WO2011147353A1 - 一种报文发送方法及装置 - Google Patents

一种报文发送方法及装置 Download PDF

Info

Publication number
WO2011147353A1
WO2011147353A1 PCT/CN2011/075289 CN2011075289W WO2011147353A1 WO 2011147353 A1 WO2011147353 A1 WO 2011147353A1 CN 2011075289 W CN2011075289 W CN 2011075289W WO 2011147353 A1 WO2011147353 A1 WO 2011147353A1
Authority
WO
WIPO (PCT)
Prior art keywords
address
network
nat
external
sent
Prior art date
Application number
PCT/CN2011/075289
Other languages
English (en)
French (fr)
Inventor
卢绪山
周倩
彭军
邹婷
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP11786125.2A priority Critical patent/EP2645679B1/en
Publication of WO2011147353A1 publication Critical patent/WO2011147353A1/zh
Priority to US13/902,243 priority patent/US20130279519A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2517Translation of Internet protocol [IP] addresses using port numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • H04L69/085Protocols for interworking; Protocol conversion specially adapted for interworking of IP-based networks with other networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/5014Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]

Definitions

  • NAT devices must support tens of thousands or more users.
  • a user device needs to send packets to the external network, multiple links need to be established on the corresponding NAT device. Each link needs to be established on the corresponding NAT device.
  • the NAT entry causes the NAT device to have a heavy burden and fewer users.
  • a method for sending a message including:
  • a message sending device includes:
  • the message receiving unit is configured to receive a forward message sent by the internal network device to the external network or a reverse message sent by the external network to the internal network device;
  • the external network forward packet sending unit is configured to: forward the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry according to the network address, and send the intranet device to the forward direction of the external network.
  • the source address of the packet is replaced with the public IP address and sent.
  • the external network reverse packet sending unit is configured to perform a reverse report of sending the external network to the internal network device according to the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry according to the network address translation
  • the destination public IP address is replaced with the private network IP address of the intranet device and sent.
  • a method for sending a message including:
  • the source port number of the forward packet is replaced with the external port range, and the source address is replaced with the private network IP address of the intranet device.
  • a message sending device includes:
  • a message receiving unit configured to receive a forward packet sent by the user equipment to the external network
  • the intranet forward packet sending unit is configured to replace the source port number of the forward packet with the external port range, and replace the source address with the private network IP address of the intranet device.
  • the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry according to the network address are forwarded on the NAT device.
  • the source address of the packet is replaced with the public IP address
  • the destination public IP address of the reverse packet is replaced with the private IP address of the intranet device. That is, when the user accesses the external network, only the intranet device goes online every time.
  • the NAT device establishes an entry. When a subsequent packet is sent, the link does not need to be established. Establishing an entry reduces the number of NAT entries established on the NAT device. This allows the NAT device to support more users and reduce the number of NAT devices.
  • FIG. 2 is a schematic flow chart of a method for sending a message on an intranet device end according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a signaling process for a user equipment to perform packet transmission by using an intranet device and a NAT device with an external network according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a method for an intranet device to apply for an external port range and a method for transmitting packets by an intranet device and an external network according to an embodiment of the present disclosure
  • FIG. 5 is a schematic structural diagram of an apparatus for sending a message according to an embodiment of the present invention.
  • the technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. example. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
  • An embodiment of the present invention provides a packet sending method, as shown in FIG. 1 , which may specifically include: Step 1 1. Receive a forward packet sent by the intranet device to the external network.
  • the user equipment when the user equipment sends a forward packet to the external network, the user equipment first sends the forward packet to the NAT device, and the NAT device receives the forward packet.
  • Step 12 After the source IP address of the internal network device, the external port range, and the public network IP address, the source address of the forward packet is replaced with the public network IP address, and then sent;
  • the NAT device establishes a NAT entry for the internal network device when the internal network device is online.
  • the NAT entry includes the private network IP address of the internal network device, and the external port range and the public port allocated for the internal network device.
  • the network IP address is replaced with the public IP address of the forward packet and then sent to the external network.
  • Step 13 receiving a reverse packet sent by the external network to the internal network device
  • the reverse packet is first sent to the NAT device, and the NAT device receives the reverse packet.
  • Step 14 Replace the destination public IP address of the reverse packet sent by the external network to the internal network device with the internal network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry.
  • the device sends the private IP address of the device.
  • the NAT device establishes a NAT entry for the internal network device when the internal network device is online.
  • the NAT entry includes the private network IP address of the internal network device, and the external port range and the public port allocated for the internal network device.
  • the IP address of the network is replaced with the private IP address of the internal network device and then sent to the internal network device.
  • An embodiment of the present invention further provides a packet sending method, as shown in FIG. 2, which may specifically include:
  • Step 21 Receive a forward packet sent by the user equipment to the external network.
  • the forward packet is sent to the connected intranet device, and the intranet device receives the forward packet.
  • Step 22 Replace the source port number of the forward packet with the external port range, and the source address. It is sent after being replaced with the private IP address of the intranet device.
  • the intranet device after receiving the forward packet sent by the intranet device to the external network, the intranet device replaces the source port number of the forward packet with the external port range allocated by the NAT device, and replaces the source address with the inner address.
  • the private IP address of the network device is sent to the NAT device.
  • the specific signaling procedure may refer to FIG. 3, and the related devices include the user equipment, the intranet device, and the NAT.
  • the device may be a CPE (Customer Premises Equipment), and the NAT device may be a Carrier-Grade NAT (Carrier-Grade NAT).
  • the CPE is a bridged type, the user equipment needs to support the function of the CPE.
  • the internal network device is the user equipment itself.
  • the CGN needs to be encapsulated in a tunnel. Reconciliation encapsulation.
  • the specific process can include:
  • Step 41 The intranet device obtains a private network IP address of the intranet device.
  • the intranet device for example, CPE
  • the intranet device for example, CPE
  • DHCP Dynamic Host Configuration Protocol
  • PPPoE Dynamic Host Configuration Protocol
  • the IP address of the network After obtaining the IP address of the private network, send an online notification to the NAT device (for example, CGN).
  • the NAT device for example, CGN
  • Step 42 the intranet device sends a request message for acquiring the range of the external port through the NAT to the NAT device;
  • the intranet device sends a request message to the NAT device, where the request message carries the private network IP address of the intranet device, so that the NAT device can obtain the intranet device.
  • the private network IP address, the request message may be a request message based on a PCP (Pinhole Control Protocol), which may be a Pinhole Request message or a DHCP-based request message, and may be a DHCP discover message.
  • the request message is used to negotiate with the NAT device and obtain an external port range, where the external port range is used for the external port range of the intranet device to the NAT device and the NAT device is sent to the external network.
  • the external port range, the range of the external port that the intranet device sends to the NAT device is the same as the range of the external port that the NAT device sends to the external network.
  • the carrier-grade NAT device is often a public network of the NAT
  • the public network address of the user equipment after the NAT is randomly selected in the pool, and the single user equipment cannot be guaranteed after the NAT is performed.
  • the public network address is the same IP address.
  • the public network addresses after multiple NAT connections need to be the same IP address. If the address is not the same address, the connection cannot be established. . Therefore, the intranet device can further negotiate the public IP address of the packet sent by the user equipment connected to the intranet device after passing through the NAT, so that the user equipment can use the same IP address in subsequent connections, thereby avoiding the inability to establish a connection. The situation arises.
  • Step 43 According to the request message sent by the received intranet device, allocate an external port range sent by the intranet device to the NAT device and an external port range sent by the NAT device to the external network, and an external port range and NAT sent by the intranet device to the NAT device.
  • the external port of the device sent to the external network has the same range, and sends a response message including the range of the external port to the internal network device;
  • the NAT device allocates the range of the external port that the intranet device sends to the NAT device and the range of the external port that the NAT device sends to the external network according to the situation of the user equipment.
  • the external port range such as 2000 ⁇ 3000 and 4000 ⁇ 5000, is usually established when the intranet device accesses the external network address. Each link will create an entry on the NAT device.
  • the NAT device allocates an entry to the external port range of the same intranet device to the NAT device and the external port range that the NAT device sends to the external network, that is, when the intranet device accesses the external network, the NAT device establishes an entry only when the internal network device goes online.
  • the device When a link is sent, the device does not need to create an entry, and the external port is selected from the external port range. This reduces the number of NAT entries established on the NAT device, and synchronizes the intranet device when the NAT device ages.
  • the NAT device. sends the assigned external port range to the intranet device in the form of a response message, which may be a Pinhole Response.
  • DHCP offer message or information. In this case, the range of external ports that the NAT device can allocate is exhausted. An error response message can be returned to the intranet device.
  • the external port range can be dynamically negotiated.
  • the NAT device also assigns a public network IP address corresponding to the internal network device, and in some cases, the public network IP address is carried in the response message and sent to the internal network device.
  • the certain situation may be that the internal network device is The request message further requests to negotiate the public network IP address. Informing the internal network device of the converted public network IP address, in addition to enabling the user equipment connected to the internal network device to use the same IP address in subsequent connections, thereby avoiding the situation that the connection cannot be established, and effectively utilizing the internal network device.
  • the existing ALG Application Level Gateway
  • has a relatively strong advantage so that the NAT device does not need the corresponding ALG.
  • Step 44 The NAT device establishes a NAT entry according to the external port range.
  • the NAT device when the NAT device allocates the range of the external port of the intranet device to the NAT device and the range of the external port that the NAT device sends to the external network, and the corresponding public IP address, the NAT device establishes a corresponding The NAT entry includes the private network IP address of the intranet device, the external port range of the intranet device to the NAT device, the public IP address, and the range of the external port that the NAT device sends to the external network.
  • the range of the external port that the intranet device sends to the NAT device is the same as the range of the external port that the NAT device sends to the external network.
  • Step 45 The intranet device obtains a response message from the NAT device, where the response message includes an external port range after the NAT;
  • the intranet device after receiving the response message sent by the NAT device, the intranet device saves the corresponding external port range. If the public network IP address is applied in step 42, the public network IP address is also saved.
  • Step 46 The intranet device receives the forward packet sent by the user equipment to the external network, replaces the source port number of the forward packet with the external port range, and replaces the source address with the private network IP address of the intranet device. Send
  • the forward packet is first sent to the internal network device, where the forward packet includes the source address, the destination address, the source port number, and the destination port. number.
  • the intranet device After receiving the forward packet sent by the user equipment to the external network, the intranet device will source the port number. After the external port range is replaced with the private IP address of the intranet device, the forward packet is sent from the port in the range of the external port to the NAT device.
  • Step 47 The NAT device receives the forward packet sent by the intranet device to the external network, and converts the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry according to the network address, and the forward direction is forwarded.
  • the source address of the packet is replaced with the public IP address and sent.
  • the NAT device searches for the saved NAT entry, and finds the private network IP address and the external port range of the intranet device of the forward packet. After the source address is replaced with the public IP address of the matching entry, the forward packet is sent from the port in the range of the external port to the external network.
  • Step 48 The NAT device receives the reverse packet sent by the external network to the intranet device, and converts the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry according to the network address, and the external network
  • the destination public IP address of the reverse packet sent to the internal network device is replaced by the private network IP address of the internal network device.
  • the NAT device receives the reverse packet sent by the external network to the intranet device, where the reverse packet includes the source address, the destination address, and the source. Port number and destination port number.
  • the destination address is the public IP address.
  • the NAT device searches for the saved NAT entry, and finds the entry that matches the destination public IP address and the destination port number in the range of the external port range, and replaces the destination public IP address with the intranet device of the matching entry. After the private IP address, the reverse packet is sent to the intranet device.
  • the source address of the forward packet is replaced with the public network IP address on the NAT device by converting the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry according to the network address.
  • the destination public IP address of the reverse packet is replaced with the private IP address of the intranet device.
  • the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • the embodiment of the present invention further provides a message sending apparatus.
  • the apparatus may include an external network receiving unit 51, an external network forward message sending unit 52, and an external network reverse report at the NAT device end.
  • the external network receiving unit 51 is configured to receive a forward message sent by the internal network device to the external network or receive a reverse message sent by the external network to the internal network device.
  • the external network forward packet sending unit 52 is configured to send the source address of the forward packet of the intranet device to the external network according to the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry. It is sent after being replaced with the public IP address.
  • the reverse network sending unit 53 is configured to send the reverse packet sent by the external network to the internal network device according to the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry.
  • the destination public IP address is replaced with the private IP address of the intranet device and sent.
  • the device may include an intranet receiving unit 54 and an intranet forward message transmitting unit 55 on the internal network device end.
  • the intranet receiving unit 54 is configured to receive a forward packet sent by the user equipment to the external network.
  • the intranet forward packet sending unit 55 is configured to replace the source port number of the forward packet with the external port range, and replace the source address with the private network IP address of the intranet device.
  • the NAT device may further include a port allocating unit 56, a NAT entry establishing unit 57, and a public network address assigning unit 58.
  • the port assigning unit 56 is configured to allocate the intranet device according to the received request message sent by the intranet device.
  • the range of the external port that the intranet device sends to the NAT device is the same as the range of the external port that the NAT device sends to the external network, and sends the external port to the internal device.
  • the NAT entry establishing unit 57 is configured to establish a NAT entry according to the external port range;
  • the IP address of the public network and the IP address of the public network are carried in the response message to the internal network device.
  • the certain situation may be that the intranet device further requests to negotiate the public network IP address in the request message.
  • the requesting unit sending unit 59, the response message obtaining unit 510, and the private network address obtaining unit 511 may be configured to send the request message sending unit 59 before receiving the forward message sent by the user equipment to the external network.
  • the request message of the external port range after the NAT is obtained; the response message obtaining unit 510 is configured to obtain the response message, and the response message includes the external port range after the NAT; the private network address obtaining unit 511 is configured to acquire the private network of the intranet device. IP address, and carries the private network IP address of the intranet device in the request message.
  • the corresponding NAT entry establishing unit is specifically configured to establish an entry including a private network IP address, an external port range, and a public network IP address of the internal network device.
  • the corresponding request message further includes obtaining the public network IP address converted by the NAT device.
  • the source address of the forward packet is replaced with the public network IP address on the NAT device by converting the private network IP address, the external port range, and the public network IP address of the intranet device included in the NAT entry according to the network address.
  • the destination public IP address of the reverse packet is replaced with the private IP address of the intranet device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Description

一种报文发送方法及装置 本申请要求于 2010年 11月 25日提交中国专利局、 申请号为 CN201010591093.1 , 发明名称为 "一种报文发送方法及装置" 的中国专 利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域 本发明属于网络通信技术领域, 涉及一种报文发送方法及装置。 背景技术 随着 IPv6的演进及 IPv4地址即将耗尽, 以及整个产业链的 IPv6演进相 对滞后, IPv4和 IPv6将会长期共存。 目前普遍使用的解决方案是规模部署 NAT(Network Address Translation , 网络地址转换)设备, 通常情况下一个
NAT设备都要支持几万甚至更多的用户, 当一个用户设备需要向外网发送 报文时, 需要在相应的 NAT设备上建立多个链接, 每个链接都需要在相应 的 NAT设备上建立 NAT表项, 导致 NAT设备存在负担较重、 支持的用户较 少的问题。 发明内容 本发明的实施例提供了一种报文发送方法及装置, 能够减少 NAT设备 的负担, 使 NAT设备能够支持更多的用户。
一种报文发送方法, 包括:
接收内网设备发往外网的正向报文;
根据网络地址转换 NAT表项包含的内网设备的私网 IP地址、 外部端口 范围和公网 IP地址, 将所述正向报文的源地址替换为公网 IP地址后发送; 或者, 接收外网发往内网设备的反向报文;
根据网络地址转换 NAT表项包含的内网设备的私网 IP地址、 外部端口 范围和公网 IP地址,将外网发往内网设备的反向报文的目的公网 IP地址替换 为内网设备的私网 IP地址后发送。
一种报文发送装置, 包括:
报文接收单元, 用于接收内网设备发往外网的正向报文或者接收外网 发往内网设备的反向报文;
外网正向报文发送单元, 用于根据网络地址转换 NAT表项包含的内网 设备的私网 IP地址、外部端口范围和公网 IP地址,将内网设备发往外网的所 述正向报文的源地址替换为公网 IP地址后发送;
外网反向报文发送单元, 用于根据网络地址转换 NAT表项包含的内网 设备的私网 IP地址、外部端口范围和公网 IP地址,将外网发往内网设备的反 向报文的目的公网 IP地址替换为内网设备的私网 IP地址后发送。
一种报文发送方法, 包括:
接收用户设备发往外网的正向报文;
将所述正向报文的源端口号替换为外部端口范围, 以及将源地址替换 为内网设备的私网 IP地址后发送。
一种报文发送装置, 包括:
报文接收单元, 用于接收用户设备发往外网的正向报文;
内网正向报文发送单元, 用于将所述正向报文的源端口号替换为外部 端口范围, 以及将源地址替换为内网设备的私网 IP地址后发送。
由上述本发明的实施例提供的技术方案可以看出, 通过根据网络地址 转换 NAT表项包含的内网设备的私网 IP地址、 外部端口范围和公网 IP地址, 在 NAT设备上将正向报文的源地址替换为公网 IP地址、 将反向报文的目的 公网 IP地址替换为内网设备的私网 IP地址,即用户访问外网时只在内网设备 每次上线时, NAT设备建立一个表项, 后续发送报文建立链接时, 不需再 建立表项, 减少了 NAT设备中建立 NAT表项的数量, 从而使 NAT设备可以 支持更多的用户, 减少 NAT设备的数量, 而且在 NAT设备老化的时候可以 同步内网设备和 NAT设备。 附图说明 为了更清楚地说明本发明实施例的技术方案, 下面将对实施例描述中 所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是 本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳 动性的前提下, 还可以根据这些附图获得其他的附图。 图;
图 2为本发明的实施例提供的在内网设备端发送报文的方法流程示意 图;
图 3为本发明的实施例提供的用户设备通过内网设备和 NAT设备与外 网进行报文传输的信令流程示意图;
图 4为本发明的实施例提供的内网设备申请外部端口范围及内网设备 与外网传输报文的方法的流程示意图;
图 5为本发明的实施例提供的发送报文的装置结构示意图。 具体实施方式 下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进 行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没 有作出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的 范围。
本发明的实施例提供了一种报文发送方法,如图 1所示,具体可以包括: 步骤 1 1, 接收内网设备发往外网的正向报文;
具体的, 当用户设备向外网发送正向报文时, 首先通过内网设备将正 向报文发送给 NAT设备, NAT设备则接收该正向报文。
步骤 12, 根据 NAT表项包含的内网设备的私网 IP地址、 外部端口范围 和公网 IP地址, 将正向报文的源地址替换为公网 IP地址后发送;
具体的, NAT设备会在内网设备上线时为内网设备建立 NAT表项, 在 NAT表项中包含了该内网设备的私网 IP地址、 为该内网设备分配的外部端 口范围和公网 IP地址, 在接收到内网设备发往外网的正向报文后, 将该正 向报文的源地址替换为公网 IP地址后发送到外网。
或者,
步骤 13, 接收外网发往内网设备的反向报文;
具体的, 当外网向内网设备发送反向报文时, 首先将反向报文发送到 NAT设备上, NAT设备则接收该反向报文。
步骤 14, 根据 NAT表项包含的内网设备的私网 IP地址、 外部端口范围 和公网 IP地址,将外网发往内网设备的反向报文的目的公网 IP地址替换为内 网设备的私网 IP地址后发送。
具体的, NAT设备会在内网设备上线时为内网设备建立 NAT表项, 在 NAT表项中包含了该内网设备的私网 IP地址、 为该内网设备分配的外部端 口范围和公网 IP地址, 在接收到外网发往内网设备的反向报文后, 将该反 向报文的目的公网 IP地址替换为内网设备的私网 IP地址后发送给内网设备。
本发明的实施例还提供了一种报文发送方法, 如图 2所示, 具体可以包 括:
步骤 21, 接收用户设备发往外网的正向报文。
具体的, 当用户设备向外网发送正向报文时, 首先将该正向报文发送 到连接的内网设备上, 内网设备则接收该正向报文。
步骤 22, 将正向报文的源端口号替换为外部端口范围, 以及将源地址 替换为内网设备的私网 IP地址后发送。
具体的, 在接收到内网设备发往外网的正向报文后, 内网设备将该正 向报文的源端口号替换为 NAT设备分配的外部端口范围, 以及将源地址替 换为该内网设备的私网 IP地址后发送给 NAT设备。
下面以一个用户设备通过内网设备和 NAT设备与外网进行报文传输的 过程对本实施例作进一步说明, 具体的信令流程可以参考图 3, 涉及的设备 包括用户设备、 内网设备和 NAT设备, 其中内网设备可以是 CPE(Customer Premises Equipment,用户前端设备), NAT设备可以是 CGN(Carrier-Grade NAT,运营级 NAT)。其中, 当 CPE是桥接型时,用户设备需要支持其中 CPE 的功能, 即此时, 内网设备为用户设备本身; 若在 CPE与 CGN之间采用隧 道方式的场景, 则 CGN需要做隧道的封装和解封装。 如图 4所示, 具体的过 程可以包括:
步骤 41, 内网设备获取该内网设备的私网 IP地址;
具体的, 当内网设备 (如: CPE)上线时,可以通过 DHCP(Dynamic Host Configuration Protocol , 动态主机配置协议)获取该内网设备所在私网的 IP 地址, 也可以使用 PPPoE的方式获取所在私网的 IP地址。 获取到所在私网 的 IP地址后, 向 NAT设备 (如: CGN)发送上线通知。
步骤 42, 内网设备向 NAT设备发送用于获取经过 NAT的外部端口范围 的请求消息;
具体的, 内网设备获取该内网设备的私网 IP地址后, 向 NAT设备发送 一个请求消息, 该请求消息携带该内网设备的私网 IP地址, 以使 NAT设备 可以获取该内网设备的私网 IP地址, 该请求消息可以是基于 PCP(Pinhole Control Protocol , 端口映射控制协议)的请求消息, 具体可以为 Pinhole Request消息,也可以是基于 DHCP的请求消息,具体可以为 DHCP discover 消息。 该请求消息用于与 NAT设备协商并获得一个外部端口范围, 该外部 端口范围用于内网设备发往 NAT设备的外部端口范围和 NAT设备发往外网 的外部端口范围, 该内网设备发往 NAT设备的外部端口范围和 NAT设备发 往外网的外部端口范围相同。
进一步地, 由于运营商级的 NAT设备 (CGN)往往是有 NAT公网池的,用 户设备在进行 NAT后的公网地址是在该池中随机选取, 不能保证单个用户 设备在进行 NAT后的公网地址是同一个 I P地址, 而现网中存在很多应用需 要建立多个连接, 多个连接在做 NAT后的公网地址需要是同一个 IP地址, 如果不是同一个地址会出现连接不能建立。 因此内网设备可以进一步协商 与该内网设备连接的用户设备发送的报文经过 NAT后的公网 IP地址, 这样 在该用户设备在后续连接也能够使用同一个 IP地址, 避免了不能建立连接 的情况出现。
步骤 43,根据接收的内网设备发送的请求消息,分配内网设备发往 NAT 设备的外部端口范围和 NAT设备发往外网的外部端口范围, 内网设备发往 NAT设备的外部端口范围和 NAT设备发往外网的外部端口范围相同, 并向 内网设备发送包括外部端口范围的响应消息;
具体的, NAT设备在接收到内网设备发送的请求消息后, 会根据用户 设备的情况分配内网设备发往 NAT设备的外部端口范围和 NAT设备发往外 网的外部端口范围(可以分配不连续的外部端口范围, 如 2000~3000 和 4000~5000等, 由于当内网设备访问外网地址时, 一般都会建立 100~300 个链接, 每个链接都会在 NAT设备上建立一个表项, 而通过分配相同的内 网设备发往 NAT设备的外部端口范围和 NAT设备发往外网的外部端口范 围, 即内网设备访问外网时只在内网设备每次上线时, NAT设备建立一个 表项, 后续发送报文建立链接时, 不需再建立表项, 从外部端口范围中选 取外部端口发送, 减少了 NAT设备中建立 NAT表项的数量, 而且在 NAT 设备老化的时候可以同步内网设备和 NAT设备。 ), 并将分配的外部端口范 围以响应消息的形式发送给内网设备,具体可以为 Pinhole Response消息 或 DHCP offer消息。 如此时 NAT设备能够分配的外部端口范围已经用完, 则可以向内网设备返回错误响应消息。 另外, 如果后续用户数增加, 申请 的外部端口范围不够, 可动态协商增加外部端口范围。
NAT设备也会分配一个对应内网设备的公网 IP地址,并在一定情况下 把该公网 IP地址携带在在响应消息中一并发送给内网设备, 该一定情况可 以为内网设备在请求消息中进一步请求协商了公网 IP地址。 把转换后的公 网 IP地址告知内网设备, 除了可以使该内网设备连接的用户设备在后续连 接能够使用同一个 IP地址, 避免了不能建立连接的情况出现, 还可以有效 利用内网设备现有的 ALG (Application Level Gateway, 应用层网关)功能 相对较强的优势, 使 NAT设备不需要相应的 ALG。
步骤 44, NAT设备根据外部端口范围建立 NAT表项;
具体的, 当 NAT设备为内网设备分配完内网设备发往 NAT设备的外部 端口范围和 NAT设备发往外网的外部端口范围, 以及相应的公网 IP地址后, 会在 NAT设备中建立相应的 NAT表项, 该 NAT表项包括内网设备的私网 IP 地址、 内网设备发往 NAT设备的外部端口范围、 公网 IP地址、 NAT设备发 往外网的外部端口范围。 其中, 内网设备发往 NAT设备的外部端口范围和 NAT设备发往外网的外部端口范围相同。
步骤 45, 内网设备从 NAT设备获取响应消息, 响应消息包括经过 NAT 后的外部端口范围;
具体的, 内网设备接收 NAT设备发送的响应消息后会保存相应的外部 端口范围。 如果在步骤 42中申请了公网 IP地址, 则同时保存该公网 IP地址。
步骤 46, 内网设备接收用户设备发往外网的正向报文, 并将该正向报 文的源端口号替换为外部端口范围, 以及将源地址替换为内网设备的私网 IP地址后发送;
具体的, 当用户设备需要向外网发送正向报文时, 会先将该正向报文 发送到内网设备, 该正向报文包括了源地址、 目的地址、 源端口号和目的 端口号。 内网设备接收到用户设备向外网发送的正向报文后, 将源端口号 替换为外部端口范围、 将源地址替换为内网设备的私网 IP地址后, 将正向 报文从在该外部端口范围内的某个端口发送给 NAT设备。
步骤 47, NAT设备接收内网设备发往外网的正向报文, 并根据网络地 址转换 NAT表项包含的内网设备的私网 IP地址、 外部端口范围和公网 IP地 址, 将该正向报文的源地址替换为公网 IP地址后发送;
具体的, NAT设备接收内网设备发往外网的正向报文后, NAT设备查 找保存的 NAT表项, 找到与该正向报文的内网设备的私网 IP地址和外部端 口范围匹配的表项, 将源地址替换为匹配表项的公网 IP地址后, 将正向报 文从在该外部端口范围内的某个端口发送到外网。
步骤 48, NAT设备接收外网发往内网设备的反向报文, 并根据网络地 址转换 NAT表项包含的内网设备的私网 IP地址、 外部端口范围和公网 IP地 址, 将外网发往内网设备的反向报文的目的公网 IP地址替换为内网设备的 私网 IP地址后发送。
具体的, 当外网通过 NAT设备向内网设备发送反向报文时, NAT设备 接收外网发往内网设备的反向报文, 该反向报文包括了源地址、 目的地址、 源端口号和目的端口号, 该目的地址是公网 IP地址。 NAT设备查找保存的 NAT表项, 找到与该目的公网 IP地址, 及目的端口号在范围内的外部端口 范围相匹配的表项,将目的公网 IP地址替换为匹配表项的内网设备的私网 IP 地址后将反向报文发送到内网设备。
本实施例通过根据网络地址转换 NAT表项包含的内网设备的私网 IP地 址、 外部端口范围和公网 IP地址, 在 NAT设备上将正向报文的源地址替换 为公网 IP地址、 将反向报文的目的公网 IP地址替换为内网设备的私网 IP地 址, 即用户访问外网时只在内网设备每次上线时, NAT设备建立一个表项, 后续发送报文建立链接时, 不需再建立表项, 减少了 NAT设备中建立 NAT 表项的数量, 从而使 NAT设备可以支持更多的用户, 减少 NAT设备的数量, 而且在 NAT设备老化的时候可以同步内网设备和 NAT设备。 本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流 程, 是可以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储 于一计算机可读取存储介质中, 该程序在执行时, 可包括如上述各方法的 实施例的流程。 其中, 所述的存储介质可为磁碟、 光盘、 只读存储记忆体
( Read-Only Memory , ROM ) 或随机存储记忆体 ( Random Access Memory, RAM )等。
本发明的实施例还提供了一种报文发送装置, 如图 5所示, 该装置在 NAT设备端可以包括外网接收单元 51、 外网正向报文发送单元 52和外网反 向报文发送单元 53。 外网接收单元 51用于接收内网设备发往外网的正向报 文或者接收外网发往内网设备的反向报文。 外网正向报文发送单元 52用于 根据 NAT表项包含的内网设备的私网 IP地址、 外部端口范围和公网 IP地址, 将内网设备发往外网的正向报文的源地址替换为公网 IP地址后发送。 夕卜网 反向报文发送单元 53用于根据 NAT表项包含的内网设备的私网 IP地址、 外 部端口范围和公网 IP地址, 将外网发往内网设备的反向报文的目的公网 IP 地址替换为内网设备的私网 IP地址后发送。 该装置在内网设备端可以包括 内网接收单元 54和内网正向报文发送单元 55。 内网接收单元 54用于接收用 户设备发往外网的正向报文。 内网正向报文发送单元 55用于将正向报文的 源端口号替换为外部端口范围, 以及将源地址替换为内网设备的私网 IP地 址后发送。
进一步地, 在 NAT设备端还可以包括端口分配单元 56、 NAT表项建立 单元 57和公网地址分配单元 58, 端口分配单元 56用于根据接收的内网设备 发送的请求消息, 分配内网设备发往 NAT设备的外部端口范围和 NAT设备 发往外网的外部端口范围, 内网设备发往 NAT设备的外部端口范围和 NAT 设备发往外网的外部端口范围相同, 并向内网设备发送包括外部端口范围 的响应消息; NAT表项建立单元 57用于根据外部端口范围建立 NAT表项; 网 IP地址,并在一定情况下把该公网 IP地址携带在在响应消息中一并发送给 内网设备, 该一定情况可以为内网设备在请求消息中进一步请求协商了公 网 IP地址。 在内网设备端还可以包括请求消息发送单元 59、 响应消息获取 单元 510和私网地址获取单元 511, 请求消息发送单元 59用于在接收用户设 备发往外网的正向报文之前, 发送用于获取经过 NAT后的外部端口范围的 请求消息; 响应消息获取单元 510用于获取响应消息, 响应消息包括经过 NAT后的外部端口范围; 私网地址获取单元 511用于获取内网设备的私网 IP 地址, 并在请求消息中携带内网设备的私网 I P地址。
另外, 在 NAT设备中, 相应的 NAT表项建立单元具体用于建立包括内 网设备的私网 IP地址、 外部端口范围和公网 IP地址的表项。 在内网设备中, 相应的请求消息还包括获取经过 NAT设备转换后的公网 IP地址。
本实施例通过根据网络地址转换 NAT表项包含的内网设备的私网 IP地 址、 外部端口范围和公网 IP地址, 在 NAT设备上将正向报文的源地址替换 为公网 IP地址、 将反向报文的目的公网 IP地址替换为内网设备的私网 IP地 址, 即用户访问外网时只在内网设备每次上线时, NAT设备建立一个表项, 后续发送报文建立链接时, 不需再建立表项, 减少了 NAT设备中建立 NAT 表项的数量, 使 NAT设备可以支持更多的用户, 减少 NAT设备的数量, 而 且在 NAT设备老化的时候可以同步内网设备和 NAT设备。 上述装置中包含 的各单元的处理功能的具体实现可参考方法实施例部分的描述, 在此不再 重复描述。
以上所述, 仅为本发明较佳的具体实施方式, 但本发明的保护范围并 不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到的变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本 发明的保护范围应该以权利要求的保护范围为准。

Claims

权利要求
1、 一种报文发送方法, 其特征在于, 包括:
接收内网设备发往外网的正向报文;
根据网络地址转换 NAT表项包含的内网设备的私网 IP地址、 外部端口 范围和公网 IP地址, 将所述正向报文的源地址替换为公网 IP地址后发送; 或者,
接收外网发往内网设备的反向报文;
根据网络地址转换 NAT表项包含的内网设备的私网 IP地址、 外部端口 范围和公网 IP地址,将外网发往内网设备的反向报文的目的公网 IP地址替换 为内网设备的私网 IP地址后发送。
2、 根据权利要求 1所述的方法, 其特征在于, 在接收内网设备发往外 网的正向报文或接收外网发往内网设备的反向报文之前, 所述方法还包括: 根据接收的内网设备发送的请求消息, 分配内网设备发往 NAT设备的 外部端口范围和 NAT设备发往外网的外部端口范围, 所述内网设备发往 NAT设备的外部端口范围和 NAT设备发往外网的外部端口范围相同, 并向 所述内网设备发送包括所述外部端口范围的响应消息;
根据所述外部端口范围建立所述 NAT表项。
3、 根据权利要求 2所述的方法, 其特征在于, 所述方法还包括分配正 向报文经过 NAT设备转换后发往外网的公网 IP地址,并将所述公网 IP地址在 响应消息中发送给所述内网设备。
4、 根据权利要求 3所述的方法, 其特征在于, 所述请求消息中携带所 述内网设备的私网 IP地址, 所述 NAT表项包括所述内网设备的私网 IP地址, 所述公网 IP地址和所述外部端口范围。
5、 根据权利要求 2所述的方法, 其特征在于, 所述请求消息包括端口 映射控制协议 PCP消息或动态主机配置协议 DHCP消息。
6、 一种报文发送装置, 其特征在于, 包括:
报文接收单元, 用于接收内网设备发往外网的正向报文或者接收外网 发往内网设备的反向报文;
外网正向报文发送单元, 用于根据网络地址转换 NAT表项包含的内网 设备的私网 IP地址、外部端口范围和公网 IP地址,将内网设备发往外网的所 述正向报文的源地址替换为公网 IP地址后发送;
外网反向报文发送单元, 用于根据网络地址转换 NAT表项包含的内网 设备的私网 IP地址、外部端口范围和公网 IP地址,将外网发往内网设备的反 向报文的目的公网 IP地址替换为内网设备的私网 IP地址后发送。
7、 根据权利要求 6所述的装置, 其特征在于, 所述装置还包括: 端口分配单元, 用于根据接收的内网设备发送的请求消息, 分配内网 设备发往 NAT设备的外部端口范围和 NAT设备发往外网的外部端口范围, 所述内网设备发往 NAT设备的外部端口范围和 NAT设备发往外网的外部端 口范围相同, 并向所述内网设备发送包括所述外部端口范围的响应消息;
NAT表项建立单元, 用于根据所述外部端口范围建立 NAT表项。
8、 根据权利要求 7所述的装置, 其特征在于, 所述装置还包括: 公网地址分配单元, 用于分配正向报文经过 NAT设备转换后发往外网 的公网 IP地址,并在一定情况下将所述公网 IP地址在响应消息中发送给所述 内网设备。
9、 根据权利要求 8所述的装置, 其特征在于, 所述 NAT表项建立单元, 具体用于建立包括所述内网设备的私网 IP地址、外部端口范围和公网 IP地址 的表项。
10、 一种报文发送方法, 其特征在于, 包括:
接收用户设备发往外网的正向报文;
将所述正向报文的源端口号替换为外部端口范围, 以及将源地址替换 为内网设备的私网 IP地址后发送。
11、 根据权利要求 10所述的方法, 其特征在于, 在所述接收用户设备 发往外网的正向报文之前, 所述方法还包括:
发送用于获取经过网络地址转换 NAT后的外部端口范围的请求消息; 获取响应消息, 所述响应消息包括经过 NAT后的外部端口范围。
12、 根据权利要求 11所述的方法, 其特征在于, 在发送用于获取经过 网络地址转换 NAT后的外部端口范围的请求消息之前, 所述方法还包括: 获取所述内网设备的私网 IP地址, 并在所述请求消息中携带所述内网 设备的私网 IP地址。
13、 根据权利要求 11或 12所述的方法, 其特征在于, 在所述请求消息 中还包括获取经过 NAT设备转换后的公网 IP地址。
14、 根据权利要求 11所述的方法, 其特征在于, 所述请求消息包括端 口映射控制协议 PCP消息或动态主机配置协议 DHCP消息。
15、 一种报文发送装置, 其特征在于, 包括:
报文接收单元, 用于接收用户设备发往外网的正向报文;
内网正向报文发送单元, 用于将所述正向报文的源端口号替换为外部 端口范围, 以及将源地址替换为内网设备的私网 IP地址后发送。
16、 根据权利要求 15所述的装置, 其特征在于, 所述装置还包括: 请求消息发送单元, 用于在所述接收用户设备发往外网的正向报文之 前, 发送用于获取经过网络地址转换 NAT后的外部端口范围的请求消息; 响应消息获取单元, 用于获取响应消息, 所述响应消息包括经过 NAT 后的外部端口范围。
17、 根据权利要求 16所述的装置, 其特征在于, 所述装置还包括: 私网地址获取单元, 用于获取所述内网设备的私网 IP地址, 并在所述 请求消息中携带所述内网设备的私网 IP地址。
18、 根据权利要求 16或 17所述的装置, 其特征在于, 所述请求消息还 包括获取经过 NAT设备转换后的公网 IP地址。
PCT/CN2011/075289 2010-11-25 2011-06-03 一种报文发送方法及装置 WO2011147353A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP11786125.2A EP2645679B1 (en) 2010-11-25 2011-06-03 Method and apparatus for message transmission
US13/902,243 US20130279519A1 (en) 2010-11-25 2013-05-24 Method and apparatus for message transmission

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010591093.1A CN102480530B (zh) 2010-11-25 2010-11-25 一种报文发送方法及装置
CN201010591093.1 2010-11-25

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/902,243 Continuation US20130279519A1 (en) 2010-11-25 2013-05-24 Method and apparatus for message transmission

Publications (1)

Publication Number Publication Date
WO2011147353A1 true WO2011147353A1 (zh) 2011-12-01

Family

ID=45003341

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/075289 WO2011147353A1 (zh) 2010-11-25 2011-06-03 一种报文发送方法及装置

Country Status (4)

Country Link
US (1) US20130279519A1 (zh)
EP (2) EP2928161A1 (zh)
CN (2) CN105100299A (zh)
WO (1) WO2011147353A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857382A (zh) * 2012-09-28 2013-01-02 瑞斯康达科技发展股份有限公司 网管设备、接入汇聚设备、接入终端设备及其管理方法和系统
CN103297336A (zh) * 2012-03-02 2013-09-11 华为技术有限公司 转发网际协议分组的方法及设备
CN103780492A (zh) * 2012-10-25 2014-05-07 华为技术有限公司 报文转发的方法和相应设备

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9185072B2 (en) * 2012-05-14 2015-11-10 Futurewei Technologies, Inc. Stateless NAT44
CN104184842A (zh) * 2013-05-24 2014-12-03 中兴通讯股份有限公司 一种转发报文的方法及装置
CN103532787A (zh) * 2013-10-22 2014-01-22 中国联合网络通信集团有限公司 Cgn设备测试反向流的生成方法及测试设备
CN104753867B (zh) * 2013-12-27 2018-10-30 中国移动通信集团公司 一种网络数据访问方法、设备及系统
WO2015100637A1 (zh) * 2013-12-31 2015-07-09 华为技术有限公司 链路倒换的方法和交换设备
JP5967173B2 (ja) * 2014-01-31 2016-08-10 株式会社バッファロー ネットワーク中継装置、ネットワーク中継装置が有するパケット中継処理部の動作モードを設定する方法、およびコンピュータープログラム
US10757170B2 (en) * 2014-10-13 2020-08-25 Vmware, Inc. Cross-cloud namespace management for multi-tenant environments
US9825905B2 (en) 2014-10-13 2017-11-21 Vmware Inc. Central namespace controller for multi-tenant cloud environments
CN107528932A (zh) * 2016-06-22 2017-12-29 中兴通讯股份有限公司 一种数据传输方法、网络地址转换设备
CN106506724B (zh) * 2016-11-23 2020-10-30 新华三技术有限公司 一种分配端口块的方法及装置
CN106878179B (zh) * 2016-12-14 2020-10-09 新华三技术有限公司 一种报文转发方法及装置
CN107172120B (zh) * 2017-03-27 2022-06-28 联想(北京)有限公司 信息处理方法、处理节点及网络节点
US10944671B2 (en) * 2017-04-27 2021-03-09 Pure Storage, Inc. Efficient data forwarding in a networked device
CN107222408B (zh) * 2017-06-01 2020-08-04 杭州迪普科技股份有限公司 一种分流方法及装置
CN107733871A (zh) * 2017-09-15 2018-02-23 苏州中天赛诺信息技术有限公司 网络安全隔离系统
CN109561164B (zh) * 2017-09-27 2021-02-09 华为技术有限公司 Nat表项的管理方法、装置及nat设备
CN107743098A (zh) * 2017-11-23 2018-02-27 新华三技术有限公司 Cgn板间负载分担的方法、装置和实现装置
US10812446B1 (en) * 2019-07-22 2020-10-20 Cisco Technology, Inc. Dynamic host configuration across multiple sites in software defined access networks
CN110474922B (zh) * 2019-09-02 2022-02-22 锐捷网络股份有限公司 一种通信方法、pc系统及接入控制路由器
CN110505248B (zh) * 2019-09-29 2022-05-24 国家计算机网络与信息安全管理中心 一种内网nat流量的定位方法及系统
CN111031020B (zh) * 2019-12-04 2022-07-15 紫光云(南京)数字技术有限公司 一种基于端口映射的管理网络和租户网络通信的方法
CN113765801B (zh) * 2020-07-16 2024-02-09 北京京东尚科信息技术有限公司 应用于数据中心的报文处理方法和装置、电子设备和介质
CN114531417B (zh) * 2020-10-30 2023-09-22 华为技术有限公司 一种通信方法及装置
CN112333298B (zh) * 2020-12-01 2022-09-02 武汉绿色网络信息服务有限责任公司 报文传输方法、装置、计算机设备及存储介质
CN112737957B (zh) * 2020-12-30 2022-12-13 锐捷网络股份有限公司 流表的老化方法及装置
CN112887187B (zh) * 2021-01-19 2022-09-06 海尔数字科技(青岛)有限公司 一种设备间通信建立方法、系统、装置、设备及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633100A (zh) * 2003-12-24 2005-06-29 华为技术有限公司 多媒体业务网络地址转换穿越的方法及其系统
CN1925458A (zh) * 2005-09-02 2007-03-07 中兴通讯股份有限公司 一种网络端口地址转换的实现方法
CN101459576A (zh) * 2007-12-14 2009-06-17 上海博达数据通信有限公司 一种ip acl归并优化处理的实现方法
US20100175123A1 (en) * 2007-06-15 2010-07-08 Shuichi Karino Address translation device and address translation method
CN101873252A (zh) * 2008-10-22 2010-10-27 冲电气网络株式会社 分组转送装置、分组转送方法和通信装置

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6563824B1 (en) * 1999-04-20 2003-05-13 3Com Corporation Apparatus and methods for determining the correct workstation within a LAN for a LAN modem to route a packet
US8032639B2 (en) * 2006-05-23 2011-10-04 Cisco Technology, Inc. Apparatus and method for providing data session source device information
EP2051473B1 (en) * 2007-10-19 2018-04-25 Deutsche Telekom AG Method and system to trace the ip traffic back to the sender or receiver of user data in public wireless networks
CN101488904B (zh) * 2009-02-27 2011-08-03 杭州华三通信技术有限公司 Gre隧道穿越网络地址转换设备的方法和网络地址转换设备
JP5164953B2 (ja) * 2009-06-17 2013-03-21 アラクサラネットワークス株式会社 インタネットワーク装置
CN101888418B (zh) * 2010-07-12 2012-11-07 中国电信股份有限公司 解决双栈网络中IPv4地址不足的方法及系统
WO2012031623A1 (en) * 2010-09-07 2012-03-15 Nokia Siemens Networks Oy Method and network devices for selecting between private addresses and public addresses within a user session

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633100A (zh) * 2003-12-24 2005-06-29 华为技术有限公司 多媒体业务网络地址转换穿越的方法及其系统
CN1925458A (zh) * 2005-09-02 2007-03-07 中兴通讯股份有限公司 一种网络端口地址转换的实现方法
US20100175123A1 (en) * 2007-06-15 2010-07-08 Shuichi Karino Address translation device and address translation method
CN101459576A (zh) * 2007-12-14 2009-06-17 上海博达数据通信有限公司 一种ip acl归并优化处理的实现方法
CN101873252A (zh) * 2008-10-22 2010-10-27 冲电气网络株式会社 分组转送装置、分组转送方法和通信装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2645679A4 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297336A (zh) * 2012-03-02 2013-09-11 华为技术有限公司 转发网际协议分组的方法及设备
CN103297336B (zh) * 2012-03-02 2017-06-06 华为技术有限公司 转发网际协议分组的方法及设备
CN102857382A (zh) * 2012-09-28 2013-01-02 瑞斯康达科技发展股份有限公司 网管设备、接入汇聚设备、接入终端设备及其管理方法和系统
CN103780492A (zh) * 2012-10-25 2014-05-07 华为技术有限公司 报文转发的方法和相应设备
CN103780492B (zh) * 2012-10-25 2017-09-26 华为技术有限公司 报文转发的方法和相应设备

Also Published As

Publication number Publication date
US20130279519A1 (en) 2013-10-24
EP2928161A1 (en) 2015-10-07
EP2645679B1 (en) 2015-08-19
EP2645679A1 (en) 2013-10-02
CN105100299A (zh) 2015-11-25
CN102480530B (zh) 2015-07-22
EP2645679A4 (en) 2013-10-30
CN102480530A (zh) 2012-05-30

Similar Documents

Publication Publication Date Title
WO2011147353A1 (zh) 一种报文发送方法及装置
JP5312672B2 (ja) 共通IPアドレス及びMACアドレスを有するVoIPカードを備えるアクセス・ノード
WO2012051915A1 (zh) 端口映射方法、装置与通信系统
US20130010614A1 (en) METHOD AND APPARATUS FOR PROCESSING PACKETS IN IPv6 NETWORK
JP2003218953A (ja) インターネットプロトコルアドレス変換装置、これを用いた通信ネットワークシステム及び通信方法
WO2012013133A1 (zh) 一种网络通信的方法和设备
EP2360879A1 (en) Data package forwarding method, system and device
WO2011144154A1 (zh) 在nat穿越中分配外网互联网协议ip地址的方法及设备、系统
JP2007166069A (ja) Ip通信装置およびこれを備えたip通信システムならびにip通信装置のipアドレス設定方法
JP2006086800A (ja) ソースアドレスを選択する通信装置
JPH10247946A (ja) ネットワーク接続方式および方法ならびにネームサーバ
US8606937B2 (en) Information providing method, home gateway, and home network system
CN110365557B (zh) 一种网络互连的方法及装置
WO2014183701A1 (zh) 端口块资源的获取、端口块资源的分配方法及装置
WO2017059742A1 (zh) 用户侧设备、服务器、端口资源管理方法及系统
WO2011103820A2 (zh) 一种网络地址转换方法及装置
TW201414253A (zh) 網路位址轉換系統及方法
EP2472788A1 (en) Method and system for implementing id/locator mapping
WO2008011776A1 (fr) Procédé d'affectation d'adresse, ainsi que système, agent relais et serveur correspondants
WO2014063606A1 (zh) 报文转发的方法和相应设备
US20090141705A1 (en) Device and method for address-mapping
WO2014156143A1 (ja) ホームゲートウェイ装置およびパケット転送方法
JP2010062757A (ja) Dnsプロキシ装置及びdns中継方法
US10164937B2 (en) Method for processing raw IP packet and device thereof
WO2015139397A1 (zh) 一种nat64资源获取方法及获取/分配装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11786125

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2011786125

Country of ref document: EP