WO2009117960A1 - 一种接入网络的方法、认证方法、通讯系统以及相关设备 - Google Patents

一种接入网络的方法、认证方法、通讯系统以及相关设备 Download PDF

Info

Publication number
WO2009117960A1
WO2009117960A1 PCT/CN2009/071009 CN2009071009W WO2009117960A1 WO 2009117960 A1 WO2009117960 A1 WO 2009117960A1 CN 2009071009 W CN2009071009 W CN 2009071009W WO 2009117960 A1 WO2009117960 A1 WO 2009117960A1
Authority
WO
WIPO (PCT)
Prior art keywords
request message
line information
lla
user
bng
Prior art date
Application number
PCT/CN2009/071009
Other languages
English (en)
French (fr)
Inventor
郑若滨
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP09725360.3A priority Critical patent/EP2249538B1/en
Priority to ES09725360.3T priority patent/ES2613433T3/es
Publication of WO2009117960A1 publication Critical patent/WO2009117960A1/zh
Priority to US12/883,394 priority patent/US8594103B2/en
Priority to US14/088,888 priority patent/US8925067B2/en
Priority to US14/565,254 priority patent/US9467447B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5092Address allocation by self-assignment, e.g. picking addresses at random and testing if they are already in use

Definitions

  • the present invention relates to the field of communications, and in particular, to a method for accessing a network, an authentication method, a communication system, and related devices.
  • DSL Digital Subscriber Line
  • Ethernet aggregation and connectivity Internet QoS, Internet Protocol Quality of Service
  • Figure 1 the DSL universal reference architecture is shown in Figure 1.
  • T is a reference point between the user equipment (UE, User Equipment) and the residential gateway (RG, Residential Gateway) in the Customer Premises Network (CPN);
  • U is the RG and the access node (AN, Access Node) (ie, the reference point between the Digital Subscriber Line Access Multiplexer (DSLAM)); in the access network, the AN and the Broadband Remote Access Server (BRAS) or the broadband network gateway (BNG, Broadband Network Gateway) is the Aggregation Network
  • V is the Ethernet Aggregation reference point between the AN and BRAS/BNG in the access network;
  • A10 is between the access network and the service provider.
  • the reference point which can connect the application service provider to the network service provider that owns the access network, or connect the network service provider to the visited access network in the roaming scenario.
  • the CPN network and the access network are interconnected by DSL access technology.
  • the AN is an Optical Line Termination (OLT) or an Optical Network Unit (ONU), and an access technology such as PON is used between the CPN and the access network. interconnection.
  • the DSL network architecture in the above technical solution can only support the fourth edition of the Internet Protocol (IPv4, Internet Protocol Version 4). With the exhaustion of the IPv4 address, the DSL network architecture is the sixth edition of the Internet Protocol (IPv6, Internet Protocol Version 6). ) Evolution has become an inevitable trend.
  • IPv4 implicit user authentication is through Dynamic Host Allocation Protocol (DHCP, Dynamic Host) Configuration Protocol)
  • DHCP Dynamic Host Allocation Protocol
  • Dynamic Host Dynamic Host Configuration Protocol
  • the message carries the user line information.
  • IPv6 can employ stateless address allocation, but prior art solutions do not disclose how to implement implicit authentication based on subscriber line information in the case of stateless address assignment.
  • the embodiments of the present invention provide a method for accessing a network, an authentication method, a communication system, and related devices, which can support implicit authentication based on subscriber line information under IPv6.
  • the method for accessing a network includes: receiving, by an access node, a first request message sent by a user equipment, where the first request message includes a link-local address LLA;
  • the second request message is sent from the access node to the broadband network gateway BNG, and the second request message is used to indicate that the BNG performs access authentication.
  • the authentication method provided by the embodiment of the present invention includes: receiving a request message from an access node to a broadband network gateway BNG, where the request message carries user line information and a link-local address LLA; according to the user line information
  • the authentication and authorization accounting AAA server sends an access request; receives the authentication result fed back by the AAA server, and if the authentication result is successful, performs duplicate address detection on the LLA, and if the authentication result is authentication failure, sends a neighbor notification message to reject the The LLA carried in the request message.
  • the communication system includes an access node and a broadband network gateway BNG, where the access node is configured to receive a first request message sent by the user equipment, where the first request message includes a chain Obtaining the user line information corresponding to the user equipment; transmitting a second request message including the LLA and the subscriber line information to the BNG; the BNG, configured to receive the second request message from the access node according to The user line information sends an access request to the authentication and authorization charging AAA server, where the access request is used to instruct the AAA server to perform access authentication.
  • the access node provided by the embodiment of the present invention includes a receiving unit, configured to receive a first request message sent by the user equipment, where the first request message includes a link-local address LLA, and an acquiring unit, configured to acquire the user a user equipment information corresponding to the device; a sending unit, configured to send, to the broadband network gateway BNG, a second request message that includes the LLA and the user line information, where the second request message is used to indicate that the BNG performs access authentication. .
  • the broadband network gateway includes: a request receiving unit, configured to receive a request message from an access node, where the request message carries user line information and an LLA; and an access request unit, configured to The user line information sends an access request to the authentication and authorization charging AAA server; the authentication result receiving unit is configured to receive the authentication result sent by the AAA server, and if the authentication result is successful, triggering the proxy duplicate address detecting unit to perform the determining operation, if the authentication is performed If the result is that the authentication fails, the agent repeating address detecting unit sends a neighbor advertisement message to reject the user-configured LLA.
  • the proxy duplicate address detecting unit is configured to determine whether an address matching the LLA in the neighbor request message exists in the address cache. .
  • the method for accessing a network is applied to the Internet Protocol version 6 IPv6, and includes: receiving a first request message from a user equipment to an access node, where the first request message is a first neighbor request message or a first routing request message; acquiring user line information corresponding to the user equipment; transmitting a second request message that includes the user line information from the access node to the broadband network gateway BNG, where the second request message is a second neighbor Request message or second route request message.
  • the embodiments of the present invention have the following advantages:
  • the access node receives the first request message sent by the user equipment, where the first request message includes the LLA, and then the access node may query the user line information corresponding to the user equipment, and carry the user line information to
  • the second request message is sent to the BNG, that is, the BNG can perform implicit authentication on the user according to the subscriber line information. Therefore, in the embodiment of the present invention, implicit authentication based on the subscriber line information can be supported in the case of IPv6.
  • FIG. 1 is a schematic diagram of a prior art DSL network architecture
  • FIG. 2 is a flowchart of an embodiment of an authentication method according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of another embodiment of an authentication method according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of still another embodiment of an authentication method according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of still another embodiment of an authentication method according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a communication embodiment in an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of an embodiment of an access node according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of an embodiment of a BNG according to an embodiment of the present invention.
  • the embodiment of the invention provides a method for accessing a network, an authentication method, a communication system and related devices, which are used for supporting implicit authentication based on subscriber line information under IPv6.
  • LMA Link Local Address
  • the foregoing first and second request messages may be neighbor request messages, route request messages, or other request messages.
  • the neighbor request message is used as an example for description. It can be understood that, in the actual application, other types of request messages may also be used, which are not limited herein.
  • the access node after receiving the first neighbor request message including the LLA sent by the user equipment, acquires the user line information corresponding to the user equipment, and carries the user line information in the second neighbor request message and sends the information to the second neighbor request message.
  • the BNG indicates that the BNG performs the access authentication operation. Therefore, in the embodiment of the present invention, implicit authentication based on the subscriber line information can be supported in the case of IPv6.
  • the access authentication function is provided in the process of accessing the network, and the access authentication may be divided into two processes:
  • the LLA Relay/Proxy function is integrated in the AN, that is, when the AN receives the message including the LLA sent by the user equipment, the AN obtains the user line information corresponding to the user equipment, and obtains the user line information and the LLA. Send to BNG for access authentication.
  • the method can be subdivided into the following two types:
  • LLA and subscriber line information are respectively set to be transmitted in different locations or different domains of the same message, that is, the LLA is set in the LLA domain carrying the LLA and the subscriber line information is set in other domains different from the LLA domain:
  • an embodiment of the authentication process in the embodiment of the present invention includes: The user equipment sends a first neighbor request message (Neighbor Solicitation) to the AN.
  • the user equipment automatically configures the LLA according to the preset manner.
  • the user equipment After the LLA configuration is complete, the user equipment sends a first neighbor request message to the AN, where the message includes a temporary LLA (tentative LLA), which is automatically configured by the user equipment according to a preset configuration rule.
  • a temporary LLA tentative LLA
  • the AN adds line information in the first neighbor request message.
  • the AN supports the LLA Relay function. That is, the AN in this embodiment does not modify the temporary LLA, but only forwards it. However, when the temporary LLA is forwarded, the line information is also forwarded together, so After obtaining the message, the AN queries the user line information corresponding to the current user equipment.
  • the user line information is used to identify the line used by the user, and may be a physical port identifier or a logical port identifier, or both port identifiers. The combination may also be other identifiers that can be used to identify the line used by the user, which is not limited herein.
  • the temporary LLA and the subscriber line information are respectively set to be transmitted in different locations or different domains of the same message, and after the AN obtains the subscriber line information, the subscriber line information is added to the reserved bit of the first neighbor request message or The second neighbor request message is obtained in the option, that is, the second neighbor request message includes the temporary LLA and the subscriber line information.
  • the AN can also add the subscriber line information to other locations of the first neighbor request message, as long as the second neighbor request message can include the subscriber line information, and the specific location does not need to be performed here. limited.
  • the AN sends a second neighbor request message that includes the temporary LLA and the user line information to the BNG.
  • the AN After the user places the subscriber line information in the first neighbor request message to obtain the second neighbor request message, the AN sends the second neighbor request message to the BNG/BRAS.
  • BNG described in this embodiment and the subsequent embodiments refers to BNG and/or BRAS.
  • the BNG sends an access request to the AAA, Authentication, Authorization, Accounting server.
  • the BNG serves the AAA according to the subscriber line information in the second neighbor request message.
  • the device sends an access request, where the access request includes information about the user line information, and the BNG sends an access request including the subscriber line information to the AAA server, where the access request is used to indicate the AAA server to the user.
  • Line information for authentication
  • the BNG obtains the corresponding username and password according to the subscriber line information, and sends an access request including the username and password to the AAA server, where the access request is used to instruct the AAA server to authenticate the username and password.
  • the AAA server sends the authentication result to the BNG according to the access request.
  • the AAA server authenticates the subscriber line information
  • the BNG feedback authentication result if the access request received by the AAA server includes the user name and the password, the AAA server authenticates the user name and the password, and feeds back the authentication result to the BNG.
  • the specific authentication result may be the authentication success, or Authentication failed.
  • the user service profile (Profile) is sent to the BNG for subsequent data communication.
  • the BNG performs duplicate address detection according to the authentication result fed back by the AAA server.
  • the BNG supports Proxy DAD (Duplicate Address Detection), and establishes and maintains an IP Address Cache of the proxyed user.
  • Proxy DAD Downlicate Address Detection
  • the Proxy DAD is performed, that is, the BNG first compares the obtained temporary LLA with the address stored in the preset address cache, and determines whether there is a matching with the temporary LLA in the address cache. The address, if any, determines that there is a conflict in the address, and sends a Neighbor Advertisements message instead of the matching address owner, or performs other exception handling procedures. If it does not exist, it determines that there is no conflict in the address, then the temporary LLA is added to the address. Cache
  • the user may perform the address conflict processing, that is, send the neighbor notification message of the LLA that is rejected by the second request message to the user, so as to reject the temporary LLA automatically configured by the user.
  • step 206 may also be performed before the process of user authentication (ie, step 204 and step 205), that is, after step 203, the BNG first acquires the temporary LLA. Comparing with the address saved in the preset address cache, determining whether there is an address matching the temporary LLA in the address cache, and if yes, determining that there is a conflict in the address, then replacing the matching address owner to send a neighbor advertisement message, or performing other The exception handling process, if it does not exist, determines that there is no conflict in the address, then adds the temporary LLA to the address cache, and triggers the execution of the user authentication process, that is, steps 204 and 205.
  • another embodiment of the authentication process in the embodiment of the present invention includes:
  • the user equipment sends a first neighbor request (Neighbor Solicitation) message to the AN.
  • the user equipment automatically configures the LLA according to a preset manner.
  • the specific configuration process may refer to the prior art. .
  • the user equipment After the LLA configuration is complete, the user equipment sends a first neighbor request message to the AN, and the message includes a temporary LLA, which is automatically configured by the user equipment according to a preset configuration rule.
  • the AN modifies the temporary LLA
  • the AN supports the LLA Proxy function.
  • the AN modifies the received temporary LLA and adds the subscriber line information to the temporary LLA.
  • the AN After obtaining the message, the AN queries the user line information corresponding to the current user equipment.
  • the user line information is used to identify the line used by the user, and may be the physical port identifier or the logical port identifier of the host, or the two port identifiers. The combination may also be other identifiers that can be used to identify the line used by the user, which is not limited herein.
  • the user line information is added to the temporary LLA of the second neighbor request message for transmission. Specifically, after the AN obtains the user line information, the user line information is added to the interface identifier of the temporary LLA (Interface ID). All or part of the bits of the field, or all or part of the bits of the 54-bit field in which the subscriber line information is located in the middle of the temporary LLA;
  • the AN can also add the subscriber line information to other locations of the temporary LLA, as long as the temporary LLA can include the subscriber line information, and the specific location is not limited herein.
  • the AN sends a second neighbor request message to the BNG.
  • the second neighbor request message carries a temporary LLA, where the temporary LLA includes user line information.
  • the BNG sends an access request to the AAA server.
  • the BNG sends an access request to the AAA server according to the user line information in the second neighbor request message, where the access request includes information about the user line information, and the BNG may send the user line including the user line to the AAA server.
  • An access request for information is used to instruct the AAA server to authenticate the subscriber line information;
  • the BNG obtains the corresponding username and password according to the subscriber line information, and sends an access request including the username and password to the AAA server, where the access request is used to instruct the AAA server to authenticate the username and password.
  • the AAA server sends the authentication result to the BNG according to the access request.
  • the access request received by the AAA server includes the user line information
  • the AAA server authenticates the subscriber line information and feeds back the authentication result to the BNG. If the access request received by the AAA server includes the username and password, the AAA server authenticates the username and password and sends the authentication to the BNG. As a result, the specific authentication result may be successful authentication or authentication failure.
  • the user service profile (Profile) is sent to the BNG for subsequent data communication.
  • the BNG performs repeated address detection according to the authentication result fed back by the AAA server.
  • the BNG supports proxy duplicate address detection (Proxy DAD, Duplicate Address).
  • the Proxy DAD is performed, that is, the BNG first compares the obtained temporary LLA including the user line information with the address stored in the preset address cache, and determines whether the address cache exists or not. This temporary LLA match containing user line information The address, if any, determines that there is a conflict in the address, and sends a neighbor advertisement message instead of the matching address owner, or performs other exception handling procedures. If it does not exist, it determines that there is no conflict in the address, and the temporary LLA containing the subscriber line information is included. Join the address cache;
  • the device may perform the address conflict processing, that is, send the neighbor notification message of the LLA that is rejected by the second neighbor request message to the user, so as to reject the temporary LLA automatically configured by the user.
  • step 306 may also be performed before the user authentication process (ie, step 304 and step 305), that is, after step 303, the BNG first saves the acquired LLA and the preset address cache. The address is compared, and it is determined whether there is an address matching the LLA in the address cache. If the address is determined to be in conflict, the neighbor address matching party sends a Neighbor Advertisements message, or performs other exception processing, if not, determines If there is no conflict in the address, the temporary LLA containing the subscriber line information is added to the address cache, and the user authentication process is triggered, ie, steps 304 and 305.
  • the user equipment sends an IPv6 packet carrying the LLA to the AN, where the IPv6 packet does not include the user line information.
  • the LLA of the IPv6 packet sent by the user equipment to the AN does not include the subscriber line information.
  • the AN modifies the LLA to enable the new LLA to include subscriber line information.
  • the conversion method includes: The AN adds the user line information to the LLA in the IPv6 packet, and the specific addition manner is similar to the manner of adding the foregoing step 302, and is not mentioned here.
  • IPv6 packets containing new LLA exchange IPv6 packets containing new LLA.
  • the AN converts the LLA including the subscriber line information in the IPv6 packet sent by the BNG into an LLA that does not include the subscriber line information.
  • the AN sends an IPv6 packet carrying the LLA that does not include the user line information to the user equipment.
  • the AN modifies the information contained in the LLA.
  • the user line information is added in the LLA.
  • the LLA including the user line information is restored to not included. The LLA of the subscriber line information.
  • steps 307 to 312 are optional steps.
  • the global IPv6 address can also be processed, including the access authentication and the address allocation process: Second, the global IPv6 address processing process:
  • the AN integrates the prefix discovery (PD, Prefix Discovery) relay/proxy function, so when the AN receives the message including the online link prefix (on-link prefix) sent by the user equipment, Obtain the subscriber line information corresponding to the user equipment, and send the obtained subscriber line information to the BNG for access authentication and global IPv6 address allocation.
  • PD Prefix Discovery
  • the AN integrates the Prefix Discovery Relay, that is, if the AN finds that the route request message sent by the user equipment carries the online link prefix of the user, the AN obtains the line information corresponding to the user equipment, and Sending the online link prefix and the obtained subscriber line information to the BNG for access authentication and global IPv6 address allocation, but the AN does not modify the online link prefix;
  • the AN integrates the Prefix Discovery Relay, that is, if the AN finds that the route request message sent by the user equipment carries the online link prefix of the user, the AN obtains the line information corresponding to the user equipment, and the online link prefix is obtained. And the obtained subscriber line information is sent to the BNG for access authentication and global IPv6 address allocation, and the AN modifies the online link prefix, for example, adding the subscriber line information in the online link prefix.
  • the method can be further subdivided into the following two types:
  • Another embodiment of the authentication process in the embodiment of the present invention includes:
  • the user equipment sends a first route request (Router Solicitation) message to the AN.
  • the user equipment sends the first route request message to request the BNG to respond to a Router Advertisement message to learn the online link prefix (on -link prefix ).
  • the first route request message carries the online link prefix of the user (on-link prefix ⁇ )
  • the AN adds the user line information to obtain the second route request that carries the user line information. Because the AN supports the Prefix Discovery Relay function, after the AN receives the first route request message, it queries the user line information corresponding to the current user equipment.
  • the user line information is used to identify the line used by the user, and may be a physical port identifier or a logical port identifier for the host, or The combination of the two types of port identifiers, or other identifiers that can be used to identify the lines used by the user, is not limited herein.
  • the AN after acquiring the subscriber line information, the AN adds the subscriber line information and the online link prefix to the reserved bit or option of the first routing request message to obtain a second routing request message, that is, the second routing request message. It contains subscriber line information and an online link prefix.
  • the AN can also add the subscriber line information to other locations of the first routing request message, and the specific location is not limited herein.
  • the AN sends a second routing request message carrying user line information to the BNG.
  • the BNG sends an access request to the AAA server.
  • the BNG sends an access request to the AAA server according to the user line information in the second routing request message, where the access request includes information about the user line information, and the BNG may send the user line including the user line to the AAA server.
  • An access request for information is used to instruct the AAA server to authenticate the subscriber line information;
  • the BNG obtains the corresponding username and password according to the subscriber line information, and sends an access request including the username and password to the AAA server, where the access request is used to instruct the AAA server to authenticate the username and password.
  • the AAA server sends the authentication result to the BNG according to the access request.
  • the AAA server authenticates the subscriber line information
  • the BNG feedback authentication result if the access request received by the AAA server includes the user name and the password, the AAA server authenticates the user name and the password, and feeds back the authentication result to the BNG.
  • the specific authentication result may be the authentication success, or Authentication failed.
  • the BNG refuses to feed back the online link prefix to the user and does not generate the user's global IPv6 address.
  • the user service profile (Profile) is sent to the BNG for subsequent data communication, and the subsequent steps are triggered.
  • the BNG generates a global IPv6 address with user line information.
  • a specific BNG can generate a global IPv6 address in three ways: (1) The BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in the present mode itself carries the subscriber line information, that is, as described in the embodiment shown in FIG. 3), and will contain the subscriber line information. The interface identifier is appended to the online link prefix of the user to generate the user's Global IPv6 address.
  • the BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in this mode does not carry the line information itself, that is, as described in the embodiment shown in FIG. 2), and requests the message from the second route. After obtaining the subscriber line information, combining the subscriber line information and the interface identifier, and attaching it to the online link prefix of the user, generating the user's Global IPv6 address;
  • the BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in this mode does not carry the line information itself, that is, as described in the embodiment shown in FIG. 2), and requests the message from the second route.
  • the subscriber line information is obtained, and the subscriber line information is used as part of the online link prefix, and the interface identifier is attached to the online link prefix of the subscriber with the line information to generate the user's Global IPv6 address.
  • the BNG sends, by using the AN, a route advertisement message that includes an online link prefix with user line information to the user equipment.
  • the location of the subscriber line information in this step is also different.
  • the subscriber line information is added to the route.
  • step 406 User line information is added to the online link prefix.
  • the AN does not participate in the online link prefix translation, so the route advertisement message sent by the BNG is directly forwarded to the user equipment.
  • the user equipment automatically configures a global IPv6 address with line information.
  • the user equipment After receiving the route advertisement message sent by the BNG, the user equipment also generates a global IPv6 address according to the user line information, the interface identifier, and the online link prefix.
  • the specific generation process is similar to the process in which the BNG generates the global IPv6 address in step 406, and the BNG is similar to the BNG. How to generate a global IPv6 address Correspondence.
  • Another embodiment of the authentication process in the embodiment of the present invention includes:
  • the user equipment sends a Router Solicitation message to the AN.
  • the user equipment sends a first route request message to request the BNG to respond to a Router Advertisement message to learn the online link prefix. -link prefix ).
  • the first route request message carries the online link prefix (on-link prefix) of the user.
  • the AN adds user line information.
  • the AN Since the AN supports the Prefix Discovery Proxy function, after the AN receives the first routing request message, it queries the user line information corresponding to the current user equipment, and the user line information may be a physical port identifier or a logical port identifier of the host, or this A combination of the two port identifiers, or other identifiers that can be used to identify the line information used by the user, which is not limited herein.
  • the AN after acquiring the subscriber line information, the AN adds the subscriber line information and the online link prefix to the reserved bit or option of the first routing request message to obtain a second routing request message, that is, the second routing request message. It contains subscriber line information and an online link prefix.
  • the AN can also add the subscriber line information to other locations of the first routing request message, and the specific location is not limited herein.
  • the AN sends a second routing request message that includes user line information to the BNG.
  • the BNG sends an access request to the AAA server.
  • the BNG sends an access request to the AAA server according to the user line information in the second routing request message, where the access request includes information about the user line information, and the BNG may send the user line including the user line to the AAA server.
  • An access request for information is used to instruct the AAA server to authenticate the subscriber line information;
  • the BNG obtains a corresponding username and password according to the subscriber line information, and sends an access request including the username and the password to the AAA server, where the access request is used to indicate the AAA server.
  • the username and password are authenticated.
  • the AAA server sends the authentication result to the BNG according to the access request.
  • the AAA server authenticates the subscriber line information
  • the BNG feedback authentication result if the access request received by the AAA server includes the user name and the password, the AAA server authenticates the user name and the password, and feeds back the authentication result to the BNG.
  • the specific authentication result may be the authentication success, or Authentication failed.
  • the BNG refuses to feed back the online link prefix to the user and does not generate the user's global IPv6 address.
  • the user service profile (Profile) is sent to the BNG for subsequent data communication, and the subsequent steps are triggered.
  • the BNG generates a global IPv6 address with line information.
  • the specific BNG can generate a global IPv6 address in three ways:
  • the BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in the present mode itself carries the subscriber line information, that is, as described in the embodiment shown in FIG. 3), and will contain the subscriber line information.
  • the interface identifier is appended to the online link prefix of the user to generate the user's Global IPv6 address.
  • the BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in this mode does not carry the subscriber line information itself, that is, as described in the embodiment shown in FIG. 2), and requests from the second route.
  • the user line information is obtained in the message, and the subscriber line information and the interface identifier are combined, and then added to the online link prefix of the user to generate the user's Global IPv6 address;
  • the BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in this mode does not carry the subscriber line information itself, that is, as described in the embodiment shown in FIG. 2), and requests from the second route.
  • the user line information is obtained in the message, and the subscriber line information is used as part of the online link prefix, and the interface identifier is attached to the online link prefix of the user with the line information to generate the user's Global IPv6 address.
  • the BNG sends a route advertisement message carrying an online link prefix to the AN.
  • the AN converts the online link prefix in the route advertisement message to an online link prefix that carries the user line information.
  • the AN participates in the online link prefix translation, so the obtained subscriber line information is placed in the received online link prefix to obtain the online link prefix carrying the subscriber line information.
  • the AN sends the online link prefix carrying the subscriber line information to the user equipment.
  • the AN places the online link prefix carrying the subscriber line information in the route advertisement message, and sends the route advertisement message to the User equipment.
  • the user equipment automatically configures a global IPv6 address with line information.
  • the user equipment After receiving the route advertisement message sent by the AN, the user equipment also generates a global IPv6 address according to the user line information, the interface identifier, and the online link prefix.
  • the specific generation process is similar to the process in which the BNG generates the global IPv6 address in step 506, and the BNG is similar to the BNG. The way to generate a global IPv6 address corresponds.
  • the access node may query the user line information corresponding to the user equipment, and carry the user line information in the second neighbor request message.
  • the second routing request message is sent to the BNG, that is, the BNG can perform the implicit authentication on the user according to the user line information. Therefore, in the embodiment of the present invention, the implicit authentication based on the user line information can be supported in the case of IPv6;
  • the BNG and the user equipment can generate the global IPv6 address according to the user line information. Therefore, the solution in this embodiment can implement address allocation and access authentication in the IPv6 structure.
  • the embodiment of the communication system in the embodiment of the present invention includes:
  • the user equipment 601 is configured to send a first request message to the access node 602, where the first request message includes: a first neighbor request message including a link-local address LLA;
  • the access node 602 is configured to receive a neighbor request message sent by the user equipment 601, where the neighbor request message includes an LLA, and acquires user line information corresponding to the user equipment 601; and sends the LLA and the user line to the BNG 603. a second neighbor request message of information; Specifically, the access node 602 sends the LNG and the user line processing manner to the BNG 603:
  • the access node 602 carries the LLA and the user line information in different locations or different domains in the second neighbor request message, and sends the second neighbor request message to the BNG 603;
  • the access node 602 converts the LLA that does not include the subscriber line information into an LLA that includes the subscriber line information, and carries the LLA including the subscriber line information in the second neighbor request message, and the second neighbor is The request message is sent to BNG603.
  • the BNG 603 is configured to receive a second neighbor request message sent by the access node 602, and send an access request to the authentication and authorization charging AAA server 604 according to the user line information.
  • the BNG 603 after receiving the authentication result fed back by the AAA server 604, the BNG 603 performs the repeated address detection on the LLA if the authentication result is successful, and sends the LLA that the second neighbor request message is rejected if the authentication result is the authentication failure. Neighbor advertisement message to reject the LLA configured by the user;
  • the AAA server 604 is configured to perform access authentication according to the access request sent by the BNG 603.
  • the above describes the processing flow of the LLA.
  • the access authentication system may further include:
  • a second access node configured to receive a routing request message sent by the user equipment 601, perform PD Relay processing, and send a second routing request message including the subscriber line information to the BNG 603;
  • the second BNG is configured to receive the second routing request message, and send an access request to the AAA server 604 according to the user line information that is cancelled by the second routing request.
  • the function of the foregoing second access node can also be implemented in the access node 602, and the function of the second BNG can also be implemented in the BNG 603.
  • the access node 602 is further configured to convert the LLA that is not included in the user line information sent by the user equipment 601 into an LLA that includes user line information, and send the BNG 603.
  • the LLA containing the subscriber line information is converted to an LLA that does not contain subscriber line information.
  • the BNG 603 when performing global IPv6 address processing, the BNG 603 is also used according to The user line information, the online link prefix of the user equipment, and/or the interface identifier generate a global IPv6 address.
  • the specific generation process has been described in detail in the foregoing method embodiment, and is not described here.
  • an embodiment of an access node in this embodiment of the present invention includes:
  • the receiving unit 701 is configured to receive a first request message sent by the user equipment, where the first request message may be a neighbor request message or a route request message, where the first request message may include a link-local address LLA, such as in a neighbor.
  • the request message contains an LLA;
  • the obtaining unit 702 is configured to acquire user line information corresponding to the user equipment.
  • the sending unit 703 is configured to send, to the BNG, a second request message that includes the user line information, where the second request message is used to instruct the BNG to perform access authentication.
  • the first request message may be a neighbor request message.
  • the first request message may also be a second route request message.
  • User line information and LLA can be set in different domains of the same message, or in the same domain, such as LLA domain.
  • the LLA proxy unit 704 is configured to convert the LLA carried in the first request message into an LLA carrying subscriber line information, and set the LLA carrying the subscriber line information in the second request message; the LLA proxy unit 704 can also Converting the LLA carrying the subscriber line information sent by the BNG into an LLA that does not include the subscriber line information;
  • the LLA relay unit 705 is configured to carry the LLA carried in the first request message and the user line information acquired by the acquiring unit in different locations or different domains of the second request message, that is, the LLA domain and the LLA domain. Other domains.
  • the receiving unit 701 is further configured to receive a first routing request message sent by the user equipment, where the first routing request message carries an online link prefix, where the online link prefix is an online device where the user equipment is located.
  • the sending unit 703 is further configured to send, to the BNG, a second routing request message that includes the online link prefix and the user line information.
  • the PD proxy unit 706 is configured to add user line information to the online link prefix sent by the BNG. Sending the online link prefix including the subscriber line information to the user equipment;
  • the PD relay unit 707 is configured to forward the online link prefix including the subscriber line information sent by the BNG to the user equipment.
  • the BNG embodiment in the embodiment of the present invention includes:
  • the request receiving unit 801 is configured to receive a second request message that is sent by the access node and includes the user line information, where the second request message may be a second neighbor request message and/or a second route request message. Further, the The second request message can also carry LLA
  • the access requesting unit 803 is configured to send an access request to the authentication and authorization charging AAA server according to the user line information.
  • the authentication result receiving unit 805 is configured to receive the authentication result sent by the AAA server. If the authentication result is successful, the triggering proxy duplicate address detecting unit 802 performs the determining operation. If the authentication result is the authentication failure, the proxy repeating address detecting unit 802 is notified. Send a neighbor advertisement message to reject the user-configured LLA.
  • a proxy duplicate address detection (Proxy DAD, Duplicate Address Detection) unit 802 configured to determine whether an address matching the LLA in the neighbor request message exists in the address cache; in an actual application, the proxy duplicate address detecting unit 802 may perform authentication according to The triggering of the result receiving unit 805 performs corresponding processing, which may specifically be:
  • the proxy duplicate address detecting unit 802 is triggered to perform the repeated address detection, that is, the proxy duplicate address detecting unit 802 firstly obtains the acquired LLA and the preset address. The addresses stored in the cache are compared to determine whether there is an address matching the LLA in the address cache.
  • the address is determined to be in conflict, and the neighbor address message is sent instead of the matching address owner, or other exception processing procedures are performed, if not If it is determined that there is no conflict in the address, the LLA carried in the neighbor request message is added to the address cache; when the authentication result received by the authentication result receiving unit 805 from the AAA server is an authentication failure, the agent repeat address detecting unit 802 is notified to The user equipment sends a neighbor advertisement message, that is, the proxy duplicate address detecting unit 802 can process the neighboring address according to the existing address conflict, that is, send the neighbor advertisement message to the user to reject the LLA automatically configured by the user.
  • the authentication result of the device feedback controls the case where the proxy duplicate address detecting unit 802 performs corresponding processing. It can be understood that, in actual applications, the specific duplicate address detecting operation may be performed before the authentication is initiated, that is, the proxy duplicate address detecting unit 802 is used.
  • the control access requesting unit 803 initiates an access request to the AAA server according to the user line information.
  • the authentication result receiving unit 805 is only used for access.
  • the requesting unit 803 receives the authentication result fed back by the AAA server after initiating the access request to the AAA server.
  • the request receiving unit 801 is further configured to receive a route request message that includes the online link prefix and the user line information.
  • the BNG in this embodiment may further include:
  • the address generating unit 804 is configured to perform an address allocation process according to the online link prefix, the user line information, and the preset interface identifier.
  • the manner in which the address generating unit 804 specifically generates the global IPv6 address may include: (1) The BNG extracts the interface identifier from the LLA in the LLA processing process before (the LLA in the present mode carries the user line information, That is, as described in the embodiment shown in FIG. 3, the interface identifier including the subscriber line information is appended to the online link prefix of the user, and the Global IPv6 address of the user is generated.
  • the BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in this mode does not carry the line information itself, that is, as described in the embodiment shown in FIG. 2), and requests the message from the second route. After obtaining the subscriber line information, combining the subscriber line information and the interface identifier, attaching the subscriber line information prefix to the user, and generating the user's Global IPv6 address;
  • the BNG extracts the interface identifier from the LLA in the previous LLA processing process (the LLA in this mode does not carry the line information itself, that is, as described in the embodiment shown in FIG. 2), and requests the message from the second route.
  • the subscriber line information is obtained, and the subscriber line information is used as part of the online link prefix, and the interface identifier is attached to the online link prefix of the subscriber with the line information to generate the user's Global IPv6 address.
  • the access node after receiving the first neighbor request message or the first route request message sent by the user equipment, acquires user line information corresponding to the user equipment, and the user line is obtained.
  • the information is carried in the second neighbor request message and sent to the BNG to instruct the BNG to perform the access authentication operation. Therefore, in the embodiment of the present invention, the implicit authentication based on the subscriber line information can be supported in the case of IPv6.
  • the BNG and the user equipment can generate a global IPv6 address according to the user line information. Therefore, the solution in this embodiment can implement address allocation and access authentication in the IPv6 structure.
  • the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

一种接入网络的方法、 认证方法、 通讯系统以及相关设备
本申请要求于 2008 年 3 月 26 日提交中国专利局、 申请号为 200810084076.1、 发明名称为 "一种接入认证方法及接入认证系统以及相关设 备" 的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通讯领域, 尤其涉及一种接入网络的方法、 认证方法、 通 讯系统以及相关设备。
背景技术
现有的数字用户线(DSL, Digital Subscriber Line ) 网络架构正向基于以 太网汇聚和连接 ( Ethernet Aggregation and connectivity ) 的互联网协议月良务质 量( IP QoS , Internet Protocol Quality of Service )使能架构演变 , 在此背景下 , DSL通用参考架构如图 1所示。
其中, T为用户驻地网络( CPN, Customer Premises Network ) 中, 用户 设备 ( UE, User Equipment )和驻地网关 (RG, Residential Gateway ) 间的参 考点; U为 RG和接入节点 (AN, Access Node ) (即数字用户线接入复用器 ( DSLAM, Digital Subscriber Line Access Multiplexer ) ) 间的参考点; 在接入 网中, AN和宽带接入服务器( BRAS, Broadband Remote Access Server )或宽 带网络网关(BNG, Broadband Network Gateway )间为汇聚网络( Aggregation Network ) , V 为接入网中 AN 和 BRAS/BNG 间的以太网汇聚 ( Ethernet Aggregation )参考点; A10为接入网与服务提供商间的参考点, 该参考点既可 以连接应用服务提供商到拥有接入网的网络服务提供商,或在漫游情景下,连 接网络服务提供商到拜访地接入网。 CPN网络与接入网间采用 DSL接入技术 互连。 对于无源光网络 ( PON, Passive Optical Network ), AN为光线路终结 点( OLT, Optical Line Termination )或光网络单元( ONU, Optical Network Unit ), CPN与接入网间采用 PON等接入技术互连。
但是,上述技术方案中的 DSL网络架构只能支持互联网协议第四版 ( IPv4, Internet Protocol Version 4 ), 随着 IPv4地址的枯竭 , DSL网络架构向互联网协 议第六版( IPv6 , Internet Protocol Version 6 )演进成为一个必然趋势。
IPv4 的隐式用户认证是通过动态主机分配协议 ( DHCP, Dynamic Host Configuration Protocol ) 消息中携带用户线路信息实现的。 IPv6可以采用无状 态地址分配,但在现有技术的方案并未公开如何在无状态地址分配的情况下实 现基于用户线路信息的隐式认证。
发明内容
本发明实施例提供了一种接入网络的方法、 认证方法、 通讯系统以及 相关设备, 能够在 IPv6下支持基于用户线路信息的隐式认证。
本发明实施例提供的接入网络的方法, 包括: 在接入节点上接收用户设备 发送的第一请求消息, 所述第一请求消息中包含链路-局部地址 LLA; 获取所 述用户设备对应的用户线路信息; 从接入节点向宽带网络网关 BNG发送包含 所述 LLA以及所述用户线路信息的第二请求消息, 所述第二请求消息用于指 示所述 BNG进行接入认证。
本发明实施例提供的认证方法, 包括: 接收从接入节点到宽带网络网关 BNG 的请求消息, 所述请求消息中携带有用户线路信息以及链路-局部地址 LLA; 根据所述用户线路信息向认证授权计费 AAA服务器发送接入请求; 接 收 AAA服务器反馈的认证结果,若认证结果为认证成功 ,则对 LLA执行重复 地址探测, 若认证结果为认证失败, 则发送邻居通告消息, 以拒绝所述请求消 息中携带的 LLA。
本发明实施例提供的通讯系统,所述通讯系统包括接入节点和宽带网络网 关 BNG, 其中, 接入节点, 用于接收用户设备发送的第一请求消息, 所述第 一请求消息中包含链路-局部地址 LLA; 获取所述用户设备对应的用户线路信 息;向 BNG发送包含所述 LLA以及所述用户线路信息的第二请求消息; BNG, 用于接收来自接入节点第二请求消息根据所述用户线路信息向认证授权计费 AAA服务器发送接入请求,所述接入请求用于指示所述 AAA服务器进行接入 认证。
本发明实施例提供的接入节点, 包括接收单元, 用于接收用户设备发送的 第一请求消息, 所述第一请求消息中包含链路-局部地址 LLA; 获取单元, 用 于获取所述用户设备对应的用户线路信息; 发送单元, 用于向宽带网络网关 BNG的包含所述 LLA以及所述用户线路信息的第二请求消息, 所述第二请求 消息用于指示所述 BNG进行接入认证。 本发明实施例提供的宽带网络网关, 包括: 请求接收单元, 用于接收来自 接入节点的请求消息, 所述请求消息中携带有用户线路信息以及 LLA; 接入 请求单元, 用于根据所述用户线路信息向认证授权计费 AAA服务器发送接入 请求; 认证结果接收单元, 用于接收 AAA服务器发送的认证结果, 若认证结 果为认证成功, 则触发代理重复地址探测单元执行判断操作, 若认证结果为认 证失败, 则通知代理重复地址探测单元发送邻居通告消息, 以拒绝用户配置的 LLA; 代理重复地址探测单元, 用于判断地址緩存中是否存在与所述邻居请 求消息中的 LLA匹配的地址。
本发明实施例提供的接入网络的方法,应用于互联网协议第六版 IPv6, 包 括:接收从用户设备到接入节点的第一请求消息, 所述第一请求消息为第一邻 居请求消息或第一路由请求消息; 获取所述用户设备对应的用户线路信息;发 送从接入节点到宽带网络网关 BNG 的包含所述用户线路信息的第二请求消 息, 所述第二请求消息为第二邻居请求消息或第二路由请求消息。
从以上技术方案可以看出, 本发明实施例具有以下优点:
本发明实施例中, 接入节点接收用户设备发送的第一请求消息, 第一请求 消息中包含 LLA, 之后接入节点可以查询该用户设备对应的用户线路信息, 并且将该用户线路信息携带于第二请求消息中发送给 BNG, 即可以使得 BNG 根据该用户线路信息对用户进行隐式认证, 因此本发明实施例中在 IPv6的情 况下可以支持基于用户线路信息的隐式认证。
附图说明
图 1为现有技术 DSL网络架构示意图;
图 2为本发明实施例中认证方法一个实施例流程图;
图 3为本发明实施例中认证方法另一个实施例流程图;
图 4为本发明实施例中认证方法又一个实施例流程图;
图 5为本发明实施例中认证方法再一个实施例流程图;
图 6为本发明实施例中通讯实施例示意图;
图 7为本发明实施例中接入节点实施例示意图;
图 8为本发明实施例中 BNG实施例示意图。
具体实施方式 本发明实施例提供了一种接入网络的方法、 认证方法、 通讯系统以及 相关设备, 用于在 IPv6下支持基于用户线路信息的隐式认证。
本实施例中接入网络的方法包括:
在接入节点上接收用户设备发送的第一请求消息,所述第一请求消息中包 含链路-局部地址(LLA, Link Local Address );
根据所述第一请求消息获取所述用户设备对应的用户线路信息; 从接入节点向宽带网络网关 BNG发送包含所述 LLA以及所述用户线路信 息的第二请求消息 , 所述第二请求消息用于指示所述 BNG对所述用户设备进 行接入认证。
在实际应用中, 上述第一、 第二请求消息可以为邻居请求消息, 也可以为 路由请求消息,或者为其它请求消息。在本实施例以及后续实施例中均以邻居 请求消息为例进行说明, 可以理解的是, 在实际应用中, 同样还可以是其他类 型的请求消息, 此处不作限定。
本发明实施例中, 接入节点接收用户设备发送的包含 LLA的第一邻居请 求消息之后,获取与用户设备对应的用户线路信息, 并将该用户线路信息携带 于第二邻居请求消息中发送给 BNG, 以指示 BNG进行接入认证操作, 所以本 发明实施例中在 IPv6的情况下可以支持基于用户线路信息的隐式认证。
本发明实施例中接入网络过程中提供接入认证功能,接入认证可以分为两 个过程:
一、 LLA处理过程:
在本实施例中, AN中集成 LLA Relay/Proxy功能, 即当 AN接收到用户 设备发送的包含 LLA的消息时会获取该用户设备对应的用户线路信息, 并将 获取到的用户线路信息以及 LLA发送给 BNG进行接入认证。
具体地, 根据 LLA与用户线路信息之间的组合方式的不同, 可以将本方 式细分为以下两种类型:
A、 LLA 与用户线路信息分别设置于同一消息的不同位置或不同域中传 输, 即 LLA设置于携带 LLA的 LLA域和用户线路信息设置于不同于 LLA域 的其它域:
请参阅图 2, 本发明实施例中认证过程一个实施例包括: 201、 用户设备向 AN发送第一邻居请求消息( Neighbor Solicitation ); 本实施例中,用户设备首先按照预置的方式自动配置 LLA,具体的配置过 程可参考现有技术, 此处不再赘述。
LLA配置完成后, 用户设备向 AN发送第一邻居请求消息,该消息中包含 有临时 LLA ( tentative LLA ), 该 tentative LLA由用户设备按照预置的配置规 则自动配置。
202、 AN在该第一邻居请求消息中添加线路信息;
AN支持 LLA Relay功能,即本实施例中的 AN不会对临时 LLA进行修改, 而只是对其进行转发, 但在转发临时 LLA的同时, 还会一并转发用户线路信 息 ( Line Information ), 所以 AN获取到该消息后 , 查询当前用户设备对应的 用户线路信息,该用户线路信息用于标识用户所使用的线路,可以为主机接入 物理端口标识或逻辑端口标识,或者是这两种端口标识的组合,还可以是其它 能用于标识用户所使用的线路的标识, 此处不做限定。
本实施例中, 临时 LLA与用户线路信息分别设置于在同一消息的不同位 置或不同域中传输, AN获取到用户线路信息之后, 将该用户线路信息添加至 第一邻居请求消息的保留位或选项中得到第二邻居请求消息,即该第二邻居请 求消息中包含有临时 LLA以及用户线路信息。
可以理解的是, 本实施例中, AN同样可以将用户线路信息添加至第一邻 居请求消息的其它位置,只要使得第二邻居请求消息能够包含该用户线路信息 即可, 具体位置此处不做限定。
203、 AN向 BNG发送包含临时 LLA以及用户线路信息的第二邻居请求 消息;
AN将用户线路信息置于第一邻居请求消息得到第二邻居请求消息之后, 向 BNG/BRAS发送该第二邻居请求消息。
需要说明的是, 本实施例以及后续实施例中所描述的 BNG即指 BNG和 / 或 BRAS。
204、 BNG 向认证授权计费 ( AAA , Authentication, Authorization, Accounting )服务器发送接入请求;
本实施例中, BNG根据第二邻居请求消息中的用户线路信息向 AAA服务 器发送接入请求, 该接入请求中包含用户线路信息的相关信息, 具体可以是: BNG向 AAA服务器发送包含用户线路信息的接入请求,该接入请求用于 指示该 AAA服务器对该用户线路信息进行认证;
BNG根据该用户线路信息获取对应的用户名以及密码,并向 AAA服务器 发送包含该用户名以及密码的接入请求, 该接入请求用于指示该 AAA服务器 对该用户名和密码进行认证。
205、 AAA服务器根据接入请求进行认证后向 BNG反馈认证结果; 本实施例中, 若 AAA服务器接收到的接入请求中包含用户线路信息, 则 AAA服务器对该用户线路信息进行认证, 并向 BNG反馈认证结果, 若 AAA 服务器接收到的接入请求中包含用户名以及密码, 则 AAA服务器对该用户名 以及密码进行认证, 并向 BNG反馈认证结果, 具体的认证结果可以为认证成 功, 或认证失败。
若认证成功, 则向 BNG下发用户业务模板 ( Profile )用于后续的数据通 讯。
206、 BNG根据 AAA服务器反馈的认证结果进行重复地址探测。
本实施例中, BNG支持代理重复地址探测( Proxy DAD, Duplicate Address Detection ), 建立和维护所代理的用户的 IP地址緩存 ( IP Address Cache )。
若 BNG接收到的认证结果为认证成功, 则进行 Proxy DAD, 即 BNG首 先将获取到的临时 LLA与预置的地址緩存中保存的地址进行比较, 判断地址 緩存中是否存在与该临时 LLA匹配的地址, 若存在, 则确定地址存在冲突, 并代替匹配地址拥有者发送邻居通告(Neighbor Advertisements ) 消息, 或进 行其他异常处理流程, 若不存在, 则确定地址不存在冲突, 则将临时 LLA加 入地址緩存;
若 BNG接收到的认证结果为认证失败, 则可以按照存在地址冲突处理, 即向用户发送拒绝第二请求消息携带的 LLA的邻居通告消息, 以拒绝用户自 动配置的临时 LLA。
需要说明的是, 本实施例中, 步骤 206还可以在用户认证的过程(即步骤 204与步骤 205 )之前执行, 即步骤 203之后, BNG首先将获取到的临时 LLA 与预置的地址緩存中保存的地址进行比较,判断地址緩存中是否存在与该临时 LLA 匹配的地址, 若存在, 则确定地址存在冲突, 则代替匹配地址拥有者发 送邻居通告消息, 或进行其他异常处理流程, 若不存在, 则确定地址不存在冲 突, 则将临时 LLA加入地址緩存, 并触发执行用户认证过程, 即步骤 204以 及 205。
上述实施例中给出了 LLA与用户线路信息分别在同一消息的不同位置或 不同域中进行传输的情况, 下面描述另外一种情况:
B、 用户线路信息被添加于 LLA中进行传输:
请参阅图 3, 本发明实施例中认证过程另一个实施例包括:
301、 用户设备向 AN发送第一邻居请求( Neighbor Solicitation ) 消息; 本实施例中,用户设备首先按照预置的方式自动配置 LLA,具体的配置过 程可参考现有技术, 此处不再赞述。
LLA配置完成后,用户设备向 AN发送第一邻居请求消息,该消息中包含 有临时 LLA, 该临时 LLA由用户设备按照预置的配置规则自动配置。
302、 AN对临时 LLA进行修改;
AN支持 LLA Proxy功能,即本实施例中 AN会对接收到的临时 LLA进行 修改 , 将用户线路信息加入该临时 LLA中。
AN获取到该消息后, 查询当前用户设备对应的用户线路信息, 该用户线 路信息用于标识用户所使用的线路,可以为主机接入物理端口标识或逻辑端口 标识,或者是这两种端口标识的组合,还可以是其它能用于标识用户所使用的 线路的标识, 此处不做限定。
本实施例中, 用户线路信息被添加于第二邻居请求消息的临时 LLA中进 行传输, 具体的, AN获取到用户线路信息之后, 该用户线路信息被添加至临 时 LLA的接口标识(Interface ID )域的全部或部分比特, 或者, 用户线路信 息位于临时 LLA中间的 54比特域的全部或部分比特;
其中 , IPv6的临时 LLA的结构如下表所示:
表 1
10比特 54比特 64 比特
1111 1110 10 0 Interface ID 可以理解的是,本实施例中 , AN同样可以将用户线路信息添加至临时 LLA 的其它位置, 只要使得该临时 LLA能够包含该用户线路信息即可, 具体位置 此处不做限定。
303、 AN向 BNG发送第二邻居请求消息;
本实施例中, 该第二邻居请求消息中携带有临时 LLA, 该临时 LLA中包 含用户线路信息。
304、 BNG向 AAA服务器发送接入请求;
本实施例中, BNG根据第二邻居请求消息中的用户线路信息向 AAA服务 器发送接入请求, 该接入请求中包含用户线路信息的相关信息, 具体可以是: BNG向 AAA服务器发送包含用户线路信息的接入请求,该接入请求用于 指示该 AAA服务器对该用户线路信息进行认证;
BNG根据该用户线路信息获取对应的用户名以及密码,并向 AAA服务器 发送包含该用户名以及密码的接入请求, 该接入请求用于指示该 AAA服务器 对该用户名和密码进行认证。
305、 AAA服务器根据接入请求进行认证后向 BNG反馈认证结果; 本实施例中, 若 AAA服务器接收到的接入请求中包含用户线路信息, 则
AAA服务器对该用户线路信息进行认证, 并向 BNG反馈认证结果, 若 AAA 服务器接收到的接入请求中包含用户名以及密码, 则 AAA服务器对该用户名 以及密码进行认证, 并向 BNG反馈认证结果, 具体的认证结果可以为认证成 功, 或认证失败。
若认证成功, 则向 BNG下发用户业务模板 ( Profile )用于后续的数据通 讯。
306、 BNG根据 AAA服务器反馈的认证结果进行重复地址探测; 本实施例中, BNG支持代理重复地址探测( Proxy DAD, Duplicate Address
Detection ), 建立和维护所代理的用户的 IP地址緩存。
若 BNG接收到的认证结果为认证成功, 则进行 Proxy DAD , 即 BNG首 先将获取到的包含用户线路信息的临时 LLA与预置的地址緩存中保存的地址 进行比较, 判断地址緩存中是否存在与该包含用户线路信息的临时 LLA匹配 的地址, 若存在, 则确定地址存在冲突, 并代替匹配地址拥有者发送邻居通告 消息, 或进行其他异常处理流程, 若不存在, 则确定地址不存在冲突, 则将包 含用户线路信息的临时 LLA加入地址緩存;
若 BNG接收到的认证结果为认证失败, 则可以按照存在地址冲突处理, 即向用户发送拒绝第二邻居请求消息携带的 LLA的邻居通告消息, 以拒绝用 户自动配置的临时 LLA。
需要说明的是, 本实施例中, 步骤 306还可以在用户认证过程(即步骤 304与步骤 305 )之前执行, 即步骤 303之后, BNG首先将获取到的 LLA与 预置的地址緩存中保存的地址进行比较, 判断地址緩存中是否存在与该 LLA 匹配的地址, 若存在, 则确定地址存在冲突, 则代替匹配地址拥有者发送 Neighbor Advertisements消息, 或进行其它异常处理流程, 若不存在, 则确定 地址不存在冲突, 则将包含用户线路信息的临时 LLA加入地址緩存, 并触发 执行用户认证过程 , 即步骤 304以及 305。
307、 用户设备向 AN发送携带 LLA的 IPv6包, 该 IPv6包不包含用户线 路信息;
本实施例中,用户设备向 AN发送的 IPv6包的 LLA不包含用户线路信息。
308、 AN修改 LLA使新 LLA包含用户线路信息;
转换的方式包括: AN在 IPv6包中的 LLA中添加入用户线路信息 , 具体 的添加方式与前述步骤 302的添加方式类似, 此处不再赞述。
309 ~ 310、 AN与 BNG交互包含新 LLA的 IPv6包。
311、 AN将 BNG发送的 IPv6包中包含用户线路信息的 LLA转换为不包 含用户线路信息的 LLA。
312、 AN向用户设备发送携带不包含用户线路信息的 LLA的 IPv6包。 本实施例中, AN对 LLA中所包含的信息进行修改, 当与 BNG交互时 , 则在 LLA中添加用户线路信息 , 当与用户设备交互时 , 则将包含用户线路信 息的 LLA还原为不包含用户线路信息的 LLA。
需要说明的是, 上述实施例中, 步骤 307至步骤 312为可选步骤。
上述描述了 LLA的处理过程,在实际的应用中 ,在对 LLA进行处理之后, 还可以对全球 IPv6地址进行处理 , 包括接入认证以及地址分配流程: 二、 全球 IPv6地址处理过程:
在本实施例中, AN 集成前缀发现 (PD , Prefix Discovery ) 中转 /代理 ( Relay/Proxy )功能, 所以当 AN接收到用户设备发送的包含在线链路前缀 ( on-link prefix ) 的消息时会获取该用户设备对应的用户线路信息, 并将获取 到的用户线路信息发送给 BNG进行接入认证以及全球 IPv6地址分配。
需要说明的是, 本实施例中 AN集成 Prefix Discovery Relay, 即表示 AN 若发现用户设备发送的路由请求消息中携带有用户的在线链路前缀,则 AN会 获取该用户设备对应的线路信息,并将在线链路前缀以及获取到的用户线路信 息发送给 BNG进行接入认证以及全球 IPv6地址分配,但是 AN不会对在线链 路前缀进行修改;
本实施例中 AN集成 Prefix Discovery Relay, 即表示 AN若发现用户设备 发送的路由请求消息中携带有用户的在线链路前缀,则 AN会获取该用户设备 对应的线路信息, 并将在线链路前缀以及获取到的用户线路信息发送给 BNG 进行接入认证以及全球 IPv6地址分配, 同时 AN会对在线链路前缀进行修改, 例如将用户线路信息添加在在线链路前缀中。
具体地, 根据 AN是否参与在线链路前缀转换, 可以再将本方式细分为以 下两种类型:
A、 AN不参与在线链路前缀转换 , 但支持 Prefix Discovery Relay功能: 请参阅图 4, 本发明实施例中认证过程又一个实施例包括:
401、 用户设备向 AN发送第一路由请求( Router Solicitation ) 消息; 本实施例中, 用户设备发送第一路由请求消息目的在于请求 BNG回应路 由通告 ( Router Advertisement ) 消息以学习在线链路前缀 ( on-link prefix )。
本实施例中, 在该第一路由请求消息中携带有用户的在线链路前缀 ( on-link prefix λ
402、 AN添加用户线路信息以得到携带用户线路信息的第二路由请求消 由于 AN支持 Prefix Discovery Relay功能, 所以当 AN接收到第一路由请 求消息之后, 查询当前用户设备对应的用户线路信息,该用户线路信息用于标 识用户所使用的线路,可以为主机接入物理端口标识或逻辑端口标识,或者是 这两种端口标识的组合,或者还可以是其它能用于标识用户所使用的线路的标 识, 此处不做限定。
本实施例中, AN获取到用户线路信息之后, 将该用户线路信息以及在线 链路前缀添加至第一路由请求消息的保留位或选项中得到第二路由请求消息, 即该第二路由请求消息中包含有用户线路信息以及在线链路前缀。
可以理解的是, 本实施例中, AN同样可以将用户线路信息添加至第一路 由请求消息的其它位置, 具体位置此处不做限定。
403、 AN向 BNG发送携带用户线路信息的第二路由请求消息;
404、 BNG向 AAA服务器发送接入请求;
本实施例中, BNG根据第二路由请求消息中的用户线路信息向 AAA服务 器发送接入请求, 该接入请求中包含用户线路信息的相关信息, 具体可以是: BNG向 AAA服务器发送包含用户线路信息的接入请求,该接入请求用于 指示该 AAA服务器对该用户线路信息进行认证;
BNG根据该用户线路信息获取对应的用户名以及密码,并向 AAA服务器 发送包含该用户名以及密码的接入请求, 该接入请求用于指示该 AAA服务器 对该用户名和密码进行认证。
405、 AAA服务器根据接入请求进行认证后向 BNG反馈认证结果; 本实施例中, 若 AAA服务器接收到的接入请求中包含用户线路信息, 则 AAA服务器对该用户线路信息进行认证, 并向 BNG反馈认证结果, 若 AAA 服务器接收到的接入请求中包含用户名以及密码 , 则 AAA服务器对该用户名 以及密码进行认证 , 并向 BNG反馈认证结果 , 具体的认证结果可以为认证成 功, 或认证失败。
若认证失败,则 BNG拒绝向用户反馈在线链路前缀,不生成用户全球 IPv6 地址。
若认证成功, 则向 BNG下发用户业务模板 ( Profile )用于后续的数据通 讯, 并触发后续步骤。
406、 BNG生成带用户线路信息的全球 IPv6地址;
本实施例中, 具体的 BNG生成全球 IPv6地址可以有三种方式: ( 1 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身带有用户线路信息, 即如图 3所示实施例所描述), 将包含有 用户线路信息的接口标识附加在用户所在的在线链路前缀之后, 生成用户的 Global IPv6地址;
( 2 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身不带有线路信息, 即如图 2所示实施例所描述), 并从第二路 由请求消息中获得用户线路信息,将用户线路信息和接口标识组合后,将其附 加在用户所在的在线链路前缀之后 , 生成用户的 Global IPv6地址;
( 3 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身不带有线路信息, 即如图 2所示实施例所描述), 并从第二路 由请求消息中获得用户线路信息, 将用户线路信息作为在线链路前缀的一部 分,将接口标识附加在用户所在带线路信息的在线链路前缀之后, 生成用户的 Global IPv6地址。
需要说明的是, 上述仅以三个例子说明本实施例中的全球 IPv6地址生成 过程, 实际应用中, 同样可以使用上述信息进行任意组合用以生成全球 IPv6 地址, 此处不做限定。
407、 BNG经由 AN向用户设备发送包含带用户线路信息的在线链路前缀 的路由通告消息;
具体地, 据步骤 406中生成地址方式的不同, 本步骤中用户线路信息所 处的位置也有所不同, 对于步骤 406中的地址生成方案(1 ) 以及(2 ): 用户 线路信息被添加于路由通告消息的保留位或选项中;
对于步骤 406中的地址生成方案( 3 ): 用户线路信息被添加于在线链路前 缀中。
本实施例中, AN不参与在线链路前缀转换, 所以直接将 BNG发送的路 由通告消息转发至用户设备。
408、 用户设备自动配置带线路信息的全球 IPv6地址。
用户设备接收到 BNG发送的路由通告消息之后,同样根据用户线路信息, 接口标识以及在线链路前缀生成全球 IPv6地址, 具体的生成过程与步骤 406 中 BNG生成全球 IPv6地址的过程类似,且与 BNG生成全球 IPv6地址的方式 对应。
上述描述了 AN不参与在线链路前缀转换的情况, 下面对 AN参与在线链 路前缀转换的情况进行描述:
B、 AN参与在线链路前缀转换 , 支持 Prefix Discovery Proxy功能: 请参阅图 5, 本发明实施例中认证过程再一个实施例包括:
501、 用户设备向 AN发送第一路由请求( Router Solicitation ) 消息; 本实施例中, 用户设备发送第一路由请求消息目的在于请求 BNG回应路 由通告 ( Router Advertisement ) 消息以学习在线链路前缀( on-link prefix )。
本实施例中, 在该第一路由请求消息中携带有用户的在线链路前缀 ( on-link prefix )。
502、 AN添加用户线路信息;
由于 AN支持 Prefix Discovery Proxy功能, 所以当 AN接收到第一路由请 求消息之后, 查询当前用户设备对应的用户线路信息,该用户线路信息可以为 主机接入物理端口标识或逻辑端口标识,或者是这两种端口标识的组合,或者 还可以是其他能用于标识用户所使用的线路信息的标识, 此处不做限定。
本实施例中, AN获取到用户线路信息之后, 将该用户线路信息以及在线 链路前缀添加至第一路由请求消息的保留位或选项中得到第二路由请求消息, 即该第二路由请求消息中包含有用户线路信息以及在线链路前缀。
可以理解的是, 本实施例中, AN同样可以将用户线路信息添加至第一路 由请求消息的其它位置, 具体位置此处不做限定。
503、 AN向 BNG发送包含用户线路信息的第二路由请求消息;
504、 BNG向 AAA服务器发送接入请求;
本实施例中, BNG根据第二路由请求消息中的用户线路信息向 AAA服务 器发送接入请求, 该接入请求中包含用户线路信息的相关信息, 具体可以是: BNG向 AAA服务器发送包含用户线路信息的接入请求,该接入请求用于 指示该 AAA服务器对该用户线路信息进行认证;
BNG根据该用户线路信息获取对应的用户名以及密码,并向 AAA服务器 发送包含该用户名以及密码的接入请求, 该接入请求用于指示该 AAA服务器 对该用户名和密码进行认证。
505、 AAA服务器根据接入请求进行认证后向 BNG反馈认证结果; 本实施例中, 若 AAA服务器接收到的接入请求中包含用户线路信息, 则 AAA服务器对该用户线路信息进行认证, 并向 BNG反馈认证结果, 若 AAA 服务器接收到的接入请求中包含用户名以及密码 , 则 AAA服务器对该用户名 以及密码进行认证 , 并向 BNG反馈认证结果 , 具体的认证结果可以为认证成 功, 或认证失败。
若认证失败,则 BNG拒绝向用户反馈在线链路前缀,不生成用户全球 IPv6 地址。
若认证成功, 则向 BNG下发用户业务模板 ( Profile )用于后续的数据通 讯, 并触发后续步骤。
506、 BNG生成带线路信息的全球 IPv6地址;
本实施例中 , 具体的 BNG生成全球 IPv6地址可以有三种方式:
( 1 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身带有用户线路信息, 即如图 3所示实施例所描述), 将包含有 用户线路信息的接口标识附加在用户所在在线链路前缀之后, 生成用户的 Global IPv6地址;
( 2 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身不带有用户线路信息, 即如图 2所示实施例所描述), 并从第 二路由请求消息中获得用户线路信息,将用户线路信息和接口标识组合后,将 其附加在用户所在在线链路前缀之后 , 生成用户的 Global IPv6地址;
( 3 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身不带有用户线路信息, 即如图 2所示实施例所描述), 并从第 二路由请求消息中获得用户线路信息,将用户线路信息作为在线链路前缀的一 部分,将接口标识附加在用户所在带线路信息的在线链路前缀之后, 生成用户 的 Global IPv6地址。
需要说明的是, 上述仅以三个例子说明本实施例中的全球 IPv6地址生成 过程, 实际应用中, 同样可以使用上述信息进行任意组合用以生成全球 IPv6 地址, 此处不做限定。 507、 BNG向 AN发送携带在线链路前缀的路由通告消息;
508、 AN将路由通告消息中的在线链路前缀转换为携带用户线路信息的在 线链路前缀;
本实施例中, AN参与在线链路前缀转换, 所以将获取到的用户线路信息 置于接收到的在线链路前缀中得到携带用户线路信息的在线链路前缀。
509、 AN向用户设备发送该携带用户线路信息的在线链路前缀;
AN将用户线路信息置于在线链路前缀中得到携带用户线路信息的在线链 路前缀之后,将该携带用户线路信息的在线链路前缀置于路由通告消息中, 并 将该路由通告消息发送至用户设备。
510、 用户设备自动配置带线路信息的全球 IPv6地址。
用户设备接收到 AN发送的路由通告消息之后 , 同样根据用户线路信息 , 接口标识以及在线链路前缀生成全球 IPv6地址, 具体的生成过程与步骤 506 中 BNG生成全球 IPv6地址的过程类似,且与 BNG生成全球 IPv6地址的方式 对应。
本实施例中,接入节点接收用户设备发送的第一邻居请求消息或第一路由 请求消息之后,可以查询该用户设备对应的用户线路信息, 并且将该用户线路 信息携带于第二邻居请求消息或第二路由请求消息中发送给 BNG, 即可以使 得 BNG根据该用户线路信息对用户进行隐式认证, 因此本发明实施例中在 IPv6的情况下可以支持基于用户线路信息的隐式认证;
其次, 在处理全球 IPv6地址的过程中, BNG和用户设备可以才 据用户线 路信息生成全球 IPv6地址, 所以本实施例方案能够实现 IPv6结构下的地址分 配以及接入认证。
下面介绍本发明实施例中的通讯系统实施例, 请参阅图 6, 本发明实施例 中的通讯系统实施例包括:
用户设备 601, 用于向接入节点 602发送第一请求消息, 第一请求消息包 括: 包含链路-局部地址 LLA的第一邻居请求消息;
接入节点 602, 用于接收用户设备 601发送的邻居请求消息, 所述邻居请 求消息中包含 LLA,获取所述用户设备 601对应的用户线路信息; 向 BNG603 发送包含所述 LLA以及所述用户线路信息的第二邻居请求消息; 具体地, 接入节点 602向 BNG603发送包含所述 LLA以及所述用户线路 处理方式:
其中 , LLARelay处理方式中,接入节点 602将 LLA以及用户线路信息分 别携带于第二邻居请求消息中不同位置或不同域,并将该第二邻居请求消息发 送至 BNG603;
LLA Proxy处理方式中 ,接入节点 602将不包含用户线路信息的 LLA转换 为包含用户线路信息的 LLA, 并将该包含用户线路信息的 LLA携带于第二邻 居请求消息中, 将该第二邻居请求消息发送至 BNG603。
BNG603 , 用于接收接入节点 602发送的第二邻居请求消息, 根据所述用 户线路信息向认证授权计费 AAA服务器 604发送接入请求。
本实施例中, BNG603接收到 AAA服务器 604反馈的认证结果之后 , 若 认证结果为认证成功, 则对 LLA执行重复地址探测, 若认证结果为认证失败, 则发送拒绝第二邻居请求消息携带的 LLA的邻居通告消息, 以拒绝所述用户 配置的 LLA;
AAA服务器 604, 用于根据 BNG603发送的接入请求进行接入认证。 上述描述的是 LLA的处理流程, 在全球 IPv6地址处理流程中, 该接入认 证系统还可以包括:
第二接入节点,用于接收用户设备 601发送的路由请求消息,进行 PD Relay 处理, 向 BNG603发送包含所述用户线路信息的第二路由请求消息;
第二 BNG, 用于接收所述第二路由请求消息, 根据所述第二路由请求消 中的用户线路信息向 AAA服务器 604发送接入请求。
上述第二接入节点的功能同样可以在所述接入节点 602中实现,上述第二 BNG的功能同样可以在所述 BNG603中实现。
需要说明的是, 当用户线路信息被置于 LLA中时, 所述接入节点 602还 用于将用户设备 601发送的不包含用户线路信息的 LLA转换为包含用户线路 信息的 LLA, 将 BNG603发送的包含用户线路信息的 LLA转换为不包含用户 线路信息的 LLA。
需要说明的是, 当进行全球 IPv6地址处理时, 所述 BNG603还用于根据 用户线路信息, 所述用户设备所在的在线链路前缀, 和 /或接口标识生成全球 IPv6 地址, 具体的生成过程在前述方法实施例流程中已经进行了详细描述, 此处不再赞述。
请参阅图 7, 本发明实施例中的接入节点实施例包括:
接收单元 701, 用于接收用户设备发送的第一请求消息, 该第一请求消息 可以为邻居请求消息或路由请求消息, 所述第一请求消息中可以包含链路-局 部地址 LLA, 如在邻居请求消息中包含 LLA;
获取单元 702, 用于获取所述用户设备对应的用户线路信息;
发送单元 703, 用于向 BNG发送包含所述用户线路信息的第二请求消息, 所述第二请求消息用于指示所述 BNG进行接入认证。 其中, 如果第一、 第二 请求消息可以为邻居请求消息; 第一、第二请求消息也可以为第二路由请求消 息。 用户线路信息和 LLA (或在线链路前缀)可以设置于同一消息的不同域, 也可以设置于同一域 , 如 LLA域。
本实施例中的接入节点还可以包括:
LLA代理单元 704, 用于所述第一请求消息中携带的 LLA转换为携带用 户线路信息的 LLA,并将该携带用户线路信息的 LLA设置于第二请求消息中; 该 LLA代理单元 704还可以将 BNG发送的携带用户线路信息的 LLA转换为 不包含用户线路信息的 LLA;
和 /或,
LLA中继单元 705, 用于将所述第一请求消息中携带的 LLA以及获取单 元获取到的用户线路信息分别携带于第二请求消息的不同位置或不同域, 即 LLA域和不同于 LLA域的其它域。
本实施例中, 接收单元 701 还用于接收用户设备发送的第一路由请求消 息, 所述第一路由请求消息中携带在线链路前缀, 所述在线链路前缀为所述用 户设备所在的在线链路的前缀标识;
所述发送单元 703还用于向 BNG发送包含所述在线链路前缀以及所述用 户线路信息的第二路由请求消息。
本实施例中的接入节点还可以包括:
PD代理单元 706,用于在 BNG发送的在线链路前缀中添加用户线路信息, 向用户设备发送所述包含用户线路信息的在线链路前缀;
和 /或
PD中继单元 707, 用于将 BNG发送的包含用户线路信息的在线链路前缀 转发至用户设备。
请参阅图 8 , 本发明实施例中的 BNG实施例包括:
请求接收单元 801 , 用于接收接入节点发送的包含用户线路信息的第二请 求消息, 所述第二请求消息可以为第二邻居请求消息和 /或第二路由请求消息; 进一步的, 所述第二请求消息中还可以携带 LLA
接入请求单元 803 , 用于根据所述用户线路信息向认证授权计费 AAA服 务器发送接入请求;
认证结果接收单元 805, 用于接收 AAA服务器发送的认证结果, 若认证 结果为认证成功, 则触发代理重复地址探测单元 802执行判断操作, 若认证结 果为认证失败, 则通知代理重复地址探测单元 802发送邻居通告消息, 以拒绝 用户配置的 LLA;
代理重复地址探测 ( Proxy DAD , Duplicate Address Detection )单元 802 , 用于判断地址緩存中是否存在与所述邻居请求消息中的 LLA匹配的地址; 在实际应用中, 代理重复地址探测单元 802可以根据认证结果接收单元 805的触发进行相应的处理, 具体可以为:
当认证结果接收单元 805从 AAA服务器接收到的认证结果为认证成功时, 则触发代理重复地址探测单元 802进行重复地址探测,即代理重复地址探测单 元 802首先将获取到的 LLA与预置的地址緩存中保存的地址进行比较, 判断 地址緩存中是否存在与该 LLA匹配的地址, 若存在, 则确定地址存在冲突, 并代替匹配地址拥有者发送邻居通告消息,或进行其他异常处理流程, 若不存 在, 则确定地址不存在冲突, 则将邻居请求消息中携带的 LLA加入地址緩存; 当认证结果接收单元 805从 AAA服务器接收到的认证结果为认证失败时, 则通知代理重复地址探测单元 802向用户设备发送邻居通告消息,即代理重复 地址探测单元 802可以按照存在地址冲突处理, 即向用户发送邻居通告消息, 以拒绝用户自动配置的 LLA。
需要说明的是, 上述描述的过程为认证结果接收单元 805根据 AAA服务 器反馈的认证结果控制代理重复地址探测单元 802进行相应处理的情况,可以 理解的是,在实际应用中,具体的重复地址探测操作可以在发起认证之前进行, 即代理重复地址探测单元 802 用于判断地址緩存中是否存在与所述邻居请求 消息中的 LLA匹配的地址, 若存在匹配的地址, 则确定地址存在冲突, 并代 替匹配地址拥有者发送邻居通告消息,或进行其他异常处理流程, 若不存在匹 配的地址, 则确定地址不存在冲突, 则控制接入请求单元 803 据所述用户线 路信息向 AAA服务器发起接入请求, 在此种情况下, 认证结果接收单元 805 仅用于接入请求单元 803向 AAA服务器发起接入请求之后接收 AAA服务器 反馈的认证结果。
请求接收单元 801 还用于接收包含在线链路前缀以及用户线路信息的路 由请求消息, 本实施例中的 BNG还可以包括:
地址生成单元 804, 用于根据所述在线链路前缀, 用户线路信息以及预置 的接口标识执行地址分配流程。
本实施例中 , 地址生成单元 804具体生成全球 IPv6地址的方式可以包括: ( 1 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身带有用户线路信息, 即如图 3所示实施例所描述), 将包含有 用户线路信息的接口标识附加在用户所在在线链路前缀之后, 生成用户的 Global IPv6地址;
( 2 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身不带有线路信息, 即如图 2所示实施例所描述), 并从第二路 由请求消息中获得用户线路信息,将用户线路信息和接口标识组合后,将其附 加在用户所在在线链路前缀之后 , 生成用户的 Global IPv6地址;
( 3 )、 BNG从之前进行 LLA处理过程中的 LLA中提取接口标识(本方 式中的 LLA本身不带有线路信息, 即如图 2所示实施例所描述), 并从第二路 由请求消息中获得用户线路信息, 将用户线路信息作为在线链路前缀的一部 分,将接口标识附加在用户所在带线路信息的在线链路前缀之后, 生成用户的 Global IPv6地址。
上述实施例中 , 由于接入节点接收用户设备发送的第一邻居请求消息或第 一路由请求消息之后,获取与用户设备对应的用户线路信息, 并将该用户线路 信息携带于第二邻居请求消息中发送给 BNG,以指示 BNG进行接入认证操作 , 所以本发明实施例中在 IPv6 的情况下可以支持基于用户线路信息的隐式认 证。
其次, 在处理全球 IPv6地址的过程中 , BNG和用户设备可以根据用户线 路信息生成全球 IPv6地址, 所以本实施例方案能够实现 IPv6结构下的地址分 配以及接入认证。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤 是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可 读存储介质中, 该程序在执行时, 包括如下步骤:
在接入节点上接收用户设备发送的第一请求消息,所述第一请求消息中包 含链路-局部地址 LLA;
获取所述用户设备对应的用户线路信息;
从接入节点向宽带网络网关 BNG发送包含所述 LLA以及所述用户线路信 息的第二请求消息, 所述第二请求消息用于指示所述 BNG进行接入认证。
上述提到的存储介质可以是只读存储器, 磁盘或光盘等。
以上对本发明所提供的一种接入网络的方法、认证方法、通讯系统以及相 关设备进行了详细介绍,对于本领域的一般技术人员,依据本发明实施例的思 想, 在具体实施方式及应用范围上均会有改变之处, 综上所述, 本说明书内容 不应理解为对本发明的限制。

Claims

OP080797 WO 2009/117960 PCT/CN2009/071009 -21 - 权 利 要 求
1、 一种接入网络的方法, 其特征在于, 包括:
在接入节点上接收用户设备发送的第一请求消息,所述第一请求消息中包 含链路-局部地址 LLA;
获取所述用户设备对应的用户线路信息;
从接入节点向宽带网络网关 BNG发送包含所述 LLA以及所述用户线路信 息的第二请求消息, 所述第二请求消息用于指示所述 BNG进行接入认证。
2、 根据权利要求 1所述的方法, 其特征在于,
所述 LLA和所述用户线路信息分别设置于携带 LLA的 LLA域和不同于 LLA i或的其它或;
或,
所述用户线路信息和所述 LLA都设置于所述第二请求消息中携带 LLA的 LLA域。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 所述发送从接入节点 到宽带网络网关 BNG的包含所述 LLA以及所述用户线路信息的第二请求消息 的步骤之后包括:
在接入节点上接收用户设备发送的第一路由请求消息 ,所述第一路由请求 消息中携带在线链路前缀,所述在线链路前缀为所述用户设备所在的在线链路 的前缀标识;
获取所述用户设备对应的用户线路信息;
向 BNG发送包含所述在线链路前缀以及所述用户线路信息的第二路由请 求消息。
4、 根据权利要求 3所述的方法, 其特征在于, 发送第二路由请求消息之 后, 所述方法还包括:
接收来自所述 BNG的路由通告消息, 所述路由通告消息中包含在线链路 前缀;
将路由通告消息中的在线链路前缀转换为携带用户线路信息的在线链路 前缀, 并
向用户设备发送该携带用户线路信息的在线链路前缀。 OP080797
WO 2009/117960 PCT/CN2009/071009
-22-
5、 一种认证方法, 其特征在于, 包括:
接收从接入节点到宽带网络网关 BNG的请求消息, 所述请求消息中携带 有用户线路信息以及链路-局部地址 LLA;
根据所述用户线路信息向认证授权计费 AAA服务器发送接入请求; 接收 AAA服务器反馈的认证结果, 若认证结果为认证成功, 则对 LLA执 行重复地址探测, 若认证结果为认证失败, 则发送邻居通告消息, 以拒绝所述 请求消息中携带的 LLA。
6、 根据权利要求 5所述的方法, 其特征在于, 所述方法还包括: 接收从接入节点到 BNG的路由请求消息, 所述路由请求消息中携带有用 户设备的在线链路前缀;
根据所述在线链路前缀,用户线路信息以及预置的接口标识执行地址分配 流程。
7、 根据权利要求 6所述的方法, 其特征在于, 根据所述在线链路前缀, 用户线路信息以及预置的接口标识执行地址分配流程包括:
根据所述在线链路前缀,用户线路信息以及预置的接口标识生成全球互联 网协议第 6版本 IPv6地址;
经由接入节点向用户设备发送包含用户线路信息和 /或在线链路前缀的路 由通告消息。
8、 一种通讯系统, 其特征在于, 所述通讯系统包括接入节点和宽带网络 网关 BNG, 其中,
接入节点, 用于接收用户设备发送的第一请求消息, 所述第一请求消息中 包含链路-局部地址 LLA; 获取所述用户设备对应的用户线路信息; 向 BNG 发送包含所述 LLA以及所述用户线路信息的第二请求消息;
BNG,用于接收来自接入节点第二请求消息根据所述用户线路信息向认证 授权计费 AAA服务器发送接入请求, 所述接入请求用于指示所述 AAA服务 器进行接入认证。
9、根据权利要求 8所述的通讯系统, 其特征在于, 所述 BNG还用于接收 AAA服务器反馈的认证结果, 若认证结果为认证成功, 则对 LLA执行重复地 址探测, 若认证结果为认证失败, 则发送拒绝第二请求消息携带的 LLA的邻 OP080797
WO 2009/117960 PCT/CN2009/071009
-23 - 居通告消息。
10、 根据权利要求 8或 9所述的通讯系统, 其特征在于,
所述接入节点, 还用于接收用户设备发送的第一路由请求消息, 所述第一 路由请求消息中携带在线链路前缀, 获取所述用户设备对应的用户线路信息 , 向 BNG发送包含所述在线链路前缀以及所述用户线路信息的第二路由请求消 息, 其中, 所述在线链路前缀为所述用户设备所在的在线链路的前缀标识; 所述 BNG, 还用于接收来自接入节点的路由请求消息, 所述路由请求消 息中携带有在线链路前缀,根据所述在线链路前缀, 用户线路信息以及预置的 接口标识执行地址分配流程。
11、 一种接入节点, 其特征在于, 包括
接收单元, 用于接收用户设备发送的第一请求消息, 所述第一请求消息中 包含链路-局部地址 LLA;
获取单元, 用于获取所述用户设备对应的用户线路信息;
发送单元,用于向宽带网络网关 BNG的包含所述 LLA以及所述用户线路 信息的第二请求消息, 所述第二请求消息用于指示所述 BNG进行接入认证。
12、 根据权利要求 11所述的接入节点, 其特征在于, 所述接入节点还包 括:
LLA代理单元, 用于将所述第一请求消息中携带的 LLA转换为携带用户 线路信息的 LLA, 并将该携带用户线路信息的 LLA携带于第二请求消息中; 和 /或
LLA中继单元, 用于将所述第一请求消息中携带的 LLA以及获取单元获 取到的用户线路信息分别携带于第二请求消息的不同位置或不同域。
13、 根据权利要求 11或 12所述的接入节点, 其特征在于, 所述接收单元 还用于接收用户设备发送的第一路由请求消息,所述第一路由请求消息中携带 在线链路前缀, 所述在线链路前缀为所述用户设备所在的在线链路的前缀标 识;
所述发送单元还用于向 BNG发送包含所述在线链路前缀以及所述用户线 路信息的第二路由请求消息。
14、 根据权利要求 13所述的接入节点, 其特征在于, 所述接入节点还包 OP080797
WO 2009/117960 PCT/CN2009/071009
-24- 括:
前缀发现 PD代理单元, 用于在 BNG发送的在线链路前缀中添加用户线 路信息, 向用户设备发送所述包含用户线路信息的在线链路前缀;
和 /或
PD中继单元,用于将 BNG发送的包含用户线路信息的在线链路前缀转发 至用户设备。
15、 一种宽带网络网关, 其特征在于, 包括:
请求接收单元, 用于接收来自接入节点的请求消息, 所述请求消息中携带 有用户线路信息以及 LLA;
接入请求单元, 用于根据所述用户线路信息向认证授权计费 AAA服务器 发送接入请求;
认证结果接收单元, 用于接收 AAA服务器发送的认证结果, 若认证结果 为认证成功, 则触发代理重复地址探测单元执行判断操作, 若认证结果为认证 失败, 则通知代理重复地址探测单元发送邻居通告消息, 以拒绝用户配置的 LLA;
代理重复地址探测单元,用于判断地址緩存中是否存在与所述邻居请求消 息中的 LLA匹配的地址。
16、 根据权利要求 15所述的宽带网络网关, 其特征在于, 所述请求接收 单元还用于接收包含在线链路前缀以及用户线路信息的路由请求消息;
所述宽带网络网关还包括:
地址生成单元, 用于根据所述在线链路前缀, 用户线路信息以及预置的接 口标识执行地址分配流程。
17、 一种接入网络的方法, 应用于互联网协议第六版 IPv6, 其特征在于, 包括:
接收从用户设备到接入节点的第一请求消息 ,所述第一请求消息为第一邻 居请求消息或第一路由请求消息;
获取所述用户设备对应的用户线路信息;
发送从接入节点到宽带网络网关 BNG的包含所述用户线路信息的第二请 求消息, 所述第二请求消息为第二邻居请求消息或第二路由请求消息。 OP080797
WO 2009/117960 PCT/CN2009/071009
-25-
18、 根据权利要求 17所述的方法, 其特征在于, 所述用户线路信息包括: 主机接入物理端口标识, 和 /或逻辑端口标识。
19、 根据权利要求 17或 18所述的方法, 其特征在于, 若所述第一请求消 息为第一邻居请求消息, 第二请求消息为第二邻居请求消息, 则
所述第一邻居请求消息中携带有链路-局部地址 LLA;
所述方法还包括:
将所述 LLA携带于所述第二邻居请求消息中发送至 BNG。
20、 根据权利要求 17或 18所述的方法, 其特征在于, 若所述第一请求消 息为第一路由请求消息, 第二请求消息为第二路由请求消息, 则
所述第一路由请求消息中携带有在线链路前缀,所述在线链路前缀为所述 用户设备所在的在线链路的前缀标识;
所述方法还包括:
将所述在线链路前缀携带于所述第二路由请求消息中发送至 BNG。
PCT/CN2009/071009 2008-03-26 2009-03-25 一种接入网络的方法、认证方法、通讯系统以及相关设备 WO2009117960A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP09725360.3A EP2249538B1 (en) 2008-03-26 2009-03-25 Method for accessing network, authentication method, communication system and related equipment
ES09725360.3T ES2613433T3 (es) 2008-03-26 2009-03-25 Método para acceder a una red, método de autenticación, sistema de comunicación y equipamiento relacionado
US12/883,394 US8594103B2 (en) 2008-03-26 2010-09-16 Network access method, authentication method, communications systems and relevant devices
US14/088,888 US8925067B2 (en) 2008-03-26 2013-11-25 Network access authentication
US14/565,254 US9467447B2 (en) 2008-03-26 2014-12-09 Network access method, authentication method, communications system and relevant devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810084076.1 2008-03-26
CN200810084076.1A CN101547383B (zh) 2008-03-26 2008-03-26 一种接入认证方法及接入认证系统以及相关设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/883,394 Continuation US8594103B2 (en) 2008-03-26 2010-09-16 Network access method, authentication method, communications systems and relevant devices

Publications (1)

Publication Number Publication Date
WO2009117960A1 true WO2009117960A1 (zh) 2009-10-01

Family

ID=41112978

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071009 WO2009117960A1 (zh) 2008-03-26 2009-03-25 一种接入网络的方法、认证方法、通讯系统以及相关设备

Country Status (5)

Country Link
US (3) US8594103B2 (zh)
EP (1) EP2249538B1 (zh)
CN (1) CN101547383B (zh)
ES (1) ES2613433T3 (zh)
WO (1) WO2009117960A1 (zh)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8156542B2 (en) * 2008-04-04 2012-04-10 Cisco Technology, Inc. Conditional data delivery to remote devices
CN102088391B (zh) 2009-12-07 2013-09-11 华为技术有限公司 一种IPv6报文的处理方法、设备和系统
CN102413194B (zh) * 2010-09-20 2015-04-01 中国电信股份有限公司 节点设备、网络接入设备、地址冲突处理方法和系统
CN103392320B (zh) * 2010-12-29 2016-08-31 思杰系统有限公司 对加密项目进行多层标记以提供额外的安全和有效的加密项目确定的系统和方法
CN103546286B (zh) * 2012-07-13 2018-08-24 中兴通讯股份有限公司 认证处理方法及装置
CN102761425B (zh) * 2012-07-20 2018-06-12 中兴通讯股份有限公司 计费方法及装置
US8832433B2 (en) * 2012-08-17 2014-09-09 Cellco Partnership Methods and systems for registering a packet-based address for a mobile device using a fully-qualified domain name (FQDN) for the device in a mobile communication network
CN103781073B (zh) * 2012-10-26 2018-10-19 中兴通讯股份有限公司 移动用户固网的接入方法及系统
CN103796245B (zh) * 2012-10-29 2019-01-25 中兴通讯股份有限公司 数据报文的管理方法、装置及系统
CN102984288B (zh) * 2012-11-19 2017-11-17 中兴通讯股份有限公司 一种自动管理IPv6地址冲突的方法及系统
CN104811414A (zh) * 2014-01-23 2015-07-29 中国电信股份有限公司 物联网节点接入认证方法和系统以及物联网主节点
CN104917849B (zh) 2014-03-11 2018-09-07 华为技术有限公司 一种消息处理方法、接入控制器及网络节点
US9838390B2 (en) * 2015-03-31 2017-12-05 Afero, Inc. System and method for automatic wireless network authentication
CN106357483B (zh) * 2015-07-17 2021-06-01 华为技术有限公司 消息传输方法、接入节点、接入控制器及接入系统
CN106911489B (zh) * 2015-12-22 2019-08-27 中国电信股份有限公司 一种接入设备的自动适配方法、管理装置及系统
US10966104B2 (en) * 2017-05-17 2021-03-30 Huawei Technologies Co., Ltd. Email synchronization method and device
CN109495594B (zh) * 2017-09-11 2022-03-29 华为技术有限公司 一种数据传输方法、pnf sdn控制器、vnf sdn控制器及系统
US11224012B1 (en) 2020-06-18 2022-01-11 T-Mobile Usa, Inc. Simulating continuous millimeter wave band access to a telecommunications network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1677981A (zh) * 2004-03-31 2005-10-05 株式会社东芝 通信设备,名称解析方法和程序
CN1798158A (zh) * 2004-12-21 2006-07-05 华为技术有限公司 一种二次地址分配方法

Family Cites Families (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5652872A (en) * 1994-03-08 1997-07-29 Exponential Technology, Inc. Translator having segment bounds encoding for storage in a TLB
US6611521B1 (en) * 1998-07-14 2003-08-26 International Business Machines Corporation Data link layer extensions to a high latency wireless MAC protocol
GB2341059A (en) * 1998-08-28 2000-03-01 Nokia Oy Ab Internet protocol flow detection
US6253327B1 (en) * 1998-12-02 2001-06-26 Cisco Technology, Inc. Single step network logon based on point to point protocol
JP2000201183A (ja) * 1999-01-08 2000-07-18 Sony Corp デ―タ送信方法
FI109950B (fi) * 2000-01-20 2002-10-31 Nokia Corp Osoitteen saanti
US6539457B1 (en) * 2000-02-21 2003-03-25 Hewlett-Packard Company Cache address conflict mechanism without store buffers
EP1137234A1 (en) * 2000-03-24 2001-09-26 BRITISH TELECOMMUNICATIONS public limited company Internet access arrangement
JP4572476B2 (ja) * 2001-03-13 2010-11-04 ソニー株式会社 通信処理システム、通信処理方法、および通信端末装置、データ転送制御装置、並びにプログラム
US20020162029A1 (en) * 2001-04-25 2002-10-31 Allen Keith Joseph Method and system for broadband network access
US20030026230A1 (en) * 2001-08-02 2003-02-06 Juan-Antonio Ibanez Proxy duplicate address detection for dynamic address allocation
US8090828B2 (en) * 2002-03-05 2012-01-03 Cisco Technology, Inc. Method and apparatus for reusing DHCP addresses in home addresses of mobile IP clients
JP2003348116A (ja) * 2002-05-28 2003-12-05 Hitachi Ltd 家庭内ネットワーク向けアドレス自動設定方式
KR100484145B1 (ko) * 2002-07-05 2005-04-18 삼성전자주식회사 중복 주소 노드에 가상 주소를 자동으로 할당하는 장치 및방법
US7466680B2 (en) * 2002-10-11 2008-12-16 Spyder Navigations L.L.C. Transport efficiency optimization for Mobile IPv6
US7734745B2 (en) * 2002-10-24 2010-06-08 International Business Machines Corporation Method and apparatus for maintaining internet domain name data
KR100547110B1 (ko) * 2002-12-17 2006-01-26 삼성전자주식회사 바인딩 업데이트 메시지 전송 방법 및 바인딩액크놀리지먼트 메시지 전송 방법
US20040156318A1 (en) * 2002-12-23 2004-08-12 Johan Rune Bridging between a Bluetooth scatternet and an Ethernet LAN
US20040167988A1 (en) * 2002-12-23 2004-08-26 Johan Rune Bridging between a Bluetooth scatternet and an Ethernet LAN
US20040156384A1 (en) * 2002-12-23 2004-08-12 Johan Rune Bridging between a Bluetooth scatternet and an Ethernet LAN
US20040151193A1 (en) * 2002-12-23 2004-08-05 Johan Rune Bridging between a Bluetooth scatternet and an Ethernet LAN
US20040153520A1 (en) * 2002-12-23 2004-08-05 Johan Rune Bridging between a bluetooth scatternet and an ethernet LAN
US20040141511A1 (en) * 2002-12-23 2004-07-22 Johan Rune Bridging between a bluetooth scatternet and an ethernet LAN
JP3997159B2 (ja) * 2003-01-07 2007-10-24 キヤノン株式会社 アドレス予約装置、方法、および、プログラム
KR100514742B1 (ko) * 2003-02-06 2005-09-14 삼성전자주식회사 통합 캐시를 이용하여 다음 홉 주소를 결정하는 장치 및 방법
GB2398704B (en) * 2003-02-21 2005-07-06 Toshiba Res Europ Ltd Address autoconfiguration in ad hoc networks
KR100580168B1 (ko) * 2003-03-21 2006-05-16 삼성전자주식회사 다중 홈 에이전트 제어장치 및 방법
KR100524069B1 (ko) * 2003-04-04 2005-10-26 삼성전자주식회사 홈 에이전트 관리장치 및 관리방법
US7343158B2 (en) * 2003-04-16 2008-03-11 Nortel Networks Limited Home agent redirection for mobile IP
JP4054719B2 (ja) * 2003-05-29 2008-03-05 キヤノン株式会社 特定アドレス使用制限装置
GB0312681D0 (en) * 2003-06-03 2003-07-09 Ericsson Telefon Ab L M IP mobility
WO2005011192A1 (ja) * 2003-07-11 2005-02-03 Nippon Telegraph & Telephone アドレスに基づく認証システム、その装置およびプログラム
KR100579834B1 (ko) * 2003-10-20 2006-05-15 삼성전자주식회사 모바일 애드혹 네트워크에서 ip 사이트로컬 프리픽스풀을 이용한 주소 할당방법
US20090222537A1 (en) * 2003-12-04 2009-09-03 Colligo Newworks, Inc., A Canadian Corporation System And Method For Interactive Instant Networking
KR20050057704A (ko) * 2003-12-10 2005-06-16 삼성전자주식회사 핸드오버 방법 및 핸드오버 장치
US7860978B2 (en) * 2004-01-22 2010-12-28 Toshiba America Research, Inc. Establishing a secure tunnel to access router
US7873036B2 (en) * 2004-02-03 2011-01-18 Nokia Siemens Networks Oy Method and apparatus to provide group management of multiple link identifiers for collective mobility
US20070274232A1 (en) * 2004-04-05 2007-11-29 Telefonaktiebolaget Lm Ericsson (Pub) Method, Communication Device and System for Detecting Neighboring Nodes in a Wireless Multihop Network Using Ndp
EP2698965A1 (en) * 2004-04-14 2014-02-19 Microsoft Corporation Mobile IPV6 authentication and authorization
US7567522B2 (en) * 2004-04-23 2009-07-28 Hewlett-Packard Development Company, L.P. Suppression of router advertisement
KR101166765B1 (ko) * 2004-05-07 2012-07-27 엘지전자 주식회사 IPv4 및 IPv6을 지원하기 위한 IP 주소 설정
KR100601673B1 (ko) * 2004-05-10 2006-07-14 삼성전자주식회사 다중 인터페이스들이 탑재된 이동 스테이션에서의 통신방법 및 장치
US20060095546A1 (en) * 2004-10-07 2006-05-04 Nokia Corporation Method and system for locating services in proximity networks for legacy application
CN100474839C (zh) * 2004-10-12 2009-04-01 上海贝尔阿尔卡特股份有限公司 IPv6接入网中的网络服务选择和认证,及无状态自动配置
JP4782139B2 (ja) * 2004-10-26 2011-09-28 テレコム・イタリア・エッセ・ピー・アー モバイルユーザーをトランスペアレントに認証してウェブサービスにアクセスする方法及びシステム
EP1662820A1 (de) * 2004-11-25 2006-05-31 Siemens Aktiengesellschaft Übermittlung Dienst-relevanter Zugangsinformationen bei Authentisierung eines Endgeräts an einer Zugangseinrichtung eines Telekommunikationsnetzes
US20060140177A1 (en) * 2004-12-28 2006-06-29 Nokia Corporation Method and device for setting a route for communication connection
US7583635B2 (en) * 2005-02-18 2009-09-01 Lg Electronics Inc. Establishing network address of mobile terminal in mobile communication system
US20060268902A1 (en) * 2005-05-24 2006-11-30 Cingular Wireless Ii, Llc Dynamic dual-mode service access control, location-based billing, and e911 mechanisms
KR100679037B1 (ko) * 2005-06-28 2007-02-05 삼성전자주식회사 무선 네트워크에서 고속 핸드오버를 수행하는 방법 및 장치
CN1897589B (zh) * 2005-07-13 2010-12-15 上海贝尔阿尔卡特股份有限公司 IPv6无状态地址配置中的接入装置、路由设备及方法
CN100502354C (zh) * 2005-07-29 2009-06-17 华为技术有限公司 一种基于vlan的数据报文传输方法和以太网桥设备
US9088619B2 (en) * 2005-09-14 2015-07-21 Cisco Technology, Inc. Quality of service based on logical port identifier for broadband aggregation networks
ATE484143T1 (de) * 2005-09-30 2010-10-15 Alcyone Holding S A Verfahren und vorrichtung zum aufbau einer verbindung zwischen einer mobilen vorrichtung und einem netzwerk
KR100656378B1 (ko) * 2005-10-15 2006-12-11 한국전자통신연구원 단대단(Point-to-Point)성격의 광대역무선 접속망에서의 lPv6 이웃 탐색 지원 방법 및시스템
CN1984155B (zh) * 2005-12-15 2010-09-15 上海贝尔阿尔卡特股份有限公司 一种IPv6接入网中的域名配置方法及其网络设备
EP1833204A1 (en) * 2006-03-08 2007-09-12 Matsushita Electric Industrial Co., Ltd. Fast configuration of a default router for a mobile node in a mobile communication system
EP1833274A1 (en) * 2006-03-08 2007-09-12 Matsushita Electric Industrial Co., Ltd. Method and system for fast handovers using dynamic router advertisements
US20070223397A1 (en) * 2006-03-24 2007-09-27 Sergey Gerasimov Network configuration
CN101064648A (zh) 2006-04-30 2007-10-31 华为技术有限公司 实现移动IPv6的系统及其用户连接建立方法
US9253151B2 (en) * 2006-05-25 2016-02-02 International Business Machines Corporation Managing authentication requests when accessing networks
US8107396B1 (en) * 2006-07-24 2012-01-31 Cisco Technology, Inc. Host tracking in a layer 2 IP ethernet network
JP4979294B2 (ja) * 2006-07-28 2012-07-18 キヤノン株式会社 通信制御装置、及びその制御方法
US7865727B2 (en) * 2006-08-24 2011-01-04 Cisco Technology, Inc. Authentication for devices located in cable networks
EP2733972B1 (en) * 2006-09-06 2015-07-01 Sharp Kabushiki Kaisha Communication system using network base IP mobility protocol, control apparatus, router and communication method thereof
EP2074800A1 (en) * 2006-10-20 2009-07-01 Panasonic Corporation Methods in mixed network- and host-based mobility management
US7873003B2 (en) * 2006-11-08 2011-01-18 Electronics And Telecommunications Research Institute Method for allocating IP address to mobile station in mobile communication system
US9071666B2 (en) * 2007-04-26 2015-06-30 Alcatel Lucent Edge router and method for dynamic learning of an end device MAC address
JP2010527549A (ja) * 2007-05-16 2010-08-12 パナソニック株式会社 ネットワーク・ベースおよびホスト・ベース混合型のモビリティ管理における方法
US8533455B2 (en) * 2007-05-30 2013-09-10 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for combining internet protocol authentication and mobility signaling
US8559321B2 (en) * 2007-06-08 2013-10-15 Qualcomm Incorporated Mobile IP home agent discovery
US9602332B2 (en) * 2007-06-15 2017-03-21 Qualcomm Incorporated Method and apparatus for DNS update triggered IPv6 neighbor advertisement
EP2037652A3 (en) * 2007-06-19 2009-05-27 Panasonic Corporation Methods and apparatuses for detecting whether user equipment resides in a trusted or a non-trusted access network
EP2015535A1 (en) * 2007-07-10 2009-01-14 Panasonic Corporation Detection of mobility functions implemented in a mobile node
US7877368B2 (en) * 2007-11-02 2011-01-25 Paglo Labs, Inc. Hosted searching of private local area network information with support for add-on applications
JP2011504698A (ja) * 2007-11-23 2011-02-10 テレフオンアクチーボラゲット エル エム エリクソン(パブル) 無線lanモビリティ
US8161541B2 (en) * 2007-12-13 2012-04-17 Alcatel Lucent Ethernet connectivity fault management with user verification option
WO2009089643A1 (en) * 2008-01-14 2009-07-23 Lucent Technologies Inc. Method for detecting a duplicate address, mobile station, network element and communication system
EP2253153A1 (en) * 2008-03-03 2010-11-24 Panasonic Corporation Information exchange between gateways for route optimization with network-based mobility management
US8619797B2 (en) * 2009-05-12 2013-12-31 Futurewei Technologies, Inc. Using internet protocol version six (IPv6) tunnel for access identifier transport
US8705503B2 (en) * 2010-11-22 2014-04-22 At&T Intellectual Property I, L.P. Apparatus and method of automatically provisioning a femtocell

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1677981A (zh) * 2004-03-31 2005-10-05 株式会社东芝 通信设备,名称解析方法和程序
CN1798158A (zh) * 2004-12-21 2006-07-05 华为技术有限公司 一种二次地址分配方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2249538A4 *

Also Published As

Publication number Publication date
US8594103B2 (en) 2013-11-26
EP2249538A4 (en) 2011-08-31
ES2613433T3 (es) 2017-05-24
EP2249538A1 (en) 2010-11-10
EP2249538B1 (en) 2016-11-16
US20110002342A1 (en) 2011-01-06
CN101547383B (zh) 2013-06-05
US20140090029A1 (en) 2014-03-27
US8925067B2 (en) 2014-12-30
CN101547383A (zh) 2009-09-30
US9467447B2 (en) 2016-10-11
US20150095991A1 (en) 2015-04-02

Similar Documents

Publication Publication Date Title
WO2009117960A1 (zh) 一种接入网络的方法、认证方法、通讯系统以及相关设备
US7616615B2 (en) Packet forwarding apparatus for connecting mobile terminal to ISP network
US7733859B2 (en) Apparatus and method for packet forwarding in layer 2 network
US9705706B2 (en) Multiple prefix connections with translated virtual local area network
KR100442594B1 (ko) 무선통신 시스템의 패킷 데이터 서비스 방법 및 장치
EP2364543B1 (en) Broadband network access
US8189567B2 (en) Method and nodes for registering a terminal
JP4938834B2 (ja) アドレス取得
US9407495B2 (en) Combining locally addressed devices and wide area network (WAN) addressed devices on a single network
WO2007009367A1 (fr) Méthode de détection de doublons d’adresse dans un réseau d’accès deux couches ipv6 et système pour celle-ci
US20190394647A1 (en) Communication system, connection control apparatus, mobile terminal, base station control method, service request method, and program
WO2012130085A1 (zh) 与网管系统建立连接的方法、设备及通信系统
WO2009117963A1 (zh) 地址配置方法、装置和系统
US20140313933A1 (en) Method, apparatus, and system for layer 2 interworking based on ipv6
WO2009046666A1 (en) Addressing method of policy decision function entity, network element and network system
JP2012503388A (ja) 多重インターネット・アクセスを提供する方法およびゲートウェイ
WO2015018069A1 (zh) 网络终端获取业务的方法、设备、系统
WO2012041168A1 (zh) 用于IPv6网络的网络连接处理方法及其装置
JP2004312482A (ja) ネットワークシステム、網内識別子の設定方法、アクセス認証情報管理装置、そのプログラム、ネットワーク接続点、網内識別子の設定プログラム、及び記録媒体
WO2011032478A1 (zh) 一种获取终端身份标识的方法、装置及终端
WO2010022535A1 (zh) 一种在ipv6接入节点中数据包转发的方法和装置
JP5261432B2 (ja) 通信システム、パケット転送方法、ネットワーク交換装置、アクセス制御装置、及びプログラム
WO2010078809A1 (zh) 获取IPv6地址信息的方法、网关、服务器及系统
US20050102410A1 (en) Communication system
JP2010268356A (ja) ゲートウェイ装置、中継方法、中継プログラム及び記録媒体

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09725360

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 3406/KOLNP/2010

Country of ref document: IN

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2009725360

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009725360

Country of ref document: EP