, where the first packet carries an address of the GW; configures a GRE tunnel to the GW, where a source destination of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW; the AP receives a second packet sent by user equipment; performs GRE tunnel encapsulation for the second packet to form a third packet; and the AP sends the third packet to the GW by using the GRE tunnel, where the third packet carries the address of the AP. The embodiments of the present application enable efficient establishment of the GRE tunnel between the AP and the GW if there are a large quantity of APs.
Description
- This application is a continuation of U.S. patent application Ser. No. 14/991,497, filed on Jan. 8, 2016, which is a continuation of International Application No. PCT/CN2013/079168, filed on Jul. 10, 2013. The disclosures of the aforementioned applications are hereby incorporated by reference in their entireties.
- Embodiments of the present application relate to communications technologies, and in particular, to a method for implementing a GRE tunnel, an access point, and a gateway.
- In actual network transmission, an operator usually implements service transmission for a user by configuring a tunnel, such as a virtual local area network (VLAN), and a pseudo wire (PW) tunnel. However, to configure these tunnels, a network and a network device must meet certain functional requirements. For example, when a PW tunnel is configured, both a provider edge device (Provider Edge, PE for short) and a provider core device (P device) on a network need to support label forwarding. Whereas a generic routing encapsulation (GRE) tunnel is a simple data tunnel, in which the tunnel configurations can be ensured only when the edge device of the tunnel is ensured. Therefore, the GRE technology receives extensive attention from equipment vendors and operators.
- On a wireless local access network (WLAN), the GRE tunnel is especially useful. Generally, a WLAN network architecture includes an access point (AP), an access controller (AC), and a gateway (GW). The AP is a network element that is deployed on a side of a terminal and is accessed by the terminal. For example, a wireless fidelity (WiFi) hot spot is an AP. The AC is configured to control an access network element, for example, configuration of AP information. The AC may be deployed in a data transmission path and is responsible for routing and forwarding and may also be connected only to the GW and is responsible for access control. The GW, also referred to as a WLAN GW, is a WLAN gateway device and is responsible for managing a WLAN user. The WLAN GW includes functions of a broadband remote access server (BRAS)/a broadband network gateway (BNG) on an operator's network. It is a tendency in the future that a single WLAN GW is deployed to complete various management on the WLAN user, including accounting, policy, quality of service (QoS), and the like.
- At present, the WLAN GW serves as a default WLAN gateway. User data of a terminal device of the WLAN, for example, user equipment (UE) or a personal computer (PC), is expected to be sent to the WLAN GW by using a Layer 2 network or a Layer 3 network. In this scenario, a generic data transmission mechanism needs to be provided. Because deployment of a PW and a VLAN has a certain functional requirement for the network and the network device between the AP and the WLAN GW, to reduce a requirement for a transmission network, many equipment vendors and operators all prefer implementing data routing between the AP and the WLAN GW by using the GRE technology.
- However, in an existing GRE tunnel, it is necessary to configure addresses of a source node and a destination node as the destination addresses of the tunnel on the source node and the destination node of the GRE tunnel, that is, to implement static configuration of the GRE tunnel. It is very difficult to implement the static configuration due to a large quantity of APs. The configuration not only involves a heavy workload, but also is error-prone, thereby greatly increasing work costs for the operator.
- Embodiments of the present application provide a method for implementing a GRE tunnel, an access point, and a gateway.
- According to a first aspect, an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- receiving, by an access point (AP), a first packet, where the first packet carries an address of a gateway (GW);
- configuring, by the AP a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
- receiving, by the AP, a second packet sent by user equipment;
- performing, by the AP, GRE tunnel encapsulation for the second packet to form a third packet; and
- sending, by the AP, the third packet to the GW by using the GRE tunnel, where the third packet carries the address of the AP.
- In a first possible implementation manner of the first aspect, the receiving, by the AP, the first packet, where the first packet carries the address of a GW, includes:
- receiving, by the AP, a Control And Provisioning of Wireless Access Points (CAPWAP) packet sent by an access controller (AC), where the CAPWAP packet carries the address of the GW.
- With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner, the CAPWAP packet includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- In a third possible implementation manner of the first aspect, the receiving, by the AP, the first packet, where the first packet carries the address of a GW, includes:
- initiating, by the AP, a Remote Authentication Dial In User Service Radius access request to an authentication server through the GW; and
- receiving, by the AP, a Radius access response returned by the GW, where the Radius access response carries the address of the GW.
- With reference to the third possible implementation manner of the first aspect, in a fourth possible implementation manner, the Radius access response includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- According to a second aspect, an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- sending, by an access point (AP), a fourth packet to a gateway (GW), where the fourth packet carries an address of the AP, and the fourth packet is used to instruct the GW to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP; and
- receiving, by the AP, a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- In a first possible implementation manner of the second aspect, the sending, by the AP, the fourth packet to the GW, where the fourth packet carries the address of the AP, includes:
- initiating, by the AP, a Radius access request to an authentication server by using the GW, where the Radius access request carries the address of the AP, so that the GW obtains the address of the AP from the Radius access request.
- With reference to the first possible implementation manner of the second aspect, in a second possible implementation manner, the Radius access request includes at least an AP address configuration attribute, and the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP.
- According to a third aspect, an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- sending, by a gateway (GW), a first packet to an access point (AP), where the first packet carries an address of the GW, and the first packet is used to instruct the AP to configure a GRE tunnel to the GW, and a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW; and
- receiving, by the GW, a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP.
- In a first possible implementation manner of the third aspect, the sending, by the GW, the first packet to the AP, where the first packet carries the address of the GW, includes:
- receiving, by the GW, a Radius access response returned by an authentication server, and sending the Radius access response that carries the address of the GW to the AP directly or by using an access controller AC.
- With reference to the first possible implementation manner of the third aspect, in a second possible implementation manner, the Radius access response includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- In a third possible implementation manner of the third aspect, the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment.
- According to a fourth aspect, an embodiment of the present application provides a method for implementing a generic routing encapsulation (GRE) tunnel, including:
- receiving, by a gateway (GW), a fourth packet sent by an access point (AP), where the fourth packet carries an address of the AP;
- configuring, by the GW, a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP; and
- sending, by the GW, a fifth packet to the AP by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- According to a fifth aspect, an embodiment of the present application provides an access point, including:
- a first receiving module, configured to receive a first packet, where the first packet carries an address of a gateway GW;
- a first configuring module, configured to configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
- a second receiving module, configured to receive a second packet sent by user equipment;
- an encapsulating module, configured to perform GRE tunnel encapsulation for the second packet to form a third packet; and
- a first sending module, configured to send the third packet to the GW by using the GRE tunnel, where the third packet carries the address of the AP.
- In a first possible implementation manner of the fifth aspect, the first receiving module is specifically configured to receive a Control And Provisioning of Wireless Access Points (CAPWAP) packet sent by an access controller AC, and the CAPWAP packet carries the address of the GW.
- With reference to the first possible implementation manner of the fifth aspect, in a second possible implementation manner, the CAPWAP packet includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- In a third possible implementation manner of the fifth aspect, the first receiving module is specifically configured to initiate a Radius access request to an authentication server by using the GW, and receive a Radius access response returned by the GW, where the Radius access response carries the address of the GW.
- With reference to the third possible implementation manner of the fifth aspect, in a fourth possible implementation manner, the Radius access response includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- According to a sixth aspect, an embodiment of the present application provides an access point, including:
- a second sending module, configured to send a fourth packet to a gateway (GW), where the fourth packet carries an address of an AP, and the fourth packet is used to instruct the GW to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP; and
- a third receiving module, configured to receive a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure the GRE tunnel to the GW.
- In a first possible implementation manner of the sixth aspect, the second sending module is specifically configured to initiate a Radius access request to an authentication server by using the GW, where the Radius access request carries an address of the AP, so that the GW obtains the address of the AP from the Radius access request.
- With reference to the first possible implementation manner of the sixth aspect, in a second possible implementation manner, the Radius access request includes at least an AP address configuration attribute, and the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP.
- According to a seventh aspect, an embodiment of the present application provides a gateway, including:
- a third sending module, configured to send a first packet to an access point AP, where the first packet carries an address of a GW, and the first packet is used to instruct the AP to configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW; and
- a fourth receiving module, configured to receive a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP.
- In a first possible implementation manner of the seventh aspect, the third sending module is specifically configured to receive a Radius access response returned by an authentication server, and send the Radius access response that carries the address of the GW to the AP directly or by using an access controller (AC).
- With reference to the first possible implementation manner of the seventh aspect, in a second possible implementation manner, the Radius access response includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- In a third possible implementation manner of the seventh aspect, the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment.
- According to an eighth aspect, an embodiment of the present application provides a gateway (GW), including:
- a fifth receiving module, configured to receive a fourth packet sent by an access point (AP), where the fourth packet carries an address of the AP;
- a second configuring module, configured to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP; and
- a fourth sending module, configured to send a fifth packet to the AP by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- Embodiments of the present application provide a method for implementing a GRE tunnel, an access point, and a gateway. There is no need to separately store an address of a peer end in an AP and a GW by using static configuration. Instead, the AP and the GW obtain and store the address of the peer end in a dynamic interaction process. In addition, data interacted in the GRE tunnel is encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- To describe the technical solutions in the embodiments of the present application more clearly, the following briefly describes the accompanying drawings required for describing the embodiments. Apparently, the accompanying drawings in the following description show merely some embodiments of the present application, and a person of ordinary skill in the art may still derive other drawings from these accompanying drawings without creative efforts.
-
FIG. 1 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 1 of the present application; -
FIG. 2A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 2 of the present application; -
FIG. 2B toFIG. 2D are schematic diagrams of a network architecture that is applicable to Embodiment 2 of the present application; -
FIG. 3A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 3 of the present application; -
FIG. 3B is a schematic structural diagram of a heterogeneous access network that is applicable to Embodiment 3 of the present application; -
FIG. 4 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 4 of the present application; -
FIG. 5 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 5 of the present application; -
FIG. 6 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 6 of the present application; -
FIG. 7 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 7 of the present application; -
FIG. 8 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 8 of the present application; -
FIG. 9 is a schematic structural diagram of an access point according to Embodiment 9 of the present application; -
FIG. 10 is a schematic structural diagram of an access point according to Embodiment 10 of the present application; -
FIG. 11 is a schematic structural diagram of a gateway according to Embodiment 11 of the present application; -
FIG. 12 is a schematic structural diagram of a gateway according to Embodiment 12 of the present application; -
FIG. 13 is a schematic structural diagram of an access point according to Embodiment 13 of the present application; and -
FIG. 14 is a schematic structural diagram of a gateway according to Embodiment 14 of the present application. - The following clearly describes the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Apparently, the described embodiments are merely a part rather than all of the embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without creative efforts shall fall within the protection scope of the present application.
-
FIG. 1 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 1 of the present application. The method may be applicable to establishment of a GRE tunnel between an AP and a GW. There are multiple types of network architectures that include the AP and the GW. These architectures are all applicable to a technical solution of this embodiment. For example, this embodiment is applicable to establishment of a GRE tunnel in a scenario of a heterogeneous access network, and is also applicable to establishment of a GRE tunnel in a scenario of a WLAN network. Specific implementation solutions under a variety of network architectures are described in detail in subsequent embodiments. - The method of this embodiment may be implemented by an access point on a terminal side. As shown in
FIG. 1 , the method may be performed according to the following process: - 101: The AP receives a first packet, where the first packet carries an address of the GW.
- 102: The AP configures a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW.
- 103: The AP receives a second packet sent by user equipment.
- 104: The AP performs GRE tunnel encapsulation for the second packet to form a third packet.
- 105: The AP sends the third packet to the GW by using the GRE tunnel, where the third packet carries the address of the AP.
- In the technical solution of this embodiment, the first packet may be a newly-defined packet, and may also use a conventional packet that used in various interaction processes, for example, a packet based on the Control And Provisioning of Wireless Access Points (CAPWAP), and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses. In this embodiment, there is no need to separately store an address of a peer end in the AP and the GW by using static configuration. Instead, the AP and the GW obtain and store the address of the peer end in a dynamic interaction process. In addition, data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- The technical solution of this embodiment of the present application may be applicable to a variety of network architectures, and be implemented by using an existing process. Details are described as follows:
-
FIG. 2A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 2 of the present application.FIG. 2B toFIG. 2D are schematic diagrams of a network architecture that is applicable to Embodiment 2 of the present application. As shown inFIG. 2B ,FIG. 2C , andFIG. 2D , the network is a WLAN network that mainly includes an AP, an AC, and a GW. InFIG. 2B , the AC is in bypass mode, and data is forwarded by each AP. InFIG. 2C , the AC is located in a data forwarding path, the data transmitted by each AP is collectively forwarded by the AC. InFIG. 2D , the AC and the GW are integrated, which means that the GW combines a function of the AC; alternatively, the AC may be integrated with the AP, and the function of the AC is implemented by the AP. - With regard to a network condition of the WLAN, in this embodiment, the AP specifically obtains an address of the GW by using a packet interacted between the AP and the AC.
- 201: The AP initiates a CAPWAP discovery and registration process to the AC.
- After the AP powers on and starts, the AP initiates the CAPWAP discovery and registration process to the AC.
- 202: The AC sends a CAPWAP packet that carries the address of the GW to the AP.
- In a data negotiation process between the AP and the AC, the AC configures the address of the GW for the AP by using a CAPWAP protocol.
- 203: The AP obtains the address of the GW from the CAPWAP packet.
- In 203, the AP receives the CAPWAP packet sent by the AC, and obtains the address of the GW from the CAPWAP packet. Herein, the CAPWAP packet is equivalent to a first packet, and the AP may obtain the address of the GW from the first packet. In different network architectures, the CAPWAP packet may be sent by the AC, or by a network element that functions as the AC.
- In the foregoing embodiment, the AP receives the CAPWAP packet sent by the AC, where the CAPWAP packet carries the address of the GW. The CAPWAP packet is used to configure the address of the GW for the AP; therefore, no additional process is required, and this facilitates improvement and popularization.
- This embodiment may specifically implement the configuration of the address of the GW by adding an attribute to a CAPWAP packet. The CAPWAP packet includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW. For example, the CAPWAP packet may be a configuration state response packet in the CAPWAP. The packet carries the GW address configuration attribute, that is, a GW Address element.
- A format of the CAWWAP configuration state response packet is as follows:
- A format of the GW Address element is defined as follows:
Type indicates that a type of the element is GW Address element, and a value that does not conflict with RFC5415 can be selected. Length indicates a length of the value. The value is, for example, an IP address of the GW. The IP address may be an IPv4 address or an IPv6 address. When load balancing is used, the value may be a plurality of GW addresses that implement the load balancing and a cost value of the GW. -
FIG. 3A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 3 of the present application. This embodiment provides another implementation manner that an AP obtains an address of a GW. As shown inFIG. 3A , the method includes the following: - 301: The AP sends a Radius access request to the GW.
- Specifically, when the AP powers on and starts, the AP initiates a user access authentication process, that is, the AP sends the Radius access request.
- 302: The GW forwards the Radius access request to an authentication server.
- 303: The authentication server sends a Radius access response to the GW.
- 304: The GW sends the Radius access response that carries the address of the GW to the AP.
- 305: The AP obtains the address of the GW from the Radius access response that carries the address of the GW.
- In the foregoing embodiment, the AP initiates the Radius access request to the authentication server by using the GW; and the AP receives the Radius access response returned by the GW, where the Radius access response carries the address of the GW. The foregoing solution may be applicable to a WLAN network shown in
FIG. 2B toFIG. 2D , and may also be applicable to a heterogeneous access network. On the WLAN network shown inFIG. 2C , only a rule that the AC forwards a Radius access request to the GW and that the AC forwards a Radius access response to the AP need to be added. Details are not described herein again. - Aggregation of the AC and the GW on the WLAN network is used as an example. As shown in
FIG. 2D , the AP initiates a Radius access request to the authentication server by using the GW. The authentication server may be an authentication authorization accounting (AAA) proxy. That is, after the AP initiates a user authentication process to the GW, the GW initiates the Radius access request to the authentication server. When the authentication server returns the Radius access response to the AP by using the GW, the GW includes its own address in the Radius access response, and the AP obtains the address of the GW from the Radius access response after the AP receives the Radius access response. -
FIG. 3B is a schematic structural diagram of the heterogeneous access network that is applicable to Embodiment 3 of the present application. As shown inFIG. 3B , the network includes: a home gateway (HG), an access network A and an access network B that run different network protocols, a gateway A, a gateway B, and an aggregation gateway (AG). The HG is equivalent to the AP, and the AG is equivalent to the GW. An independent AC may not be set; instead, a function of the AC may be integrated into another network element. The heterogeneous access network mainly refers to an access network of an aggregation architecture that is formed by interconnecting access networks running different network protocols, for example, an access network formed by interconnection of different protocol clusters such as the Transmission Control Protocol (TCP)/Internet Protocol (IP), and the Internetwork Packet Exchange protocol (IPX)/Sequenced Packet Exchange protocol (SPX). User access bandwidth may be enhanced by binding multiple links. - In a scenario of the heterogeneous access network, the HG initiates the Radius access request to the authentication server by using the AG. When the Radius access response returned by the authentication server is returned to the HG by using the AG, the AG includes its own address in the Radius access response, and the HG obtains the address of the AG from the Radius access response.
- In this embodiment, the Radius access response includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW. An advantage in doing this is that it may reduce a signaling overhead for establishing a GRE tunnel, and improve efficiency in establishing the GRE tunnel. For example, the GW address configuration attribute included in the Radius access response may be an extended Radius attribute that carries the address of the GW. A format of the attribute is:
- A value of Type is a reserved value. Length indicates a length of a string. String indicates, for example, an IP address of the GW. The address may be an IPv4 address or an IPv6 address.
-
FIG. 4 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 4 of the present application. The method provides a manner for configuring an address of an AP for a GW. As shown inFIG. 4 , the method may include the following: - 401: User equipment sends a second packet to the AP.
- 402: The AP performs GRE tunnel encapsulation for the second packet to form a third packet, where an address of the GW is a destination address of the GRE encapsulation.
- 403: The AP sends the third packet to the GW.
- 404: The GW learns the address of the AP from the third packet.
- In the foregoing embodiment, after the address of the GW is configured as a destination address of the GRE tunnel on an AP side, the AP encapsulates and sends upstream data to be sent, so that the GW obtains the address of the AP from the upstream data, where the destination address of the GRE tunnel on the AP side is adopted as the destination address of the encapsulation. This embodiment may also be applicable to the scenarios shown in
FIG. 2B toFIG. 2D , and may also be applicable to the heterogeneous access network shown inFIG. 3B . -
FIG. 5 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 5 of the present application. This method may also be applicable to a variety of network architectures of an AP and a GW. The method of this embodiment may be implemented by an access point on a terminal side. As shown inFIG. 5 , the method may be performed according to the following process: - 501: The AP sends a fourth packet to the GW, where the fourth packet carries an address of the AP, and the fourth packet is used to instruct the GW to configure a GRE tunnel to the AP, and a source address of the GRE tunnel is an address of the GW, and a destination address of the GRE tunnel is the address of the AP.
- 502: The AP receives a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW.
- In a technical solution of this embodiment, the fourth packet may be a newly-defined packet, and may also use an existing packet in various interaction processes, for example, a CAPWAP-based packet, and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses. In this embodiment, there is no need to separately store an address of a peer end in the AP and the GW by using static configuration. Instead, the AP and the GW obtain and store the address of the peer end in a dynamic interaction process. In addition, data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- The technical solution of this embodiment of the present application may be applicable to a variety of network architectures, and be implemented by using an existing process. Details are described as follows:
-
FIG. 6 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 6 of the present application. As shown inFIG. 6 , this embodiment provides a manner used by a GW to obtain an address of an AP. The method specially includes: - 601: The AP sends a Radius access request that carries the address of the AP to the GW.
- 602: The GW obtains the address of the AP from the Radius access request.
- 603: The GW forwards the Radius access request to an authentication server.
- In the foregoing embodiment, the AP initiates the Radius access request to the authentication server by using the GW, where the Radius access request carries the address of the AP, so that the GW obtains the address of the AP from the Radius access request. The foregoing solution may be applicable to the WLAN network shown in
FIG. 2B toFIG. 2D , and may also be applicable to the heterogeneous access network shown inFIG. 3B . - An AC that is deployed in a data transmission path on a WLAN network and is responsible for route forwarding is used as an example. As shown in
FIG. 2C , when the AP accesses the WLAN network, the AC completes a user authentication process. That is, the AP initiates, by using the AC, the Radius access request to the authentication server by using the GW, and the AP includes its own address in the Radius access request. The GW obtains the address of the AP from the Radius access request when the Radius access request passes the GW. - In a scenario of the heterogeneous access network, when an HG initiates the Radius access request to the authentication server by using an AG, the HG includes its own address in the Radius access request. The AG obtains the address of the HG from the Radius access request when the Radius access request passes the AG.
- In this embodiment, the Radius access request includes at least an AP address configuration attribute, and the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP. An advantage in doing this is that it may reduce a signaling overhead for establishing the GRE tunnel, and improve efficiency in establishing the GRE tunnel. For example, the AP address configuration attribute included in the Radius access request may be an extended Radius attribute that carries the address of the AP. A format of the attribute is:
- A value of Type is a reserved value. Length indicates a length of a string. String indicates, for example, an IP address of the AP. The address may be an IPv4 address or an IPv6 address.
- Optionally, on the basis of the foregoing embodiment, if the AP obtains two or more addresses of the GW, the AP obtains an access cost of each GW from a first address configuration message, and selects a GW with a lower access cost. The AP configures an address of the GW with a lower access cost locally as a destination address of the GRE tunnel.
-
FIG. 7 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 7 of the present application. The method may be applicable to establishment of a GRE tunnel between an AP and a GW. There are a variety of network architectures that include the AP and the GW. The network architectures may all be applicable to a technical solution of this embodiment. The method of this embodiment may be implemented by a GW on a network side. As shown inFIG. 7 , the method may be performed according to the following process: - 701: The GW sends a first packet to the AP, where the first packet carries an address of the GW, and the first packet is used to instruct the AP to configure a GRE tunnel to the GW. A source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW.
- 702: The GW receives a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP.
- In this embodiment, the first packet may be a newly-defined packet, and may also use an existing packet in various interaction processes, for example, a CAPWAP-based packet and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses. In this embodiment, there is no need to separately store an address of a peer end in the AP and the GW by using static configuration. Instead, the AP and the GW obtain and store the address of the peer end in a dynamic interaction process. In addition, data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- That the GW sends a first packet to the AP may specifically be: the GW receives a Radius access response returned by an authentication server, and sends the Radius access response that carries the address of the GW to the AP directly or by using an AC. Refer to the process described in the foregoing Embodiment 3. Details are not described herein again.
- In this embodiment, the Radius access response includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW. Refer to the process of Embodiment 3. Details are not described herein again.
- That the GW receives a third packet sent by the AP may specifically be: the GW receives upstream data sent by the AP by using the GRE tunnel, where a destination address for encapsulating the upstream data is the address of the GW, and the GW obtains, by parsing, the address of the AP from the upstream data. That is, the third packet is formed by encapsulating the upstream data; in other words, the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment. Refer to the process described in the foregoing Embodiment 4. Details are not described herein again.
-
FIG. 8 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 8 of the present application. The method may be applicable to establishment of the GRE tunnel between an AP and a GW. There are a variety of network architectures that include the AP and the GW, and the network architectures may all be applicable to a technical solution of the embodiment. The method of this embodiment may be implemented by a GW on a network side. As shown inFIG. 8 , the method may be performed according to the following process: - 801: The GW receives a fourth packet sent by the AP, where the fourth packet carries an address of the AP.
- 802: The GW configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of the GW, and a destination address the GRE tunnel is the address of the AP.
- 803: The GW sends a fifth packet to the AP by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure the GRE tunnel to the GW.
- In this embodiment, the fourth packet may be a newly-defined packet, and may also use an existing packet in various interaction processes, for example, a CAPWAP-based packet, and a packet in a process of Radius authentication, so long as the packet enables the AP and the GW to obtain corresponding addresses. In this embodiment, there is no need to separately store an address of a peer end in the AP and the GW by using static configuration. Instead, the AP and the GW obtain and store the address of the peer end in a dynamic interaction process. In addition, data interacted in the GRE tunnel is actually encapsulated and sent by using the address of the peer end as a destination address without a need to maintain a status of the GRE tunnel. Therefore, a dynamic GRE tunnel can be flexibly and easily established, and signaling costs are low.
- That the GW receives a fourth packet sent by the AP may specifically be: the GW receives a Radius access response returned by an authentication server, and the GW sends the Radius access response that carries the address of the GW to the AP directly or by using an AC, so that the AP obtains the address of the GW from the Radius access response. Refer to the process described in the foregoing Embodiment 3. Details are not described herein again.
- Optionally, on the basis of the foregoing embodiment, the method may further include: the GW sends its own access cost to the AP, so that the AP selects a GW according to access costs of at least two GWs. Specifically, to prevent a data transmission failure of the GRE tunnel caused by a fault, multiple GRE tunnels may be configured for the AP. In this case, when the AP selects the GRE tunnel to transmit data, it may weigh and preferentially select, according to an access cost (for example, a cost value) of a GW at the peer end of the GRE tunnel, a GRE tunnel with a lower access cost. An advantage in doing this is that it may provide an alternative GRE tunnel for data transmission, and ensure reliability of the data transmission.
- Optionally, on the basis of the foregoing embodiment, the address of the AP or the address of the GW may be an IP address of the AP or an IP address of the GW.
-
FIG. 9 is a schematic structural diagram of an access point according to Embodiment 9 of the present application. As shown inFIG. 9 , the access point may include: afirst receiving module 91, afirst configuring module 92, asecond receiving module 93, an encapsulatingmodule 94, and afirst sending module 95, where thefirst receiving module 91 may be configured to receive a first packet, and the first packet carries an address of a GW; thefirst configuring module 92 may be configured to configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW; thesecond receiving module 93 may be configured to receive a second packet sent by user equipment; the encapsulatingmodule 94 may be configured to perform the GRE tunnel encapsulation for the second packet to form a third packet; and thefirst sending module 95 may be configured to send the third packet to the GW by using the GRE tunnel, where the third packet carries the address of the AP. - Optionally, the
first receiving module 91 is specifically configured to receive a Control and Provisioning of Wireless Access Points CAPWAP packet sent by an AC, where the CAPWAP packet carries the address of the GW. - Optionally, the CAPWAP packet includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW
- Optionally, the
first receiving module 91 is specifically configured to initiate a Radius access request to an authentication server by using the GW, and receive a Radius access response returned by the GW, where the Radius access response carries the address of the GW. - Optionally, the Radius access response includes at least the GW address configuration attribute, and the GW address configuration attribute includes the type field, the length field, and the attribute value field, where the value of the type field is used to identify the attribute as the GW address configuration attribute, and the value of the attribute value field is the address of the GW.
- An apparatus in this embodiment may be used to perform the technical solution in method embodiments shown in
FIG. 1 toFIG. 4 . For a specific function, refer to the foregoing method embodiments. Details are not described herein again. -
FIG. 10 is a schematic structural diagram of an access point according to Embodiment 10 of the present application. As shown inFIG. 10 , the access point may include: asecond sending module 1001 and athird receiving module 1002, where thesecond sending module 1001 may be configured to send a fourth packet to a GW, and the fourth packet carries an address of an AP and is used to instruct the GW to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address the GW, and a destination address of the GRE tunnel is the address of the AP. Thethird receiving module 1002 may be configured to receive a fifth packet sent by the GW by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW. - Optionally, the
second sending module 1001 is specifically configured to initiate a Radius access request to an authentication server via the GW, where the Radius access request carries the address of the AP, so that the GW obtains the address of the AP from the Radius access request. - Optionally, the Radius access request includes at least an AP address configuration attribute, and the AP address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the AP address configuration attribute, and a value of the attribute value field is the address of the AP.
- An apparatus of this embodiment may be used to perform the technical solution in method embodiments shown in
FIG. 5 andFIG. 6 . For a specific function, refer to the foregoing method embodiments. Details are not described herein again. -
FIG. 11 is a schematic structural diagram of a gateway according to Embodiment 11 of the present application. As shown inFIG. 11 , the gateway may include: athird sending module 1101 and afourth receiving module 1102, where thethird sending module 1101 may be configured to send a first packet to an access point AP, and the first packet carries an address of the GW and is used to instruct the AP configure a GRE tunnel to the GW, where a source address of the GRE tunnel is an address the AP, and a destination address of the GRE tunnel is the address of the GW Thefourth receiving module 1102 may be configured to receive a third packet sent by the AP by using the GRE tunnel, where the third packet carries the address of the AP, and the third packet is used to instruct the GW to configure a GRE tunnel to the AP. - Optionally, the
third sending module 1101 is specifically configured to receive a Radius access response returned by an authentication server, and send the Radius access response that carries the address of the GW to the AP directly or by using an access controller AC. - Optionally, the Radius access response includes at least a GW address configuration attribute, and the GW address configuration attribute includes a type field, a length field, and an attribute value field, where a value of the type field is used to identify the attribute as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
- Optionally, the third packet is formed by performing GRE tunnel encapsulation for a second packet after the AP receives the second packet sent by user equipment.
- An apparatus in this embodiment may be used to perform the technical solution in the method embodiment shown in
FIG. 7 . For a specific function, refer to the foregoing method embodiment. Details are not described herein again. -
FIG. 12 is a schematic structural diagram of a gateway according to Embodiment 12 of the present application. As shown inFIG. 12 , the gateway may include: afifth receiving module 1201, asecond configuring module 1202, and afourth sending module 1203. Thefifth receiving module 1201 may be configured to receive a fourth packet sent by an access point AP, and the fourth packet carries an address of the AP. Thesecond configuring module 1202 may be configured to configure a GRE tunnel to the AP, where a source address of the GRE tunnel is an address of a GW, and a destination address of the GRE tunnel is the address of the AP. Thefourth sending module 1203 may be configured to send a fifth packet to the AP by using the GRE tunnel, where the fifth packet carries the address of the GW, and the fifth packet is used to instruct the AP to configure a GRE tunnel to the GW. - An apparatus in this embodiment may be used to perform the technical solution in the method embodiment shown in
FIG. 8 . For a specific function, refer to the foregoing method embodiment. Details are not described herein again. -
FIG. 13 is a schematic structural diagram of an access point according to Embodiment 13 of the present application. As shown inFIG. 13 , the access point may include: atransmitter 1301, areceiver 1302, amemory 1303, and aprocessor 1304 that is separately connected to thetransmitter 1301, thereceiver 1302, and thememory 1303. Thememory 1303 stores a group of program code, and theprocessor 1304 is configured to invoke the program code stored in thememory 1303, which may perform the technical solution in the method embodiments shown inFIG. 1 toFIG. 6 . For a specific function, refer to the foregoing method embodiments. Details are not described herein again. -
FIG. 14 is a schematic structural diagram of a gateway according to Embodiment 14 of the present application. As shown inFIG. 14 , the access point may include: atransmitter 1401, areceiver 1402, amemory 1403, and aprocessor 1404 that is separately connected to thetransmitter 1401, thereceiver 1402, andmemory 1403. Thememory 1403 stores a group of program code, and theprocessor 1404 is configured to invoke the program code stored in thememory 1403, which may perform the technical solutions in the method embodiments shown inFIG. 7 andFIG. 8 . For a specific function, refer to the foregoing method embodiments. Details are not described herein again. - A person of ordinary skill in the art may understand that all or a part of the method embodiments may be implemented by a program instructing relevant hardware. The foregoing program may be stored in a computer readable storage medium. When the program runs, the method embodiments are performed. The foregoing storage medium includes any medium that may store program code, such as a ROM, a RAM, a magnetic disk, or an optical disc.
- Finally, it should be noted that the foregoing embodiments are merely intended for describing the technical solutions of the present application, other than limiting the present application. Although the present application is described in detail with reference to the foregoing embodiments, persons of ordinary skill in the art should understand that they may still make modifications to the technical solutions described in the foregoing embodiments, or make equivalent substitutions to some or all the technical features thereof, without departing from the spirit and scope of the technical solutions of the embodiments of the present application.
Claims (6)
1. A method for implementing a generic routing encapsulation (GRE) tunnel by an access point (AP), comprising:
receiving a Control And Provisioning of Wireless Access Points (CAPWAP) packet sent by an access controller (AC), wherein the CAPWAP packet carries an address of a gateway (GW);
configuring a GRE tunnel from the AP to the GW, wherein a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
receiving a packet sent by a user equipment;
performing GRE tunnel encapsulation for the packet sent by the user equipment to form a encapsulated packet; and
sending the encapsulated packet to the GW by using the GRE tunnel.
2. The method according to claim 1 , wherein the CAPWAP packet comprises a GW address configuration attribute, and the GW address configuration attribute comprises a type field, and an attribute value field, wherein a value of the type field is used to identify the attribute field as the GW address configuration attribute, and a value of the attribute value field is the address of the GW
3. An access point (AP), comprising:
a processor; and
a non-transitory computer readable medium which contains computer-executable instructions that, when executed by the processor, causes the AP to perform the steps of:
receiving a Control And Provisioning of Wireless Access Points (CAPWAP) packet sent by an access controller (AC) that carries an address of a gateway (GW);
configuring a GRE tunnel from the AP to the GW, wherein a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
receiving a packet sent by a user equipment;
performing GRE tunnel encapsulation for the packet sent by the user equipment to form a encapsulated packet; and
sending the encapsulated packet to the GW by using the GRE tunnel.
4. The access point according to claim 3 , wherein the CAPWAP packet comprises a GW address configuration attribute, and the GW address configuration attribute comprises a type field, and an attribute value field, wherein a value of the type field is used to identify the attribute field as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
5. A non-transitory computer readable medium which contains computer-executable instructions, wherein the computer-executable instructions, when executed by a processor, enables an access point (AP) to perform operations comprising:
receiving a Control And Provisioning of Wireless Access Points (CAPWAP) packet sent by an access controller (AC) that carries an address of a gateway (GW);
configuring a GRE tunnel from the AP to the GW, wherein a source address of the GRE tunnel is an address of the AP, and a destination address of the GRE tunnel is the address of the GW;
receiving a packet sent by user equipment;
performing GRE tunnel encapsulation for the packet sent by the user equipment to form a encapsulated packet; and
sending the encapsulated packet to the GW by using the GRE tunnel.
6. The non-transitory computer readable medium according to claim 5 , wherein the CAPWAP packet comprises a GW address configuration attribute, and the GW address configuration attribute comprises a type field, and an attribute value field, wherein a value of the type field is used to identify the attribute field as the GW address configuration attribute, and a value of the attribute value field is the address of the GW.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/083,287 US20210044456A1 (en) | 2013-07-10 | 2020-10-28 | Method for implementing gre tunnel, access point and gateway |
US17/867,662 US11824685B2 (en) | 2013-07-10 | 2022-07-18 | Method for implementing GRE tunnel, access point and gateway |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2013/079168 WO2015003348A1 (en) | 2013-07-10 | 2013-07-10 | Gre tunnel implementation method, access point and gateway |
US14/991,497 US10855491B2 (en) | 2013-07-10 | 2016-01-08 | Method for implementing GRE tunnel, access point and gateway |
US17/083,287 US20210044456A1 (en) | 2013-07-10 | 2020-10-28 | Method for implementing gre tunnel, access point and gateway |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/991,497 Continuation US10855491B2 (en) | 2013-07-10 | 2016-01-08 | Method for implementing GRE tunnel, access point and gateway |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/867,662 Continuation US11824685B2 (en) | 2013-07-10 | 2022-07-18 | Method for implementing GRE tunnel, access point and gateway |
Publications (1)
Publication Number | Publication Date |
---|---|
US20210044456A1 true US20210044456A1 (en) | 2021-02-11 |
Family
ID=52279309
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/991,497 Active US10855491B2 (en) | 2013-07-10 | 2016-01-08 | Method for implementing GRE tunnel, access point and gateway |
US17/083,287 Abandoned US20210044456A1 (en) | 2013-07-10 | 2020-10-28 | Method for implementing gre tunnel, access point and gateway |
US17/867,662 Active US11824685B2 (en) | 2013-07-10 | 2022-07-18 | Method for implementing GRE tunnel, access point and gateway |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/991,497 Active US10855491B2 (en) | 2013-07-10 | 2016-01-08 | Method for implementing GRE tunnel, access point and gateway |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/867,662 Active US11824685B2 (en) | 2013-07-10 | 2022-07-18 | Method for implementing GRE tunnel, access point and gateway |
Country Status (5)
Country | Link |
---|---|
US (3) | US10855491B2 (en) |
EP (2) | EP3758307A1 (en) |
CN (2) | CN105324961B (en) |
ES (1) | ES2804676T3 (en) |
WO (1) | WO2015003348A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210368555A1 (en) * | 2018-12-19 | 2021-11-25 | Mosaid Technologies Inc. | System and method for a network access service |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2004135317A (en) * | 2002-05-03 | 2005-08-10 | Коко Коммьюникейшнз Корп. (Us) | METHOD AND DEVICE FOR CONSTANT CONNECTION WITH DEVICE BY USING MULTIPLE PHYSICAL NETWORK CONNECTIONS AND TRANSFERING CONNECTION BETWEEN MULTIPLE BANDS, MODES AND NETWORKS |
JP6823407B2 (en) * | 2016-09-12 | 2021-02-03 | エルジー ディスプレイ カンパニー リミテッド | Image display device and image display method |
CN110278558B (en) * | 2019-07-25 | 2022-09-13 | 迈普通信技术股份有限公司 | Message interaction method and WLAN system |
US11128491B2 (en) * | 2019-08-13 | 2021-09-21 | Cloudflare, Inc. | Network layer performance and security provided by a distributed cloud computing network |
US11888823B2 (en) * | 2021-04-15 | 2024-01-30 | Blackberry Limited | Secured in-tunnel messages and access control |
Family Cites Families (105)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6754221B1 (en) | 2001-02-15 | 2004-06-22 | General Bandwidth Inc. | System and method for selecting a compression algorithm according to an available bandwidth |
CN1180581C (en) * | 2001-07-18 | 2004-12-15 | 华为技术有限公司 | Tunnel encapsulation method for wireless VPN |
US6982984B1 (en) | 2001-08-28 | 2006-01-03 | Redback Networks Inc. | Method and apparatus for virtual private networks |
US7069331B2 (en) | 2001-09-13 | 2006-06-27 | Utstarcom, Inc. | Trunk group implementation in networks |
US7830787B1 (en) | 2001-09-25 | 2010-11-09 | Cisco Technology, Inc. | Flooding control for multicast distribution tunnel |
JP4310193B2 (en) | 2002-01-29 | 2009-08-05 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Method and system for connecting a mobile client device to the Internet |
US7356031B1 (en) | 2002-02-01 | 2008-04-08 | Cisco Technology, Inc. | Inter-v4 realm routing |
US7136384B1 (en) | 2002-03-19 | 2006-11-14 | Cisco Technology, Inc. | System and method for communicating asynchronous transfer mode cells in a network environment |
US6993039B2 (en) | 2002-07-22 | 2006-01-31 | Utstarcom, Inc. | System and method for GRE heartbeats |
US8077681B2 (en) * | 2002-10-08 | 2011-12-13 | Nokia Corporation | Method and system for establishing a connection via an access network |
US7701963B2 (en) | 2002-10-15 | 2010-04-20 | Qualcomm Incorporated | Method and apparatus for the use of micro-tunnels in a communications system |
GB0308980D0 (en) | 2003-04-17 | 2003-05-28 | Orange Personal Comm Serv Ltd | Telecommunications |
US20040223497A1 (en) | 2003-05-08 | 2004-11-11 | Onvoy Inc. | Communications network with converged services |
DE602004010519T2 (en) | 2003-07-04 | 2008-11-13 | Nippon Telegraph And Telephone Corp. | REMOTE ACCESS VPN TREATMENT PROCESS AND TREATMENT DEVICE |
KR100604531B1 (en) | 2003-10-28 | 2006-07-24 | 주식회사 팬택앤큐리텔 | Mobile Packet Data Servicing method for mobile communication system |
US7899060B2 (en) | 2004-04-01 | 2011-03-01 | Nortel Networks Limited | Method for providing bearer specific information for wireless networks |
US7616613B2 (en) | 2004-05-05 | 2009-11-10 | Cisco Technology, Inc. | Internet protocol authentication in layer-3 multipoint tunneling for wireless access points |
US7710964B2 (en) | 2004-06-22 | 2010-05-04 | Nokia Corporation | Discovering a network element in a communication system |
CN100379226C (en) | 2004-12-14 | 2008-04-02 | 华为技术有限公司 | Virtual special network multicast method by virtual router mode |
KR100617795B1 (en) | 2005-03-04 | 2006-08-28 | 삼성전자주식회사 | A method and apparatus for cdma and wlan tightly coupled inter-working |
US20060251101A1 (en) * | 2005-04-25 | 2006-11-09 | Zhang Li J | Tunnel establishment |
KR100842624B1 (en) | 2005-04-29 | 2008-06-30 | 삼성전자주식회사 | System and method for interworking between cellular network and wireless lan |
US20070081469A1 (en) | 2005-10-11 | 2007-04-12 | Sbc Knowledge Ventures L.P. | System and methods for wireless fidelity (WIFI) venue utilization monitoring and management |
US8595846B1 (en) | 2005-11-29 | 2013-11-26 | At&T Intellectual Property Ii, L.P. | Method for identifying compromised network components |
US8630645B2 (en) | 2006-02-09 | 2014-01-14 | Cisco Technology, Inc. | Fast handoff support for wireless networks |
US8184644B1 (en) | 2006-02-28 | 2012-05-22 | Nortel Networks Limited | WiMAX R6 management protocol |
US8612556B2 (en) | 2006-05-03 | 2013-12-17 | Comcast Cable Holdings, Llc | Method of provisioning network elements |
US8151322B2 (en) | 2006-05-16 | 2012-04-03 | A10 Networks, Inc. | Systems and methods for user access authentication based on network access point |
US20070283429A1 (en) * | 2006-05-30 | 2007-12-06 | A10 Networks Inc. | Sequence number based TCP session proxy |
CN101207546A (en) * | 2006-12-18 | 2008-06-25 | 华为技术有限公司 | Method for dynamically establishing tunnel, tunnel server and system thereof |
US7646731B2 (en) | 2006-12-19 | 2010-01-12 | Cisco Technology, Inc. | Route monitoring in a network management system |
US9516495B2 (en) | 2007-03-01 | 2016-12-06 | Futurewei Technologies, Inc. | Apparatus and methods of PMIPv6 route optimization protocol |
US20080281978A1 (en) * | 2007-05-10 | 2008-11-13 | Motorola, Inc. | Methods for utilizing multiple tunnels within a communication network |
US8279752B1 (en) | 2007-06-27 | 2012-10-02 | World Wide Packets, Inc. | Activating tunnels using control packets |
US8400912B2 (en) | 2007-06-27 | 2013-03-19 | World Wide Packets, Inc. | Activating a tunnel upon receiving a control packet |
US9414429B2 (en) | 2007-06-28 | 2016-08-09 | Qualcomm Incorporated | Method and apparatus for maintaining an always-on data session in a wireless communication network |
US20110004913A1 (en) * | 2007-07-31 | 2011-01-06 | Symbol Technologies, Inc. | Architecture for seamless enforcement of security policies when roaming across ip subnets in ieee 802.11 wireless networks |
US20090046577A1 (en) | 2007-08-14 | 2009-02-19 | Motorola, Inc. | Resuming an interrupted flow of data packets |
CN100518126C (en) | 2007-08-14 | 2009-07-22 | 杭州华三通信技术有限公司 | Method for configuring GRE tunnel and router |
ES2385749T3 (en) | 2007-08-22 | 2012-07-31 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and devices for data transmission control |
EP2071766B1 (en) | 2007-12-13 | 2013-08-07 | Alcatel Lucent | System and method for improved traffic aggregation in an access network |
WO2009093876A2 (en) | 2008-01-25 | 2009-07-30 | Posdata Co., Ltd. | Method and apparatus for supporting multicast broadcast service (mbs) in wimax |
WO2009128038A1 (en) | 2008-04-16 | 2009-10-22 | Nxp B.V. | System of devices of which some include an infrared remote control interface |
CN101577657B (en) * | 2008-05-08 | 2012-05-23 | 华为技术有限公司 | Method of tunnel establishment and system for realizing tunnel establishment |
EP2281408A4 (en) | 2008-05-28 | 2013-03-06 | Harris Stratex Networks Operat | Systems and methods for data path control in a wireless network |
EP2129074A1 (en) | 2008-05-30 | 2009-12-02 | Nokia Siemens Networks Oy | Method of deciding to release communication resources |
US20090303973A1 (en) * | 2008-06-10 | 2009-12-10 | Nokia Siemens Networks Oy | Packet data network selection |
US7797426B1 (en) | 2008-06-27 | 2010-09-14 | BitGravity, Inc. | Managing TCP anycast requests |
CN102106166B (en) | 2008-07-24 | 2015-03-11 | 微软公司 | Anchoring services of a mobile station attached to a first service domain at a home agent in a second service domain |
US8184526B2 (en) | 2008-09-15 | 2012-05-22 | Ciena Corporation | Systems and methods for Connectivity Fault Management extensions for automated activation of services through association of service related attributes |
US9319300B2 (en) | 2008-12-09 | 2016-04-19 | Glue Networks, Inc. | Systems and methods for determining endpoint configurations for endpoints of a virtual private network (VPN) and deploying the configurations to the endpoints |
JP5421392B2 (en) | 2009-01-15 | 2014-02-19 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | Support for proxy mobile IPv6 in home network |
CN101827013A (en) * | 2009-03-05 | 2010-09-08 | 华为技术有限公司 | Method, device and system for balancing multi-gateway load |
US8867747B2 (en) | 2009-03-31 | 2014-10-21 | Cisco Technology, Inc. | Key generation for networks |
US9276663B2 (en) | 2009-04-17 | 2016-03-01 | Viasat, Inc. | Layer-2 connectivity from switch to access node/gateway |
CN101572664B (en) * | 2009-05-27 | 2011-11-09 | 杭州华三通信技术有限公司 | GRE tunnel collocation method and router thereof |
CN101572644B (en) * | 2009-06-19 | 2011-06-08 | 杭州华三通信技术有限公司 | Data encapsulation method and equipment thereof |
WO2011003004A1 (en) * | 2009-07-01 | 2011-01-06 | Zte Corporation | Femto access point initialization and authentication |
CN101938787B (en) * | 2009-07-01 | 2014-01-01 | 华为技术有限公司 | Method and device for switch controlling |
CN101645895B (en) | 2009-08-31 | 2012-04-18 | 杭州华三通信技术有限公司 | Method and device for realizing tunnel safety |
CN102025848A (en) | 2009-09-18 | 2011-04-20 | 鸿富锦精密工业(深圳)有限公司 | Gateway and method for processing packets by using gateway |
US8355382B2 (en) | 2009-11-11 | 2013-01-15 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for providing WiMAX (worldwide interoperability for microwave access) anchor mode service on a system with distributed forwarding planes |
CN102065471B (en) | 2009-11-13 | 2015-05-20 | 中兴通讯股份有限公司 | Transmission method and system in relay communication network |
US8341722B2 (en) * | 2009-11-30 | 2012-12-25 | Unisys Corporation | Load balancing and failover of gateway devices |
US8493851B2 (en) | 2010-05-07 | 2013-07-23 | Broadcom Corporation | Method and system for offloading tunnel packet processing in cloud computing |
US9049098B2 (en) | 2010-08-05 | 2015-06-02 | Cisco Technology, Inc. | Discovery of services provided by application nodes in a network |
US8345682B2 (en) | 2010-09-15 | 2013-01-01 | Cisco Technology, Inc. | Data path processing information included in the pseudowire layer of packets |
US8787303B2 (en) | 2010-10-05 | 2014-07-22 | Cisco Technology, Inc. | Methods and apparatus for data traffic offloading at a router |
US20120099602A1 (en) | 2010-10-25 | 2012-04-26 | Brocade Communications Systems, Inc. | End-to-end virtualization |
CN102025613B (en) * | 2010-11-11 | 2012-12-12 | 福建星网锐捷网络有限公司 | Method and device for building tunnels as well as network equipment |
US9253159B2 (en) | 2011-05-06 | 2016-02-02 | Citrix Systems, Inc. | Systems and methods for cloud bridging between public and private clouds |
US8902852B2 (en) * | 2011-05-19 | 2014-12-02 | Telefonaktiebolaget L M Ericsson (Publ) | Inter-rat handover control using empty GRE packets |
CN102149138B (en) * | 2011-05-26 | 2013-04-24 | 东南大学 | Method for balancing gateway load of wireless Mesh network |
US8958298B2 (en) * | 2011-08-17 | 2015-02-17 | Nicira, Inc. | Centralized logical L3 routing |
US9167501B2 (en) | 2011-08-29 | 2015-10-20 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing a 3G packet core in a cloud computer with openflow data and control planes |
US8762501B2 (en) | 2011-08-29 | 2014-06-24 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing a 3G packet core in a cloud computer with openflow data and control planes |
US9408177B2 (en) * | 2011-12-19 | 2016-08-02 | Cisco Technology, Inc. | System and method for resource management for operator services and internet |
US9210728B2 (en) | 2011-12-19 | 2015-12-08 | Cisco Technology, Inc. | System and method for resource management for operator services and internet |
CN103188760A (en) * | 2011-12-27 | 2013-07-03 | 华为技术有限公司 | Data transmission method and access network equipment |
WO2013117166A1 (en) | 2012-02-08 | 2013-08-15 | Hangzhou H3C Technologies Co., Ltd. | Implement equal cost multiple path of trill network |
WO2013126918A1 (en) | 2012-02-24 | 2013-08-29 | Ruckus Wireless, Inc. | Wireless services gateway |
US20130254264A1 (en) | 2012-03-07 | 2013-09-26 | 26Ones Inc. | Tethering method, computing devices, system and software |
US9154416B2 (en) | 2012-03-22 | 2015-10-06 | Brocade Communications Systems, Inc. | Overlay tunnel in a fabric switch |
WO2013158115A1 (en) | 2012-04-20 | 2013-10-24 | Hewlett-Packard Development Company, L.P. | Controlling data rates of data flows based on information indicating congestion |
CN102611634A (en) | 2012-04-20 | 2012-07-25 | 杭州华三通信技术有限公司 | IP (Internet protocol) network access method and edge device |
IN2014MN02415A (en) | 2012-05-22 | 2015-08-21 | Hughes Network Systems Llc | |
WO2014003787A1 (en) | 2012-06-29 | 2014-01-03 | Hewlett-Packard Development Company, L.P. | Routing packet from edge device to home network or from home network to remote access network |
CN103517249B (en) | 2012-06-29 | 2018-11-16 | 中兴通讯股份有限公司 | A kind of methods, devices and systems of policy control |
US9237098B2 (en) | 2012-07-03 | 2016-01-12 | Cisco Technologies, Inc. | Media access control (MAC) address summation in Datacenter Ethernet networking |
US10142159B2 (en) | 2012-08-14 | 2018-11-27 | Benu Networks, Inc. | IP address allocation |
US9197980B2 (en) | 2012-08-22 | 2015-11-24 | Cisco Technology, Inc. | Multi-operator wireless networking |
CN102868586B (en) | 2012-09-25 | 2015-06-10 | 杭州华三通信技术有限公司 | Method for establishing tunnel forwarding table entries, central node and branch nodes |
JP5957612B2 (en) | 2012-09-25 | 2016-07-27 | トムソン ライセンシングThomson Licensing | Reducing core network traffic caused by my grant |
CN103702364B (en) | 2012-09-27 | 2017-08-25 | 华为技术有限公司 | A kind of method of business data transmission, equipment and system |
US9160797B2 (en) | 2012-10-17 | 2015-10-13 | Verizon Patent And Licensing Inc. | Network devices with feature peer network logic |
US9001671B2 (en) | 2012-10-17 | 2015-04-07 | Verizon Patent And Licensing Inc. | Feature peer network representations and scalable feature peer network management |
US8832819B2 (en) | 2012-11-30 | 2014-09-09 | Unisys Corporation | Load balancing and failover of gateway devices |
US9338225B2 (en) | 2012-12-06 | 2016-05-10 | A10 Networks, Inc. | Forwarding policies on a virtual service network |
JP6060688B2 (en) | 2013-01-10 | 2017-01-18 | 富士通株式会社 | Transfer device, communication system, and roundabout path detection method |
US9450817B1 (en) | 2013-03-15 | 2016-09-20 | Juniper Networks, Inc. | Software defined network controller |
US9794169B2 (en) | 2013-03-15 | 2017-10-17 | Aerohive Networks, Inc. | Application based data traffic routing using network tunneling |
US9350706B1 (en) | 2013-03-15 | 2016-05-24 | Centurylink Intellectual Property Llc | Network traffic data scrubbing with services offered via anycasted addresses |
US10021027B2 (en) * | 2013-04-30 | 2018-07-10 | Comcast Cable Communications, Llc | Network validation with dynamic tunneling |
US20140376550A1 (en) | 2013-06-24 | 2014-12-25 | Vmware, Inc. | Method and system for uniform gateway access in a virtualized layer-2 network domain |
CN105264835B (en) | 2013-07-12 | 2016-12-28 | 华为技术有限公司 | Gre tunneling implementation method, access device and aggregation gateway |
-
2013
- 2013-07-10 CN CN201380001119.4A patent/CN105324961B/en active Active
- 2013-07-10 EP EP20169264.7A patent/EP3758307A1/en not_active Withdrawn
- 2013-07-10 EP EP13888920.9A patent/EP3007389B1/en active Active
- 2013-07-10 ES ES13888920T patent/ES2804676T3/en active Active
- 2013-07-10 WO PCT/CN2013/079168 patent/WO2015003348A1/en active Application Filing
- 2013-07-10 CN CN201910162050.2A patent/CN109921973A/en active Pending
-
2016
- 2016-01-08 US US14/991,497 patent/US10855491B2/en active Active
-
2020
- 2020-10-28 US US17/083,287 patent/US20210044456A1/en not_active Abandoned
-
2022
- 2022-07-18 US US17/867,662 patent/US11824685B2/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210368555A1 (en) * | 2018-12-19 | 2021-11-25 | Mosaid Technologies Inc. | System and method for a network access service |
US11601991B2 (en) * | 2018-12-19 | 2023-03-07 | Taiwan Semiconductor Manufacturing Company, Ltd. | System and method for a network access service |
Also Published As
Publication number | Publication date |
---|---|
US20220368563A1 (en) | 2022-11-17 |
US20160127148A1 (en) | 2016-05-05 |
EP3007389B1 (en) | 2020-04-22 |
CN105324961B (en) | 2019-03-19 |
CN109921973A (en) | 2019-06-21 |
WO2015003348A1 (en) | 2015-01-15 |
US11824685B2 (en) | 2023-11-21 |
EP3007389A4 (en) | 2016-06-08 |
ES2804676T3 (en) | 2021-02-09 |
EP3007389A1 (en) | 2016-04-13 |
EP3758307A1 (en) | 2020-12-30 |
CN105324961A (en) | 2016-02-10 |
US10855491B2 (en) | 2020-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7079866B2 (en) | Packet processing method and device | |
US20210044456A1 (en) | Method for implementing gre tunnel, access point and gateway | |
US11032105B2 (en) | Method for implementing GRE tunnel, home gateway and aggregation gateway | |
US9231820B2 (en) | Methods and apparatus for controlling wireless access points | |
US10085253B2 (en) | Methods and apparatus for controlling wireless access points | |
US9118687B2 (en) | Methods and apparatus for a scalable network with efficient link utilization | |
US11356294B2 (en) | Packet processing method and device | |
JP2023523048A (en) | Packet processing method and related device | |
WO2021093863A1 (en) | Information processing method and apparatus, and computer-readable storage medium | |
US10148550B1 (en) | Methods and apparatus for a scalable network with efficient link utilization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |