WO2005083959A1 - Routeur d’accès réseau, méthode d’accès réseau, programme et support d’enregistrement - Google Patents

Routeur d’accès réseau, méthode d’accès réseau, programme et support d’enregistrement Download PDF

Info

Publication number
WO2005083959A1
WO2005083959A1 PCT/JP2005/003215 JP2005003215W WO2005083959A1 WO 2005083959 A1 WO2005083959 A1 WO 2005083959A1 JP 2005003215 W JP2005003215 W JP 2005003215W WO 2005083959 A1 WO2005083959 A1 WO 2005083959A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
network access
access router
network
target
Prior art date
Application number
PCT/JP2005/003215
Other languages
English (en)
Japanese (ja)
Inventor
Norihito Fujita
Yuichi Ishikawa
Akio Iijima
Original Assignee
Nec Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nec Corporation filed Critical Nec Corporation
Priority to JP2006510491A priority Critical patent/JP4600394B2/ja
Publication of WO2005083959A1 publication Critical patent/WO2005083959A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

Definitions

  • Network access router network access method, program, and recording medium
  • the present invention relates to a network access router, a network access method, a program for a network access router (hereinafter, referred to as a “program”), and a recording medium, and particularly to a home or office, and a hot spot (IEEE802.11b).
  • Internet access from nodes that exist in a LAN (Local Area Network), such as shops and public facilities that provide a wireless LAN and provide Internet connection services, condominiums, and office buildings.
  • Network access routers, network access methods, programs, and records used for remote access to networks (connecting to external LAN via public line such as modem and using resources on LAN) Regarding the medium.
  • IP Virtual Private Network
  • This type of network access router includes Internet or VPN (hereinafter referred to as target network) and PPP (Point-to-Point Protocol: a protocol for directly connecting two points to configure a WAN), L2TP (Layer 2 Tunneling Protocol: When constructing a VPN via the Internet MTS's L2F and IPsec (adding authentication and encryption functions to TCPZlP communication to alter or spoof packets) Connect to the target network using a protocol such as IEEE802.lx. In some cases, the target network is directly connected to a link such as Ethernet (registered trademark). The IP address used to connect to the target network, the DNS server address in the target network, etc.
  • IP IP address used to connect to the target network, the DNS server address in the target network, etc.
  • Configuration Protocol A mechanism for automating TCP / IP-related settings in network clients) and other protocols, and are set in the WAN interface of the network access router.
  • a private IP address is used on the LAN side of the network access router.
  • the packet is sent to the WAN interface of the network access router.
  • the source IP address is set to NAT (Network Address Translation: When connecting the LAN to the Internet, the private IP address used on the LAN side is changed to the global IP address assigned on the Internet side. Conversion technology).
  • IPsec connections There are also network access routers that can simultaneously establish connections to a plurality of target networks by simultaneously establishing a plurality of PPP connections, IPsec connections, and the like.
  • the IP address assigned for each connection is set on the WAN interface of the network access router, and the source that is NATed for packets within the LAN node according to the target network to which the packet is transferred IP addresses are used properly.
  • the PD (Prefix Delegation) method has been proposed as an IPv6 address dispatching method.
  • the target network issues an IP address prefix such as 2001: 260: 0: 1 :: / 64 to the network access router, and the network access router issues the assigned IP address.
  • a separate IP address for example,
  • RA Route Advertisement: a mechanism by which a router connects to itself and informs IPv6-compatible machines etc. of network setting information
  • D HCPv6 Pay out to nodes in the LAN using such a method.
  • a node in the LAN can communicate with a node in the target network without passing through NAT by using the address assigned from the target network as a source IP address (for example, see Patent Document 1). .
  • Patent Document 1 Patent No. 3153173 (Page 5, FIG. 1)
  • the nodes in the LAN are sent to a plurality of target networks. Cannot be connected at the same time.
  • the nodes in the LAN are assigned private addresses that can be used only under the network access router. If the network access router connects to multiple target networks using this method, the network access router should forward the packet based on the destination IP address of the packet sent from the LAN node to the target network. By deciding the target network, paying from the corresponding target network, and sending the source IP address to the issued IP address by NAT, transmission of multiple target networks could be realized.
  • IP addresses are issued to the LAN nodes because NAT is not performed on the way.
  • the source IP address must be selected according to the target network used by the internal nodes and the packet must be transmitted.
  • an object of the present invention is to provide a method in which a node in a LAN selects a source IP address according to a target network to be used without performing NAT on a packet between a node in the LAN and a node in a target network.
  • An object of the present invention is to provide a network access router, a network access method, a network access router program, and a recording medium which enable communication with a node in a network.
  • the invention according to claim 1 relates to a method in which a node connected to a subordinate LAN is connected to one or more target networks which are networks to be accessed by the node.
  • a network access router that enables communication, comprising: transmitting a packet corresponding to communication between the node and one or more of the target networks in a section between the node and the network access router itself. And transmitting over a communication tunnel established between the node and the network access router itself.
  • the communication tunnel is established by causing the node to execute a setting script provided to the node by the network access router itself. It is characterized by the following.
  • the invention according to claim 3 is a network that enables communication between a node connected to a subordinate LAN and at least one target network that is a network to be accessed by the node.
  • An access router which transmits a packet corresponding to communication between the node and one or more of the target networks in a section between the node and the network access router itself.
  • a target network connection setting unit configured to perform settings in the network access router itself and settings in the node in order to transfer the data over a communication tunnel established with the network access router itself. It is characterized by
  • the invention according to claim 4 is the invention according to claim 3, wherein the communication tunnel is provided between the node and the network access router itself for the target network with which the node communicates. It is characterized in that it is set individually in a section.
  • the invention according to claim 5 is the invention according to claim 3 or 4, wherein the target network connection setting unit corresponds to communication between the node and at least one of the target networks.
  • the network access router itself for transferring packets over a communication tunnel established between the node and the network access router itself in a space between the node and the network access router itself.
  • a router-get network connection policy management unit that holds parameters necessary for setting in the node; an interface setting unit that sets a tunneling interface for a LAN-side interface in the network access router itself; Routing table in the access router itself
  • routing setting unit for setting the entry for characterized in that it comprises a configuration script creation unit that creates a configuration script to be executed to Te per cent ⁇ to establish the communication tunnel to the node.
  • the configuration script executed to establish the communication tunnel in the node includes a tunneling agent that terminates the communication tunnel in the node. Creation of an interface, assignment of an IP address corresponding to the target network connected via the communication tunnel on the tunneling interface, and communication tunnel corresponding to a packet to the target network. It is characterized by including a command corresponding to the setting of a routing table for passing through the server.
  • the invention according to claim 7 is the invention according to claim 6, wherein an IP address assigned to the created tunneling interface and corresponding to the target network connected via the communication tunnel. Is an IPv6 address, and is lower than the IPv6 address.
  • 64 bits are automatically generated from the MAC address of the physical interface of the node.
  • the invention according to claim 8 is the invention according to claim 6 or 7, wherein the target network In the setting of the routing table for passing the packet to the corresponding communication tunnel, the default route automatically set in advance by DHCP or RA at the node is set to the metric of the automatically set default route. It is characterized by overwriting by specifying a metric with a smaller value and passing through the above-mentioned communication tunnel as the default route.
  • the invention according to claim 9 is the invention according to any one of claims 3 to 8, wherein the communication tunnel uses the IP address in an outer header, such as an IPv6 over IPv4 tunneling protocol, to establish the communication tunnel.
  • IPv6 over IPv4 tunneling protocol This is a protocol in which identification is performed.
  • an alias address is assigned to the LAN-side interface of the network access router itself.
  • IP address of the network access router itself is assigned to the IP address of the network access router itself in a header of the communication tunnel according to the communication tunnel.
  • the invention according to claim 10 is a network that enables communication between a node connected to a subordinate LAN and at least one target network that is a network to be accessed by the node.
  • An access router which provides a Web screen for receiving a communication request from the node between the node and one or more of the target networks, wherein the node responds to the Web screen with the Web screen.
  • the invention according to claim 11 is a network that enables communication between a node connected to a subordinate LAN and at least one target network that is a network to be accessed by the node.
  • An access router wherein the node communicates a packet corresponding to communication between the node and the target network in a section between the node and the network access router itself. It is characterized in that transfer is performed using different communication tunnels depending on the target network.
  • the invention according to claim 12 enables communication between a node connected to a subordinate LAN and one or more target networks, which are networks to be accessed by the node.
  • An access method for a network access router comprising: establishing a communication tunnel between the node and the network access router itself in a section between the node and the network access router itself; Any of the nets
  • a packet corresponding to communication with one or more packets is transferred on the communication tunnel.
  • the invention according to claim 13 is a network that enables communication between a node connected to a subordinate LAN and at least one target network that is a network accessed by the node.
  • An access method of an access router wherein in a section between the node and the network access router itself, a packet corresponding to communication between the node and the target network is transmitted by the node. It is characterized in that transfer is performed using different communication tunnels according to the target network.
  • the invention according to claim 14 is a network that enables communication between a node connected to a subordinate LAN and at least one target network that is a network to be accessed by the node.
  • a program for an access router comprising: establishing, in a target network connection setting unit, a communication tunnel between the node and the network access router itself in a section between the node and the network access router itself. A, and a procedure B of transferring a packet corresponding to communication between the node and at least one of the target networks over the communication tunnel.
  • the invention according to claim 15 is a network that enables communication between a node connected to a subordinate LAN and at least one target network that is a network to be accessed by the node.
  • An access router program wherein a target network connection setting unit establishes, in a section between the node and the network access router itself, a different communication tunnel according to the target network with which the node is communicating.
  • the invention according to claim 16 is a network that enables communication between a node connected to a subordinate LAN and one or more target networks that are networks to which the node accesses.
  • the connection setting unit includes a procedure A for establishing a communication tunnel between the node and the network access router itself in a section between the node and the network access router itself;
  • a program for executing a procedure B of transferring a packet corresponding to communication with one or more of the powers over the communication tunnel is recorded.
  • the invention according to claim 17 is a network that enables communication between a node connected to a subordinate LAN and at least one target network that is a network accessed by the node.
  • a storage medium storing a program of an access router, wherein a target network connection setting unit communicates with the target network in a section between the node and the network access router itself.
  • the network access router of the present invention by performing the above-described configuration and operation, communicates between a node, which is a node in the LAN, and the target network by using the node and the network access router itself (hereinafter, "own router") t ⁇ ⁇ )) through a communication tunnel established between This communication tunnel can be established by the number corresponding to the target network with which the node communicates, and the target network power can be directly assigned to the tunneling interface that terminates the communication tunnel at the node. . Therefore, even in an environment where a node communicates with a plurality of target networks, communication between the node and the target network can be performed without performing NAT on the way, thus achieving the object of the present invention. it can.
  • a node in a LAN selects a source IP address according to a target network to be used without performing NAT on a packet between a node in the LAN and a node in the target network. It is possible to realize communication with a node in the network. The reason is that the network access router of the present invention receives a request from a subordinate LAN node for the subordinate LAN node to access the target network, and responds to the request. On the other hand, a tunneling interface is created on the local router's LAN interface, and packets destined for that node from the target network to the LAN node are sent to the corresponding communication tunnel between the local router and the LAN node.
  • the network access router includes a network access router in each of the target nodes in the LAN so that a packet between the node in the LAN and the target network is performed on a corresponding communication tunnel between the router and the node in the LAN.
  • one embodiment of the present invention includes three types of networks: a LAN-A1, an access network C1, and target networks D1 and D2.
  • LAN—A1 is connected to one or more LAN nodes including terminal All.
  • LAN—A network access router B1 is located between A1 and the access network C1, and nodes in the LAN connect to the target networks Dl and D2 via the communication tunnels Btl and Bt2, respectively, where the network access router B1 is also established.
  • Access servers Dll and D21 are arranged between the access network C1 and the target networks Dl and D2, respectively, and terminate a communication tunnel established with the network access router B1. If the access network C1, which consists only of the target networks Dl and D2, is also an IP network, the nodes in the LAN can communicate with the access network C1 as one of the target networks.
  • access network C1 is also an IP network, and that a node in the LAN communicates with a node in access network C1.
  • the description will be made assuming that the access network C1 and the target networks Dl and D2 are IPv6 networks, and RAN-A1 is an IPv4ZlPv6 dual network.
  • the access servers Dll and D21 are installed at the boundaries between the target networks Dl and D2 and the access network C1, respectively, and the communication tunnels Btl and Btl, which are established with the network access router B1, respectively. Terminate each of Bt2. These communication tunnels are used when the nodes in the LAN A1 under the network access router BUS and the nodes in the target networks Dl and D2 communicate. Examples of the communication tunnel include PPPoE (Point-to-Point Protocol over Ethernet (registered trademark)), L2TP, and IPsec.
  • PPPoE Point-to-Point Protocol over Ethernet (registered trademark)
  • L2TP Layer2TP
  • IPsec IPsec
  • Terminal All is a node in LAN-A1 that communicates with nodes in access network CI and target networks Dl and D2, examples of which include PCs (Personal Computers), mobile terminals, workstations, and IP telephones. Can be In addition, network devices such as routers and network switches are also given as examples. Hereinafter, the terminal All including such nodes will be described.
  • the terminal All has, as an IP address, an IPv6 address for communication with the access network C1 and the target networks Dl and D2, as well as an IPv4 address used in the LAN-A1.
  • This IPv4 address may be set manually by the user of the terminal All, or may be obtained using the DHCP (Dynamic Host Configuration Protocol) function provided by the network access router B1 or another server.
  • Terminal All must have its own IPv6 address to communicate with access network C1 and target networks Dl and D2.
  • three IPv6 addresses assigned from each network are assigned to one physical interface by the following method.
  • IPv6 address of access network C1 Allocated on a physical interface. This IPv6 address is issued by RA or DHCPv6 from network access router B1. The IPv6 address assigned here is in the range of the IP address prefix assigned from the access network C1 to the network access router B1 by the PD method.
  • IPv6 addresses of target networks Dl and D2 Allocated on the tunneling interface created on the physical interface of terminal All.
  • the user of the terminal All connects to the Web server section Bl 1 of the network access router B1 and executes a script provided from the Web server section Bl 1 to execute a tunneling interface on the physical interface of the terminal All.
  • Create a face assign addresses to the tunneling interface, and set up the routing table. By creating tunneling interfaces for the number of IPv6 addresses that need to be assigned, Communication can be performed.
  • Examples of the tunneling interface set in the terminal Al 1 in the method (2) include an IPv6 over IPv4 tunneling interface, an IPsec tunneling interface, and a PPTP (Point-to-point). -Point Tunneling Protocol).
  • IPv6 over IPv4 tunneling interface can be generally used as a protocol for transferring IPv6 packets on an IPv4 network, and is widely used today.
  • XP is also provided as a standard function.
  • the network access router B1 has a Web server section B11, a target network connection setting section B12, a routing table B13, an interface driver section B14, a WAN interface B15, and a LAN interface B16.
  • LAN—DHCP server function for assigning IPv4 addresses to nodes in A1
  • RA function for assigning IPv6 addresses
  • tunnel setting for establishing a communication tunnel to access servers DLL and D21
  • the Web server unit B11 transmits HTTP (Hyper Text Transfer Protocol: a name of a protocol used for exchanging HTML contents and other Web contents between the Web server and the Web browser) from the terminal A11. And displays setting information and a setting change screen for the network access router B1 on the browser of the terminal All.
  • the web server unit B11 executes the terminal Al 1 in response to a connection request from the terminal All to the target networks Dl and D2 so that the terminal Al 1 can communicate with the target networks Dl and D2.
  • the setting script is for creating a tunneling interface, assigning an address to the tunneling interface, and setting a routing table in the terminal All.
  • Web server unit B11 executes these scripts by using the Web server unit B11 to specify the link tally on the browser screen of the terminal All or by directly specifying a URL (Universal Resource Locator).
  • Web server B11 is the target network from terminal All. As long as it has a function of accepting a connection request for Dl and D2 and responding to the request with a setting script to the terminal All, it is possible to substitute a function other than the Web. The following description is based on the assumption that the Web is used as a protocol that can be used universally by the terminal All.
  • the target network connection setting unit B12 has a setting function for allowing the terminal All to communicate with the target networks D1 and D2 via the network access router B1 without performing NAT.
  • This setting function includes a setting function for the terminal All and a setting function for the network access router B1 itself. As described above, the setting for the terminal All is performed by causing the terminal Al 1 to execute the setting script via the Web server unit Bl 1.
  • the target network connection setting unit B12 includes, as its components, a target network connection policy management unit B121, an interface setting unit B122, a routing setting unit B123, and a terminal setting script generation unit B124.
  • the target network connection policy management unit B121 manages parameters required for setting in the network access router B1 and the terminal Al1 for enabling communication between the terminal All and the target networks Dl and D2. Being done.
  • the interface setting unit B122 makes settings for the interface driver unit B14 so that it can communicate with the target networks Dl and D2 via the network access router B1 without performing NAT. Specifically, in order to allow communication between the terminal All and the target networks Dl and D2 to pass through a communication tunnel in a section between the terminal Al 1 and the network access router B1, the LAN of the network access router B1 is used. A request is made to interface B16 to create a tunneling interface that terminates this communication tunnel. The parameters required for the setting are obtained from the target network connection policy management unit B121.
  • the routing setting unit B123 makes settings in the routing table B13 in order to communicate with the target networks D1 and D2 via the network access router B1 without performing NAT. Specifically, an entry is added to transfer the packet transferred from the target networks Dl and D2 to the terminal All on the corresponding communication tunnel set from the network access router B1 to the terminal Al1. The parameters required for this setting are acquired from the target network connection policy management unit B121.
  • the terminal setting script generation unit B124 should be executed in the terminal All in order to communicate with the target networks Dl and D2 via the network access router B1 without performing NAT. Generate a script and pass it to the Web server. Specifically, the creation of a tunneling interface in the terminal A11, the assignment of an address on the tunneling interface, and the setting of a routing table are mentioned. The parameters required for creating the setting script are acquired from the target network connection policy management unit B121.
  • the routing table B13 is a table storing IP routing setting information in the network access router B1.
  • the routing table B13 can set an entry from the routing setting unit B123.
  • the interface driver section B14 manages an interface in the network access router B1. Upon receiving the request from the interface setting unit B 122, the interface driver unit B14 actually performs creation Z deletion of the tunneling interface and setting of parameters in the tunneling interface.
  • the WAN interface B15 is a physical interface on the WAN side in the network access router B1.
  • the network access router B1 is connected to the access network C1 by a link provided by the WAN interface B15.
  • the WAN interface B15 includes tunneling interfaces B151 and B152 as virtual interfaces for a communication tunnel established on a link to be provided.
  • the tunneling interfaces B151 and B152 are respectively the communication tunnels Btl and B152. This is a virtual interface for establishing t2, and is used for communication with target networks Dl and D2.
  • the WAN interface B15 can have an arbitrary number of tunneling interfaces according to the number of target networks to which the network access router B1 connects.
  • the LAN interface B16 is a physical interface on the LAN-A1 side in the network access router B1.
  • Network access router B1 is connected to LAN-A1 by a link provided by LAN interface B16.
  • the tunneling interfaces B161 and B162 are virtual interfaces for establishing a communication tunnel between the terminal Al and the network access router B1, and the terminal Al and the target network Dl and B1, respectively. Used to communicate with D2.
  • the LAN interface B16 can have any number of tunneling interfaces according to the number of LAN nodes connected to the network access router B1 and the number of target networks connected to the LAN nodes. It is.
  • the network access router B1 is directly connected to the access network C1 by the WAN interface B15, and the communication tunnels Btl, B2 to the target networks Dl, D2 by the tunneling B151, B152, respectively. Connected via Bt2.
  • FIG. 2 is a diagram showing a target network connection operation in the network access router according to one embodiment of the present invention.
  • FIG. 3 is a diagram showing an interface list in the network access router according to one embodiment of the present invention.
  • FIG. 4 is a diagram showing a routing table in the network access router according to one embodiment of the present invention.
  • FIG. 5 is a diagram showing an interface list in a terminal in a LAN according to an embodiment of the present invention.
  • FIG. 6 is a diagram showing a routing table in a terminal in a LAN according to an embodiment of the present invention.
  • FIG. 7 is a diagram showing a message sequence according to one embodiment of the present invention.
  • FIG. 8 is a diagram showing a target in the network access router according to one embodiment of the present invention.
  • FIG. 9 is a diagram showing a network connection policy table.
  • FIG. 9 is a diagram showing a setting script created by the network access router according to one embodiment of the present invention.
  • FIG. 10 is a diagram showing a
  • the interface list 101 and the routing table 102 shown in FIG. 3 and FIG. 4 respectively show the state of the network interface in the network access router B1 and an example of the routing table B13. In the initial state, only the 114th entry of the interface list 101 exists.
  • an IPv4 address, an IPv6 address, and an alias address in the LAN interface B16 are registered.
  • the alias address is not necessarily required depending on the type of the protocol of the communication tunnel used between the terminal A 11 and the network access router B1, but the IP address based on the identification of the communication tunnel such as an IPv6 over IPv4 tunnel is used. (In the case of IPv6 over IPv4 tunnel, the source IP address of the IPv4 header and the Z destination IP address) This may be necessary if a protocol is used.
  • the third entry and the fourth entry indicate the settings of the tunneling interfaces B151 and B152 on the WAN interface B15, and both are communication tunnels based on the IPsec protocol.
  • the base address (in this case, the IPv6 address in the outer header) is shown.
  • 2001: c90: 0: 2: 200: 9alF: febc: deiD network access It shows that an IPsec tunnel has been established between router B1's IPv6 address) and 2001: c90: 1: 0 :: 1 (IPv6 address of access server Dl 1).
  • the routing table 102 only the first to sixth entries exist in the initial state.
  • the first entry and the second entry are entries for forwarding an IPv4 packet and an IPv6 packet to LAN-A1 to the LAN interface B16 side, respectively.
  • the third entry and the fourth entry are entries for transferring an IPv6 packet to access network C1 to WAN interface B15.
  • the fifth entry and the sixth entry are entries for transferring IPv6 packets to the target networks Dl and D2 via the communication tunnels Btl and Bt2 via the interfaces B151 and B152, respectively. is there.
  • the terminal All is assigned from the network access router B1 an IPv4 address used in the LAN-A1 by DHCP or other means, and an IPv6 address issued from the access network C1. Assigned by RA, DHCPv6 or other means. Allocation of these IP addresses is performed when terminal Al 1 connects to LAN—A1. IPv4 communication with nodes in LAN—A1 using the assigned IPv4 address, and assigned IPv6 address It is possible to perform IPv6 communication with LAN-Al nodes and access network C1 using LAN.
  • FIG. 5 and FIG. 6 show examples of the interface list 201 and the routing table 202 in the terminal All, respectively.
  • the initial state only the first entry exists in the interface list 201, and an IPv4 address and an IPv6 address are respectively assigned to ethO indicating the physical interface of the terminal Al1! /.
  • the 113rd entry exists in the routing table 202, and the routes for the IPv4 packet and the IPv6 packet are registered respectively.
  • FIG. 7 shows an example of a message sequence between the terminal All and the network access router B1 after the terminal All has connected to the LAN-A1 under the network access router B1.
  • the terminal A1 obtains an IPv4 address by DHCP (step S201 in FIG. 7) and obtains an IPv6 address by RA (step S202), thereby performing IPv4 communication with a node in the LAN—A1, and in the LAN—A1. IPv6 communication with nodes and access network C1 is now possible.
  • the terminal All uses the IPv6 address allocated and allocated from the target networks Dl and D2. It cannot communicate with the target networks Dl and D2. For this reason, the terminal All uses a browser to make an HTTP connection to the network access router B1 to open a target network connection setting Web screen so that it can communicate with the target networks Dl and D2.
  • the target network connection policy management unit Bl21 the network access router B1 and the network access router B1 for enabling communication between nodes in the LAN A1, including the terminal All, and the target networks Dl, D2.
  • the target network D1 is connected via the ipsecO tunneling interface of the network access router B1, and the supported IP address scope (a node in the LAN—A1 is connected to the target D1). It indicates that the destination IP address range of the IP packet to be forwarded is:: 0 (that is, the default route).
  • the IP address prefix assigned from the target network D1 is 2001: 218: 0: 1 :: / 64, and IP addresses in this range can be assigned to nodes in LAN-A1.
  • the IP packet transferred between the target network D1 and the node in the LAN is transferred by an IPv6 over IPv4 tunnel between the network access router B1 and the node in the LAN—A1.
  • the base address (in this case, the IPv4 address in the outer header) of the local side (the network access router B1 side) in the IPv6 over IPv4 tunnel is 192.168.0.254.
  • the setting for the target network D2 is also shown.
  • the setting in the target network connection policy table 201 may be performed by the administrator of the network access router B1, or may be performed when the communication tunnels Btl and Bt2 from the network access router B1 to the access servers Dll and D21 are set. It may be automatically obtained from Dll and D21.
  • IPsec [7, Internet Security Association and Key Management Protocol (ISAKMP) Configuration Method, IPCP ( IP Control Protocol).
  • the Web server unit Bl l of the network access router Bl uses the HTTP message (for example,
  • FIG. 11 is a diagram showing a Web screen displayed by the network access router according to one embodiment of the present invention.
  • a link for making a target network connection setting request is pasted on the target network connection setting Web screen, as in the “connection” button in the screen 401 in FIG. 11, and the user of the terminal A11 connects this link.
  • Web server B11 receives a target network connection setting request from terminal All as an HTTP message (step S103).
  • the Web server unit Upon receiving the target network connection setting request in step B103, the Web server unit issues various settings to the target network connection setting unit B12 so that the terminal All can communicate with the target networks Dl and D2. Ask to do.
  • the target network connection setting unit B12 passes communication between the terminal All and the target networks Dl and D2 via the interface setting unit B122 in a section between the communication terminal All and the network access router B1.
  • a tunneling interface is set on the LAN interface B16 for the communication tunnel (step S104).
  • This tunneling interface is created by the number of target networks with which the terminal All communicates.
  • the setting parameters managed in the target network connection policy management unit B121 are used. For example, when the target network connection policy 201 shown in FIG. 8 is managed, the tunneling interfaces (sitO and sitl) corresponding to the fifth and sixth entries are added to the interface list shown in FIG. Will be done.
  • the tunneling interface sitO is used for communication between the target network D1 and the terminal All, and the tunneling interface sitl is used for communication between the target network D2 and the terminal All.
  • IPv6 over IPv4 is used as a tunneling protocol, and the IPv4 addresses of the network access router B11 and the terminal All are registered as optional parameters as base addresses.
  • the base address of the same tunneling interface is used as the base address of the network access router B11 and the IPv4 address of the terminal All. Since the combination must not be the same (since each IPv6 over IPv4 tunnel is identified by a base address), an alias address of 192.168.0.0.253 is used as the base address of one network access router B11. Note that is used.
  • the target network connection setting unit B12 sets a routing table via the routing setting unit B 123 (Step S105). For example, when the target network connection policy table 201 shown in FIG. 8 is managed, a seventh entry and an eighth entry are added to the routing table 102 shown in FIG. In a later step S107, a script responding to the terminal Al1 creates a tunneling interface on the LAN interface B16 of the terminal Al1, and creates target networks Dl and D2 on the tunneling interface. IPv6 Address Assignment These entries specify the route for packets destined for the assigned IPv6 address.
  • the seventh entry is for an IPv6 packet addressed to 2001: 218: 0: l: 200: 4cff: fe23: 9ed2, which is an IPv6 address assigned to terminal All to communicate with target network D1.
  • the network access router B1 ! designates transmission from the tunneling interface sitO.
  • the terminal All can receive the IPv6 packet transmitted from the target network to the terminal All with the tunneling interface power corresponding to the target network.
  • a setting script to be performed is created by the terminal setting script generation unit B124 (step S106).
  • the setting parameters managed by the target network connection policy management unit B121 are used when creating the setting script, and the tunneling interface necessary for connecting to the target networks Dl and D2 at the terminal All.
  • a script is created to create a network, assign addresses to the tunneling interface, and set up routing tables.
  • the target network connection setting unit B12 passes the setting script created in step S106 to the web server unit B11, and the web server unit B11 sends the received setting script.
  • a response to the terminal is sent to the terminal All (step S107).
  • This setting script is responded as a response message to the target network connection setting request received in step S103.
  • the configuration script responded to at the terminal All is executed to create a tunneling interface at the terminal All, assign an address on the tunneling interface, and edit a routing table.
  • the settings are made.
  • general browsers do not allow the browser to automatically execute a script that sets the tunneling interface on the terminal All. Therefore, the following example will be described as a method that can be universally used to cause the terminal Al 1 to execute the setting script.
  • a link for performing a target network connection setting request placed on the Web screen displayed in step S102 is linked to the setting script (for example,
  • the setting script 301 shown in FIG. 9 is a setting created by the terminal setting sta- bile generation unit B124 when the target network connection policy table 201 shown in FIG. 8 is managed by the target network connection policy management unit B121. It is an example of a script.
  • the first to third lines are commands for creating a tunneling interface corresponding to the target network D1, assigning an address on the tunneling interface, and setting a routing table.
  • Lines 6 to 6 are commands for creating the tunneling interface corresponding to the target network D2, assigning addresses to the tunneling interface, and setting the routing table.
  • the lower 64 bits of the IPv6 address to be allocated are determined using the MAC address of the physical interface in terminal Al1 according to the EUI-64 standard. It may be automatically generated according to the rules, or an arbitrary value may be assigned so as not to overlap with other LAN-A1 nodes.
  • the network access router B1 does not need to perform address duplication management at! /.
  • the route to the access network C1 automatically set by the RA in the routing table of the terminal All (in the RA, :: / 0 (default route) is automatically set) is accessed. This is used to change the route to the IP address scope of network C1.
  • the terminal Al 1 executes the setting script responded to the terminal Al 1 in step S 107, creates a tunneling interface on the terminal Al 1, and creates an IP on the tunneling interface.
  • the state of the network interface in the terminal All becomes a state in which the second entry and the third entry are added to the interface list 201 in FIG. .
  • Tunneling interfaces sitO and sitl are used to communicate to the target networks Dl and D2, respectively.
  • the routing table B13 is in a state where the fourth-sixth entry is added to the routing table 202 of FIG.
  • the fourth entry is to overwrite the IPv6 default route issued by the RA to the target network D1 instead of the access network C1.
  • overwriting can be realized by making the metric of the newly registered default route smaller than the metric of the third entry, which is the default route automatically registered by the RA.
  • the fifth entry registers the route of the IPv6 packet destined for access network C1 overwritten by the fourth entry, specifying the destination IPv6 address prefix.
  • the sixth entry specifies the route of the IPv6 packet destined for the target network D2.
  • the setting script responded in step S107 includes a script that returns to the Web server section Bl1 a notification of whether or not the setting has been successful at the terminal All (the setting script 301 in FIG. 9).
  • the terminal All After executing the setting script, the terminal All notifies the Web server B11 of the success or failure of the power.
  • This notification can be realized by making an HTTP request to a different URL depending on the success or failure of the setting stab. For example, if successful, an HTTP request to http: ⁇ www.cpe.myhome / success.html is made; if unsuccessful, an HTTP request to http: ⁇ www.cpe.myhome / failure.html is made. Then, when an HTTP request to http: www.cpe.myhome / success.html is received, the web server unit B11 responds to the terminal All with a web screen indicating that the connection to the target network has been successfully made.
  • Step S108 and S109 http: ⁇ If an HTTP request to www.cpe.myhome / failure.html is received, respond to the Web screen indicating that connection to the target network has failed. (Steps S108, S110). Further, when notified that the execution of the setting script has failed at the terminal All, the Web server unit B11 notifies the target network connection setting unit B12 of the information. Upon receiving this notification, the target network connection setting unit B12 deletes the setting of the tunneling interface and the setting of the routing table performed in steps S104 and S105 (step S111).
  • FIG. 10 shows an example of a packet format corresponding to each case when communicating with the terminal A11, the node C11 in the access network C1, the node D12 in the target network D1, and the node D22 in the target network D2.
  • an IP sec tunnel is used between the network access router B1 and the access routers Dll and D12 to enable communication between the terminal All and the target networks Dl and D2.
  • an IPv6 IPv4 tunnel is used between the network access router B1 and the network access router B1.
  • FIG. 11 shows the operation of the target network disconnection setting based on the request from the terminal All in the network access router B1.
  • the terminal All uses a browser to make an HTTP connection to the network access router B1 to open the target network disconnection setting Web screen, and presses the “disconnect” button on the Web screen 401 in FIG. Disconnect communication with Dl and D2.
  • FIG. 12 is a diagram showing a target network disconnection operation in the network access router according to one embodiment of the present invention.
  • media for carrying IP packets between the terminal All and the network access router B1 are used in accordance with the network to which the communication partner node of the terminal All belongs. That is, when the terminal All communicates with the access network C1, the IP packet is directly carried over a data link such as Ethernet (registered trademark), and when the terminal All communicates with the target networks Dl and D2, IP packets were carried over the corresponding communication tunnel. In addition, when the terminal All communicates with the target network D1, the IP packet is carried directly over a data link such as Ethernet (registered trademark), and the terminal All is connected to the access network Cl and the target network D2. When communicating with, a form that allows IP packets to be carried over the corresponding communication tunnel is also conceivable.
  • the case where the access network Cl and the target networks Dl and D2 are IPv4 networks described as being IPv6 networks is applicable.
  • the terminal All and the network access Examples of the communication tunnel used between the router S1 and the router B1 include PPPoE, IPsec, and IPv4 over IPv4 tunneling protocol.
  • network access router B1 receives a request from terminal All, which is a node in LAN-A1, for terminal All to access target networks D1 and D2, and responds to this request by its own router. Creates a tunneling interface on the LAN interface B16, and forwards packets destined from the target networks Dl and D2 to the terminal All over the corresponding communication tunnel between the own router and the terminal All Set the routing table B 13 so that Further, the network access router B1 transmits the packet between the terminal All and the target networks Dl and D2 to the terminal Al 1 so that the packet is transmitted through the corresponding communication tunnel between the own router and the terminal All.
  • a script that creates the tunneling interface used for communication with each target network pays the target network to the tunneling interface from each target network, assigns the issued IP address, and sets the routing And the terminal All executes the script, thereby enabling communication between the terminal A11 and the target networks Dl and D2 without performing NAT on the way.
  • the LAN-A1 node realizes each target network using the assigned IP address and without performing NAT on the way. Has been impossible in the past, but by using the network access router B1 provided in the present embodiment, the packet between the LAN node and the target network node is not NATed on the way, However, it is possible to select the source IP address according to the target network to be used and communicate with nodes in the target network.
  • the power described in the case of the network access router is applicable to a network access method, a network access router program, and a recording medium that are not limited thereto.
  • the present invention is a network access method that enables communication between a node connected to a subordinate LAN and one or more target networks, which are target networks to be accessed by the node. Establish a communication tunnel between the node and the router in the section between the node and the router, and establish a communication tunnel between the node and one or more of the target networks. May be transferred over the communication tunnel.
  • the present invention provides a network access router that enables communication between a node connected to a subordinate LAN and one or more target networks that are the target networks to be accessed by the node.
  • a packet corresponding to communication between the node and the target network is transmitted by the node to establish a different communication tunnel according to the target network. You can use and transfer.
  • the present invention also provides a network access router program that enables communication between a node connected to a subordinate LAN and one or more target networks that are nodes to be accessed by the node.
  • the procedure B in which a packet corresponding to the above communication is transferred to the communication tunnel may be executed.
  • the present invention provides a program for a network access router that enables communication between a node connected to a subordinate LAN and one or more target networks that are networks to be accessed by the node.
  • the target network connection setting unit establishes, in the section between the node and the network access router itself, a procedure ⁇ for establishing a different communication tunnel according to the target network with which the node is communicating, ⁇ , And the procedure j8 of transferring the packet corresponding to the communication between the different communication tunnels.
  • the present invention provides a program for a network access router that enables communication between a node connected to a subordinate LAN and one or more target networks that are networks to be accessed by the node.
  • the procedure A for establishing a communication tunnel between the node and the own router in the section between the node and the own router in the target network connection setting unit Record a program that executes Step B to transfer a packet corresponding to communication with at least one of the target networks over a communication tunnel.
  • the present invention provides a network that enables communication between a node connected to a subordinate LAN and one or more target networks that are nodes to be accessed by the node.
  • a storage medium that stores the access router program, and establishes a different communication tunnel in the target network connection setting unit in the section between the node and the network access router itself according to the target network with which the node is communicating.
  • a program for executing the procedure ⁇ and the procedure j8 of transferring a packet corresponding to communication between the node and the target network using a different communication tunnel may be recorded.
  • examples of the recording medium include an HDD (hard disk driver), a CDROM, a flexible disk, and a semiconductor memory.
  • FIG. 1 is a block diagram showing a configuration of an embodiment of the present invention.
  • FIG. 2 is a diagram showing a target network connection operation in a network access router according to one embodiment of the present invention.
  • FIG. 3 is a diagram showing an interface list in a network access router according to an embodiment of the present invention.
  • FIG. 4 is a diagram showing a routing table in the network access router according to one embodiment of the present invention.
  • FIG. 5 is a diagram showing an interface list in a terminal in a LAN according to an embodiment of the present invention.
  • FIG. 6 is a diagram showing a routing table in a terminal in a LAN according to an embodiment of the present invention.
  • FIG. 7 is a diagram showing a message sequence according to an embodiment of the present invention.
  • FIG. 8 is a diagram showing a target network connection policy table in the network access router according to one embodiment of the present invention.
  • FIG. 9 is a diagram showing a setting script created by the network access router according to one embodiment of the present invention.
  • FIG. 10 is a diagram showing a packet format according to an embodiment of the present invention.
  • FIG. 11 is a diagram showing a Web screen displayed by the network access router according to one embodiment of the present invention.

Abstract

Routeur d’accès réseau, méthode d’accès réseau, programme et support d’enregistrement permettant à un nœud LAN de sélectionner une adresse IP source en fonction du réseau cible à utiliser, et de communiquer avec un nœud de réseau cible sans traduction d'adresse réseau en paquet entre le nœud LAN et le nœud de réseau cible. Le routeur d’accès réseau B1 inclut une unité de paramétrage de la connexion au réseau cible qui permet de paramétrer le routeur d'accès réseau B1 et les nœuds afin de transmettre un paquet de données entre un terminal fonctionnant sous le routeur d’accès réseau B1 et les réseaux cibles D1 et D2 dans un tunnel de communication établi entre le terminal A11 et le routeur d'accès réseau B1 à un croisement entre les nœuds et le routeur d'accès réseau B1. En conséquence, en réponse à la demande de connexion au réseau cible par le terminal A11, le routeur d’accès routeur B1 paramètre son nœud, génère un scénario de paramétrage à exécuter dans le terminal A11, et répond au scénario de paramétrage du terminal A11 pour forcer le terminal A11 à l’exécuter.
PCT/JP2005/003215 2004-03-01 2005-02-25 Routeur d’accès réseau, méthode d’accès réseau, programme et support d’enregistrement WO2005083959A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2006510491A JP4600394B2 (ja) 2004-03-01 2005-02-25 ネットワークアクセスルータ、ネットワークアクセス方法、プログラム、及び記録媒体

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004056293 2004-03-01
JP2004-056293 2004-03-01

Publications (1)

Publication Number Publication Date
WO2005083959A1 true WO2005083959A1 (fr) 2005-09-09

Family

ID=34908906

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/003215 WO2005083959A1 (fr) 2004-03-01 2005-02-25 Routeur d’accès réseau, méthode d’accès réseau, programme et support d’enregistrement

Country Status (3)

Country Link
JP (1) JP4600394B2 (fr)
TW (1) TW200601752A (fr)
WO (1) WO2005083959A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007215090A (ja) * 2006-02-13 2007-08-23 Fujitsu Ltd ネットワークシステム、端末およびゲートウェイ装置
JPWO2006016698A1 (ja) * 2004-08-11 2008-05-01 日本電気株式会社 仮想lanシステムおよびノード装置
JP2009100062A (ja) * 2007-10-13 2009-05-07 A2 Network Kk 通信方法
JP2012515479A (ja) * 2009-01-15 2012-07-05 テレフオンアクチーボラゲット エル エム エリクソン(パブル) 宅内ネットワーク内におけるプロキシモバイルIPv6のサポート
JP2013511207A (ja) * 2009-11-11 2013-03-28 マイクロソフト コーポレーション スマートクライアントルーティング
JP2015118478A (ja) * 2013-12-17 2015-06-25 エヌ・ティ・ティ・コミュニケーションズ株式会社 通信アダプタ装置、通信システム、トンネル通信方法、及びプログラム
US9609553B2 (en) 2006-02-22 2017-03-28 Barkan Wireless Access Technologies, L.P. Wireless internet system and method
KR20210035278A (ko) * 2019-02-15 2021-03-31 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 분산 시스템에서 노드에 대한 제어 방법 및 관련 장치

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI401913B (zh) * 2009-05-15 2013-07-11 Chunghwa Telecom Co Ltd 全路由電路之設定方法
CN112913170A (zh) * 2019-10-01 2021-06-04 柏思科技有限公司 发送和接收互联网协议分组上的传输控制协议段的改进方法和系统

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002335274A (ja) * 2001-03-06 2002-11-22 Fujitsu Ltd パケット中継装置およびパケット中継方法
JP2004187282A (ja) * 2002-11-20 2004-07-02 Hitachi Communication Technologies Ltd 仮想アクセスルータ

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4728511B2 (ja) * 2001-06-14 2011-07-20 古河電気工業株式会社 データ中継方法、その装置およびその装置を用いたデータ中継システム

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002335274A (ja) * 2001-03-06 2002-11-22 Fujitsu Ltd パケット中継装置およびパケット中継方法
JP2004187282A (ja) * 2002-11-20 2004-07-02 Hitachi Communication Technologies Ltd 仮想アクセスルータ

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
HARA Y. ET AL: "VPN Architecture Enabling Users to be Associated with Multiple VPNs.", TECHNICAL REPORT OF IEICE IN2003-50., 11 July 2003 (2003-07-11), pages 1 - 6, XP003016702 *
ISHIKAWA Y. ET AL: "Site-multihoming on Authenticated VLAN systems.", TECHNICAL REPORT OF IEICE NS2004-12., vol. 104, no. 18, 16 April 2004 (2004-04-16), pages 13 - 16, XP008084483 *
ISHIKAWA Y. ET AL: "Sute-Multihoming on authenticated VLAN Sytems.", PROCEEDINGS OF THE 2004, IEICE GENERAL CONFERENCE B-6-98., 8 March 2004 (2004-03-08), pages 98, XP008084482 *
KORAI K. ET AL: "VPN to Host no Jikko Kankyo o Togo Suru Personal Network.", COMPUTER SOFTWARE., vol. 21, no. 1, 27 January 2004 (2004-01-27), pages 2 - 12 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4529144B2 (ja) * 2004-08-11 2010-08-25 日本電気株式会社 仮想lanシステムおよびノード装置
JPWO2006016698A1 (ja) * 2004-08-11 2008-05-01 日本電気株式会社 仮想lanシステムおよびノード装置
JP2007215090A (ja) * 2006-02-13 2007-08-23 Fujitsu Ltd ネットワークシステム、端末およびゲートウェイ装置
US10342059B2 (en) 2006-02-22 2019-07-02 Barkan Wireless Access Technologies, L.P. Wireless Internet system and method
US9609553B2 (en) 2006-02-22 2017-03-28 Barkan Wireless Access Technologies, L.P. Wireless internet system and method
US11051350B2 (en) 2006-02-22 2021-06-29 Barkan Wireless Access Technologies, L.P. Wireless internet system and method
JP2009100062A (ja) * 2007-10-13 2009-05-07 A2 Network Kk 通信方法
JP2012515479A (ja) * 2009-01-15 2012-07-05 テレフオンアクチーボラゲット エル エム エリクソン(パブル) 宅内ネットワーク内におけるプロキシモバイルIPv6のサポート
US8615017B2 (en) 2009-01-15 2013-12-24 Telefonaktiebolaget L M Ericsson (Publ) Proxy mobile IPv6 support in residential networks
JP2013511207A (ja) * 2009-11-11 2013-03-28 マイクロソフト コーポレーション スマートクライアントルーティング
JP2015118478A (ja) * 2013-12-17 2015-06-25 エヌ・ティ・ティ・コミュニケーションズ株式会社 通信アダプタ装置、通信システム、トンネル通信方法、及びプログラム
KR20210035278A (ko) * 2019-02-15 2021-03-31 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 분산 시스템에서 노드에 대한 제어 방법 및 관련 장치
US11343233B2 (en) 2019-02-15 2022-05-24 Tencent Technology (Shenzhen) Company Limited Node control method and related apparatus in distributed system
KR102435780B1 (ko) * 2019-02-15 2022-08-23 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 분산 시스템에서 노드에 대한 제어 방법 및 관련 장치

Also Published As

Publication number Publication date
TW200601752A (en) 2006-01-01
JPWO2005083959A1 (ja) 2007-11-29
JP4600394B2 (ja) 2010-12-15

Similar Documents

Publication Publication Date Title
JP4600394B2 (ja) ネットワークアクセスルータ、ネットワークアクセス方法、プログラム、及び記録媒体
US6591306B1 (en) IP network access for portable devices
EP1441483B1 (fr) Passerelle pour support de communications entre les appareils de réseau de réseaux privés différents
JP4816572B2 (ja) 仮想ネットワーク接続システム及び装置
KR100953805B1 (ko) 이동 컴퓨팅 장치를 위한 가상사설망 구조 재사용
US8122113B2 (en) Dynamic host configuration protocol (DHCP) message interception and modification
Blanchet Migrating to IPv6: a practical guide to implementing IPv6 in mobile and fixed networks
JP5516571B2 (ja) 通信方法、通信システム、匿名化装置、サーバ
KR101455219B1 (ko) 패킷을 포워딩하기 위한 방법, 장치 및 시스템
JP4146886B2 (ja) 通信モジュール及びこの通信モジュールを備えたアプリケーションプログラム
US20030172170A1 (en) Providing multiple ISP access to devices behind NAT
CN103338151B (zh) 公网客户端访问私网服务器的方法及路由器
JP2005051473A (ja) ネットワーク相互接続装置及びネットワーク相互接続方法、名前解決装置、並びにコンピュータ・プログラム
WO2012083657A1 (fr) Procédé et système de traitement de paquets et équipement des locaux d'abonné
JP3858884B2 (ja) ネットワークアクセスゲートウェイ及びネットワークアクセスゲートウェイの制御方法並びにプログラム
US8873569B2 (en) User centric virtual network and method of establishing the same
Cooper et al. IPv6: business applications and implementation concerns
Dooley et al. IPv6 Deployment and Management
JP2003167805A (ja) 複数ユーザ側閉域網とサーバ側閉域網間のネットワーク通信方法およびサーバ装置
KR100552475B1 (ko) 서로 다른 사설망에 위치한 네트워크 장치들 사이의통신을 지원하는 망접속장치
JP3864397B2 (ja) ユーザエッジルータ、ゲートウェイルータ、マルチホーミング通信システム、マルチホーミング通信方法およびマルチホーミング通信プログラム
Hamarsheh Deploying IPv4-only connectivity across local IPv6-only access networks
JP5054666B2 (ja) Vpn接続装置、パケット制御方法、及びプログラム
JP3575369B2 (ja) アクセスルーティング方法及びアクセス提供システム
JP3808471B2 (ja) ネットワーク及びルータ装置並びにそれらに用いるアドレス通知方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2006510491

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase