WO2012088982A1 - 路由信息发布方法、设备及虚拟专用网系统 - Google Patents

路由信息发布方法、设备及虚拟专用网系统 Download PDF

Info

Publication number
WO2012088982A1
WO2012088982A1 PCT/CN2011/083093 CN2011083093W WO2012088982A1 WO 2012088982 A1 WO2012088982 A1 WO 2012088982A1 CN 2011083093 W CN2011083093 W CN 2011083093W WO 2012088982 A1 WO2012088982 A1 WO 2012088982A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual private
private network
address
mac address
network server
Prior art date
Application number
PCT/CN2011/083093
Other languages
English (en)
French (fr)
Inventor
郑若滨
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP11853907.1A priority Critical patent/EP2624525B1/en
Publication of WO2012088982A1 publication Critical patent/WO2012088982A1/zh
Priority to US13/896,050 priority patent/US9853896B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/741Routing in networks with a plurality of addressing schemes, e.g. with both IPv4 and IPv6
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/5014Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/503Internet protocol [IP] addresses using an authentication, authorisation and accounting [AAA] protocol, e.g. remote authentication dial-in user service [RADIUS] or Diameter

Definitions

  • Routing information publishing method, device and virtual private network system The present application claims to be submitted to the Chinese Patent Office on December 27, 2010, the application number is 201010607474.4, and the invention name is "route information publishing method, equipment and virtual private network system" Chinese patent Priority of the application, the entire contents of which are incorporated herein by reference.
  • the present invention relates to the field of network communication technologies, and in particular, to a routing information publishing method, device, and virtual private network system. Background technique
  • a Virtual Private Network is defined as a temporary, secure connection through a public network (usually the Internet), a secure, stable tunnel through a chaotic public network. Using this tunnel, you can encrypt data several times to achieve the safe use of the Internet.
  • a virtual private network is an extension of an intranet. Virtual private networks help remote users, corporate branches, business partners, and suppliers establish trusted, secure connections with the company's intranet and securely transmit data.
  • VPNs are classified into client-based VPNs and network-based VPNs, depending on whether they are implemented by enterprise customers or service providers.
  • the VPN based on the client device establishes a tunnel between the Customer Edge (CE) and the CE and directly transmits routing information.
  • the routing protocol data is always exchanged between the client devices.
  • the carrier network can configure the client network. None is known, and different customer address spaces can overlap, and privacy and security are very good. Therefore, when the concept of "cloud computing" / "data center” is proposed, the “cloud computing" / "data center” interconnection through VPN based on client devices has become a research hotspot.
  • FIG. 1A is a virtual private network based on a client device in a TR101 digital subscriber loop access network.
  • Site 1, Site 2, and Site 3 belong to the same virtual private network a.
  • the ID of the virtual private network is VPN1, and each site is a data center.
  • each site there is one user edge node and several user terminals.
  • the site accesses the data center through user edge nodes and access nodes (such as DSLAM).
  • IP Edge nodes can be broadband access servers (BRAS, Broadband Remote Access Server).
  • BNG Broadband Network Gateway
  • the inter-CE system needs to use the flooding mechanism to multicast routing information through the Intermediate System to Intermediate System (IS-IS).
  • IS-IS Intermediate System to Intermediate System
  • the network does not support user multicast. Therefore, the IS-IS multicast packets from the CE node will be filtered out by the access node. That is, the routing information between the CE nodes at each site cannot be exchanged with each other through the routing protocol.
  • the embodiment of the present invention provides a routing information publishing method, a device, and a virtual private network system based on a client device, which solves the problem that a multicast packet of a user edge node is accessed in a virtual private network system based on a client device. That is, the operator edge node in the data center Internet is filtered out, so that the routing information between the CE nodes of each site in the virtual private network system based on the client device cannot be exchanged with each other through the routing protocol.
  • a routing information publishing method includes:
  • the virtual private network server collects the first medium access control (MAC) address routing information, where the first MAC address routing information is the MAC address routing information of each site in the virtual private network to which the virtual private network server belongs. a set; wherein the virtual private network server is configured to manage MAC address routing information of each site for the virtual private network to which the virtual private network belongs;
  • MAC medium access control
  • the virtual private network server sends the second MAC address routing information to the destination station in a unicast manner, where the second MAC address routing information is the first MAC address routing information, and the MAC address routing information of each site except the destination station is removed. Collection.
  • a routing information publishing method includes:
  • the IP edge node receives the authentication message sent by the user edge node corresponding to each site in the virtual private network, and the authentication message carries the information of the user edge node;
  • the address of the virtual private network server may be an IP address or a MAC address address.
  • a virtual private network server device including: a first collection module, configured to collect first MAC address routing information, where the first MAC address routing information is a set of MAC address routing information of each site in the virtual private network to which the virtual private network server belongs;
  • a sending module configured to send the second MAC address routing information to the destination station in a unicast manner, where the second MAC address routing information is the MAC address routing information of the first MAC address routing information, and the MAC address routing information of the destination station is removed.
  • An IP edge node device including:
  • a receiving module configured to receive an authentication message sent by a user edge node corresponding to each site in the virtual private network, where the authentication message carries information about the user edge node, where the information of the user edge node is a MAC address, a user identifier, or a physical Line information, etc.
  • the virtual private network identifier obtaining module is configured to obtain, according to the information about the user edge node carried in the authentication message received by the receiving module, the identifier of the corresponding virtual private network from the correspondence between the preset user edge node and the virtual private network;
  • a virtual private network server address obtaining module configured to obtain an address of the virtual private network server according to the identifier of the virtual private network; where the address of the virtual private network server may be an IP address or a MAC address; The address of the virtual private network server is sent to the user edge node.
  • a virtual private network system based on a client device including:
  • the above virtual private network server device and IP edge node device are The above virtual private network server device and IP edge node device;
  • the user edge node device configured to obtain an address of the virtual private network server in the virtual private network, and MAC address information of the local station, and then send the MAC address routing information of the local station to the virtual private network server;
  • the address of the virtual private network server can be an IP address or a MAC address.
  • the VPN server collects the MAC address routing information of each site in the virtual private network, and then sends the MAC address of each site except the destination site to the user edge node corresponding to each site in the virtual private network in a unicast manner. Address routing information; In this way, the MAC address routing information in the virtual private network is collected and transmitted by using one node in the virtual private network as a server, thereby solving the problem that the multicast message is connected to the access node in the data center interconnection network. Filtering, so that routing information between CE nodes of each site in the virtual private network cannot be exchanged with each other through a routing protocol.
  • FIG. 1A is a schematic diagram of a client device-based virtual private network architecture in a digital subscriber loop access network
  • FIG. 1B is a schematic flowchart of a road information publishing method according to a first embodiment of the present invention
  • 2A is a schematic flowchart of a method for issuing a road information according to a second embodiment of the present invention
  • FIG. 2B is a schematic diagram of an Ethernet frame encapsulation in a second embodiment of the present invention.
  • 2C is a schematic diagram of inter-site communication in a second embodiment of the present invention.
  • 3A is a schematic flowchart of a method for issuing road information in a third embodiment of the present invention.
  • FIG. 3B is a schematic flowchart of a road information publishing method according to a third embodiment of the present invention.
  • 4A is a schematic flowchart of a road information publishing method according to a fourth embodiment of the present invention.
  • 4B is a schematic diagram showing a topology structure of a method for issuing road information according to a fourth embodiment of the present invention.
  • 4C is a schematic diagram of a topological structure of a method for issuing road information according to a fourth embodiment of the present invention.
  • 4D is a schematic diagram showing a topology structure of a road information publishing method according to a fourth embodiment of the present invention.
  • 4E is a schematic diagram of a topology structure of a road information publishing method according to a fourth embodiment of the present invention.
  • 4F is a schematic diagram showing a topology structure of a road information publishing method according to a fourth embodiment of the present invention.
  • 4G is a schematic diagram of a topology structure of a road information publishing method according to a fourth embodiment of the present invention.
  • 5A is a schematic diagram showing the logical structure of a virtual private network server device in a fifth embodiment of the present invention.
  • 5B is a schematic diagram showing the logical structure of a virtual private network server device in a fifth embodiment of the present invention.
  • 6A is a schematic diagram showing the logical structure of an IP edge node device in a sixth embodiment of the present invention.
  • 6B is a schematic diagram showing the logical structure of an IP edge node device in a sixth embodiment of the present invention.
  • FIG. 7 is a schematic diagram showing the logical structure of a routing information distribution system in the seventh embodiment of the present invention. Specific lung
  • the embodiment of the invention provides a road information publishing method, and the embodiment of the invention further provides a corresponding device and a virtual private network system based on the client device. The details are described below separately.
  • the first embodiment of the routing information publishing method in the embodiment of the present invention is specific:
  • the VPN server collects first MAC address routing information.
  • the VPN server is the node that manages the MAC address routing information of each site in the virtual private network.
  • the IP edge device selects the VPN server from each CE node according to the preset rules. For example, the IP edge device can carry the virtual certificate through the extended authentication protocol.
  • the address of the private network server is obtained by the address of the private network server, or the address of the virtual private network server is obtained by extending the address of the virtual private network server by expanding the option of the dynamic host setting protocol; or obtaining the address of the virtual private network server by using the TR069 protocol .
  • the VPN server collects the first MAC address routing information, where the first MAC address routing information is a set of MAC address routing information of each site in the virtual private network to which the VPN server belongs.
  • Each VPN network includes multiple sites, and each site includes multiple nodes.
  • the MAC address routing information of the site includes the MAC address information and CE of each node (such as a terminal device, server, or virtual machine) in the site.
  • the VPN server sends the second MAC address routing information to the destination station.
  • the VPN server sends the second MAC address routing information to the destination site in a unicast manner.
  • the destination site includes multiple nodes.
  • the VPN server unicasts to each site except the local site.
  • the user edge node sends the second MAC address routing information, where the second MAC address routing information is a set of MAC address routing information of the MAC address routing information of the destination station.
  • the method in the embodiment of the present invention expresses the idea that a node is selected as a server in each VPN network to manage node information such as a MAC address of each node, and each node in the network first has its own node information list.
  • the broadcast is sent to the server, and then the server unicasts the node information of all the nodes except the sending target node to the sending target node, which solves the problem that certain nodes brought by the broadcast in the network are not supported.
  • each VPN network can be arranged in one physical network, and each VPN network manages information of each node in the VPN network, so in each VPN network
  • the node information of each node is centrally managed, but in the entire physical network, the node information in each VPN network is distributedly managed; the ideas expressed by the method in this embodiment can be used not only to pass A virtual private network for cloud computing interconnection based on a virtual private network of a client device, and can also be used for Other networks that need to solve the same problem; in this embodiment, the virtual private network based on the virtual private network of the client device is used as an example to describe the discovery of the present invention.
  • the VPN server collects MAC address routing information of each site in the virtual private network, and then unicasts the The user edge node corresponding to each site in the virtual private network sends MAC address routing information of each site except the destination site; thus, the MAC address routing information in the virtual private network is performed by using one node in the virtual private network as a server.
  • the method of collecting and transmitting solves the problem that the multicast message is filtered by the access node in the data center interconnection network, so that the routing information between the CE nodes of each site in the virtual private network cannot be exchanged through the routing protocol.
  • a second embodiment of a routing information publishing method according to an embodiment of the present invention is specific:
  • the CE node sends an authentication message to the IP edge device in the data center interconnection network.
  • the authentication message may be a DHCP message, and the authentication message carries information of the CE node, such as a MAC address.
  • 202. Obtain an IP address and an address of a VPN server.
  • the IP edge device receives the dynamic host configuration protocol (DHCP) message sent by the CE node, and the IP edge device allocates an IP address to the CE node through the DHCP server, and sends the IP address to the CE node.
  • DHCP dynamic host configuration protocol
  • the IP edge device also associates the CE node with the corresponding IP address.
  • the correspondence relationship can be implemented by using the corresponding relationship table, graph, or tree structure.
  • the corresponding relationship table can be used to save a CE node locally.
  • the correspondence table of the corresponding IP addresses is implemented, as shown in Table 1:
  • the CE node receives the IP address returned by the IP edge device and uses the IP address as the IP address of the CE node.
  • the CE node also needs the address of the VPN server. Specifically:
  • the IP edge device selects a VPN server from each CE node according to a preset rule, and sends an address (which may be an IP address or a MAC address) of the VPN server to each CE node;
  • the address of the virtual private network server may be obtained by using an extended authentication protocol to carry the address of the virtual private network server;
  • the address of the virtual private network server is carried by the option of the extended dynamic host setting protocol to obtain the address of the virtual private network server;
  • the IP address of the VPN server and the address of the VPN server are sent to each of the CEs.
  • the IP address of the VPN server can be sent at the same time, or it can be sent separately.
  • the pre-set rules include: the CE node that passes the first authentication as the VPN server, or the CE node that has the largest bandwidth as the VPN server, etc., which are not enumerated here, the above two presets
  • the rules are not to be construed as limiting the embodiments of the present invention.
  • the VPN server collects routing information of the first MAC address.
  • the VPN server collects the first MAC address routing information, where the first MAC address routing information is a set of MAC address routing information of each site in the virtual private network to which the VPN server belongs;
  • the VPN server receives the MAC address routing information sent by the user edge node corresponding to the other sites in the virtual private network, and obtains the MAC address information of the local station by using the MAC address learning; Alternatively, the VPN server receives the MAC address routing information sent by the user edge node corresponding to each site in the virtual private network.
  • the VPN server sends the second MAC address routing information to the destination station.
  • the VPN server sends the second MAC address routing information to the destination site in a unicast manner.
  • the destination site includes multiple nodes.
  • the VPN server unicasts to each site except the local site.
  • the user edge node sends the second MAC address routing information, where the second MAC address routing information is the first MAC address routing information, and the set of the MAC address routing information of the MAC address routing information of the destination station is removed;
  • the VPN server carries the routing protocol packet carrying the routing information of the second MAC address in the unicast MAC frame for transmission; wherein the destination MAC address is the MAC address of the user edge node;
  • the routing protocol packet is carried in a unicast IP packet, where the destination IP address of the unicast IP packet is an IP address of the user edge node;
  • the VPN server also collects the information of the user edge node that is already online in the virtual private network to maintain the network topology of the VPN. Specifically, if the MAC address routing information of the site sent by the user edge node is received, the user edge is indicated. If the node is in the online state, the MAC address and/or the IP address of the user edge node are saved locally, which may be a preset online user edge node list, as shown in Table 2:
  • the VPN server collects the IP address of the user edge node corresponding to each site in the virtual private network; specifically, if the MAC address routing information of the site sent by the user edge node is received, the IP address of the user edge node is saved in the Local, specifically, may be a preset list of user edge node IP address information, as shown in Table 3:
  • the IP address of the user edge node and the address of the VPN server in the VPN where the user edge node is located may be statically configured on the user edge node.
  • the communication between the site and the site may adopt Ethernet technology or IP technology, specifically: It is assumed that the VPN includes three sites, namely, site 1, site 2, and site 3, and site 1 includes node Server1 and node CE1, the site 2 includes node Server2 and node CE2, and site 3 includes node Server3 and node CE3;
  • Adopt Ethernet technology Now take the communication between site 1 and site 2 as an example.
  • an Ethernet frame of one site is encapsulated in the payload of another Ethernet frame and transmitted to another site of the same VPN, the available There are technologies such as Provider Backbone Transport (PBT) technology or MACinMAC encapsulation technology, which is implemented by querying MAC address routing information.
  • PBT Provider Backbone Transport
  • MACinMAC encapsulation technology which is implemented by querying MAC address routing information.
  • the source MAC address of the original Ethernet frame is the MAC address of the node Server1 under the station 1 (sending station), and the destination MAC address of the original Ethernet frame is located under the station 2 (destination site).
  • the CE2 node forwards the received original Ethernet frame to Server2, and Server2 under Site 2 sends an Ethernet frame to Se at Site 1. The same is true for rverl, as shown in Figure 2C.
  • IP technology The Ethernet frame of one site is encapsulated in the payload of the IP packet and transmitted to another site of the same VPN, which can be implemented by checking the MAC address routing information.
  • the user edge node CE1 corresponding to the site 1 receives the Ethernet frame from the server 2 under the site 1 and the server address of the server 2 under the site 2, and checks the MAC address routing information to obtain the MAC address corresponding to the server 2.
  • the next hop address is the address of the user edge node CE2 corresponding to the site 2.
  • the user edge node CE1 sends the Ethernet frame from Server1 to CE2 through IP encapsulation.
  • the source IP address of the outer Ethernet is the user edge node CEl.
  • IP address, destination IP of outer Ethernet The address is the IP address of the user edge node CE2; the user edge node CE2 forwards the Ethernet frame to Server2.
  • the method in the embodiment of the present invention expresses the idea that a node is selected as a server in the network to manage node information such as a MAC address of each node, and each node in the network first transmits the node information to the unicast to the node.
  • the server after being collated by the server, unicasts the node information of all the nodes except the sending target node to the sending target node, thereby solving the problem that some nodes brought by the broadcast in the network are filtered out because they are not supported, thereby The problem that the broadcast information is not sent to other nodes in the network; in each VPN network, the node information of each node is centrally managed, but in the entire physical network, the node information of each VPN node is distributed management.
  • the idea expressed by the method in this embodiment can be used not only for a virtual private network that performs cloud computing interconnection through a virtual private network based on a client device, but also for other networks that need to solve the same problem; Taking a virtual private network based on a virtual private network of a client device for cloud computing interconnection as an example Inventors found that described in detail.
  • a VPN server in a virtual private network that performs cloud computing interconnection through a virtual private network based on a client device, a VPN server is preselected in the virtual private network, and the VPN server is used to manage MAC addresses of each site. Routing information; the VPN server first collects the MAC address routing information of each site in the virtual private network, and then sends the MAC address of each site except the destination site to the user edge node corresponding to each site in the virtual private network in a unicast manner.
  • Routing information In this way, by using a node in the virtual private network as a server, collecting and transmitting MAC address routing information in the virtual private network, and solving the problem that the multicast message is filtered by the access node in the data center interconnection network In addition, the routing information between the CE nodes of each site in the virtual private network cannot be exchanged with each other through the routing protocol.
  • the third embodiment of the routing information publishing method in the embodiment of the present invention is specific:
  • the IP edge device receives an authentication message sent by each user edge node, where the authentication message carries information about the user edge node.
  • the IP edge device receives the authentication message sent by the user edge node corresponding to each site in the virtual private network, and the authentication message may be DHCP, 802.1X, Extensible Authentication Protocol (EAP), or network access authentication. Protocol for Carrying Authentication and Network Access (PANA), the authentication message carries information of a user edge node, such as a MAC address, a user identifier, or physical line information;
  • the IP edge device obtains the identifier of the corresponding virtual private network from the corresponding relationship between the user edge node and the virtual private network according to the information of the user edge node.
  • the correspondence relationship may be a correspondence table and a graphic. Or tree structure, etc. to achieve, as illustrated by the correspondence table, as shown in Table 4:
  • the MAC address carried by the IP edge device and sent by the user edge node carries the MAC address 10-23-59-65-89-F7
  • the IP edge device according to the MAC address 10-23-59-65-89- F7 queries from the preset relationship table between the user edge node and the virtual private network, and the MAC address 10-23-59-65-89-F7 corresponds to VPN1, that is, the MAC address 10-23-59-65-89
  • the user edge node corresponding to -F7 belongs to the virtual private network VPN1.
  • the IP edge device obtains an address of the VPN server according to the identifier of the virtual private network, and sends the address to the user edge node.
  • the IP edge device obtains the address of the VPN server from the correspondence between the identifier of the virtual private network preset in the local area and the address of the VPN server according to the identifier of the virtual private network, and carries the address of the VPN server by returning the authentication message of the user edge node.
  • the address of the VPN server can be an IP address or a MAC address.
  • the correspondence can be implemented by using a correspondence table, a graph, or a tree structure. For example, as shown in Table 5, the IP address is used as the IP address. example:
  • the IP edge device queries the mapping between the identifier of the virtual private network preset in the local area and the IP address of the VPN server according to the identifier VPN2, and the IP address of the VPN server corresponding to the VPN2.
  • the address is 192.168.3.1.
  • the user edge node sends a DHCP message (such as a DHCP Request message) to the access node.
  • a DHCP message such as a DHCP Request message
  • the access node After receiving the DHCP message sent by the user edge node, the access node obtains the Line ID corresponding to the physical line according to the received physical line from the correspondence between the physical line and the Line ID, and the line is The ID is added to the received DHCP message, and the correspondence between the physical line and the Line ID may be implemented by using a corresponding table, a graphic, or a tree structure;
  • the access node sends a DHCP message (such as a DHCP request message) with a Line ID to the IP edge node.
  • a DHCP message (such as a DHCP request message) with a Line ID to the IP edge node.
  • the IP edge node receives the DHCP message with the added Line ID and sends the carrying line to the AAA server.
  • ID AAA message (such as access request message);
  • the AAA server After receiving the AAA message carrying the Line ID, the AAA server performs port authentication according to the Line ID, and obtains the address of the VPN server.
  • the address can be an IP address or a MAC address.
  • a virtual private network identifier and a VPN are preset.
  • the correspondence between the address of the server and the correspondence between the Line ID and the virtual private network identifier, or the correspondence between the Line ID and the address of the VPN server is preset, so that the address of the corresponding VPN server can be queried according to the Line ID.
  • the corresponding relationship may be implemented by a corresponding table, a graph, or a tree structure;
  • the AAA server returns an AAA message (such as an access accept message) to the IP edge node, where the message carries the Line ID and the address of the corresponding VPN server;
  • the IP edge device sends a DHCP message (such as a DHCP response message) carrying the Line ID and the address of the corresponding VPN server to the access node.
  • a DHCP message (such as a DHCP response message) carrying the Line ID and the address of the corresponding VPN server to the access node.
  • the access node After receiving the DHCP message carrying the line ID and the address of the corresponding VPN server, the access node
  • the Line ID finds the physical line corresponding to the Line ID from the correspondence between the physical line and the Line ID, and then deletes
  • the access node sends the DHCP message carrying the address of the VPN server to the user edge node through the found physical line.
  • the IP address of the VPN server can be dynamically sent to the user edge node through the TR069 protocol. Further, the IP address of the VPN server may also be obtained according to the address of the user edge node, such as a MAC address or an IP address. In this case, the line ID in FIG. 4B is only changed to the address of the user edge node, and the acquisition process is based on Line. The IP address of the VPN server is the same, and is not mentioned here.
  • the method further includes: if the VPN server is not selected, the IP edge node elects the VPN server according to the preset election rule, and establishes a correspondence between the virtual private network and the address of the VPN server;
  • the pre-set election rule may be the first user edge node authenticated in the virtual private network as a VPN server, or the user edge node having the largest bandwidth as a VPN server, etc.;
  • the method further includes: the IP edge device assisting the user edge node to obtain an IP address from the DHCP server, and sending the IP address to the user edge node.
  • the IP edge node monitors the link state between the virtual private network and the corresponding VPN server through session keep-alive. If the link between the virtual private network and the corresponding VPN server is detected to be faulty, according to the preset The election rule re-elects a new VPN server, establishes a correspondence between the virtual private network and the new VPN server, and then sends the address of the new VPN server to each user edge node in the virtual private network.
  • the user edge node obtains the address of the VPN server from the IP edge node, so that the user edge node can send the MAC address routing information of the site to the VPN server after the MAC address learning, so that the VPN server can be dedicated to the virtual server.
  • the MAC address routing information of each site in the network is managed and advertised, so that the multicast packets are filtered by the access nodes in the data center interconnection network, so that the routing information between the CE nodes of each site in the virtual private network cannot be The problem of exchanging each other through routing protocols; and, the IP edge node also monitors the link status between the virtual private network and the corresponding VPN server in real time, and when the link transmission failure of the two links, reselect the new VPN server in time to solve accidents.
  • a fourth embodiment of the method for issuing road information in the embodiment of the present invention is:
  • a VPN server or a VPN server pool can be set in the VPN network.
  • the VPN server or the VPN server pool is used to manage information of each member node in the VPN network, and provides a routing information query service of the VPN member node.
  • the VPN server or VPN server pool is elected. Take the VPN server as an example.
  • the VPN server can be a CE, or a PE or other node (such as an AAA server); different VPNs, VPN server locations may be different; as shown in Figure 4B, the VPN1 server is located at CE2, and the VPN servers of other VPNs may be other nodes.
  • the VPN server is responsible for collecting the MAC address routing information in the VPN, and is responsible for issuing the MAC address routing information of the VPN to each CE of the VPN.
  • the MAC address information is centrally managed by the VPN server, but different VPNs, MACs. The address information will be distributed to different VPN servers by VPN to achieve centralized and distributed hybrid management.
  • the CE advertises the routing information of each MAC address in the site to the VPN server through a routing protocol (such as IS-IS).
  • the MAC address routing information includes the internal MAC address of the site and the CE address of the site.
  • the MAC address of the CE can be Is the MAC address or IP address.
  • the address of the CE corresponding to the site is made in the MAC address route. Is the next hop address.
  • the VPN server can also collect IP address information in a VPN and advertise the IP address information of the VPN to each CE of the VPN.
  • the CE can also publish its own site to the VPN server through a routing protocol (such as IS-IS). Each IP address information within.
  • CE1 performs user authentication
  • the node CE1 sends an authentication message to the IP edge node in the data center internetwork, and the authentication message may be a DHCP, 802.IX, EAP or PANA message, and the authentication message carries information of the CE1 of the node, such as a MAC address, a user identifier, or a line. ID.
  • CE2 performs user authentication
  • the node CE2 sends an authentication message to the IP edge node in the data center internetwork, and the authentication message may be a DHCP, 802.IX, EAP or PANA message, and the authentication message carries information of the CE2 of the node, such as a MAC address, a user identifier, or a line. ID.
  • the IP edge node obtains the identifier of the corresponding virtual private network from the correspondence between the preset user edge node and the virtual private network according to the information of the nodes CE1 and CE2.
  • the corresponding relationship may be a correspondence table, a graph, or a tree structure.
  • the MAC address correspondence table is used as an example, as shown in Table 6:
  • the MAC address carried by the authentication message sent by the node CE1 is 10-23-59-65-89-F7
  • the IP edge node is from the preset user edge according to the MAC address 10-23-59-65-89-F7.
  • the correspondence between the node and the virtual private network is queried in Table 6.
  • the MAC address 10-23-59-65-89-F7 corresponds to VPN1, and the node CE1 belongs to the virtual private network VPN1.
  • the IP edge node elects a VPN server according to a preset election rule, and establishes a correspondence between the virtual private network and the address of the VPN server, and the address may be the IP address of the VPN server or the MAC address of the VPN server.
  • the preset election rule may be a user edge node that is the first authentication pass in the virtual private network as a VPN server, or a user edge node having the largest bandwidth as a VPN server, and the like; a virtual private network and a
  • the corresponding relationship may be implemented by using a correspondence table, a graph, a tree structure, or the like, and is illustrated by a correspondence table, as shown in Table 5 in the fourth embodiment.
  • the IP edge node selects CE2 as the VPN server of VPN1.
  • the IP edge node assists the node CE1 to obtain an IP address from the DHCP server, and obtains the address of the VPN server, that is, the address (IP address or MAC address) of the node CE2, and sends the IP address and the address of the VPN server to the node CE1 by expanding the DHCP option. ;
  • the address of the VPN server can be obtained by using the address of the VPN server in the extended authentication protocol, or can be dynamically obtained through the TR069 protocol.
  • the IP edge node assists the node CE2 to obtain an IP address from the DHCP server, and obtains the address of the VPN server, that is, the address (IP address or MAC address) of the node CE2, and dynamically sends the IP address and the address of the VPN server to the node CE2 through DHCP or TR069. ;
  • the address of the VPN server can be obtained by using the address of the VPN server in the extended authentication protocol, or can be dynamically obtained through the TR069 protocol.
  • the nodes CE1 and CE2 obtain the MAC address information of the site.
  • the nodes CE1 and CE2 respectively obtain the MAC address information of the local station through MAC address learning.
  • the user edge node broadcasts a packet to all user terminals in the site. After receiving the packet, the user terminal returns a report to the user edge node. The returned message includes the MAC address of the user terminal. After receiving the returned packet, the user edge node saves the carried MAC address to the local MAC address forwarding table, and learns the obtained MAC address information.
  • the address information of the next hop that is, the address information (which may be an IP address or a MAC address) of the user edge node (such as the node CE1), and the MAC address routing information of the group cost site.
  • the node CE1 sends the MAC address routing information of the site to the VPN server.
  • the node CE1 After obtaining the MAC address information of the local station, the node CE1 sends the routing information of the MAC address of the local station to the VPN server in a unicast manner.
  • the routing protocol packet carrying the routing information of the second MAC address is carried in the single The broadcast MAC frame is transmitted; wherein the destination MAC address is the MAC address of the user edge node; or the routing protocol packet is carried in the unicast IP packet; wherein, the destination IP address of the unicast IP packet The address is the IP address of the user edge node; or, the tunnel carries the routing protocol packet for transmission; or, through routing The protocol unicast message is transmitted.
  • the VPN server saves the MAC address routing information of the site where the node CE1 is sent by the node CE1;
  • the VPN server sends the second MAC address routing information to the node CE1.
  • the VPN server that is, the node CE2 unicasts the user edge node corresponding to each site except the local site in the virtual private network, that is, the node CE1 sends the second MAC address routing information, and the second MAC address routing information is the first a MAC address routing information, which is a set of MAC address routing information for removing MAC address routing information of the destination station, where is the MAC address routing information of the node CE2;
  • the VPN server carries the routing protocol packet carrying the routing information of the second MAC address in the unicast MAC frame for transmission; wherein the destination MAC address is the MAC address of the user edge node;
  • the routing protocol packet is carried in a unicast IP packet, where the destination IP address of the unicast IP packet is an IP address of the user edge node;
  • CE3 performs user authentication
  • the node CE3 sends an authentication message to the IP edge node in the data center internetwork, and the authentication message may be
  • the authentication message carries the information of the CE3 of the local node, such as the MAC address, user ID, or Line ID.
  • the IP edge node obtains the identifier of the corresponding virtual private network from the correspondence between the preset user edge node and the virtual private network according to the information of the node CE3.
  • the correspondence relationship may be a correspondence table, a graph, or a tree structure.
  • the implementation is illustrated by the correspondence table.
  • the MAC address carried by the DHCP message sent by the node CE3 is 00-58-27-06-09-P4, and the IP edge node is based on the MAC address 00-58- 27-06-09-P4 is queried from the preset relationship between the user edge node and the virtual private network.
  • the MAC address 00-58-27-06-09-P4 corresponds to VPN1, and the node CE3 belongs to the virtual private network. VPN1.
  • the IP edge node assists the node CE3 to obtain an IP address from the DHCP server, and obtains the address of the VPN server, that is, the address (IP address or MAC address) of the node CE2, and dynamically sends the IP address and the address of the VPN server to the node CE3 through DHCP or TR069. ;
  • the address of the VPN server can also be obtained by using the address of the VPN server in the extended authentication protocol, or can be dynamically obtained through the TR069 protocol.
  • the nodes CE1, CE2, and CE3 are respectively authenticated by the IP edge node, and the nodes CE1, CE2, and CE3 are obtained to obtain IP addresses, and are respectively sent to the nodes CE1, CE2, and CE3, and the IP edge node selects the node CE2.
  • the address of the node CE2 is sent to the nodes CE1, CE2, and CE3, respectively.
  • the node CE3 obtains the MAC address information of the site.
  • the node CE3 obtains the MAC address information of the local station by using the MAC address learning. Specifically, the user edge node broadcasts a packet to all user terminals in the site. After receiving the packet, the user terminal returns a packet to the user edge node. The returned packet contains the MAC address of the user terminal. After receiving the returned packet, the user edge node saves the carried MAC address to the local MAC address forwarding table, and adds the learned MAC address information.
  • the address information of one hop that is, the address information (which may be an IP address or a MAC address) of the user edge node (such as the node CE3), and the MAC address routing information of the group cost site.
  • the node CE3 sends the MAC address routing information of the site to the VPN server.
  • the node CE3 After obtaining the MAC address routing information of the local station, the node CE3 sends the routing information of the MAC address of the local station to the VPN server in a unicast manner, for example, by carrying the routing protocol packet carrying the routing information of the second MAC address.
  • the unicast MAC address is transmitted; wherein the destination MAC address is the MAC address of the user edge node; or the routing protocol packet is carried in the unicast IP packet; wherein, the purpose of the unicast IP packet is The IP address is the IP address of the user edge node; or it is transmitted through the tunnel to carry the routing protocol packet; or it is transmitted through the routing protocol unicast packet.
  • the VPN server in VPN1 that is, the node CE2 collects the MAC address routing information of the site 1 and the site 3 through the IP edge node, and the node CE1 and the node CE3 respectively send the information to the VPN server through the IP edge node;
  • the nodes CE1, CE2, and CE3 are authenticated by the IP edge node respectively. If the IP edge node selects the node PE2 as the VPN server of the VPN1, as shown by the dotted line in FIG. 4D, the nodes CE1, CE2, and CE3 respectively correspond to the VPN server, that is, the node PE2. Send the MAC address routing information of each site.
  • the VPN server saves the MAC address routing information of the site where the node CE1 is sent by the node CE3; 16. The VPN server sends the second MAC address routing information to the node CE3;
  • the VPN server that is, the node CE2, sends the MAC address routing information of the site where the nodes CE1 and CE2 are located to the node CE3;
  • the VPN server carries the routing protocol packet carrying the routing information of the second MAC address in the unicast MAC frame for transmission; wherein the destination MAC address is the MAC address of the user edge node;
  • the routing protocol packet is carried in a unicast IP packet, where the unicast IP packet is The IP address is the IP address of the user edge node;
  • the VPN server sends the second MAC address routing information to the node CE1.
  • the VPN server sends the MAC address routing information of the site where the new node CE3 is located to the node CE1. Specifically, the VPN server carries the routing protocol packet carrying the second MAC address routing information in the unicast MAC frame for transmission; The destination MAC address is the MAC address of the user edge node;
  • the routing protocol packet is carried in a unicast IP packet, where the destination IP address of the unicast IP packet is an IP address of the user edge node;
  • the VPN server that is, the node CE2 sends the second MAC address routing information to the nodes CE1 and CE3, respectively.
  • the PE2 sends the second MAC address routing information to the nodes CE1, CE2, and CE3, as shown by the dotted line in FIG. 4F.
  • the IP edge node monitors the link state between the virtual private network and the corresponding VPN server through session keep-alive. If the link between the virtual private network and the corresponding VPN server is detected to be faulty, according to a preset election rule. The new VPN server is re-elected, and the corresponding relationship between the virtual private network and the new VPN server is established, and the address of the new VPN server is sent to each user edge node in the virtual private network.
  • the IP edge node detects the VPN server of VPN1, that is, the node CE2 is faulty.
  • the IP edge node re-selects the VPN server of the new VPN1, which is CE3.
  • the IP edge node sends the address of the new VPN server, that is, the node CE3, to the node CE1, and the node CE1 receives and stores the VPN server, that is, the address of the node CE3.
  • the IP edge node sends the address of the new VPN server, that is, the node CE3, to the node CE3.
  • the node CE3 receives the address of the VPN server and is the same as its own address, and determines that it is the VPN server of VPN1.
  • the new VPN server that is, the node CE3 is responsible for collecting the MAC address routing information of each site in the PVN1. Send.
  • the IP edge node monitors the node CE2, that is, the VPN server's session in the middle of the VPN server. As shown in the cross, the IP edge node reselects the node CE3 as the VPN server of VPN1 and updates the VPN server address. The dotted edge node indicates that the address of the new VPN server, that is, the address of the node CE3, is sent to the node CE1 and the node CE3, respectively.
  • the method in the embodiment of the present invention expresses the idea that a node is selected as a server in the network to manage node information such as a MAC address of each node, and each node in the network first transmits the node information to the unicast to the node.
  • the server after being collated by the server, unicasts the node information of all the nodes except the sending target node to the sending target node, thereby solving the problem that some nodes brought by the broadcast in the network are filtered out because they are not supported, thereby The problem that the broadcast information is not sent to other nodes in the network; in each VPN network, the node information of each node is centrally managed, but in the entire physical network, the node information of each VPN node is distributed management.
  • the idea expressed by the method in this embodiment can be used not only for a virtual private network that performs cloud computing interconnection through a virtual private network based on a client device, but also for other networks that need to solve the same problem; Virtual private network for cloud computing interconnection based on virtual private network of client equipment As an example, the findings of the present invention will be described in detail.
  • a VPN server is pre-selected in the virtual private network, and the VPN server is used to manage MAC address routing information of each site; the VPN server first collects MAC address routing information of each site in the virtual private network, and then Sending MAC address routing information of each site except the destination site to the user edge node corresponding to each site in the virtual private network in a unicast manner; thus, by using one node in the virtual private network as a server, the virtual private network The routing information of the MAC address is collected and sent to solve the problem that the multicast message is filtered by the access node in the data center interconnection network, so that the routing information between the CE nodes of each site in the virtual private network cannot pass the routing protocol. The problem of exchanging each other.
  • the fifth embodiment of the virtual private network server device in the embodiment of the present invention is as follows:
  • the first collection module 501 is configured to collect first MAC address routing information, the first MAC.
  • the address routing information is Zhukou of the MAC address routing information of each site in the virtual private network to which the virtual private network server belongs;
  • the sending module 502 is configured to send the second MAC address routing information to the destination site in a unicast manner.
  • the destination site includes multiple nodes.
  • the VPN server sends the unicast mode to other than the local station.
  • the user edge node corresponding to each station sends the second MAC address routing information, where the second MAC address routing information is a set of MAC address routing information of the MAC address routing information of the destination station.
  • the virtual private network server device further includes:
  • the obtaining module 503 is configured to obtain an address of the VPN server in the virtual private network, where the address may be an IP address or a MAC address. Specifically, the address of the VPN server may be obtained by using a routing protocol packet carrying the routing information of the second MAC address.
  • the bearer is transmitted in a unicast MAC frame, where the destination MAC address is the MAC address of the user edge node, or the routing protocol packet is carried in the unicast IP packet, where the unicast IP packet is transmitted.
  • the destination IP address is the IP address of the user edge node; or, the tunnel carries the routing protocol packet for transmission; or the routing protocol unicast packet is used for transmission.
  • the second collection module 504 is configured to collect the information of the user edge node that is already online in the virtual private network.
  • the first collection module 501 includes:
  • the receiving unit 501a is configured to receive MAC address routing information sent by a user edge node corresponding to another station in the virtual private network;
  • the MAC address information obtaining unit 501b of the site is configured to learn the MAC address information of the site by using the MAC address.
  • the virtual private network server device collects the MAC address routing information of each site in the virtual private network, and then sends the user edge node corresponding to each site in the virtual private network in addition to the destination site in a unicast manner.
  • MAC address routing information of each site thus, the MAC address routing information in the virtual private network is collected and sent by using one node in the virtual private network as a server, thereby solving the problem that the multicast packet is received in the data center interconnection network.
  • the access nodes are filtered out, so that the routing information between the CE nodes of each site in the virtual private network cannot be exchanged with each other through the routing protocol.
  • the sixth embodiment of the IP edge node device in the embodiment of the present invention is specific: Referring to FIG. 6A, the IP edge node device includes:
  • the receiving module 601 is configured to receive an authentication message sent by a user edge node corresponding to each site in the virtual private network, where the authentication message may be a DHCP message, where the authentication message carries information of the user edge node;
  • the virtual private network identifier obtaining module 602 is configured to obtain, according to the information about the user edge node carried in the authentication message received by the receiving module, the identifier of the corresponding virtual private network from the correspondence between the preset user edge node and the virtual private network;
  • the virtual private network server address obtaining module 603 is configured to obtain an address of the virtual private network server according to the identifier of the virtual private network, where the address may be an IP address or a MAC address;
  • the sending module 604 is configured to send the address acquired by the virtual private network server address obtaining module 604 to the corresponding user edge node.
  • the IP edge node device further includes:
  • a virtual private network server election module 605, configured to elect a virtual private network server according to a preset election rule
  • the correspondence establishing module 606 is configured to establish a correspondence between the virtual private network and the address of the virtual private network server, where the address may be an IP address or a MAC address;
  • the keep-alive monitoring module 607 is configured to monitor the link status between the virtual private network and the corresponding virtual private network server by session keep-alive.
  • the IP edge node device further includes: an IP address allocation module, configured to assist the user edge node to obtain an IP address, and send the IP address to the user edge node.
  • an IP address allocation module configured to assist the user edge node to obtain an IP address, and send the IP address to the user edge node.
  • the user edge node obtains the address of the VPN server from the IP edge node, so that the user edge node can send the MAC address routing information of the site to the VPN server after the MAC address learning, so that the VPN server can be dedicated to the virtual server.
  • the MAC address routing information of each site in the network is managed and advertised, so that the multicast packets are filtered by the access nodes in the data center interconnection network, so that the routing information between the CE nodes of each site in the virtual private network cannot be The problem of exchanging each other through routing protocols; and, the IP edge node also monitors the link status between the virtual private network and the corresponding VPN server in real time, and when the link transmission failure of the two links, reselect the new VPN server in time to solve accidents.
  • a seventh embodiment of a virtual private network system based on a client device in the embodiment of the present invention is specifically:
  • the user edge node device 702 is configured to obtain an address of the VPN server in the virtual private network, and the address may be an IP address or a MAC address.
  • the address of the VPN server is obtained by using the extended authentication protocol to obtain the address of the VPN server; or
  • the address of the VPN server is obtained by the option of extending the DHCP server.
  • the address of the VPN server is carried by the option of extending the DHCP, so that the IP address and the address of the VPN server are simultaneously delivered.
  • obtain the address of the VPN server by using the TR069 protocol, and obtain the MAC address information of the local station.
  • the user edge node device 702 broadcasts a packet to all user terminals in the site, and after receiving the packet, the user terminal goes to the edge of the user.
  • the node device 702 returns a packet, and the returned packet includes the MAC address of the user terminal.
  • the user edge node device 702 saves the carried MAC address to the local MAC address forwarding table.
  • the user edge node device 702 collects the MAC address routing information of the site. After the information is transmitted, the MAC address routing information of the site is sent to the VPN server in a unicast manner.
  • the routing protocol packet carrying the second MAC address routing information is carried in the unicast MAC frame for transmission;
  • the destination MAC address is the MAC address of the user edge node; or, the routing protocol packet is carried in the unicast IP packet, where the destination IP address of the unicast IP packet is the IP address of the user edge node; Or transmitting the routing protocol packet through the tunnel; or transmitting the unicast packet through the routing protocol;
  • the user edge node device 702 is further configured to: send an authentication message to the IP edge device in the data center interconnection network before acquiring the MAC address information of the site, where the authentication message may be: the authentication message carries the user edge Information about the node device, such as the MAC address, the username and password, the user equipment identifier, or the line identifier.
  • the IP edge device After receiving the authentication message, the IP edge device authenticates, authorizes, and charges according to the information of the user edge node (Authentication, Authorization and Accounting). Accounting, AAA)
  • AAA AAA
  • the server obtains the identifier of the virtual private network where the user edge node device is located, and then assists the user edge node device to obtain the IP address of the user edge node device from the dynamic host setting protocol server, and obtains the obtained IP address. Sent to the user edge node device; the user edge node device receives the IP address assigned to itself by the IP edge device.
  • the description of the virtual private network server device 701 may be referred to the description in the first embodiment or the second embodiment or the fourth embodiment;
  • the user edge node device 702 refers to the description in the fourth embodiment.
  • the IP edge node device 703 refer to the description in the third embodiment or the fourth embodiment.
  • the virtual private network server device collects the MAC address routing information of each site in the virtual private network, and then sends the user edge node corresponding to each site in the virtual private network in addition to the destination site in a unicast manner.
  • MAC address routing information of each site thus, the MAC address routing information in the virtual private network is collected and sent by using one node in the virtual private network as a server, thereby solving the problem that the multicast packet is received in the data center interconnection network.
  • the access nodes are filtered out, so that the routing information between the CE nodes of each site in the virtual private network cannot be exchanged with each other through the routing protocol.
  • the program can be stored in a computer readable storage medium.
  • the storage medium can include: Read Only Memory (ROM), Random Access Memory (RAM, Random

Abstract

27???????????????????????????????????????IP????????????????????????????????????????????????????????MAC???????????????5?????????????????????????????????MAC????????????????????????????????????????????????CE????????????????????????

Description

路由信息发布方法、 设备及虚拟专用网系统 本申请要求于 2010年 12月 27日提交中国专利局、 申请号为 201010607474.4、 发 明名称为"路由信息发布方法、 设备及虚拟专用网系统"的中国专利申请的优先权, 其全 部内容通过引用结合在本申请中。 技术领域
本发明涉及网络通信技术领域, 具体涉及一种路由信息发布方法、 设备及虚拟专用 网系统。 背景技术
虚拟专用网 (Virtual Private Network, VPN )被定义为通过一个公用网络(通常是 因特网)建立一个临时的、 安全的连接, 是一条穿过混乱的公用网络的安全、 稳定的隧 道。 使用这条隧道可以对数据进行几倍加密达到安全使用互联网的目的。 虚拟专用网是 对企业内部网的扩展。 虚拟专用网可以帮助远程用户、 公司分支机构、 商业伙伴及供应 商同公司的内部网建立可信的安全连接, 并保证数据的安全传输。
根据是由企业客户还是由服务提供商实施,将 VPN分为基于客户端设备的 VPN和 基于网络的 VPN。 基于客户端设备的 VPN由于在用户边缘节点 (Customer Edge, CE) 与 CE之间建立隧道, 并直接传递路由信息, 路由协议数据总是在客户设备之间交换, 运营商网络可以对客户网络结构一无所知,而且不同的客户地址空间可以重叠,保密性、 安全性非常好。所以当 "云计算" /"数据中心"的概念提出后,通过基于客户端设备的 VPN 进行"云计算 "/"数据中心"互联成为研究的热点。
在宽带论坛 (Broadband Forum) 定义的接入网络, 如 TR101数字用户环路接入网 或无源光纤接入网下进行基于客户端设备的虚拟专用网的"云计算 "/ "数据中心"互联 时, 如图 1A, 图 1A是 TR101数字用户环路接入网络下的基于客户端设备的虚拟专用 网, 在图 1A中, 站点 1、 站点 2和站点 3属于同一个虚拟专用网 a, 该虚拟专用网的标 识为 VPN1 , 每个站点是一个数据中心, 在每个站点中, 有一个用户边缘节点和若干个 用户终端, 站点通过用户边缘节点和接入节点 (如 DSLAM) 接入数据中心互联网络; 在数据中心互联网络中,包括供站点接入的接入节点(如 DSLAM)和 IP边缘(IP Edge) 设备, IP Edge节点可以是宽带接入服务器(BRAS, Broadband Remote Access Server ) 宽带网络网关 (BNG, Broadband Network Gateway) 等。 CE 节点间需要通过中间系统到中间系统路由协议 (Intermediate System to Intermediate System, IS-IS)利用泛洪(flooding) 的机制来组播路由信息, 出现的问题 是, 接入网络, 即数据中心互联网络不支持用户组播, 因此来自 CE节点的 IS-IS组播 报文将会被接入节点滤除, 即各个站点的 CE节点间的路由信息无法通过路由协议彼此 交换。
上述问题不仅仅在基于客户端设备的虚拟专用网进行云计算互联的虚拟专用网中 存在, 在其他的一些网络中也可能存在相同的问题。 发明内容
本发明实施例提供一种路由信息发布方法、 设备及基于客户端设备的虚拟专用网 系统, 解决了在基于客户端设备的虚拟专用网系统中, 用户边缘节点的组播报文被接入 网, 即数据中心互联网中的运营商边缘节点滤除, 从而导致基于客户端设备的虚拟专用 网系统中各个站点的 CE节点间的路由信息无法通过路由协议彼此交换的问题。
一种路由信息发布方法, 包括:
虚拟专用网服务器采集第一介质访问控制 (Medium/Media Access Control, MAC) 地址路由信息,第一 MAC地址路由信息为所述虚拟专用网服务器所属的虚拟专用网内各 个站点的 MAC地址路由信息的集合;其中,所述虚拟专用网服务器用于为所属虚拟专用 网管理各站点的 MAC地址路由信息;
虚拟专用网服务器以单播的方式向目的站点发送第二 MAC地址路由信息; 其中, 所述第二 MAC地址路由信息为第一 MAC地址路由信息除去目的站点之外的各个站点的 MAC地址路由信息的集合。
一种路由信息发布方法, 包括:
IP边缘节点接收虚拟专用网中各站点对应的用户边缘节点发送的认证消息,所述认 证消息携带所述用户边缘节点的信息;
根据用户边缘节点的信息从预先设置的用户边缘节点和虚拟专用网的对应关系中 获取对应的虚拟专用网的标识;
根据所述虚拟专用网的标识获取虚拟专用网服务器的地址, 并将所述虚拟专用网 服务器的地址发送给所述用户边缘节点; 其中, 所述虚拟专用网服务器的地址可以为 IP 地址或者 MAC地址。
一种虚拟专用网服务器设备, 包括: 第一采集模块, 用于采集第一 MAC地址路由信息, 第一 MAC地址路由信息为所述 虚拟专用网服务器所属的虚拟专用网内各个站点的 MAC地址路由信息的集合;
发送模块, 用于以单播的方式向目的站点发送第二 MAC地址路由信息; 其中, 所 述第二 MAC地址路由信息为第一 MAC地址路由信息除去目的站点的 MAC地址路由信 息的 MAC地址路由信息的集合。
一种 IP边缘节点设备, 包括:
接收模块, 用于接收虚拟专用网中各站点对应的用户边缘节点发送的认证消息, 所述认证消息携带所述用户边缘节点的信息,所述用户边缘节点的信息为 MAC地址、用 户标识或物理线路信息等;
虚拟专用网标识获取模块, 用于根据接收模块接收的认证消息携带的用户边缘节 点的信息, 从预先设置的用户边缘节点和虚拟专用网的对应关系中获取对应的虚拟专用 网的标识;
虚拟专用网服务器地址获取模块, 用于根据所述虚拟专用网的标识获取虚拟专用 网服务器的地址; 其中, 所述虚拟专用网服务器的地址可以为 IP地址或者 MAC地址; 发送模块, 用于将所述虚拟专用网服务器的地址发送给所述用户边缘节点。
一种基于客户端设备的虚拟专用网系统, 包括:
上述虚拟专用网服务器设备和 IP边缘节点设备;
以及用户边缘节点设备, 用于获取所属虚拟专用网中虚拟专用网服务器的地址, 以及本站点的 MAC地址信息, 然后向所述虚拟专用网服务器发送本站点的 MAC地址路 由信息; 所述虚拟专用网服务器的地址可以为 IP地址或者 MAC地址。
本发明实施例采用 VPN服务器采集本虚拟专用网中各个站点的 MAC地址路由信 息, 再以单播的方式向该虚拟专用网中各站点对应的用户边缘节点发送除目的站点之外 各个站点的 MAC地址路由信息; 这样, 通过以虚拟专用网中的一个节点作为服务器, 对 虚拟专用网内的 MAC地址路由信息进行采集和发送,解决了因组播报文被数据中心互联 网络中的接入节点滤除,从而使得虚拟专用网中各个站点的 CE节点间的路由信息无法通 过路由协议彼此交换的问题。 附图说明
图 1A是数字用户环路接入网络下的基于客户端设备的虚拟专用网架构示意图; 图 1B是本发明第一实施例中路信息发布方法的流程示意图; 图 2A是本发明第二实施例中路信息发布方法的流程示意图;
图 2B是本发明第二实施例中以太网帧封装示意图;
图 2C本发明第二实施例中站点间通信示意图;
图 3A是本发明第三实施例中路信息发布方法的流程示意图;
图 3B是本发明第三实施例中路信息发布方法的流程示意图;
图 4A是本发明第四实施例中路信息发布方法的流程示意图;
图 4B是本发明第四实施例中路信息发布方法的拓扑结构示意图;
图 4C是本发明第四实施例中路信息发布方法的拓扑结构示意图;
图 4D是本发明第四实施例中路信息发布方法的拓扑结构示意图;
图 4E是本发明第四实施例中路信息发布方法的拓扑结构示意图;
图 4F是本发明第四实施例中路信息发布方法的拓扑结构示意图;
图 4G是本发明第四实施例中路信息发布方法的拓扑结构示意图;
图 5A是本发明第五实施例中虚拟专用网服务器设备的逻辑结构示意图;
图 5B是本发明第五实施例中虚拟专用网服务器设备的逻辑结构示意图;
图 6A是本发明第六实施例中 IP边缘节点设备的逻辑结构示意图;
图 6B是本发明第六实施例中 IP边缘节点设备的逻辑结构示意图;
图 7是本发明实第七施例中路由信息发布系统的逻辑结构示意图。 具体实肺式
本发明实施例提供一种路信息发布方法, 本发明实施例还提供相应的设备及基于 客户端设备的虚拟专用网系统。 以下分别进行详细说明。 请参阅图 1B, 本发明实施例中路由信息发布方法的第一实施例具体的:
101、 VPN服务器采集第一 MAC地址路由信息;
VPN服务器为所属虚拟专用网中管理各站点的 MAC地址路由信息的节点, 由 IP边 缘设备根据预先设置的规则从各个 CE节点中选出 VPN服务器,例如, IP边缘设备可以通 过扩展认证协议携带虚拟专用网服务器的地址来获取虚拟专用网服务器的地址, 或者通 过扩展动态主机设置协议的选项携带虚拟专用网服务器的地址来获取虚拟专用网服务 器的地址; 或者通过 TR069协议获取虚拟专用网服务器的地址。
VPN服务器采集第一 MAC地址路由信息, 第一 MAC地址路由信息为 VPN服务器所 属的虚拟专用网内各个站点的 MAC地址路由信息的集合。 每个 VPN网络包含多个站点, 每个站点又包含多个节点; 其中, 站点的 MAC地址 路由信息包括本站点内各个节点(如终端设备、服务器或虚拟机等)的 MAC地址信息与 CE节点的 MAC地址路由信息的集合。
102、 VPN服务器向目的站点发送第二 MAC地址路由信息;
VPN服务器以单播的方式向目的站点发送第二 MAC地址路由信息; 其中, 目的站 点包括多个节点,本实施例中 VPN服务器以单播的方式向除本站点之外的各站点对应的 用户边缘节点发送第二 MAC地址路由信息, 其中, 第二 MAC地址路由信息为第一 MAC 地址路由信息除去目的站点的 MAC地址路由信息的 MAC地址路由信息的集合。
本发明实施例中的方法所表达的思想是, 在每个 VPN网络中选择一个节点作为服 务器,来管理各个节点的诸如 MAC地址等的节点信息,先由网络中各个节点将各自的节 点信息单播发送到服务器, 再由服务器整理后将除发送对象节点外的所有节点的节点信 息单播发送给发送对象节点, 这样就解决了网络中广播所带来的某些节点因不支持而滤 除信息, 从而使得广播信息发送不到网络中其他节点的问题; 在一个物理网络中可以布 置多个 VPN网络, 每个 VPN网络管理本 VPN网络中的各个节点的信息, 所以说在每个 VPN网络中, 各个节点的节点信息是集中式管理的, 但是在整个物理网络中, 各个 VPN 网络内的节点信息又是分布式管理的; 本实施例中的方法所表达的思想不仅仅能用于通 过基于客户端设备的虚拟专用网进行云计算互联的虚拟专用网,还能用于需要解决相同 问题的其他网络; 本实施例中以基于客户端设备的虚拟专用网进行云计算互联的虚拟专 用网为例对本发明发现进行详细说明。
在本实施例中, 在通过基于客户端设备的虚拟专用网进行云计算互联的虚拟专用 网中, VPN服务器采集本虚拟专用网中各个站点的 MAC地址路由信息,再以单播的方式 向该虚拟专用网中各站点对应的用户边缘节点发送除目的站点之外各个站点的 MAC地 址路由信息; 这样, 通过以虚拟专用网中的一个节点作为服务器, 对虚拟专用网内的 MAC地址路由信息进行采集和发送,解决了因组播报文被数据中心互联网络中的接入节 点滤除,从而使得虚拟专用网中各个站点的 CE节点间的路由信息无法通过路由协议彼此 交换的问题。
请参阅图 2A, 本发明实施例中路由信息发布方法的第二实施例具体的:
201、 向数据中心互联网络中的 IP边缘设备发送认证消息;
CE节点向数据中心互联网络中的 IP边缘设备发送认证消息, 该认证消息可以为 DHCP消息, 该认证消息携带本 CE节点的信息, 如 MAC地址。 202、 获取 IP地址和 VPN服务器的地址;
IP边缘设备接收 CE节点发送的动态主机设置协议 (Dynamic Host Configuration Protocol, DHCP)消息, IP边缘设备通过 DHCP服务器为该 CE节点分配 IP地址, 并将该 IP 地址发送给 CE节点;
IP边缘设备还将 CE节点与对应的 IP地址建立对应关系, 对应关系可以用对应关系 表、 图形或者树型结构等来实现, 现以对应关系表为例, 可以通过在本地保存一个 CE 节点与对应的 IP地址的对应关系表来实现, 如表 1所示:
表 1
Figure imgf000008_0001
CE节点接收 IP边缘设备返回的 IP地址, 并将该 IP地址作为本 CE节点的 IP地址; CE节点还需要 VPN服务器的地址, 具体的:
IP边缘设备根据预先设置的规则从各个 CE节点中选出 VPN服务器, 并将该 VPN服 务器的地址 (可以是 IP地址或者 MAC地址) 发送给各个 CE节点;
具体的, 可以通过扩展认证协议携带虚拟专用网服务器的地址来获取虚拟专用网 服务器的地址;
或者, 通过扩展动态主机设置协议的选项携带虚拟专用网服务器的地址来获取虚 拟专用网服务器的地址;
或者, 通过 TR069协议获取虚拟专用网服务器的地址;
向各个 CE节点发送 IP地址以及 VPN服务器的地址,可以在分配 IP地址的 DHCP过程 中携带 VPN服务器的地址同时下发, 也可以分别发送, 此处不做限定;
举例来说, 预先设置的规则具体有: 将第一个认证通过的 CE节点作为 VPN服务器, 或者将拥有最大带宽的 CE节点作为 VPN服务器等等,此处不一一列举, 以上两种预先设 置的规则不能作为对本发明实施例的限制;
203、 VPN服务器采集第一 MAC地址路由信息;
VPN服务器采集第一 MAC地址路由信息, 第一 MAC地址路由信息为 VPN服务器所 属的虚拟专用网内各个站点的 MAC地址路由信息的集合;
具体的, VPN服务器通过接收虚拟专用网中其他站点对应的用户边缘节点发送的 MAC地址路由信息, 并且通过 MAC地址学习得到本站点的 MAC地址信息; 或者, VPN服务器通过接收虚拟专用网中各个站点对应的用户边缘节点发送的 MAC地址路由信息。
204、 VPN服务器向目的站点发送第二 MAC地址路由信息;
VPN服务器以单播的方式向目的站点发送第二 MAC地址路由信息; 其中, 目的站 点包括多个节点,本实施例中 VPN服务器以单播的方式向除本站点之外的各站点对应的 用户边缘节点发送第二 MAC地址路由信息, 第二 MAC地址路由信息为第一 MAC地址路 由信息除去目的站点的 MAC地址路由信息的 MAC地址路由信息的集合;
具体的, VPN服务器通过将携带第二 MAC地址路由信息的路由协议报文承载在单 播 MAC帧进行传输; 其中, 该的目的 MAC地址为用户边缘节点的 MAC地址;
或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 该单播 IP报文的目 的 IP地址为用户边缘节点的 IP地址;
或者, 通过隧道承载路由协议报文进行传输;
或者, 通过路由协议单播报文进行传输。
进一步的, VPN服务器还采集所属虚拟专用网内已经在线的用户边缘节点的信息, 来维护本 VPN的网络拓扑;具体的,如果接收用户边缘节点发送的站点的 MAC地址路由 信息, 说明该用户边缘节点处于在线状态, 则将该用户边缘节点的 MAC地址和 /或 IP地 址保存在本地, 具体可以是预先设置的在线用户边缘节点列表, 如表 2所示:
表 2
Figure imgf000009_0002
当然, 以表格的方式保存并不是唯一方式, 还可以用其他方式例如图形或者树型 结构等来实现, 此处不视为对本发明的限制。
进一步的, VPN服务器采集所属虚拟专用网内各个站点对应的用户边缘节点的 IP 地址; 具体的, 如果接收用户边缘节点发送的站点的 MAC地址路由信息, 则将该用户边 缘节点的 IP地址保存在本地, 具体可以是预先设置的用户边缘节点 IP地址信息列表, 如 表 3所示:
表 3
Figure imgf000009_0001
CEl 192.168.1.1
CE2 192.168.2.1
CE3 192.168.3.1
当然, 以表格的方式保存并不是唯一方式, 还可以用其他方式例如图形或者树型 结构等来实现, 此处不视为对本发明的限制;
进一步的, 如果不动态分配 IP地址给用户边缘节点, 则可以预先在用户边缘节点上 静态配置本用户边缘节点的 IP地址, 以及本用户边缘节点所在 VPN内的 VPN服务器的地 址。
进一步的, 站点与站点之间的通信可以采用以太网技术或者 IP技术, 具体的: 假设 VPN包括 3个站点, 分别是站点 1、 站点 2和站点 3, 站点 1包括节点 Serverl和节 点 CE1, 站点 2包括节点 Server2和节点 CE2, 站点 3包括节点 Server3和节点 CE3;
采用以太网技术: 现以站点 1与站点 2进行通信为例, 一个站点的以太网帧被封装 在另一个以太网帧的净荷中传送到同一个 VPN的另一个站点时, 可以利用的现有技术有 运营商骨干网传输 (Provider Backbone Transport, PBT)技术或者 MACinMAC封装技术, 通过查询 MAC地址路由信息来实现。 以 MACinMAC封装技术为例, 如图 2B, 原始以太 网帧的源 MAC地址为站点 1 (发送站点)下的节点 Serverl的 MAC地址, 原始以太网帧的 目的 MAC地址为站点 2 (目的站点)下的 Server2的 MAC地址; 将原始以太网帧再封装到 外层以太网帧的外层净荷中, 外层以太网帧的源 MAC地址为站点 1 (发送站点) 对应的 用户边缘节点 CE1的 MAC地址, 外层以太网帧的目的 MAC地址为站点 2 (目的站点) 对 应的用户边缘节点 CE2的 MAC地址; CE1节点接收来自站点 1下的 Serverl的目的地址为 站点 2下的 Server2的原始以太网帧,查 MAC地址路由信息得到 Server2的 MAC地址对应的 下一跳地址, 即 CE2节点的 MAC地址, 则将接收的原始以太网帧进行 MACinMAC封装, 将封装好的以太网帧发送给 CE2节点, 再由 CE2节点将接收的原始以太网帧转发给 Server2, 由站点 2下的 Server2发送以太网帧给站点 1下的 Serverl的过程也一样, 如图 2C 所示。
采用 IP技术:一个站点的以太网帧被封装在 IP报文的净荷中传送到同一个 VPN的另 一个站点, 可通过查 MAC地址路由信息实现。 例如, 对于站点 1到站点 2方向, 站点 1对 应的用户边缘节点 CE1接收来自站点 1下的 Serverl的目的地址为站点 2下的 Server2的以 太网帧,查 MAC地址路由信息得到 Server2的 MAC地址对应的下一跳地址为站点 2对应的 用户边缘节点 CE2的地址, 则用户边缘节点 CE1把来自 Serverl的以太网帧通过 IP封装先 送给 CE2, 外层以太网的源 IP地址为用户边缘节点 CEl的 IP地址, 外层以太网的目的 IP 地址为用户边缘节点 CE2的 IP地址; 再由用户边缘节点 CE2将以太网帧转发给 Server2。 本发明实施例中的方法所表达的思想是, 在网络中选择一个节点作为服务器, 来 管理各个节点的诸如 MAC地址等的节点信息,先由网络中各个节点将各自的节点信息单 播发送到服务器, 再由服务器整理后将除发送对象节点外的所有节点的节点信息单播发 送给发送对象节点, 这样就解决了网络中广播所带来的某些节点因不支持而滤除信息, 从而使得广播信息发送不到网络中其他节点的问题; 在每个 VPN网络中, 各个节点的节 点信息是集中式管理的, 但是在整个物理网络中, 各个 VPN的节点的节点信息又是分布 式管理的; 本实施例中的方法所表达的思想不仅仅能用于通过基于客户端设备的虚拟专 用网进行云计算互联的虚拟专用网, 还能用于需要解决相同问题的其他网络; 本实施例 中以基于客户端设备的虚拟专用网进行云计算互联的虚拟专用网为例对本发明发现进 行详细说明。
在本实施例中, 在通过基于客户端设备的虚拟专用网进行云计算互联的虚拟专用 网中, 先在虚拟专用网中预先选出一个 VPN服务器, 该 VPN服务器用于管理各站点的 MAC地址路由信息; VPN服务器先采集本虚拟专用网中各个站点的 MAC地址路由信息, 再以单播的方式向该虚拟专用网中各站点对应的用户边缘节点发送除目的站点之外各 个站点的 MAC地址路由信息; 这样, 通过以虚拟专用网中的一个节点作为服务器, 对虚 拟专用网内的 MAC地址路由信息进行采集和发送,解决了因组播报文被数据中心互联网 络中的接入节点滤除,从而使得虚拟专用网中各个站点的 CE节点间的路由信息无法通过 路由协议彼此交换的问题。
请参阅图 3A, 图 3B, 本发明实施例中路由信息发布方法的第三实施例具体的:
301、 IP边缘设备接收各用户边缘节点发送的认证消息, 该认证消息携带用户边缘 节点的信息;
IP边缘设备接收虚拟专用网中各站点对应的用户边缘节点发送的认证消息,该认证 消息可以为 DHCP、 802.1X、 可扩展认证协议 (Extensible Authentication Protocol, EAP) 或网络接入认证 7 载十办议 (Protocol for Carrying Authentication and Network Access, PANA)消息, 该认证消息携带用户边缘节点的信息, 如 MAC地址、用户标识或物理线路 信息等;
302、 根据用户边缘节点的信息获取对应的虚拟专用网的标识;
IP边缘设备根据用户边缘节点的信息从预先设置的用户边缘节点和虚拟专用网的 对应关系中获取对应的虚拟专用网的标识; 具体的, 对应关系可以以对应关系表、 图形 或者树型结构等来实现, 以对应关系表来举例说明, 如表 4:
表 4
Figure imgf000012_0001
举例说明, IP边缘设备接收的由用户边缘节点发送的 DHCP消息携带的 MAC地址为 10-23-59-65-89-F7, 则 IP边缘设备根据 MAC地址 10-23-59-65-89-F7从预先设置的用户边 缘节点和虚拟专用网的对应关系表 4中查询, MAC地址 10-23-59-65-89-F7对应的是 VPN1 , 即 MAC地址 10-23-59-65-89-F7对应的用户边缘节点属于虚拟专用网 VPN1。
303、 IP边缘设备根据虚拟专用网的标识获取 VPN服务器的地址, 并将该地址发送 给用户边缘节点;
IP边缘设备根据虚拟专用网的标识从预先设置在本地的虚拟专用网的标识与 VPN 服务器的地址的对应关系中获取 VPN服务器的地址, 并通过返回用户边缘节点的认证消 息将 VPN服务器的地址携带给用户边缘节点; VPN服务器的地址可以为 IP地址或者 MAC 地址, 对应关系可以以对应关系表、 图形或者树型结构等来实现, 以对应关系表来举例 说明, 如表 5, 以 IP地址为例:
表 5
Figure imgf000012_0002
举例说明,虚拟专用网的标识为 VPN2,则 IP边缘设备根据标识 VPN2从预先设置在 本地的虚拟专用网的标识与 VPN服务器的 IP地址的对应关系表 5中查询, VPN2对应的 VPN服务器的 IP地址为 192.168.3.1。
进一步的, 如图 3B所示:
3.1、 用户边缘节点发送 DHCP消息 (如 DHCP Request消息) 给接入节点;
3.2、接入节点接收用户边缘节点发送的 DHCP消息后,根据接收的物理线路从物理 线路与 Line ID (线路标识) 的对应关系中获取与该物理线路对应的 Line ID, 并将该 Line ID添加到接收的 DHCP消息, 物理线路与 Line ID的对应关系具体可以以对应表、 图形或 者树型结构等来实现;
3.3、 接入节点将添加了 Line ID的 DHCP消息 (如 DHCP请求消息) 发送给 IP边缘 节点;
3.4、 IP边缘节点接收添加了 Line ID的 DHCP消息,并向 AAA服务器发送该携带 Line
ID的 AAA消息 (如接入请求消息);
3.5、 AAA服务器接收携带 Line ID的 AAA消息后, 根据 Line ID进行端口认证, 获得 VPN服务器的地址, 该地址可以为 IP地址或者 MAC地址, 在 AAA服务器上, 预先设置 有虚拟专用网标识和 VPN服务器的地址的对应关系,以及 Line ID与虚拟专用网标识的对 应关系, 或者, 预先设置有 Line ID与 VPN服务器的地址的对应关系, 所以, 根据 Line ID 就能查询到对应的 VPN服务器的地址, 该对应关系具体可以以对应表、 图形或者树型结 构等来实现;
3.6、 AAA服务器向 IP边缘节点返回 AAA消息(如接入接受消息), 该消息携带 Line ID和对应的 VPN服务器的地址;
3.7、 IP边缘设备将携带 Line ID和对应的 VPN服务器的地址的 DHCP消息 (如 DHCP 应答消息) 发送给接入节点;
3.8、 接入节点接收携带 Line ID和对应的 VPN服务器的地址的 DHCP消息后, 根据
Line ID从物理线路与 Line ID的对应关系查找到与 Line ID对应的物理线路, 然后删除
DHCP消息中的 Line ID;
3.9、接入节点将携带了 VPN服务器的地址的 DHCP消息通过查找到的物理线路发送 给用户边缘节点。
进一步的, VPN服务器的 IP地址还可以通过 TR069协议动态下发给用户边缘节点。 进一步的, 也可以根据用户边缘节点的地址, 如 MAC地址或者 IP地址来获取 VPN 服务器的 IP地址,此时只需将图 4B中的 Line ID改为用户边缘节点的地址, 获取过程与根 据 Line ID获取 VPN服务器的 IP地址相同, 此处不再赘述。
进一步的, 在步骤 402之后还包括: 如果还没有选定 VPN服务器, IP边缘节点根据 预先设定的选举规则选举出 VPN服务器, 并建立虚拟专用网与 VPN服务器的地址的对应 关系; 具体的, 预先设定的选举规则可以是虚拟专用网中第一个认证通过的用户边缘节 点作为 VPN服务器, 或者拥有最大带宽的用户边缘节点作为 VPN服务器, 等等; 虚拟专 用网与 VPN服务器的地址的对应关系, 对应关系可以以对应关系表、 图形或者树型结构 等来实现, 以对应关系表来举例说明, 如表 5所示; VPN服务器可以是虚拟专用网中的 CE节点, 或者还可以是虚拟专用网中的 PE节点。
进一步的, 在步骤 302之后还包括: IP边缘设备协助用户边缘节点从 DHCP服务器 获取 IP地址, 并将该 IP地址发送给用户边缘节点。
进一步的, IP边缘节点通过会话保活监测虚拟专用网与对应的 VPN服务器之间的链 路状态, 如果监测到虚拟专用网与对应的 VPN服务器之间的链路发生故障, 则根据预先 设定的选举规则重新选举出新的 VPN服务器, 并建立虚拟专用网与该新的 VPN服务器的 对应关系, 再将新的 VPN服务器的地址发送给虚拟专用网内的各个用户边缘节点。
在本实施例中,用户边缘节点从 IP边缘节点获取 VPN服务器的地址,使得用户边缘 节点能够在 MAC地址学习后将本站点的 MAC地址路由信息发送给 VPN服务器, 使得 VPN服务器能够对虚拟专用网中各站点的 MAC地址路由信息进行管理和发布,从而解决 因组播报文被数据中心互联网络中的接入节点滤除, 从而使得虚拟专用网中各个站点的 CE节点间的路由信息无法通过路由协议彼此交换的问题; 并且, IP边缘节点还实时监测 虚拟专用网与对应的 VPN服务器之间的链路状态, 当两者的链路发送故障时, 及时重新 选择新的 VPN服务器, 解决意外情况。
请参阅图 4A、 图 4B、 图 4C、 图 4D, 本发明实施例中路信息发布方法的第四实施例 为:
可在 VPN网络中设置 VPN服务器或 VPN服务器池, 该 VPN服务器或 VPN服务器池 用于管理 VPN网络中各成员节点的信息, 提供 VPN成员节点的路由信息查询服务。
对于每个 VPN, 通过选举产生 VPN服务器或 VPN服务器池, 以 VPN服务器为例,
VPN服务器可以是 CE、或 PE或其它节点 (如 AAA服务器); 不同的 VPN, VPN服务器位置 可能不同; 如图 4B所示, VPN1服务器位于 CE2, 而其它 VPN的 VPN服务器可以是其它 节点。
VPN服务器负责收集本 VPN内的 MAC地址路由信息, 并负责发布本 VPN的 MAC地 址路由信息给本 VPN的各个 CE; 同一个 VPN内部, MAC地址信息是由 VPN服务器集中 管理,但不同 VPN, MAC地址信息将按 VPN分散到不同 VPN服务器实现集中式和分布式 混合管理。
CE通过路由协议(如 IS-IS) 向 VPN服务器发布其所属站点内部的各个 MAC地址路 由信息; 其中, MAC地址路由信息包含站点内部的 MAC地址和站点对应的 CE的地址, CE的 MAC地址可以是 MAC地址或 IP地址,站点对应的 CE的地址在 MAC地址路由中被作 为下一跳地址。
另外, VPN服务器还可以负责收集一个 VPN内的 IP地址信息, 并负责发布 VPN的 IP 地址信息给该 VPN的各个 CE; CE还可以通过路由协议 (如 IS-IS) 向 VPN服务器发布其 所属站点内的各个 IP地址信息。
下面进行详细说明:
1、 CE1进行用户认证;
节点 CE1向数据中心互联网络中的 IP边缘节点发送认证消息, 该认证消息可以是 DHCP、 802. IX、 EAP或 PANA消息, 该认证消息携带本节点 CE1的信息, 如 MAC地址、 用户标识或 Line ID。
2、 CE2进行用户认证;
节点 CE2向数据中心互联网络中的 IP边缘节点发送认证消息, 该认证消息可以是 DHCP、 802. IX、 EAP或 PANA消息, 该认证消息携带本节点 CE2的信息, 如 MAC地址、 用户标识或 Line ID。
3、 获取节点 CE1、 CE2的 VPN标识;
IP边缘节点根据节点 CE1、 CE2的信息从预先设置的用户边缘节点和虚拟专用网的 对应关系中获取对应的虚拟专用网的标识; 具体的, 对应关系可以以对应关系表、 图形 或者树型结构等来实现, 以 MAC地址对应关系表来举例说明, 如表 6所示:
表 6
Figure imgf000015_0001
举例说明, 节点 CE1发送的认证消息携带的 MAC地址为 10-23-59-65-89-F7, 则 IP边 缘节点根据 MAC地址 10-23-59-65-89-F7从预先设置的用户边缘节点和虚拟专用网的对 应关系表 6中查询, MAC地址 10-23-59-65-89-F7对应的是 VPN1 , 节点 CE1属于虚拟专用 网 VPN1。
4、 选 VPN服务器;
IP边缘节点根据预先设定的选举规则选举出 VPN服务器,并建立虚拟专用网与 VPN 服务器的地址的对应关系, 该地址可以为 VPN服务器的 IP地址或者 VPN服务器的 MAC 地址; 具体的, 预先设定的选举规则可以是虚拟专用网中第一个认证通过的用户边缘节 点作为 VPN服务器, 或者拥有最大带宽的用户边缘节点作为 VPN服务器, 等等; 虚拟专 用网与所述 VPN服务器的地址的对应关系, 对应关系可以以对应关系表、 图形或者树型 结构等来实现, 以对应关系表来举例说明, 如实施例四中的表 5所示; 在本应用例中, IP边缘节点选出 CE2作为 VPN1的 VPN服务器。
5a、 向节点 CE1发送 IP地址和 VPN服务器的地址;
IP边缘节点协助节点 CE1从 DHCP服务器获取 IP地址, 并获取 VPN服务器的地址即 节点 CE2的地址(IP地址或者 MAC地址), 将 IP地址和 VPN服务器的地址通过扩展 DHCP 的选项下发给节点 CE1 ;
进一步的, VPN服务器的地址还可以通过扩展认证协议携带 VPN服务器的地址来 获取, 或者还可以通过 TR069协议动态获取。
5b、 向节点 CE2发送 IP地址和 VPN服务器的地址;
IP边缘节点协助节点 CE2从 DHCP服务器获取 IP地址, 并获取 VPN服务器的地址即 节点 CE2的地址(IP地址或者 MAC地址), 将 IP地址和 VPN服务器的地址通过 DHCP或者 TR069动态下发给节点 CE2;
进一步的, VPN服务器的地址还可以通过扩展认证协议携带 VPN服务器的地址来 获取, 或者还可以通过 TR069协议动态获取。
6、 节点 CE1、 CE2获取本站点的 MAC地址信息;
节点 CE1、 CE2通过 MAC地址学习分别获取本站点的 MAC地址信息, 具体的, 用 户边缘节点向站点内所有用户终端广播一个报文, 用户终端收到报文后, 往用户边缘节 点返回一个报文,该返回的报文包含了本用户终端的 MAC地址,用户边缘节点收到返回 的报文后, 将携带的 MAC地址保存到本地的 MAC地址转发表中, 将学习得到的 MAC地 址信息, 加上下一跳的地址信息, 即用户边缘节点 (如节点 CE1 ) 的地址信息 (可以是 IP地址或者 MAC地址), 组成本站点的 MAC地址路由信息。
7、 节点 CE1向 VPN服务器发送本站点的 MAC地址路由信息;
节点 CE1获取本站点的 MAC地址信息后, 以单播的形式将本站点的 MAC地址路由 信息发送给 VPN服务器,例如,通过将携带第二 MAC地址路由信息的路由协议报文承载 在单播 MAC帧进行传输; 其中, 该的目的 MAC地址为用户边缘节点的 MAC地址; 或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 该单播 IP报文的目的 IP地址为 用户边缘节点的 IP地址; 或者, 通过隧道承载路由协议报文进行传输; 或者, 通过路由 协议单播报文进行传输。
8、 VPN服务器保存节点 CE1发送的节点 CE1所在站点的 MAC地址路由信息;
9、 VPN服务器向节点 CE1发送第二 MAC地址路由信息;
VPN服务器,即节点 CE2以单播的方式向虚拟专用网中除本站点之外的各站点对应 的用户边缘节点, 即节点 CE1发送第二 MAC地址路由信息, 第二 MAC地址路由信息为 第一 MAC地址路由信息除去目的站点的 MAC地址路由信息的 MAC地址路由信息的集 合, 在此处即节点 CE2的 MAC地址路由信息;
具体的, VPN服务器通过将携带第二 MAC地址路由信息的路由协议报文承载在单 播 MAC帧进行传输; 其中, 该的目的 MAC地址为用户边缘节点的 MAC地址;
或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 该单播 IP报文的目 的 IP地址为用户边缘节点的 IP地址;
或者, 通过隧道承载路由协议报文进行传输;
或者, 通过路由协议单播报文进行传输。
10、 CE3进行用户认证;
节点 CE3向数据中心互联网络中的 IP边缘节点发送认证消息, 该认证消息可以是
DHCP消息、 802.1X、 EAP或 PANA消息, 该认证消息携带本节点 CE3的信息, 如 MAC 地址、 用户标识或 Line ID。
11、 获取节点 CE3的 VPN标识;
IP边缘节点根据节点 CE3的信息从预先设置的用户边缘节点和虚拟专用网的对应 关系中获取对应的虚拟专用网的标识; 具体的, 对应关系可以以对应关系表、 图形或者 树型结构等来实现, 以对应关系表来举例说明, 如表 6所示, 节点 CE3发送的 DHCP消息 携带的 MAC地址为 00-58-27-06-09-P4, 则 IP边缘节点根据 MAC地址 00-58-27-06-09-P4从 预先设置的用户边缘节点和虚拟专用网的对应关系表 6中查询, MAC地址 00-58-27-06-09-P4对应的是 VPN1 , 节点 CE3属于虚拟专用网 VPN1。
12、 向节点 CE3发送 IP地址和 VPN服务器的地址;
IP边缘节点协助节点 CE3从 DHCP服务器获取 IP地址, 并获取 VPN服务器的地址即 节点 CE2的地址(IP地址或者 MAC地址), 将 IP地址和 VPN服务器的地址通过 DHCP或者 TR069动态下发给节点 CE3;
进一步的, VPN服务器的地址还可以通过扩展认证协议携带 VPN服务器的地址来 获取, 或者还可以通过 TR069协议动态获取。 如图 4B所示,节点 CE1、CE2、CE3分别通过 IP边缘节点进行认证,并协助节点 CE1、 CE2、 CE3获取 IP地址, 并分别发送给节点 CE1、 CE2、 CE3, IP边缘节点选出节点 CE2 作为 VPN1的 VPN服务器, 并将节点 CE2的地址分别发送给节点 CE1、 CE2、 CE3。
13、 节点 CE3获取本站点的 MAC地址信息;
节点 CE3通过 MAC地址学习分别获取本站点的 MAC地址信息, 具体的, 用户边缘 节点向站点内所有用户终端广播一个报文, 用户终端收到报文后, 往用户边缘节点返回 一个报文,该返回的报文包含了本用户终端的 MAC地址,用户边缘节点收到返回的报文 后,将携带的 MAC地址保存到本地的 MAC地址转发表中,将学习得到的 MAC地址信息, 加上下一跳的地址信息, 即用户边缘节点 (如节点 CE3) 的地址信息 (可以是 IP地址或 者 MAC地址), 组成本站点的 MAC地址路由信息。
14、 节点 CE3向 VPN服务器发送本站点的 MAC地址路由信息;
节点 CE3获取本站点的 MAC地址路由信息后, 以单播的形式将本站点的 MAC地址 路由信息发送给 VPN服务器,例如,通过将携带第二 MAC地址路由信息的路由协议报文 承载在单播 MAC帧进行传输; 其中, 该的目的 MAC地址为用户边缘节点的 MAC地址; 或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 该单播 IP报文的目的 IP 地址为用户边缘节点的 IP地址; 或者, 通过隧道承载路由协议报文进行传输; 或者, 通 过路由协议单播报文进行传输。
如图 4C中虚线所示, VPN1中的 VPN服务器, 即节点 CE2通过 IP边缘节点采集站点 1 和站点 3的 MAC地址路由信息, 分别由节点 CE1、 节点 CE3通过 IP边缘节点发送给 VPN 服务器;
节点 CE1、 CE2、 CE3分别通过 IP边缘节点进行认证, 如果 IP边缘节点选择节点 PE2 作为 VPN1的 VPN服务器, 如图 4D中虚线所示, 节点 CE1、 CE2、 CE3分别向 VPN服务器, 即节点 PE2, 发送各站点的 MAC地址路由信息。
15、 VPN服务器保存节点 CE3发送的节点 CE1所在站点的 MAC地址路由信息; 16、 VPN服务器向节点 CE3发送第二 MAC地址路由信息;
VPN服务器, 即节点 CE2, 向节点 CE3发送节点 CE1、 CE2所在站点的 MAC地址路 由信息;
具体的, VPN服务器通过将携带第二 MAC地址路由信息的路由协议报文承载在单 播 MAC帧进行传输; 其中, 该的目的 MAC地址为用户边缘节点的 MAC地址;
或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 该单播 IP报文的目 的 IP地址为用户边缘节点的 IP地址;
或者, 通过隧道承载路由协议报文进行传输;
或者, 通过路由协议单播报文进行传输。
17、 VPN服务器向节点 CE1发送第二 MAC地址路由信息;
VPN服务器, 向节点 CE1发送新的节点 CE3所在站点的 MAC地址路由信息; 具体的, VPN服务器通过将携带第二 MAC地址路由信息的路由协议报文承载在单 播 MAC帧进行传输; 其中, 该的目的 MAC地址为用户边缘节点的 MAC地址;
或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 该单播 IP报文的目 的 IP地址为用户边缘节点的 IP地址;
或者, 通过隧道承载路由协议报文进行传输;
或者, 通过路由协议单播报文进行传输。
如图 4E中虚线所示, VPN服务器, 即节点 CE2分别向节点 CE1、 CE3发送第二 MAC 地址路由信息;
如果 IP边缘节点选出的 VPN1的 VPN服务器是节点 PE2, 则 PE2向节点 CE1、 CE2、 CE3发送第二 MAC地址路由信息, 如图 4F中虚线所示;
18、 保活监测;
IP边缘节点通过会话保活监测虚拟专用网与对应的 VPN服务器之间的链路状态,如 果监测到虚拟专用网与对应的 VPN服务器之间的链路发生故障, 则根据预先设定的选举 规则重新选举出新的 VPN服务器, 并建立虚拟专用网与该新的 VPN服务器的对应关系, 再将新的 VPN服务器的地址发送给虚拟专用网内的各个用户边缘节点。
19、 IP边缘节点监测到 VPN1的 VPN服务器, 即节点 CE2故障。
20、 重新选 VPN服务器;
IP边缘节点重新选出新的 VPN1的 VPN服务器, 为 CE3。
21、 向节点 CE1发送新的 VPN服务器的地址;
IP边缘节点将新的 VPN服务器, 即节点 CE3的地址发送给节点 CE1 , 节点 CE1接收 并保存 VPN服务器, 即节点 CE3的地址。
22、 向节点 CE3发送 VPN服务器的地址;
IP边缘节点将新的 VPN服务器, 即节点 CE3的地址发送给节点 CE3, 节点 CE3接收 到 VPN服务器的地址, 并且与自己的地址相同, 判断出自己是 VPN1的 VPN服务器。
新的 VPN服务器, 即节点 CE3负责对 PVN1内各站点的 MAC地址路由信息的收集与 发送。
如图 4G所示, IP边缘节点监测到节点 CE2, 即 VPN1的 VPN服务器 Session中段, 如 图中叉号所示, IP边缘节点重新选择节点 CE3作为 VPN1的 VPN服务器并更新 VPN服务器 地址, 如图中虚线所示 I, P边缘节点将新的 VPN服务器的地址, 即节点 CE3的地址分别 发送给节点 CE1和节点 CE3。
本发明实施例中的方法所表达的思想是, 在网络中选择一个节点作为服务器, 来 管理各个节点的诸如 MAC地址等的节点信息,先由网络中各个节点将各自的节点信息单 播发送到服务器, 再由服务器整理后将除发送对象节点外的所有节点的节点信息单播发 送给发送对象节点, 这样就解决了网络中广播所带来的某些节点因不支持而滤除信息, 从而使得广播信息发送不到网络中其他节点的问题; 在每个 VPN网络中, 各个节点的节 点信息是集中式管理的, 但是在整个物理网络中, 各个 VPN的节点的节点信息又是分布 式管理的; 本实施例中的方法所表达的思想不仅仅能用于通过基于客户端设备的虚拟专 用网进行云计算互联的虚拟专用网, 还能用于需要解决相同问题的其他网络; 本实施例 中以基于客户端设备的虚拟专用网进行云计算互联的虚拟专用网为例对本发明发现进 行详细说明。
在本应用例中, 在虚拟专用网中预先选出一个 VPN服务器, 该 VPN服务器用于管 理各站点的 MAC地址路由信息; VPN服务器先采集本虚拟专用网中各个站点的 MAC地 址路由信息, 再以单播的方式向该虚拟专用网中各站点对应的用户边缘节点发送除目的 站点之外各个站点的 MAC地址路由信息;这样,通过以虚拟专用网中的一个节点作为服 务器,对虚拟专用网内的 MAC地址路由信息进行采集和发送,解决了因组播报文被数据 中心互联网络中的接入节点滤除,从而使得虚拟专用网中各个站点的 CE节点间的路由信 息无法通过路由协议彼此交换的问题。
请参阅图 5A, 图 5B,本发明实施例中虚拟专用网服务器设备的第五实施例具体的: 请参阅图 5A, 第一采集模块 501, 用于采集第一 MAC地址路由信息, 第一 MAC地 址路由信息为虚拟专用网服务器所属的虚拟专用网内各个站点的 MAC地址路由信息的 朱口;
发送模块 502, 用于以单播的方式向目的站点发送第二 MAC地址路由信息; 其中, 目的站点包括多个节点,本实施例中 VPN服务器以单播的方式向除本站点之外的各站点 对应的用户边缘节点发送第二 MAC地址路由信息, 其中, 第二 MAC地址路由信息为第 一 MAC地址路由信息除去目的站点的 MAC地址路由信息的 MAC地址路由信息的集合; 进一步的, 请参阅图 5B, 虚拟专用网服务器设备还包括:
获取模块 503, 用于获取所属虚拟专用网中 VPN服务器的地址, 该地址可以为 IP地 址或者 MAC地址; 具体的, 获取 VPN服务器的地址可以通过将携带第二 MAC地址路由 信息的路由协议报文承载在单播 MAC帧进行传输; 其中, 该的目的 MAC地址为用户边 缘节点的 MAC地址; 或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 该 单播 IP报文的目的 IP地址为用户边缘节点的 IP地址; 或者, 通过隧道承载路由协议报文 进行传输; 或者, 通过路由协议单播报文进行传输。
第二采集模块 504, 用于采集所属虚拟专用网内已经在线的用户边缘节点的信息; 第一采集模块 501包括:
接收单元 501a, 用于接收虚拟专用网中其他站点对应的用户边缘节点发送的 MAC 地址路由信息;
本站点的 MAC地址信息获取单元 501b,用于通过 MAC地址学习得到本站点的 MAC 地址信息。
在本实施例中, 虚拟专用网服务器设备采集本虚拟专用网中各个站点的 MAC地址 路由信息, 再以单播的方式向该虚拟专用网中各站点对应的用户边缘节点发送除目的站 点之外各个站点的 MAC地址路由信息;这样,通过以虚拟专用网中的一个节点作为服务 器,对虚拟专用网内的 MAC地址路由信息进行采集和发送,解决了因组播报文被数据中 心互联网络中的接入节点滤除,从而使得虚拟专用网中各个站点的 CE节点间的路由信息 无法通过路由协议彼此交换的问题。
请参阅图 6A, 图 6B, 本发明实施例中 IP边缘节点设备的第六实施例具体的: 请参阅图 6A, IP边缘节点设备包括:
接收模块 601, 用于接收虚拟专用网中各站点对应的用户边缘节点发送的认证消 息, 该认证消息可以为 DHCP消息, 该认证消息携带用户边缘节点的信息;
虚拟专用网标识获取模块 602, 用于根据接收模块接收的认证消息携带的用户边缘 节点的信息, 从预先设置的用户边缘节点和虚拟专用网的对应关系中获取对应的虚拟专 用网的标识;
虚拟专用网服务器地址获取模块 603, 用于根据虚拟专用网的标识获取虚拟专用网 服务器的地址, 该地址可以为 IP地址或者 MAC地址;
发送模块 604, 用于将虚拟专用网服务器地址获取模块 604获取的地址发送给对应 的用户边缘节点。 请参阅图 6B, IP边缘节点设备还包括:
虚拟专用网服务器选举模块 605, 用于根据预先设定的选举规则选举出虚拟专用网 服务器;
对应关系建立模块 606, 用于建立虚拟专用网与所述虚拟专用网服务器的地址的对 应关系, 该地址可以为 IP地址或者 MAC地址;
保活监测模块 607, 用于通过会话保活监测虚拟专用网与对应的虚拟专用网服务器 之间的链路状态。
IP边缘节点设备还包括: IP地址分配模块, 用于协助用户边缘节点获取 IP地址, 并 将该 IP地址发送给所述用户边缘节点。
在本实施例中,用户边缘节点从 IP边缘节点获取 VPN服务器的地址,使得用户边缘 节点能够在 MAC地址学习后将本站点的 MAC地址路由信息发送给 VPN服务器, 使得 VPN服务器能够对虚拟专用网中各站点的 MAC地址路由信息进行管理和发布,从而解决 因组播报文被数据中心互联网络中的接入节点滤除, 从而使得虚拟专用网中各个站点的 CE节点间的路由信息无法通过路由协议彼此交换的问题; 并且, IP边缘节点还实时监测 虚拟专用网与对应的 VPN服务器之间的链路状态, 当两者的链路发送故障时, 及时重新 选择新的 VPN服务器, 解决意外情况。
请参阅图 7, 本发明实施例中基于客户端设备的虚拟专用网系统的第七实施例具体 的:
包括实施例六中的虚拟专用网服务器设备 701, 实施例八中的 IP边缘节点设备 703; 以及用户边缘节点设备 702;
用户边缘节点设备 702, 用于获取所属虚拟专用网中 VPN服务器的地址, 该地址可 以为 IP地址或者 MAC地址, 具体的: 通过扩展认证协议携带 VPN服务器的地址来获取 VPN服务器的地址; 或者, 通过扩展 DHCP的选项携带 VPN服务器的地址来获取 VPN服 务器的地址,例如在扩展 DHCP分配 IP地址时,通过扩展 DHCP的选项携带 VPN服务器的 地址, 使得该 IP地址和 VPN服务器的地址同时下发; 或者, 通过 TR069协议获取 VPN服 务器的地址; 获取本站点的 MAC地址信息, 具体的: 用户边缘节点设备 702向站点内所 有用户终端广播一个报文, 用户终端收到报文后, 往用户边缘节点设备 702返回一个报 文, 该返回的报文包含了本用户终端的 MAC地址, 用户边缘节点设备 702收到返回的报 文后, 将携带的 MAC地址保存到本地的 MAC地址转发表中; 向 VPN服务器发送本站点 的 MAC地址路由信息, 具体的: 用户边缘节点设备 702采集到本站点的 MAC地址路由信 息后, 以单播的形式将本站点的 MAC地址路由信息发送给 VPN服务器, 例如, 通过将携 带第二 MAC地址路由信息的路由协议报文承载在单播 MAC帧进行传输; 其中, 该的目 的 MAC地址为用户边缘节点的 MAC地址; 或者, 通过将路由协议报文承载在单播 IP报 文进行传输; 其中, 该单播 IP报文的目的 IP地址为用户边缘节点的 IP地址; 或者, 通过 隧道承载路由协议报文进行传输; 或者, 通过路由协议单播报文进行传输;
进一步的, 用户边缘节点设备 702还用于: 在获取本站点的 MAC地址信息之前, 先 向数据中心互联网络中的 IP边缘设备发送认证消息, 该认证消息可以为, 该认证消息携 带用户边缘节点设备的信息, 如 MAC地址、用户名与密码、用户设备标识或线路标识等 等, IP边缘设备接收该认证消息后, 根据用户边缘节点的信息从认证、 授权和计费 (Authentication , Authorization and Accounting, AAA)月艮务器获取到该用户边缘节点设 备所在虚拟专用网的标识, 再协助用户边缘节点设备从动态主机设置协议服务器获取该 用户边缘节点设备的 IP地址, 并将获取的 IP地址发送给用户边缘节点设备; 用户边缘节 点设备接收经 IP边缘设备分配给自己的 IP地址。
进一步的, 本发明实施例八提供的一种基于客户端设备的虚拟专用网系统中, 对 虚拟专用网服务器设备 701的具体描述可以参照实施例一或实施例二或实施例四中的描 述; 对用户边缘节点设备 702的具体描述可以参照实施例四中的描述; 对 IP边缘节点设 备 703的具体描述可以参照实施例三或实施例四中的描述。
在本实施例中, 虚拟专用网服务器设备采集本虚拟专用网中各个站点的 MAC地址 路由信息, 再以单播的方式向该虚拟专用网中各站点对应的用户边缘节点发送除目的站 点之外各个站点的 MAC地址路由信息;这样,通过以虚拟专用网中的一个节点作为服务 器,对虚拟专用网内的 MAC地址路由信息进行采集和发送,解决了因组播报文被数据中 心互联网络中的接入节点滤除,从而使得虚拟专用网中各个站点的 CE节点间的路由信息 无法通过路由协议彼此交换的问题。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以 通过程序来指令相关的硬件来完成, 该程序可以存储于一计算机可读存储介质中, 存储 介质可以包括:只读存储器(ROM, Read Only Memory),随机存取存储器(RAM, Random
Access Memory )、 磁盘或光盘等。 以上对本发明实施例所提供的路由信息发布方法以及设备、及虚拟专用网系统进行 了详细介绍, 本文中应用了具体个例对本发明的原理及实施方式进行了阐述, 以上实施 例的说明只是用于帮助理解本发明的方法及其核心思想; 同时, 对于本领域的一般技术 人员, 依据本发明的思想, 在具体实施方式及应用范围上均会有改变之处, 综上所述, 本说明书内容不应理解为对本发明的限制。

Claims

权利要求
1、 一种路由信息发布方法, 其特征在于, 包括:
虚拟专用网服务器采集第一介质访问控制 (Medium/Media Access Control, MAC) 地址路由信息,第一 MAC地址路由信息为所述虚拟专用网服务器所属的虚拟专用网内各 个站点的 MAC地址路由信息的集合;其中,所述虚拟专用网服务器用于为所属虚拟专用 网管理各站点的 MAC地址路由信息;
虚拟专用网服务器以单播的方式向目的站点发送第二 MAC地址路由信息; 其中, 所述第二 MAC地址路由信息为第一 MAC地址路由信息除去目的站点之外的各个站点的 MAC地址路由信息的集合。
2、 根据权利要求 1所述的方法, 其特征在于, 所述采集第一 MAC地址路由信息的 步骤之前还包括:
虚拟专用网服务器获取本虚拟专用网服务器的地址, 所述虚拟专用网服务器的地 址可以为 IP地址或者 MAC地址。
3、 根据权利要求 2所述的方法, 其特征在于, 所述虚拟专用网服务器获取本虚拟 专用网服务器的地址的步骤具体为:
通过扩展认证协议携带虚拟专用网服务器的地址来获取虚拟专用网服务器的地 址;
或者, 通过扩展动态主机设置协议的选项携带虚拟专用网服务器的地址来获取虚 拟专用网服务器的地址;
或者, 通过 TR069协议获取虚拟专用网服务器的地址。
4、 根据权利要求 3所述的方法, 其特征在于, 所述通过扩展动态主机设置协议的 选项携带虚拟专用网服务器的地址来获取虚拟专用网服务器的地址, 具体为:
在扩展动态主机设置协议分配 IP地址时,通过扩展动态主机设置协议的选项携带虚 拟专用网服务器的地址, 使得所述 IP地址和所述虚拟专用网服务器的地址同时下发。
5、 根据权利要求 4所述的方法, 其特征在于, 所述方法还包括:
虚拟专用网服务器采集所属虚拟专用网内已经在线的用户边缘节点的信息。
6、 根据权利要求 5所述的方法, 其特征在于, 所述采集第一 MAC地址路由信息的 步骤具体为:
虚拟专用网服务器接收虚拟专用网中其它站点对应的用户边缘节点发送的 MAC地 址路由信息, 并且通过 MAC地址学习得到本站点的 MAC地址信息; 或者, 虚拟专用网服务器接收虚拟专用网中各个站点对应的用户边缘节点发送的 MAC地址路由信息。
7、 根据权利要求 6所述的方法, 其特征在于, 所述虚拟专用网服务器以单播的方 式向目的站点发送第二 MAC地址路由信息的步骤具体为:
将携带第二 MAC地址路由信息的路由协议报文承载在单播 MAC帧进行传输; 其 中, 所述单播 MAC帧的目的 MAC地址为用户边缘节点的 MAC地址;
或者, 通过将路由协议报文承载在单播 IP报文进行传输; 其中, 所述单播 IP报文的 目的 IP地址为所述用户边缘节点的 IP地址;
或者, 通过隧道承载路由协议报文进行传输;
或者, 通过路由协议单播报文进行传输。
8、 一种路由信息发布方法, 其特征在于, 包括:
IP边缘节点接收虚拟专用网中各站点对应的用户边缘节点发送的认证消息,所述认 证消息携带所述用户边缘节点的信息;
根据用户边缘节点的信息从预先设置的用户边缘节点和虚拟专用网的对应关系中 获取对应的虚拟专用网的标识;
根据所述虚拟专用网的标识获取虚拟专用网服务器的地址, 并将所述虚拟专用网 服务器的地址发送给所述用户边缘节点; 其中, 所述虚拟专用网服务器的地址可以为 IP 地址或者 MAC地址。
9、 根据权利要求 8所述的方法, 其特征在于, 所述用户边缘节点的信息为 MAC地 址、 用户标识或物理线路信息等;
所述根据用户边缘节点的信息从预先设置的用户边缘节点和虚拟专用网的对应关 系中获取对应的虚拟专用网的标识的步骤之后还包括:
如果还没有选定虚拟专用网服务器, 则根据预先设定的选举规则选举出虚拟专用 网服务器, 并建立所述虚拟专用网与所述虚拟专用网服务器的地址的对应关系。
10、 根据权利要求 9所述的方法, 其特征在于, 所述将虚拟专用网服务器的地址发 送给所述用户边缘节点的步骤包括:
通过扩展认证协议携带虚拟专用网服务器的地址来发送虚拟专用网服务器的地 址;
或者, 通过扩展动态主机设置协议的选项携带虚拟专用网服务器的地址来发送虚 拟专用网服务器的地址; 或者, 通过 TR069协议发送虚拟专用网服务器的地址。
11、 根据权利要求 10所述的方法, 其特征在于, 所述方法还包括:
IP边缘设备通过会话保活监测所述虚拟专用网与对应的虚拟专用网服务器之间的 链路状态;
若监测到所述虚拟专用网与对应的虚拟专用网服务器之间的链路故障, 则根据预 先设定的选举规则选举出新的虚拟专用网服务器, 并建立所述虚拟专用网与所述新的虚 拟专用网服务器的对应关系;
将新的虚拟专用网服务器的地址发送给所述虚拟专用网内的用户边缘节点。
12、 一种虚拟专用网服务器设备, 其特征在于, 所述虚拟专用网服务器用于为虚 拟专用网中管理各站点的 MAC地址路由信息的节点, 包括:
第一采集模块, 用于采集第一 MAC地址路由信息, 第一 MAC地址路由信息为所述 虚拟专用网服务器所属的虚拟专用网内各个站点的 MAC地址路由信息的集合;
发送模块, 用于以单播的方式向目的站点发送第二 MAC地址路由信息; 其中, 所 述第二 MAC地址路由信息为第一 MAC地址路由信息除去目的站点的 MAC地址路由信 息的 MAC地址路由信息的集合。
13、 根据权利要求 12所述的设备, 其特征在于, 所述设备还包括:
获取模块, 用于获取所属虚拟专用网中虚拟专用网服务器的地址, 所述虚拟专用 网服务器的地址可以为 IP地址或者 MAC地址;
第二采集模块, 用于采集所属虚拟专用网内已经在线的用户边缘节点的信息。
14、 根据权利要求 13所述的设备, 其特征在于, 所述第一采集模块包括: 接收单元, 用于接收虚拟专用网中其他站点对应的用户边缘节点发送的 MAC地址 路由信息;
本站点的 MAC地址信息获取单元,用于通过 MAC地址学习得到本站点的 MAC地址 信息。
15、 一种 IP边缘节点设备, 其特征在于, 包括:
接收模块, 用于接收虚拟专用网中各站点对应的用户边缘节点发送的认证消息, 所述认证消息携带所述用户边缘节点的信息,所述用户边缘节点的信息为 MAC地址、用 户标识或物理线路信息等;
虚拟专用网标识获取模块, 用于根据接收模块接收的认证消息携带的用户边缘节 点的信息, 从预先设置的用户边缘节点和虚拟专用网的对应关系中获取对应的虚拟专用 网的标识;
虚拟专用网服务器地址获取模块, 用于根据所述虚拟专用网的标识获取虚拟专用 网服务器的地址; 其中, 所述虚拟专用网服务器的地址可以为 IP地址或者 MAC地址; 发送模块, 用于将所述虚拟专用网服务器的地址发送给所述用户边缘节点。
16、 根据权利要求 15所述的设备, 其特征在于, 所述设备还包括:
虚拟专用网服务器选举模块, 用于根据预先设定的选举规则选举出虚拟专用网服 务器;
对应关系建立模块, 用于建立所述虚拟专用网与所述虚拟专用网服务器的地址的 对应关系;
保活监测模块, 用于通过会话保活监测所述虚拟专用网与对应的虚拟专用网服务 器之间的链路状态。
17、 一种基于客户端设备的虚拟专用网系统, 其特征在于, 包括:
如权利要求 12至 14任一项所述的虚拟专用网服务器设备,权利要求 15或 16所述的 IP 边缘节点设备;
以及用户边缘节点设备, 用于获取所属虚拟专用网中虚拟专用网服务器的地址, 以及本站点的 MAC地址信息, 然后向所述虚拟专用网服务器发送本站点的 MAC地址路 由信息; 所述虚拟专用网服务器的地址可以为 IP地址或者 MAC地址。
PCT/CN2011/083093 2010-12-27 2011-11-29 路由信息发布方法、设备及虚拟专用网系统 WO2012088982A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP11853907.1A EP2624525B1 (en) 2010-12-27 2011-11-29 Method, apparatus and virtual private network system for issuing routing information
US13/896,050 US9853896B2 (en) 2010-12-27 2013-05-16 Method, device, and virtual private network system for advertising routing information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010607474.4A CN102137173B (zh) 2010-12-27 2010-12-27 路由信息发布方法、设备及虚拟专用网系统
CN201010607474.4 2010-12-27

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/896,050 Continuation US9853896B2 (en) 2010-12-27 2013-05-16 Method, device, and virtual private network system for advertising routing information

Publications (1)

Publication Number Publication Date
WO2012088982A1 true WO2012088982A1 (zh) 2012-07-05

Family

ID=44296826

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/083093 WO2012088982A1 (zh) 2010-12-27 2011-11-29 路由信息发布方法、设备及虚拟专用网系统

Country Status (4)

Country Link
US (1) US9853896B2 (zh)
EP (1) EP2624525B1 (zh)
CN (1) CN102137173B (zh)
WO (1) WO2012088982A1 (zh)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8560634B2 (en) * 2007-10-17 2013-10-15 Dispersive Networks, Inc. Apparatus, systems and methods utilizing dispersive networking
US8867552B2 (en) 2010-05-03 2014-10-21 Brocade Communications Systems, Inc. Virtual cluster switching
US9769016B2 (en) 2010-06-07 2017-09-19 Brocade Communications Systems, Inc. Advanced link tracking for virtual cluster switching
US9807031B2 (en) 2010-07-16 2017-10-31 Brocade Communications Systems, Inc. System and method for network configuration
CN102137173B (zh) * 2010-12-27 2014-09-03 华为技术有限公司 路由信息发布方法、设备及虚拟专用网系统
CN103095543B (zh) * 2011-11-07 2016-10-05 华为技术有限公司 用于域间虚拟专用网络对接的方法和设备
CN103179218B (zh) * 2011-12-20 2016-06-08 中国电信股份有限公司 一种为云电脑分配ip地址的方法和系统
CN103685026A (zh) * 2012-08-31 2014-03-26 中兴通讯股份有限公司 一种虚拟网络的接入方法和系统
US9565099B2 (en) 2013-03-01 2017-02-07 Brocade Communications Systems, Inc. Spanning tree in fabric switches
CN103475563A (zh) * 2013-09-28 2013-12-25 上海成业智能科技股份有限公司 非固定ip地址的公网vpn实施方法及监控系统
CN104579814B (zh) * 2013-10-29 2018-07-31 国家计算机网络与信息安全管理中心 一种路由信息分析、采集装置及其方法
US9548873B2 (en) 2014-02-10 2017-01-17 Brocade Communications Systems, Inc. Virtual extensible LAN tunnel keepalives
US10581758B2 (en) 2014-03-19 2020-03-03 Avago Technologies International Sales Pte. Limited Distributed hot standby links for vLAG
US10476698B2 (en) 2014-03-20 2019-11-12 Avago Technologies International Sales Pte. Limited Redundent virtual link aggregation group
CN103957160B (zh) * 2014-05-12 2017-04-19 华为技术有限公司 一种发送报文的方法及设备
US9800471B2 (en) 2014-05-13 2017-10-24 Brocade Communications Systems, Inc. Network extension groups of global VLANs in a fabric switch
US10616108B2 (en) * 2014-07-29 2020-04-07 Avago Technologies International Sales Pte. Limited Scalable MAC address virtualization
US9807007B2 (en) 2014-08-11 2017-10-31 Brocade Communications Systems, Inc. Progressive MAC address learning
SG11201706629RA (en) 2015-02-27 2017-09-28 Level 3 Communications Llc Network address resolution
US10579406B2 (en) 2015-04-08 2020-03-03 Avago Technologies International Sales Pte. Limited Dynamic orchestration of overlay tunnels
CN104994331B (zh) * 2015-05-13 2018-05-01 浙江宇视科技有限公司 一种适合低速链路的网络间流量发送方法和系统
CN113225238B (zh) 2015-07-17 2022-08-26 华为技术有限公司 消息传输方法、接入节点、接入控制器及接入系统
US10439929B2 (en) 2015-07-31 2019-10-08 Avago Technologies International Sales Pte. Limited Graceful recovery of a multicast-enabled switch
US10171303B2 (en) 2015-09-16 2019-01-01 Avago Technologies International Sales Pte. Limited IP-based interconnection of switches with a logical chassis
US11070395B2 (en) * 2015-12-09 2021-07-20 Nokia Of America Corporation Customer premises LAN expansion
CN107086966B (zh) * 2016-02-16 2021-07-27 阿里巴巴集团控股有限公司 一种网络的负载均衡、控制及网络交互方法和装置
US10637890B2 (en) 2016-06-09 2020-04-28 LGS Innovations LLC Methods and systems for establishment of VPN security policy by SDN application
US10305935B2 (en) 2016-06-09 2019-05-28 LGS Innovations LLC Methods and systems for enhancing cyber security in networks
US10237090B2 (en) 2016-10-28 2019-03-19 Avago Technologies International Sales Pte. Limited Rule-based network identifier mapping
CN108228076B (zh) * 2016-12-14 2020-10-16 华为技术有限公司 访问磁盘的方法和主机
CN108512755B (zh) * 2017-02-24 2021-03-30 华为技术有限公司 一种路由信息的学习方法及装置
CN107547324B (zh) * 2017-09-27 2020-12-29 新华三技术有限公司 一种mac地址下发方法、装置、设备及机器可读存储介质
CN108833272B (zh) * 2018-06-20 2021-04-27 新华三技术有限公司 一种路由管理方法和装置
TW202344019A (zh) * 2018-08-23 2023-11-01 美商阿爾克斯股份有限公司 具有主機確定學習及本地化路由與橋接整合的主機路由覆蓋機制的系統
US10992670B1 (en) * 2018-11-12 2021-04-27 Amazon Technologies, Inc. Authenticating identities for establishing secure network tunnels
CN109951332B (zh) * 2019-03-19 2022-04-05 江河瑞通(北京)技术有限公司 基于非对等网络的边缘计算设备组网方法、装置及系统
CN110224844B (zh) * 2019-07-26 2021-01-15 宙安科技河北有限公司 虚拟专网的调度方法及系统
CN110247846B (zh) * 2019-07-26 2021-09-03 宙安科技河北有限公司 一种虚拟专用网的路由方法及路由装置
CN111262939B (zh) * 2020-01-17 2023-03-28 珠海市横琴盈实科技研发有限公司 边缘计算节点通信方法、装置、计算机设备和存储介质
US11902166B2 (en) * 2020-08-04 2024-02-13 Cisco Technology, Inc. Policy based routing in extranet networks
US11316826B1 (en) * 2020-11-04 2022-04-26 Charter Communications Operating, Llc Hardware address consistency management
CN112636789A (zh) * 2020-12-31 2021-04-09 广东电网有限责任公司电力调度控制中心 一种电力线通信的虚拟mac方法及装置
CN113691545B (zh) * 2021-08-26 2023-03-24 中国电信股份有限公司 路由的控制方法、装置、电子设备及计算机可读介质
CN114172762B (zh) * 2021-10-31 2024-04-26 广东浪潮智慧计算技术有限公司 一种通信方法、装置、系统及可读存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040049597A1 (en) * 2002-09-09 2004-03-11 Hamid Ould-Brahim SVC-L2.5 VPNs: combining Layer-3 VPNs technology with switched MPLS/IP L2VPNs for ethernet, ATM and frame relay circuits
CN1852214A (zh) * 2005-11-02 2006-10-25 华为技术有限公司 一种虚拟专用网络的路由方法
CN101114973A (zh) * 2007-09-06 2008-01-30 福建星网锐捷网络有限公司 一种虚拟专用网内的报文转发方法、系统和边缘设备
CN101471841A (zh) * 2007-12-29 2009-07-01 华为技术有限公司 路由表维护方法及装置
CN102137173A (zh) * 2010-12-27 2011-07-27 华为技术有限公司 路由信息发布方法、设备及虚拟专用网系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7139818B1 (en) * 2001-10-04 2006-11-21 Cisco Technology, Inc. Techniques for dynamic host configuration without direct communications between client and server
JP4692258B2 (ja) * 2005-12-07 2011-06-01 株式会社日立製作所 ルータ装置及び通信システム
US7693073B2 (en) * 2006-10-13 2010-04-06 At&T Intellectual Property I, L.P. System and method for routing packet traffic
US8166205B2 (en) * 2007-07-31 2012-04-24 Cisco Technology, Inc. Overlay transport virtualization
CN101227407B (zh) * 2008-01-25 2011-08-10 华为技术有限公司 基于二层隧道协议的报文发送方法及装置
US9391921B1 (en) * 2008-03-18 2016-07-12 Packeteer, Inc. Virtual bandwidth management deployment architectures
US8918531B2 (en) * 2009-05-07 2014-12-23 Cisco Technology, Inc. Automated network device provisioning using dynamic host configuration protocol
US10257016B2 (en) * 2009-06-08 2019-04-09 Wsou Investments, Llc Virtual leased line address resolution protocol cache for customer edge internet protocol addresses
US8619598B2 (en) * 2010-01-25 2013-12-31 Cisco Technology, Inc. Pseudowire status maintenance for static pseudowires

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040049597A1 (en) * 2002-09-09 2004-03-11 Hamid Ould-Brahim SVC-L2.5 VPNs: combining Layer-3 VPNs technology with switched MPLS/IP L2VPNs for ethernet, ATM and frame relay circuits
CN1852214A (zh) * 2005-11-02 2006-10-25 华为技术有限公司 一种虚拟专用网络的路由方法
CN101114973A (zh) * 2007-09-06 2008-01-30 福建星网锐捷网络有限公司 一种虚拟专用网内的报文转发方法、系统和边缘设备
CN101471841A (zh) * 2007-12-29 2009-07-01 华为技术有限公司 路由表维护方法及装置
CN102137173A (zh) * 2010-12-27 2011-07-27 华为技术有限公司 路由信息发布方法、设备及虚拟专用网系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2624525A4 *

Also Published As

Publication number Publication date
CN102137173B (zh) 2014-09-03
EP2624525B1 (en) 2017-07-05
US20130250947A1 (en) 2013-09-26
US9853896B2 (en) 2017-12-26
EP2624525A4 (en) 2014-01-22
EP2624525A1 (en) 2013-08-07
CN102137173A (zh) 2011-07-27

Similar Documents

Publication Publication Date Title
WO2012088982A1 (zh) 路由信息发布方法、设备及虚拟专用网系统
CN100594476C (zh) 用于实现基于端口的网络访问控制的方法和装置
EP3151510B1 (en) Mac (l2) level authentication, security and policy control
US10050824B2 (en) Managing a cluster of switches using multiple controllers
US7447166B1 (en) Method to distribute IEEE 802.1X authenticated users among multiple broadcast domains
JP4692258B2 (ja) ルータ装置及び通信システム
WO2014194749A1 (zh) 边缘设备的vpn实现处理方法及装置
US20110317678A1 (en) Extended Private LAN
WO2010075771A1 (zh) 一种组播虚拟私有网络的外联网组网方法、系统和装置
WO2008092351A1 (fr) Procédé de liaison dynamique de réseau privé virtuel
US20070195804A1 (en) Ppp gateway apparatus for connecting ppp clients to l2sw
WO2013056585A1 (zh) 一种虚拟私云接入认证方法及相关装置
WO2005112350A1 (fr) Procede de gestion de chemin dans un reseau prive virtuel utilisant le protocole ipv6
WO2007000120A1 (fr) Systeme, procede et serveur d'acces pour authentification
WO2014029367A1 (zh) 一种动态配置方法及装置、系统
WO2011147342A1 (zh) 交换路由信息的方法、设备和系统
WO2009082905A1 (fr) Procédé système et dispositif commutateur permettant l'établissement dynamique de réseau local virtuel de multidiffusion
WO2011140919A1 (zh) 接入业务批发网络的方法、设备、服务器和系统
WO2007030970A1 (fr) Systeme de gestion par grappe dans une couche de commutation ethernet et procede associe
KR20040033866A (ko) 가상 랜을 이용한 아이피 멀티캐스트 서비스방법
JP2004312482A (ja) ネットワークシステム、網内識別子の設定方法、アクセス認証情報管理装置、そのプログラム、ネットワーク接続点、網内識別子の設定プログラム、及び記録媒体
WO2011057570A1 (zh) 虚拟局域网的数据传输方法、设备与系统
JP5261432B2 (ja) 通信システム、パケット転送方法、ネットワーク交換装置、アクセス制御装置、及びプログラム
WO2010091562A1 (zh) 用于固定网络与第三方网络或应用服务器交互的方法及装置
WO2020215657A1 (zh) 基于二维路由协议实现l3vpn的方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11853907

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2011853907

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011853907

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE