WO2001099354A1 - Dispositif de communication comprenant une fonction d'amenagement vpn - Google Patents
Dispositif de communication comprenant une fonction d'amenagement vpn Download PDFInfo
- Publication number
- WO2001099354A1 WO2001099354A1 PCT/JP2000/003980 JP0003980W WO0199354A1 WO 2001099354 A1 WO2001099354 A1 WO 2001099354A1 JP 0003980 W JP0003980 W JP 0003980W WO 0199354 A1 WO0199354 A1 WO 0199354A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vpn
- address
- header
- communication device
- packet
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/741—Routing in networks with a plurality of addressing schemes, e.g. with both IPv4 and IPv6
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4645—Details on frame tagging
- H04L12/4666—Operational details on the addition or the stripping of a tag in a frame, e.g. at a provider edge node
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/50—Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/251—Translation of Internet protocol [IP] addresses between different IP versions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2521—Translation architectures other than single NAT servers
- H04L61/2535—Multiple local networks, e.g. resolving potential IP address conflicts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/167—Adaptation for transition between two IP versions, e.g. between IPv4 and IPv6
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/604—Address structures or formats
Definitions
- the present invention relates to a communication device having a function of accommodating a virtual private network (VPN) accommodated on the Internet.
- VPN virtual private network
- the Internet is a globally interconnected network that is rapidly spreading.
- various technologies have been developed on the Internet to realize VPN.
- VPN a virtual private network
- FIG. 1 shows an example of a network configuration configuring a VPN according to FIG.
- various networks A to C are connected to a network 1 managed by a service provider by routers 20 to 25 called VPN edge routers.
- the service provider's network 1 is generally interconnected with another service provider's network.
- the VPN refers to, for example, a network in which the network of the organization A is exclusively interconnected with the networks of other organizations, that is, the organizations B and C via the network 1 of the service provider.
- the VPN refers to, for example, a network in which the network of the organization A is exclusively interconnected with the networks of other organizations, that is, the organizations B and C via the network 1 of the service provider.
- the VPN refers to, for example, a network in which the network of the organization A is exclusively interconnected with the networks of other organizations, that is, the organizations B and C via the network 1 of the service provider.
- a private address is an address that can be used on a closed network within a certain organization, and the same address may be used by a different organization. Therefore, a function to route the bucket on the Internet and a function to do the routing on the intranet are required for the equipment accommodating the VPN.
- communications within the intranet A bucket that can be processed on the Internet.
- the bucket format is realized by performing the reverse conversion.
- an IPv4 (Internet Protocol version 4) header having a source address 26 and a destination address 27 having a structure as shown in FIG. Furthermore, this IPv4 header is combined, or the IPv6 (Internet Protocol version 6) header having the source address 28 and the destination address 29 having the structure shown in FIG. As shown in Fig. A and Fig. 4B, it may be encapsulated (equivalent to the Internet Standards Recommendation RFC 1853).
- an mpls (Multi Protocol Label Switching) -shim header shown in FIG. 5 is used to encapsulate an IPv4 header and a shim header as shown in FIG. 4C.
- the encapsulation technique shown in FIG. 4 is realized by setting the IP address assigned to the boundary in the IP header of the bucket to be encapsulated.
- a value that is unique for each link is set in the label area (Label) of the shim header of the packet.
- a device connecting the link converts the value of the label area and sets a virtual path, thereby realizing a tunnel between boundaries.
- the number of settings in the device for realizing VPN is the number of tunnels X 2 (both ends of the tunnel), and there is a problem that the number of settings becomes enormous as the number of bases increases.
- N locations When the N locations are connected to the minimum number of tunnels, that is, in a star configuration, it is (N-1) X2, and when it is a full mesh, it is NX (N-1). To add one more base, it is necessary to set 2 for the star type and N for the full mesh.
- an object of the present invention is to realize a full-mesh virtual path with a small number of settings and to realize an expanding VPN service.
- a communication device including a VPN accommodating function in a virtual private network (VPN) connecting an intra-organization or inter-organization network via the Internet according to the present invention.
- VPN virtual private network
- a second means for converting the packet to a format equivalent to the original bucket or removing the header containing the VPN address format When receiving a packet containing the header of the VPN address format, there is provided a second means for converting the packet to a format equivalent to the original bucket or removing the header containing the VPN address format.
- a processing means for discarding the corresponding bucket is provided.
- a protocol used in an organization or between organizations is IPv4 (Intemet Protocol, version 4), and a packet containing a VPN address format is an IPv6. (Internet Protocol, version 6), characterized in that an IPv6 header is added to the IPv4 header by the first means or is replaced with the IPv4 header.
- the VPN number uses an IPLA-based NLA (Next Level Aggregation Identifier) ID area in an aggregated address format, and an SLA (Site Level Aggregation Identifier) ID. It is characterized in that the IPv4 address is stored in the interface (Interface Identifier) area.
- IPv4 a protocol used within an organization or between organizations is IPv4
- IPv6 a packet including a VPN address format
- IPv4 packet It is characterized in that IP v6 headers are added or deleted.
- the protocol used within an organization or between organizations is IPv6, the packet including the VPN address format is IPv6, and the VPN address Of the VPN number and the IP header address used within or between organizations, using the SLA (Site Level Aggregation Identifier) ID of the site-local address format or aggregated global address and the interface (Interface Identifier) area. And address conversion.
- IPv6 IPv6
- SLA Site Level Aggregation Identifier
- a VPN-ID is used as a VPN address in a virtual private network (VPN) for connecting a network within an organization or between organizations via the Internet.
- VPN virtual private network
- Is composed of a scope area that indicates whether a VPN is closed inside an ISP or a VPN that crosses ISPs, and a VPN number that can uniquely identify the VPN within that range. I do.
- the VPN address is such that VPN-ID is composed of an IPv4 address.
- FIG. 1 is a diagram illustrating a configuration example of a network configuring a VPN.
- FIG. 2 is a diagram for explaining the IPv4 header.
- FIG. 3 is a diagram for explaining the IPv6 header.
- FIG. 4 is a diagram illustrating the encapsulation of a header.
- FIG. 5 is a diagram showing an mpls shim header.
- FIG. 6 is a diagram illustrating the configuration concept of the present invention.
- FIG. 7 is a diagram showing the definition of a VPN address.
- FIG. 8 is a diagram showing a specific example.
- FIG. 9 is a diagram showing an example of the configuration of the VPN accommodation function unit in FIG. 8, showing an example of converting an IPv4 header to an IPv6.
- FIG. 10 is a diagram showing another configuration example of the VPN accommodating function unit in FIG. 8 in an example of converting an IPv4 header to an IPv6.
- FIG. 11 is a diagram showing an IPv6 address generated in the configuration examples of FIGS.
- FIG. 12 is a configuration example of the VPN accommodating function unit in FIG. 8, and is a diagram illustrating an example in which an IPv4 bucket is encapsulated with an IPv6 header.
- FIG. 13 is a diagram illustrating another configuration example of the VPN accommodating function unit in FIG. 8 in an example of encapsulating an IPv4 packet with an IPv6 header.
- FIG. 14 is a diagram illustrating an example of the configuration of the VPN accommodating function unit in FIG. 8, in which IPv6 is used in an intranet.
- FIG. 15 is a diagram illustrating another configuration example of the VPN accommodation function unit in FIG. 8 in an example in which IPv6 is used in an intranet.
- FIG. 16 is a diagram for explaining VPN addresses corresponding to the configurations in FIGS. 14 and 15.
- FIG. 17 is a diagram showing an example of a site local address format address.
- FIG. 18 is a diagram illustrating an example of an aggregated global address.
- FIG. 19 is a diagram showing an example having a scope with a VPN address as an application example of the present invention.
- FIG. 20 is a diagram showing an example in which an IPv4 global address is used in a VPN address as an application example of the present invention.
- FIG. 6 is a diagram illustrating the configuration concept of the present invention.
- the Internet A VPN accommodating function unit 32 is provided between the internal router function unit 30 and the VPN internal router function unit 31 according to the present invention.
- This VPN accommodating section 32 converts a packet to be transmitted into a header including a VPN address format, or encapsulates a header including a VPN address format, and includes a VPN address format. When a packet is received, it has a function to remove the header containing the same format as the original packet or the VPN address format.
- a VPN address format as shown in FIG. 7 is defined.
- the header in the address format is generated by adding the ID for identifying the VPN, ie, the VPN number 34, to the IP address 33 used in the intranet.
- ? 1 ⁇ number 34 is a number that is unique within a certain range, and the certain range may be the entire Internet or the unit of an Internet service provider (ISP). Note that the address of the structure of the present invention is distinguished from other types of addresses by FP (Format Prefix) 35.
- the setting for VPN realization can be reduced to N, compared to NX (N-1) in the prior art, when compared with efficient full mesh.
- NX NX
- (N-1) X2 is required, and a full mesh can be realized with less settings than in this case.
- N is required in the case of full mesh, but according to the present invention, only 1 is required, and the number of settings can also be reduced.
- the VPN edge nolator 20 includes an Internet-side router function unit 30, a VPN-side router function unit 31, and a VPN accommodation function unit 32.
- the router 300 is a router function unit that connects between the VPN edge routers 20.
- the VPN router function unit 31 has a routing table 501, and the Internet router function unit 30 and the router 300 have routing tables 502 and 503. Referring to this routing table, the destination and source addresses are described in the header of the IPv4 packet.
- FIG. 9 is a block diagram of a configuration example of the VPN accommodating function unit 32 for realizing the present invention. When packet communication is performed from one VPN base to a different VPN base, an IPv4 bucket used in the base is transmitted to the VPN accommodating function unit 32 of the VPN edge router 20.
- the IP address (both the transmission address and the destination address) included in the packet is extracted by the IPv4 address extraction unit 320.
- the VPN address generation unit 3 2 2 uses the VPN ID (number) as shown in FIG.
- the ID40 and the IPv4 address 41 are combined to generate a VPN address of the Internet address IPv6.
- the generated IPv6 VPN address is used in the IPv6 header address added in the IPv6 header adding section 324 after being deleted in the IPv4 header deleting section 323 in FIG.
- the IPv4 header is converted to an IPv6 header.
- the IPv6 bucket thus converted is transferred to the VPN accommodating function unit 32 of the VPN edge router 20 to which the destination is connected via the Internet 1.
- This VPN accommodating function unit 32 will be described with reference to FIG. In FIG. 9, the IPv6 packet is input to an IPv6 address extracting unit 325.
- IPv6 address extracted by the IPv6 address extraction unit 325 is separated from the IPv4 address by the VPN ID / IPv4 address separation unit 326. Further, The separated IPv4 address is used for the IPv4 header address added in the IPv4 header adding section 328 to the bucket from which the IPv6 header has been deleted in the IPv6 header deleting section 327. Will be Thereby, it is returned to the IPv4 packet.
- FIG. 6B shows a state of header conversion between the intranet and the Internet, corresponding to the description related to FIG. 9 above.
- the VPN accommodating function unit 32 is configured as shown in FIG. That is, a comparison circuit 329 is newly provided for the configuration of FIG.
- a predetermined VPN number corresponding to the VPN held in the VAN—ID holding unit 321 and the VPN—ID / IPv4 separated by the address separation unit 326 by the comparison circuit 329 are output. IDs are compared.
- the packet is discarded by the IPv4 header adding unit 328 because the packet has no relationship with the VPN. This can prevent inflow or outflow of packets from different VPNs and improve security.
- the VPN accommodating function unit 32 outputs a route including the prefix up to the IPv4 shown in FIG. 11, so that the routing by the IPv6 is realized according to the route table 502 in FIG.
- the configuration of the VPN accommodating function unit 32 shown in FIG. 9 and FIG. 10 is the configuration of FIG. 12 and FIG.
- the IPv4 header deletion unit 323 and the IPv4 header addition unit 328 are unnecessary.
- FIG. 6C This is illustrated in FIG. 6C by taking the header conversion of FIG. 4A as an example.
- IPv4 is used in the intranet
- IPv6 is used in the intranet
- site ID or site prefix of the site local address a local address not connected to the Internet
- FIGS. 14 and 15 are block diagrams of configuration examples of the VPN accommodating function unit 32 corresponding to FIGS. 9 and 10 when IPv6 is used in such an intranet. Since only the IPv6 address is handled, the IPv6
- FIG. 16 is a diagram for explaining VPN addresses for the configurations of FIGS. 14 and 15.
- the VPN address is the VPN-ID 40 shown in Fig. 16 and the SLA 42 of the site local address format or the aggregated global address among the IP header addresses used within and between organizations.
- interface ID is the VPN-ID 40 shown in Fig. 16 and the SLA 42 of the site local address format or the aggregated global address among the IP header addresses used within and between organizations.
- This address conversion is executed in the address rewriting unit 331 in FIGS. 14 and 15.
- FIG. 17 c An example of the above site local address format address is shown in FIG. 17 c.
- area I is a global address
- area ⁇ is an organization address having a subnet ID and an interface ID.
- FIG. 18 shows an example of a centralized global address. Similarly, region I is a global address, and region ⁇ includes a site-intensive ID and an interface ID.
- FIG. Fig. 19A is a diagram when IPv4 is used on the intranet
- Fig. 19B is a diagram when IPv6 is used on the intranet.
- the address stores a flag indicating whether the VPN-ID 45 is a closed VPN or a non-closed VPN as an address. It has a scope 44. In the case of a VPN closed to the service provider, it is possible for the service provider to assign a VPN—ID 45.
- FIG. Figure 2 OA shows the case where IPv4 is used on the intranet
- Figure 20B shows the case where IPv6 is used on the intranet.
- IPv4 global address is used as VPN-ID
- this is an example that can be used as a unique VPN-ID45.
- an IPv4 global address assigned to an organization it is unique and the address assigned to the organization is used, eliminating the need for management to make the VPN-ID 45 unique.
- the realization of the VPN service can greatly reduce the number of settings and the possibility of erroneous settings compared to other methods, so that the operator can provide the service with confidence.
- a router on the user side or a router that is not at the user boundary can be used as a normal router, and installation is easy.
- the service can be realized even if the addresses in the organization are duplicated.
- the effect of the present invention is large and greatly contributes to the expansion of the VPN service on the Internet.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
Claims
Priority Applications (15)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20100185985 EP2375643B1 (en) | 2000-06-16 | 2000-06-16 | Communication device having VPN accomodation function |
EP20090164531 EP2101447B8 (en) | 2000-06-16 | 2000-06-16 | Communication device having VPN accommodation function |
EP00937295A EP1298853A4 (en) | 2000-06-16 | 2000-06-16 | COMMUNICATION DEVICE INCLUDING A VPN MANAGEMENT FUNCTION |
JP2002504082A JP3859591B2 (ja) | 2000-06-16 | 2000-06-16 | Vpn収容機能を含む通信装置 |
EP20100185998 EP2276204B1 (en) | 2000-06-16 | 2000-06-16 | Communication device having VPN accomodation function |
DE60042800T DE60042800D1 (de) | 2000-06-16 | 2000-06-16 | Kommunikationsgerät mit VPN-Ermöglichungsfunktion |
PCT/JP2000/003980 WO2001099354A1 (fr) | 2000-06-16 | 2000-06-16 | Dispositif de communication comprenant une fonction d'amenagement vpn |
EP20100186013 EP2288083B1 (en) | 2000-06-16 | 2000-06-16 | Communication device having VPN accomodation function |
EP20100186014 EP2375644B1 (en) | 2000-06-16 | 2000-06-16 | Communication device having VPN accomodation function |
EP20090164530 EP2101446B1 (en) | 2000-06-16 | 2000-06-16 | Communication device having VPN accomodation function |
EP20060013822 EP1758311B1 (en) | 2000-06-16 | 2000-06-16 | Communication device including VPN accomodation function |
EP14198863.4A EP2858309B1 (en) | 2000-06-16 | 2000-06-16 | Communication device having VPN accomodation function |
US10/319,930 US8423669B2 (en) | 2000-06-16 | 2002-12-12 | Communication device having VPN accommodation function |
US12/777,313 US8489767B2 (en) | 2000-06-16 | 2010-05-11 | Communication device having VPN accommodation function |
US13/921,754 US9413657B2 (en) | 2000-06-16 | 2013-06-19 | Communication device having VPN accommodation function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2000/003980 WO2001099354A1 (fr) | 2000-06-16 | 2000-06-16 | Dispositif de communication comprenant une fonction d'amenagement vpn |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/319,930 Continuation US8423669B2 (en) | 2000-06-16 | 2002-12-12 | Communication device having VPN accommodation function |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001099354A1 true WO2001099354A1 (fr) | 2001-12-27 |
Family
ID=11736155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/003980 WO2001099354A1 (fr) | 2000-06-16 | 2000-06-16 | Dispositif de communication comprenant une fonction d'amenagement vpn |
Country Status (5)
Country | Link |
---|---|
US (3) | US8423669B2 (ja) |
EP (9) | EP1758311B1 (ja) |
JP (1) | JP3859591B2 (ja) |
DE (1) | DE60042800D1 (ja) |
WO (1) | WO2001099354A1 (ja) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1351450A2 (en) * | 2002-03-15 | 2003-10-08 | Broadcom Corporation | Fastpath implementation for transparent local area network (LAN) services over multiprotocol label switching (MPLS) |
WO2007013628A1 (ja) * | 2005-07-29 | 2007-02-01 | Matsushita Electric Industrial Co., Ltd. | データユニット転送装置及び位置情報管理装置並びにアドレス配布装置 |
WO2007013584A1 (ja) * | 2005-07-28 | 2007-02-01 | Matsushita Electric Industrial Co., Ltd. | データユニット転送装置及びアドレス変換装置並びに通信システム |
US7483962B2 (en) | 2002-07-05 | 2009-01-27 | Samsung Electronics Co., Ltd. | Apparatus and method for automatically allocating virtual addresses to nodes having same address |
JP2010087585A (ja) * | 2008-09-29 | 2010-04-15 | Alaxala Networks Corp | 転送装置、転送方法、およびコンピュータプログラム |
JP2011517815A (ja) * | 2008-03-31 | 2011-06-16 | アマゾン テクノロジーズ インコーポレイテッド | コンピューティングノード間の通信の構成 |
WO2013145167A1 (ja) | 2012-03-28 | 2013-10-03 | 富士通株式会社 | Lan多重化装置 |
US20140215179A1 (en) * | 2013-01-31 | 2014-07-31 | Fujitsu Limited | Address generator, address generation method, and encapsulation-decapsulation device |
US9577926B2 (en) | 2008-03-31 | 2017-02-21 | Amazon Technologies, Inc. | Authorizing communications between computing nodes |
Families Citing this family (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6778498B2 (en) * | 2001-03-20 | 2004-08-17 | Mci, Inc. | Virtual private network (VPN)-aware customer premises equipment (CPE) edge router |
US20030115480A1 (en) * | 2001-12-17 | 2003-06-19 | Worldcom, Inc. | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks |
US8200577B2 (en) | 2001-03-20 | 2012-06-12 | Verizon Business Global Llc | Systems and methods for retrieving and modifying data records for rating and billing purposes |
US7609689B1 (en) * | 2001-09-27 | 2009-10-27 | Cisco Technology, Inc. | System and method for mapping an index into an IPv6 address |
AU2003219294A1 (en) * | 2002-03-27 | 2003-10-13 | British Telecommunications Public Limited Company | System for selecting a connectivity mechanism |
GB2407737B (en) * | 2002-08-30 | 2006-05-17 | Ericsson Telefon Ab L M | Intelligent peripheral for speech recognition in networks |
US20040088385A1 (en) * | 2002-11-01 | 2004-05-06 | Hexago Inc. | Method and apparatus for connecting IPV4 devices through an IPV6 network using a tunnel setup protocol |
US7966418B2 (en) | 2003-02-21 | 2011-06-21 | Axeda Corporation | Establishing a virtual tunnel between two computer programs |
US20040249974A1 (en) * | 2003-03-31 | 2004-12-09 | Alkhatib Hasan S. | Secure virtual address realm |
FR2855697B1 (fr) | 2003-05-26 | 2005-09-23 | At & T Corp | SYSTEME DE CONVERSION DE DONNEES BASEE SUR IPv4 EN DONNEES BASEES SUR IPv6 A TRANSMETTRE A TRAVERS UN RESEAU COMMUTE IP |
US7715380B2 (en) * | 2003-06-19 | 2010-05-11 | Cisco Technology, Inc. | Apparatus and methods for handling shared services through virtual route forwarding (VRF)-aware-NAT |
US7447203B2 (en) | 2003-07-29 | 2008-11-04 | At&T Intellectual Property I, L.P. | Broadband access for virtual private networks |
US8892706B1 (en) * | 2010-06-21 | 2014-11-18 | Vmware, Inc. | Private ethernet overlay networks over a shared ethernet in a virtual environment |
US8037286B2 (en) * | 2008-01-23 | 2011-10-11 | Arm Limited | Data processing apparatus and method for instruction pre-decoding |
US9524167B1 (en) * | 2008-12-10 | 2016-12-20 | Amazon Technologies, Inc. | Providing location-specific network access to remote services |
US8230050B1 (en) | 2008-12-10 | 2012-07-24 | Amazon Technologies, Inc. | Providing access to configurable private computer networks |
US8201237B1 (en) | 2008-12-10 | 2012-06-12 | Amazon Technologies, Inc. | Establishing secure remote access to private computer networks |
US9137209B1 (en) | 2008-12-10 | 2015-09-15 | Amazon Technologies, Inc. | Providing local secure network access to remote services |
US8726007B2 (en) * | 2009-03-31 | 2014-05-13 | Novell, Inc. | Techniques for packet processing with removal of IP layer routing dependencies |
US20120224579A1 (en) * | 2011-03-01 | 2012-09-06 | Futurewei Technologies, Inc. | Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Over Routed Ethernet Backbone |
CN102907048B (zh) * | 2011-04-22 | 2015-07-08 | 华为技术有限公司 | 发起ldp会话建连的方法以及标签转发路由器 |
US10140049B2 (en) | 2012-02-24 | 2018-11-27 | Missing Link Electronics, Inc. | Partitioning systems operating in multiple domains |
US9143481B2 (en) * | 2013-06-06 | 2015-09-22 | Apple Inc. | Systems and methods for application-specific access to virtual private networks |
US9112790B2 (en) * | 2013-06-25 | 2015-08-18 | Google Inc. | Fabric network |
US10749711B2 (en) | 2013-07-10 | 2020-08-18 | Nicira, Inc. | Network-link method useful for a last-mile connectivity in an edge-gateway multipath system |
US10454714B2 (en) | 2013-07-10 | 2019-10-22 | Nicira, Inc. | Method and system of overlay flow control |
CN104601352B (zh) | 2013-10-30 | 2019-02-12 | 华为技术有限公司 | 一种网络上下行数据处理方法、电子设备及系统 |
US9521219B2 (en) * | 2014-01-20 | 2016-12-13 | Echelon Corporation | Systems, methods, and apparatuses using common addressing |
US9258255B2 (en) * | 2014-04-11 | 2016-02-09 | Cisco Technology, Inc. | Hierarchical programming of dual-stack switches in a network environment |
US9584492B2 (en) * | 2014-06-23 | 2017-02-28 | Vmware, Inc. | Cryptographic proxy service |
US9832118B1 (en) | 2014-11-14 | 2017-11-28 | Amazon Technologies, Inc. | Linking resource instances to virtual networks in provider network environments |
US10484297B1 (en) | 2015-03-16 | 2019-11-19 | Amazon Technologies, Inc. | Automated migration of compute instances to isolated virtual networks |
US10498652B2 (en) | 2015-04-13 | 2019-12-03 | Nicira, Inc. | Method and system of application-aware routing with crowdsourcing |
US10425382B2 (en) | 2015-04-13 | 2019-09-24 | Nicira, Inc. | Method and system of a cloud-based multipath routing protocol |
US10135789B2 (en) | 2015-04-13 | 2018-11-20 | Nicira, Inc. | Method and system of establishing a virtual private network in a cloud service for branch networking |
US10749808B1 (en) | 2015-06-10 | 2020-08-18 | Amazon Technologies, Inc. | Network flow management for isolated virtual networks |
US10021196B1 (en) | 2015-06-22 | 2018-07-10 | Amazon Technologies, Inc. | Private service endpoints in isolated virtual networks |
US10326710B1 (en) | 2015-09-02 | 2019-06-18 | Amazon Technologies, Inc. | Propagating access rules on virtual networks in provider network environments |
US10320644B1 (en) | 2015-09-14 | 2019-06-11 | Amazon Technologies, Inc. | Traffic analyzer for isolated virtual networks |
KR102516027B1 (ko) | 2016-07-20 | 2023-03-31 | 삼성전자주식회사 | 헤더 처리 장치, 프로세서 및 전자장치 |
DE102016010359B4 (de) * | 2016-08-26 | 2023-08-17 | Telefónica Germany GmbH & Co. OHG | Endanwenderspezifisches virtuelles globales Netzwerk |
US10862796B1 (en) | 2017-01-18 | 2020-12-08 | Amazon Technologies, Inc. | Flow policies for virtual networks in provider network environments |
US10862709B1 (en) | 2017-01-18 | 2020-12-08 | Amazon Technologies, Inc. | Conditional flow policy rules for packet flows in provider network environments |
US10992568B2 (en) | 2017-01-31 | 2021-04-27 | Vmware, Inc. | High performance software-defined core network |
US20180219765A1 (en) | 2017-01-31 | 2018-08-02 | Waltz Networks | Method and Apparatus for Network Traffic Control Optimization |
US11121962B2 (en) | 2017-01-31 | 2021-09-14 | Vmware, Inc. | High performance software-defined core network |
US11252079B2 (en) | 2017-01-31 | 2022-02-15 | Vmware, Inc. | High performance software-defined core network |
US20200036624A1 (en) | 2017-01-31 | 2020-01-30 | The Mode Group | High performance software-defined core network |
US10992558B1 (en) | 2017-11-06 | 2021-04-27 | Vmware, Inc. | Method and apparatus for distributed data network traffic optimization |
US11706127B2 (en) | 2017-01-31 | 2023-07-18 | Vmware, Inc. | High performance software-defined core network |
US10778528B2 (en) | 2017-02-11 | 2020-09-15 | Nicira, Inc. | Method and system of connecting to a multipath hub in a cluster |
US10623374B2 (en) | 2017-06-09 | 2020-04-14 | Microsoft Technology Licensing, Llc | Automatic network identification for enhanced communications administration |
US10523539B2 (en) | 2017-06-22 | 2019-12-31 | Nicira, Inc. | Method and system of resiliency in cloud-delivered SD-WAN |
US10959098B2 (en) | 2017-10-02 | 2021-03-23 | Vmware, Inc. | Dynamically specifying multiple public cloud edge nodes to connect to an external multi-computer node |
US11115480B2 (en) | 2017-10-02 | 2021-09-07 | Vmware, Inc. | Layer four optimization for a virtual network defined over public cloud |
US11089111B2 (en) | 2017-10-02 | 2021-08-10 | Vmware, Inc. | Layer four optimization for a virtual network defined over public cloud |
US10999100B2 (en) | 2017-10-02 | 2021-05-04 | Vmware, Inc. | Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SAAS provider |
US10841131B2 (en) | 2017-10-02 | 2020-11-17 | Vmware, Inc. | Distributed WAN security gateway |
US10999165B2 (en) | 2017-10-02 | 2021-05-04 | Vmware, Inc. | Three tiers of SaaS providers for deploying compute and network infrastructure in the public cloud |
US11223514B2 (en) | 2017-11-09 | 2022-01-11 | Nicira, Inc. | Method and system of a dynamic high-availability mode based on current wide area network connectivity |
US11108687B1 (en) | 2018-09-12 | 2021-08-31 | Amazon Technologies, Inc. | Scalable network function virtualization service |
US10834044B2 (en) | 2018-09-19 | 2020-11-10 | Amazon Technologies, Inc. | Domain name system operations implemented using scalable virtual traffic hub |
CN113595913B (zh) * | 2018-11-02 | 2023-02-14 | 华为技术有限公司 | 报文转发的方法、发送报文的装置和接收报文的装置 |
US11088944B2 (en) | 2019-06-24 | 2021-08-10 | Amazon Technologies, Inc. | Serverless packet processing service with isolated virtual network integration |
US10848418B1 (en) | 2019-06-24 | 2020-11-24 | Amazon Technologies, Inc. | Packet processing service extensions at remote premises |
US11296981B2 (en) | 2019-06-24 | 2022-04-05 | Amazon Technologies, Inc. | Serverless packet processing service with configurable exception paths |
US11310170B2 (en) | 2019-08-27 | 2022-04-19 | Vmware, Inc. | Configuring edge nodes outside of public clouds to use routes defined through the public clouds |
US11611507B2 (en) | 2019-10-28 | 2023-03-21 | Vmware, Inc. | Managing forwarding elements at edge nodes connected to a virtual network |
US11394640B2 (en) | 2019-12-12 | 2022-07-19 | Vmware, Inc. | Collecting and analyzing data regarding flows associated with DPI parameters |
US11489783B2 (en) | 2019-12-12 | 2022-11-01 | Vmware, Inc. | Performing deep packet inspection in a software defined wide area network |
US11438789B2 (en) | 2020-01-24 | 2022-09-06 | Vmware, Inc. | Computing and using different path quality metrics for different service classes |
US11153195B1 (en) | 2020-06-08 | 2021-10-19 | Amazon Techologies, Inc. | Packet processing service configuration change propagation management |
US11245641B2 (en) | 2020-07-02 | 2022-02-08 | Vmware, Inc. | Methods and apparatus for application aware hub clustering techniques for a hyper scale SD-WAN |
US11709710B2 (en) | 2020-07-30 | 2023-07-25 | Vmware, Inc. | Memory allocator for I/O operations |
US11444865B2 (en) | 2020-11-17 | 2022-09-13 | Vmware, Inc. | Autonomous distributed forwarding plane traceability based anomaly detection in application traffic for hyper-scale SD-WAN |
US11575600B2 (en) | 2020-11-24 | 2023-02-07 | Vmware, Inc. | Tunnel-less SD-WAN |
US11601356B2 (en) | 2020-12-29 | 2023-03-07 | Vmware, Inc. | Emulating packet flows to assess network links for SD-WAN |
US11792127B2 (en) | 2021-01-18 | 2023-10-17 | Vmware, Inc. | Network-aware load balancing |
US11979325B2 (en) | 2021-01-28 | 2024-05-07 | VMware LLC | Dynamic SD-WAN hub cluster scaling with machine learning |
US12009987B2 (en) | 2021-05-03 | 2024-06-11 | VMware LLC | Methods to support dynamic transit paths through hub clustering across branches in SD-WAN |
US11381499B1 (en) | 2021-05-03 | 2022-07-05 | Vmware, Inc. | Routing meshes for facilitating routing through an SD-WAN |
US11729065B2 (en) | 2021-05-06 | 2023-08-15 | Vmware, Inc. | Methods for application defined virtual network service among multiple transport in SD-WAN |
US11489720B1 (en) | 2021-06-18 | 2022-11-01 | Vmware, Inc. | Method and apparatus to evaluate resource elements and public clouds for deploying tenant deployable elements based on harvested performance metrics |
US12015536B2 (en) | 2021-06-18 | 2024-06-18 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds |
US12047282B2 (en) | 2021-07-22 | 2024-07-23 | VMware LLC | Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN |
US11375005B1 (en) | 2021-07-24 | 2022-06-28 | Vmware, Inc. | High availability solutions for a secure access service edge application |
US11943146B2 (en) | 2021-10-01 | 2024-03-26 | VMware LLC | Traffic prioritization in SD-WAN |
US11863515B2 (en) * | 2021-12-10 | 2024-01-02 | Cisco Technology, Inc. | Systems and methods for translating IPV6 packets for DIA in an SD-WAN environment |
US11909815B2 (en) | 2022-06-06 | 2024-02-20 | VMware LLC | Routing based on geolocation costs |
US12057993B1 (en) | 2023-03-27 | 2024-08-06 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
US12034587B1 (en) | 2023-03-27 | 2024-07-09 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0952755A2 (en) * | 1998-03-27 | 1999-10-27 | Nec Corporation | Virtual private network forming system and method |
JP2000106572A (ja) * | 1998-09-28 | 2000-04-11 | Nec Corp | アドレス変換方法及び装置 |
JP2000138710A (ja) * | 1998-10-30 | 2000-05-16 | Toshiba Corp | カットスルーパス制御方法及びルータ装置並びに通信方法 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5001702A (en) * | 1989-09-26 | 1991-03-19 | At&T Bell Laboratories | Packet switching network for multiple packet types |
US5742604A (en) * | 1996-03-28 | 1998-04-21 | Cisco Systems, Inc. | Interswitch link mechanism for connecting high-performance network switches |
JP3531367B2 (ja) * | 1996-07-04 | 2004-05-31 | 株式会社日立製作所 | トランスレータ |
EP0840482B1 (en) * | 1996-11-01 | 2007-04-25 | Hitachi, Ltd. | Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus |
DE19809824C2 (de) * | 1997-03-12 | 2003-01-16 | Mannesmann Ag | Verfahren zum Betreiben von virtuellen privaten Netzen auf einem gemeinsamen Datenpaketvermittlungsnetz und Vorrichtung zum Durchführen des Verfahrens |
FR2761843B1 (fr) * | 1997-03-12 | 2002-05-03 | Mannesmann Ag | Procede d'exploitation de reseaux virtuels prives dans un reseau commun de commutation de paquets de donnees et dispositif pour la mise en oeuvre de ce procede |
US6226748B1 (en) * | 1997-06-12 | 2001-05-01 | Vpnet Technologies, Inc. | Architecture for virtual private networks |
US6339595B1 (en) * | 1997-12-23 | 2002-01-15 | Cisco Technology, Inc. | Peer-model support for virtual private networks with potentially overlapping addresses |
US6353614B1 (en) * | 1998-03-05 | 2002-03-05 | 3Com Corporation | Method and protocol for distributed network address translation |
US6226751B1 (en) * | 1998-04-17 | 2001-05-01 | Vpnet Technologies, Inc. | Method and apparatus for configuring a virtual private network |
US6449272B1 (en) | 1998-05-08 | 2002-09-10 | Lucent Technologies Inc. | Multi-hop point-to-point protocol |
US7095740B1 (en) * | 1998-06-30 | 2006-08-22 | Nortel Networks Limited | Method and apparatus for virtual overlay networks |
JP4110671B2 (ja) * | 1999-05-27 | 2008-07-02 | 株式会社日立製作所 | データ転送装置 |
US6535481B1 (en) * | 1999-08-20 | 2003-03-18 | Nortel Networks Limited | Network data routing protection cycles for automatic protection switching |
US6594704B1 (en) | 1999-12-15 | 2003-07-15 | Quarry Technologies | Method of managing and using multiple virtual private networks in a router with a single routing table |
JP2001237876A (ja) * | 2000-02-21 | 2001-08-31 | Nec Corp | Ip仮想プライベート網の構築方法及びip仮想プライベート網 |
US20010040895A1 (en) * | 2000-03-16 | 2001-11-15 | Templin Fred Lambert | An IPv6-IPv4 compatibility aggregatable global unicast address format for incremental deployment of IPv6 nodes within IPv4 |
JP2001326693A (ja) * | 2000-05-17 | 2001-11-22 | Nec Corp | 通信装置及び通信制御方法並びに制御プログラム記録媒体 |
JP4099930B2 (ja) * | 2000-06-02 | 2008-06-11 | 株式会社日立製作所 | ルータ装置及びvpn識別情報の設定方法 |
US8385342B2 (en) * | 2001-05-31 | 2013-02-26 | Fujitsu Limited | System and method of virtual private network route target filtering |
US7139818B1 (en) | 2001-10-04 | 2006-11-21 | Cisco Technology, Inc. | Techniques for dynamic host configuration without direct communications between client and server |
US7574738B2 (en) | 2002-11-06 | 2009-08-11 | At&T Intellectual Property Ii, L.P. | Virtual private network crossovers based on certificates |
US20040093492A1 (en) | 2002-11-13 | 2004-05-13 | Olivier Daude | Virtual private network management with certificates |
-
2000
- 2000-06-16 EP EP20060013822 patent/EP1758311B1/en not_active Expired - Lifetime
- 2000-06-16 EP EP20090164531 patent/EP2101447B8/en not_active Expired - Lifetime
- 2000-06-16 EP EP20100185985 patent/EP2375643B1/en not_active Expired - Lifetime
- 2000-06-16 EP EP14198863.4A patent/EP2858309B1/en not_active Expired - Lifetime
- 2000-06-16 JP JP2002504082A patent/JP3859591B2/ja not_active Expired - Fee Related
- 2000-06-16 EP EP00937295A patent/EP1298853A4/en not_active Ceased
- 2000-06-16 EP EP20100185998 patent/EP2276204B1/en not_active Expired - Lifetime
- 2000-06-16 EP EP20100186014 patent/EP2375644B1/en not_active Expired - Lifetime
- 2000-06-16 EP EP20100186013 patent/EP2288083B1/en not_active Expired - Lifetime
- 2000-06-16 WO PCT/JP2000/003980 patent/WO2001099354A1/ja not_active Application Discontinuation
- 2000-06-16 DE DE60042800T patent/DE60042800D1/de not_active Expired - Lifetime
- 2000-06-16 EP EP20090164530 patent/EP2101446B1/en not_active Expired - Lifetime
-
2002
- 2002-12-12 US US10/319,930 patent/US8423669B2/en not_active Expired - Fee Related
-
2010
- 2010-05-11 US US12/777,313 patent/US8489767B2/en not_active Expired - Fee Related
-
2013
- 2013-06-19 US US13/921,754 patent/US9413657B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0952755A2 (en) * | 1998-03-27 | 1999-10-27 | Nec Corporation | Virtual private network forming system and method |
JP2000106572A (ja) * | 1998-09-28 | 2000-04-11 | Nec Corp | アドレス変換方法及び装置 |
JP2000138710A (ja) * | 1998-10-30 | 2000-05-16 | Toshiba Corp | カットスルーパス制御方法及びルータ装置並びに通信方法 |
Non-Patent Citations (3)
Title |
---|
"Kabushiki Kaisha Ohm-sha", COMPUTER & NETWORK LAN, vol. 17, no. 9, 1 September 1999 (1999-09-01), JAPAN, pages 2 - 13 , 37 - 39, XP002907792 * |
B. GLEESON ET AL.: "A framework for IP based virtual private networks", RFC2764 (NETWORK WORKING GROUP REQUEST FOR COMMENTS: 2764), THE INTERNET SOCIETY, February 2000 (2000-02-01), pages 01 - 44, XP002175773 * |
See also references of EP1298853A4 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1351450A2 (en) * | 2002-03-15 | 2003-10-08 | Broadcom Corporation | Fastpath implementation for transparent local area network (LAN) services over multiprotocol label switching (MPLS) |
EP1351450A3 (en) * | 2002-03-15 | 2004-09-01 | Broadcom Corporation | Fastpath implementation for transparent local area network (LAN) services over multiprotocol label switching (MPLS) |
US7483962B2 (en) | 2002-07-05 | 2009-01-27 | Samsung Electronics Co., Ltd. | Apparatus and method for automatically allocating virtual addresses to nodes having same address |
WO2007013584A1 (ja) * | 2005-07-28 | 2007-02-01 | Matsushita Electric Industrial Co., Ltd. | データユニット転送装置及びアドレス変換装置並びに通信システム |
WO2007013628A1 (ja) * | 2005-07-29 | 2007-02-01 | Matsushita Electric Industrial Co., Ltd. | データユニット転送装置及び位置情報管理装置並びにアドレス配布装置 |
JP2011517815A (ja) * | 2008-03-31 | 2011-06-16 | アマゾン テクノロジーズ インコーポレイテッド | コンピューティングノード間の通信の構成 |
US9705792B2 (en) | 2008-03-31 | 2017-07-11 | Amazon Technologies, Inc. | Authorizing communications between computing nodes |
US11240092B2 (en) | 2008-03-31 | 2022-02-01 | Amazon Technologies, Inc. | Authorizing communications between computing nodes |
US10601708B2 (en) | 2008-03-31 | 2020-03-24 | Amazon Technologies, Inc. | Authorizing communications between computing nodes |
JP2014158274A (ja) * | 2008-03-31 | 2014-08-28 | Amazon Technologies Inc | コンピューティングノード間の通信の構成 |
JP2016028494A (ja) * | 2008-03-31 | 2016-02-25 | アマゾン テクノロジーズ インコーポレイテッド | コンピューティングノード間の通信の構成 |
US10218613B2 (en) | 2008-03-31 | 2019-02-26 | Amazon Technologies, Inc. | Authorizing communications between computing nodes |
US9577926B2 (en) | 2008-03-31 | 2017-02-21 | Amazon Technologies, Inc. | Authorizing communications between computing nodes |
JP2010087585A (ja) * | 2008-09-29 | 2010-04-15 | Alaxala Networks Corp | 転送装置、転送方法、およびコンピュータプログラム |
US9444642B2 (en) | 2012-03-28 | 2016-09-13 | Fujitsu Limited | LAN multiplexing apparatus |
WO2013145167A1 (ja) | 2012-03-28 | 2013-10-03 | 富士通株式会社 | Lan多重化装置 |
US9317431B2 (en) | 2013-01-31 | 2016-04-19 | Fujitsu Limited | Address generator, address generation method, and encapsulation-decapsulation device |
US20140215179A1 (en) * | 2013-01-31 | 2014-07-31 | Fujitsu Limited | Address generator, address generation method, and encapsulation-decapsulation device |
Also Published As
Publication number | Publication date |
---|---|
US20100223401A1 (en) | 2010-09-02 |
EP2101446A1 (en) | 2009-09-16 |
EP1758311A1 (en) | 2007-02-28 |
DE60042800D1 (de) | 2009-10-01 |
EP2375643A1 (en) | 2011-10-12 |
JPWO2001099354A1 (ja) | 2004-01-08 |
EP1758311B1 (en) | 2009-08-19 |
US8489767B2 (en) | 2013-07-16 |
EP2101446B1 (en) | 2012-03-21 |
EP2101447A1 (en) | 2009-09-16 |
EP1298853A4 (en) | 2003-08-13 |
EP2288083B1 (en) | 2013-07-31 |
EP2101447B8 (en) | 2012-09-12 |
EP2375644B1 (en) | 2013-05-29 |
EP2858309A1 (en) | 2015-04-08 |
EP2288083A1 (en) | 2011-02-23 |
EP2101447B1 (en) | 2012-07-18 |
JP3859591B2 (ja) | 2006-12-20 |
EP2375643B1 (en) | 2015-02-18 |
EP2276204A1 (en) | 2011-01-19 |
US20030088697A1 (en) | 2003-05-08 |
EP2858309B1 (en) | 2016-03-23 |
EP2276204B1 (en) | 2012-12-26 |
US9413657B2 (en) | 2016-08-09 |
EP1298853A1 (en) | 2003-04-02 |
US8423669B2 (en) | 2013-04-16 |
EP2375644A1 (en) | 2011-10-12 |
US20140003437A1 (en) | 2014-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3859591B2 (ja) | Vpn収容機能を含む通信装置 | |
EP3863237B1 (en) | Packet forwarding method, packet transmission device, and packet reception device | |
RU2735725C1 (ru) | Способ и устройство обработки и отправки пакетов, узел pe и узел | |
US6603769B1 (en) | Method and system for improving traffic operation in an internet environment | |
CN101340372B (zh) | 号码自动路由方法、更新方法、撤销方法、路由器及设备 | |
JP4801153B2 (ja) | 通信ネットワーク内のIPv6ステートレスアドレス構成をサポートするアクセス装置、ルーティング装置およびその方法 | |
JP5880570B2 (ja) | マッピングサーバ装置、ネットワークシステム、パケット転送方法およびプログラム | |
EP1713197A1 (en) | A method for implementing the virtual leased line | |
JP2001237876A (ja) | Ip仮想プライベート網の構築方法及びip仮想プライベート網 | |
JP6098192B2 (ja) | アドレス生成装置 | |
EP2599286B1 (en) | IPv6 address generation to trigger a virtual leased line service | |
WO2022184169A1 (zh) | 报文转发方法、系统、存储介质及电子装置 | |
CN114338495A (zh) | 业务处理方法以及相关设备 | |
Leddy et al. | Rfc 8986: Segment routing over ipv6 (srv6) network programming | |
JP4957818B2 (ja) | データ転送装置 | |
WO2019123630A1 (ja) | 通信装置および通信方法 | |
CN118075186A (zh) | 用于sd-wan的通信方法、报文处理方法及网络设备 | |
Fogel | IP version 6 in larger city networks and at Internet service providers | |
Tronco | Evolution of Internet Architecture | |
Khan et al. | Implementing VPN over MPLS | |
Ryynänen | Päästä-päähän reitittävä Ethernet–Tekninen kokeilu |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000937295 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10319930 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2000937295 Country of ref document: EP |
|
WWR | Wipo information: refused in national office |
Ref document number: 2000937295 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000937295 Country of ref document: EP |