WO2007072245A2 - Definition dynamique des regles de pare-feu - Google Patents

Definition dynamique des regles de pare-feu Download PDF

Info

Publication number
WO2007072245A2
WO2007072245A2 PCT/IB2006/054437 IB2006054437W WO2007072245A2 WO 2007072245 A2 WO2007072245 A2 WO 2007072245A2 IB 2006054437 W IB2006054437 W IB 2006054437W WO 2007072245 A2 WO2007072245 A2 WO 2007072245A2
Authority
WO
WIPO (PCT)
Prior art keywords
network
firewall
messages
devices
sub
Prior art date
Application number
PCT/IB2006/054437
Other languages
English (en)
Other versions
WO2007072245A3 (fr
Inventor
Boris Cobelens
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Publication of WO2007072245A2 publication Critical patent/WO2007072245A2/fr
Publication of WO2007072245A3 publication Critical patent/WO2007072245A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks

Definitions

  • the networks like the Internet allow interconnection of many private (sub-)networks.
  • tunneling By means of tunneling different sub-networks can be coupled to form a virtual private network, wherein the devices from these different sub-networks can send messages to each other as if they were connected to a single private network.
  • "Tunneling" means that messages are transmitted via the Internet (or other interconnecting networks) in a way wherein the addresses of the messages that are used in the sub-networks are not used as address during transmission via the Internet.
  • a virtual private network is realized for example by coupling each sub-network to the Internet via a residential gateway.
  • each sub-network messages with destination addresses for devices in the other sub-network are detected and transmitted over the Internet between the residential gateways of the sub-networks, inserted in messages addressed to the residential gateway of the other sub-network.
  • the residential gateway of the other sub-network forwards the messages to devices connected to the other sub-network.
  • firewalls are used at the residential gateways to block selected messages.
  • a firewall is conventionally implemented to apply a set of rules, in terms of source and destination addresses of messages that must be blocked and the types of messages that must be blocked.
  • Network addresses are often assigned dynamically to devices in a subnetwork.
  • DHCP Dynamic Host Configuration Protocol
  • Such a server manages a range of available addresses and assigns addresses from this range to devices upon request from the devices. In this way the address of a particular device may be different at different times, for example after the device has been switched off and on again.
  • the sub-network contains only one, or very few devices with a static address that does not change, the remaining devices in the sub-network having dynamically changing addresses.
  • the residential gateway or a central computer of the sub-network may have a static address and printers etc. in the sub-network may have dynamically changing addresses.
  • firewall rules can account for dynamic network address assignment by blocking out messages to or from the whole range of available addresses of the DHCP server.
  • messages from devices in a first sub-network to devices with dynamically assigned addresses in a second sub-network could all be passed if the first and second sub-network form a virtual private sub-network, or blocked if not.
  • specific firewall rules could be defined for those network addresses that are statically assigned to devices to provide selective access.
  • US patent No 6,678,827 describes a system for remote management of firewalls.
  • Security policy templates are defined, which express abstract firewall rules in terms of abstract services instead of network addresses.
  • network profiles are defined which identify network addresses associated with an abstract service. Concrete instantiations of firewall rules are made by substituting the network addresses from the network profile into the security policy templates. The user must generate the network profile. This would be very cumbersome if access rules would be different for different individual dynamically assigned network addresses.
  • US patent application no 2004/0249907 describes a technique for discovering devices or services in a (sub-) network. Discovered devices or services are selected to perform various services and the user is prompted to configure the devices or services. One of the services that can be configured in this way by the user is the DHCP service.
  • European Patent Application No. 1313290 describes a firewall for a laptop computer, which changes between different sets of firewall rules dependent on a detected network address of the laptop, which is taken to be indicative of whether the laptop is coupled to a safe, closed network or an open network.
  • a firewall policy management apparatus redefines a firewall rule of a firewall coupled between a communication network and a sub-network dynamically.
  • the redefined firewall rules are expressed in terms of the network addresses.
  • the redefined firewall rules are derived from access policy rules that are expressed in terms of identifiers.
  • Network addresses are assigned dynamically, and the firewall rules are generated after detection of dynamic associations between identifiers and network addresses. Thus, automatic, dynamic firewall reconfiguration is realized.
  • the firewall is configured to apply the redefined rules to messages received through a virtual private network tunnel, and preferably only to such messages, for example after extracting messages from tunnel messages that have been transmitted through an open communicating network and before injection into the subnetwork, or as part of extraction.
  • virtual private networks with adaptive rules can be realized.
  • a plurality of virtual private network tunnels through the communication network to the sub-network is serviced, the firewall policy rules differentiating between different ones of the tunnels.
  • more and less virtual private networks can be supported.
  • the firewall initially blocks all messages to devices with network addresses within a range of network addresses that are available for dynamic assignment in the sub-network, the redefined firewall rules allowing at least selected messages to pass through the firewall when these messages have a destination address to a particular one of the devices.
  • the redefined rules are undone when the device signs off, or nothing is heard from a device during a time out interval.
  • permissive firewall rules are established only when a device or service is active, avoiding that messages can get through when a network address is reassigned to a device that should be shielded off by the firewall.
  • Fig. 1 shows a networked system
  • Fig. 2 shows a firewall policy management device
  • Fig. 3 shows a flow-chart of firewall policy management
  • Fig. 4 shows a firewall policy management device
  • Fig. 5 shows a firewall policy management device.
  • Figure 1 shows a networked system.
  • the system comprises a main network interconnection circuitry 10 (e.g. the Internet) and a plurality of sub-networks each with its own sub-network interconnection circuitry 12 and a number of devices 14,16 (only some referenced explicitly by way of example) coupled to the sub-network interconnection circuitry 12.
  • interconnection circuitry includes to refer to both wired and/or wireless connections, as well as optical connections and associated devices for transporting and routing messages if present.
  • the devices 14, 16 in each sub-network include a gateway device 16 coupled between the main network interconnection circuitry 10 and the sub-network interconnections 12.
  • devices 14, 16 transmit messages via interconnections 10, 12. Each message typically contains a destination address, which identifies a receiving device 14, 16 for which the message is destined.
  • Part of the devices 14, 16, for example the gateway devices 16, may have predetermined globally unique addresses, selected so that no other device 14, 16 coupled to main network interconnections 10 has the same address. In the Internet (IP version 4) environment, such addresses are typically represented as a series of four numbers separated by dots. Another part of the devices 14, 16 are locally assigned devices 14, 16 that have locally assigned addresses, which are assigned to the locally assigned devices 14, 16 by an assigning device.
  • IP version 4 IP version 4
  • Messages with locally assigned addresses of devices 14, 16 that are connected to the sub-network interconnections 12 of the sub-network wherein these messages are initially transmitted are detected by these devices 14, 16 and received.
  • Messages addressed to devices 14, 16 with a globally unique address on main network interconnections 10 are forwarded by gateway device 16 to their destination.
  • virtual networks may be defined, wherein at least a first and second one of the sub-networks are coupled.
  • Information about such virtual networks may be stored for example in gateway device 16 of the sub-networks that are part of such a virtual network.
  • the information may include for example a list of addresses of devices 14, 16 in the other sub-network, or an identification of one or more ranges of addresses reserved for such devices.
  • gateway device 16 of the first sub- network transmits the message to the second sub-network.
  • a message is encapsulated in a further message that is addressed to a device (e.g.
  • the gateway device 16 in the second sub-network that has a globally unique address.
  • the message is converted back to the original message with its locally assigned address.
  • Local assignment of addresses may be performed for example by the gateway device 16 that is connected between the locally assigned device 14, 16 and the main network interconnections 10.
  • another device 14, 16 e.g. a main computer coupled to the sub-network interconnections 12 may be used, or even a remote device coupled to sub- network interconnections 12 via main interconnections 12.
  • the locally assigned addresses may be assigned dynamically, each time when a device 14, 16 starts up, or more persistently, for example each time a device 14, 16 is added to sub-network interconnections 12 of a subnetwork.
  • gateway device 16 provides a firewall service. That is, gateway device 16 inspects messages passing from main network 10 to its corresponding sub-network 12 and blocks transmission of selected messages dependent on whether the transmission is permitted by firewall rules.
  • FIG. 2 shows a functional structure of a gateway device 16 that acts as firewall policy management device.
  • Gateway device 16 is coupled between a first connection 28 to a closed local network (e.g. a sub-network 12 not shown) and a second connection 29 to an open network (e.g. main network 10 not shown).
  • a closed local network e.g. a sub-network 12 not shown
  • an open network e.g. main network 10 not shown
  • Gateway device 16 comprises a firewall implementation unit 23 coupled to the network connections 28, 29 via respective interface units 21, 25.
  • gateway device 16 comprises a firewall policy management unit 24 coupled to the network connection 28 to the closed local network via a network interface 22 and a storage unit 26.
  • Interface unit 25 between firewall implementation unit 23 and second connection 29 is preferably a virtual private network tunnel endpoint, which translates messages from second connection 29 that contain virtual private network messages into messages for transmission on the closed local network via first connection 28. These messages are filtered by firewall implementation unit 23, which allows only those messages to pass for which this is allowed by firewall rules.
  • the virtual private network tunnel endpoint preferably also translates messages from first connection 28 to messages for transmission to another tunnel endpoint via first connection 29 and the open network.
  • Storage unit 26 stores a set of access policy rules in terms of service identifiers or UUIDs of devices that may be actively coupled to the first connection 28 for the closed local network.
  • the access policy rules specify for example whether messages to all or part of these devices should be passed, optionally dependent on the source of the message or a sub-network that contains the source of the message.
  • the access policy rules may specify whether messages from devices should be passed, optionally dependent on the destination of the message or a sub-network that contains the destination of the message.
  • FIG. 3 shows a flow-chart of operation of firewall policy management unit 24.
  • firewall policy management unit 24 listens for messages in the closed, local network that is connected to first connection 28.
  • firewall policy management unit 24 tests in a second step 32 whether the received message is an advertisement message. This is repeated from first step 31 until firewall policy management unit 24 detects an advertisement message.
  • Advertisement messages serve to discover devices that are actively coupled to the closed, local network that is connected to first connection 28. This may be done for example by monitoring messages on first connection 28 to detect SSDP service advertisements.
  • the SSDP Simple Search and Discovery Protocol
  • a service advertisement message contains a network address (which may include a port number) and a service identifier.
  • firewall policy management unit 24 may multicast search messages for eliciting responses with this information from actively connected devices that perform specified services.
  • firewall policy management unit 24 executes a third step 33 to check whether storage unit 26 contains an access policy rule for the advertised service. If so firewall policy management unit 24 executes a fourth step 34 wherein firewall policy management unit 24 updates a firewall rule for the network address from the advertisement message according to the access policy rule that has been found in storage unit 26.
  • network addresses are defined by a DHCP (Dynamic Host Control Protocol) server device coupled to the local network.
  • DHCP Dynamic Host Control Protocol
  • Such servers are known per se.
  • the DHCP server device selects an unused address from a reserved range and supplies this address in response to the request.
  • the device without a permanent network address switches off it transmits a "byebye" message, which enables the DHCP server to reuse its network address.
  • the added rules are enabling rules, which allow firewall implementation unit 23 to pass selected messages to the network address.
  • firewall implementation unit 23 is preferably initially programmed with access rules to block all messages addressed to an unassigned address. Thus, when the DHCP server device assigns a network address to a device, firewall implementation unit 23 will initially block all messages to that network address. Only after firewall policy management unit 24 has updated the firewall rules selected messages may be passed. As an alternative, some initial firewall access rules may be permissive (pass selected types of messages) and the updates by firewall policy management unit 24 may cause some of these types of messages to be blocked. However, it will be noted that this may entail the risk that some undesirable messages slip through initially.
  • firewall policy management unit 24 also listens for the "byebye” messages. In response to a "byebye” message firewall policy management unit 24 determines which firewall rules were changed, added or removed upon discovery of the device that has sent the "byebye” message and changes back, removes or reinstates these rules in response to the "byebye” message.
  • firewall policy management unit 24 keeps time-out information for each of the devices for which firewall access rules have been changed, added or removed.
  • the time out information is for each particular device is updated each time when a message from that device is detected (e.g. by writing a time value representative of the time of detection; alternatively the time out information may be a count value that is periodically incremented and reset upon detection).
  • firewall policy management unit 24 tests which time-out information has not been updated for a predetermined time and, if so, changes back, removes or reinstates these rules as if a "byebye" message was received.
  • SSDP is only one example of detection of devices associated with network addresses.
  • service identifiers were used it should be appreciated that alternative device identifiers may be used, such as UUIDs (Universal Unique IDentifiers of devices).
  • UUIDs Universal Unique IDentifiers of devices.
  • firewall policy management unit 24 finds its network address and its device identifier, looks up access policy rules associated with the device identifier an programs firewall access rules into firewall implementation unit 23 for the associated network address.
  • the access policy rules may depend on the destination service and/or the device identifier and/or message type and/or message source address. In a simple embodiment, each access policy rule depends only on the destination service or the device identifier and the message type. In a more advance embodiment the rules are also dependent on the source address. Thus for example, messages form sub-networks 12 that form a virtual private network with a local network may passed selectively.
  • firewall implementation unit 23 and the tunnel endpoint are integrated and firewall implementation unit 23 is configured to perform the source dependent filtering dependent on the source address of the message that contains a tunneled message, in combination with a dependence on the type of the tunneled message and its destination network address.
  • FIG. 4 shows a further functional structure of a gateway device 16 that acts as firewall policy management device.
  • a tunnel endpoint 40 and a general firewall unit 42 have been added.
  • Tunnel endpoint 40 is coupled between the network interface 25 to the open network and firewall implementation unit 23.
  • General firewall unit 42 is coupled between the network interface 25 to the open network and the network interface 21 to the closed network in parallel with the series arrangement of tunnel endpoint 40 and firewall unit 42.
  • tunnel endpoint 40 received messages that contain tunneled messages, extracts the tunneled messages including a destination address and outputs the tunneled messages to firewall implementation unit 23.
  • Firewall implementation unit 23 then blocks these messages according to rules defined by firewall policy management unit 24.
  • FIG. 5 shows a further functional structure of a gateway device 16 that acts as firewall policy management device.
  • a tunnel endpoint 40 has been added.
  • Tunnel endpoint 40 operates as a device coupled to the local sub-network via a network interface 51.
  • Tunnel endpoint 40 receives messages from the open network, preferably via a gateway firewall (not shown) and the local network.
  • Tunnel endpoint 40 extracts virtual private network messages from the received messages and applies these virtual private network messages to firewall implementation unit 23.
  • Firewall implementation unit 23 blocks these extracted messages according to rules defined by firewall policy management unit 24. Thus, messages for the virtual private network are selectively blocked by firewall implementation unit 23.
  • the functional structure used in figures 2, 4 and 5 may be implemented by using different circuits for respective functional parts in these figures.
  • Dedicated circuits or programmable circuits programmed to perform the described functions may be used.
  • some functional parts may be integrated with one another.
  • the firewall policy management unit 24 may be implemented in a device separate from residential gateway 16 and the same goes for storage unit 26.
  • a plurality of storage units may even be used to store different access policy rules.
  • firewall policy management unit 24 may also be applied to incoming messages in general. Also, firewall unit may be designed to block outgoing messages dependent on rules defined by firewall policy management unit 24.
  • the access policy rules in storage unit 26 preferably include access policy rules specified in terms of types of source service and/or source device ID. In this case, firewall policy management unit 24 uses a discovered association between a network address and a source service type or device ID to generate firewall outward rules wherein the discovered network address is substituted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un sous-réseau (12) couplé à Internet (10) par l'intermédiaire d'un pare-feu (23). Des règles d'accès basées sur un identifiant sont générées pour des dispositifs et/ou des services couplés au sous-réseau. Les identifiants sont statistiquement assignés à des dispositifs (14) couplés au sous-réseau (12) et/ou à des services fournis par lesdits dispositifs (14). Des adresses de réseau sont assignées de manière dynamique aux dispositifs, par exemple au moyen d'un serveur DHCP. Une unité de gestion de pare-feu surveille des messages sur le sous-réseau (12) pour détecter des messages associant les identifiants à des adresses de réseau assignées aux dispositifs (14) assignés aux identifiants. L'unité de gestion de pare-feu redéfinit de manière dynamique des règles de pare-feu exprimées en termes des adresses de réseau obtenues lors de la surveillance, en fonction des règles d'accès pour les identifiants assignés aux dispositifs et/ou aux services pour lesquels les adresses de réseau obtenues par ladite surveillance sont utilisées. Le pare-feu est situé, de préférence, entre un point final d'un tunnel pour un réseau virtuel privé et le sous-réseau, le pare-feu étant initialisé pour bloquer tous les messages pour les adresses de réseau dans une gamme assignable de manière dynamique, l'unité de gestion de pare-feu rendant certaines règles plus permissives lorsqu'une adresse de réseau pour un dispositif a été déterminée.
PCT/IB2006/054437 2005-12-21 2006-11-27 Definition dynamique des regles de pare-feu WO2007072245A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP05112576 2005-12-21
EP05112576.3 2005-12-21

Publications (2)

Publication Number Publication Date
WO2007072245A2 true WO2007072245A2 (fr) 2007-06-28
WO2007072245A3 WO2007072245A3 (fr) 2007-10-11

Family

ID=38057269

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2006/054437 WO2007072245A2 (fr) 2005-12-21 2006-11-27 Definition dynamique des regles de pare-feu

Country Status (1)

Country Link
WO (1) WO2007072245A2 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8495726B2 (en) 2009-09-24 2013-07-23 Avaya Inc. Trust based application filtering
US8555369B2 (en) 2011-10-10 2013-10-08 International Business Machines Corporation Secure firewall rule formulation
US9531674B2 (en) 2009-11-11 2016-12-27 Microsoft Technology Licensing, Llc Virtual host security profiles
CN114884692A (zh) * 2022-03-31 2022-08-09 中国工商银行股份有限公司 网络访问控制方法及装置
EP4262159A3 (fr) * 2016-10-28 2023-12-20 Avago Technologies International Sales Pte. Limited Mappage d'identifiant de réseau basé sur des règles

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610799B (zh) * 2015-12-19 2019-06-11 浙江宇视科技有限公司 Onvif应用系统中的安全防护方法及防火墙设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0854621A1 (fr) * 1997-01-17 1998-07-22 AT&T Corp. Système et procédé pour permettre la contrÔle d'accès au même niveau dans un reseau
EP0909074A1 (fr) * 1997-09-12 1999-04-14 Lucent Technologies Inc. Procédés et appareil pour un firewall dans un réseau d'ordinateurs qui permet l'utilisation de domaine multiple
US20030233582A1 (en) * 2002-04-09 2003-12-18 Ram Pemmaraju Methods and apparatus for a computer network firewall which can be configured dynamically via an authentication mechanism
US20050138204A1 (en) * 1999-06-10 2005-06-23 Iyer Shanker V. Virtual private network having automatic reachability updating

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0854621A1 (fr) * 1997-01-17 1998-07-22 AT&T Corp. Système et procédé pour permettre la contrÔle d'accès au même niveau dans un reseau
EP0909074A1 (fr) * 1997-09-12 1999-04-14 Lucent Technologies Inc. Procédés et appareil pour un firewall dans un réseau d'ordinateurs qui permet l'utilisation de domaine multiple
US20050138204A1 (en) * 1999-06-10 2005-06-23 Iyer Shanker V. Virtual private network having automatic reachability updating
US20030233582A1 (en) * 2002-04-09 2003-12-18 Ram Pemmaraju Methods and apparatus for a computer network firewall which can be configured dynamically via an authentication mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LEACH MICROSOFT M MEALLING REFACTORED NETWORKS P ET AL: "A Universally Unique IDentifier (UUID) URN Namespace" IETF STANDARD, INTERNET ENGINEERING TASK FORCE, IETF, CH, July 2005 (2005-07), XP015041880 ISSN: 0000-0003 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8495726B2 (en) 2009-09-24 2013-07-23 Avaya Inc. Trust based application filtering
US9531674B2 (en) 2009-11-11 2016-12-27 Microsoft Technology Licensing, Llc Virtual host security profiles
US8555369B2 (en) 2011-10-10 2013-10-08 International Business Machines Corporation Secure firewall rule formulation
EP4262159A3 (fr) * 2016-10-28 2023-12-20 Avago Technologies International Sales Pte. Limited Mappage d'identifiant de réseau basé sur des règles
CN114884692A (zh) * 2022-03-31 2022-08-09 中国工商银行股份有限公司 网络访问控制方法及装置
CN114884692B (zh) * 2022-03-31 2024-01-30 中国工商银行股份有限公司 网络访问控制方法及装置

Also Published As

Publication number Publication date
WO2007072245A3 (fr) 2007-10-11

Similar Documents

Publication Publication Date Title
US20190124005A1 (en) Network Validation With Dynamic Tunneling
CN101827134B (zh) 自动释放为宽带接入网内的用户设备保留的资源
EP2051446B1 (fr) Procédé de résolution d'adresse mac en double, système de gestion de dispositif réseau, serveur et dispositif d'informations
CA2619092C (fr) Methode et systeme de prise en charge des dispositifs utilisateurs changeant de zone de desserte entre des domaines de routage par un seul serveur reseau
US7836203B2 (en) Automatic route setup via snooping dynamic addresses
EP1894352B1 (fr) Dispositif et procede permettant de gerer deux types de dispositifs
US9912633B2 (en) Selective IP address allocation for probes that do not have assigned IP addresses
CN101471936B (zh) 建立ip会话的方法、装置及系统
US20050066035A1 (en) Method and apparatus for connecting privately addressed networks
CN104104744A (zh) 一种ip地址分配的方法和装置
JP4973223B2 (ja) ネットワーク再構成方法、ルータ、及びネットワーク再構成システム
WO2005036831A1 (fr) Dispositif de relais de trame
JP2007036374A (ja) パケット転送装置、通信網及びパケット転送方法
WO2005013038A2 (fr) Configuration automatique d'un mecanisme d'allocation d'adresses dans un reseau informatique
KR20080090834A (ko) 네트워크 스위치 및 그 스위치의 주소충돌방지방법
JP2002368763A (ja) ネットワーク装置及びサーバ装置及びクライアント装置及びネットワークのipアドレス付与方法及びプログラム
WO2007072245A2 (fr) Definition dynamique des regles de pare-feu
US20040258074A1 (en) Method and apparatus for allocating addresses in integrated zero-configured and manually configured networks
CN104662848B (zh) 用于动态域名系统(ddns)的方法和系统
CN104301449A (zh) 一种修改ip地址的方法和装置
US20060193330A1 (en) Communication apparatus, router apparatus, communication method and computer program product
US20150229520A1 (en) Network monitoring system, communication device, network management method
JP2006332910A (ja) ネットワーク機器制御システム、アクセス制御装置、アクセス制御方法、及びプログラム
US8782226B2 (en) Allocating internet protocol (IP) addresses to nodes in communications networks which use integrated IS-IS
CN107070725B (zh) 一种服务器两级管理模块间通信握手的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06831936

Country of ref document: EP

Kind code of ref document: A2