WO2012151927A1 - 局域网内防止手动指定ip地址的方法及装置 - Google Patents

局域网内防止手动指定ip地址的方法及装置 Download PDF

Info

Publication number
WO2012151927A1
WO2012151927A1 PCT/CN2011/082553 CN2011082553W WO2012151927A1 WO 2012151927 A1 WO2012151927 A1 WO 2012151927A1 CN 2011082553 W CN2011082553 W CN 2011082553W WO 2012151927 A1 WO2012151927 A1 WO 2012151927A1
Authority
WO
WIPO (PCT)
Prior art keywords
packet
address
host
filtering rule
sent
Prior art date
Application number
PCT/CN2011/082553
Other languages
English (en)
French (fr)
Inventor
刘威
郑玉婷
马小亮
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012151927A1 publication Critical patent/WO2012151927A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5046Resolving address allocation conflicts; Testing of addresses

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a method and apparatus for preventing manual assignment of an IP address in a local area network. Background technique
  • DHCP Dynamic Host Configuration Protocol
  • IP network protocol
  • MAC Media Access Control
  • ARP Address Resolution Protocol
  • the present invention provides a method and a device for preventing manual IP address selection in a local area network, so as to solve the problem that the IP address in the local area network is easily caused by manually specifying an IP address in the prior art.
  • the present invention provides a method for preventing a manually designated IP address in a local area network, including: receiving a packet sent by a terminal, according to a preset packet filtering rule table and a media access device; When it is determined that the packet is sent by a host that does not manually specify an IP address, the packet is allowed to pass. If the packet is sent by the host with the manually specified IP address, the packet is prohibited from passing.
  • the present invention also provides an apparatus for preventing manual designation of an IP address in a local area network, comprising: a determining module, configured to receive a packet sent by the terminal, according to a preset packet filtering rule table, and a media access control MAC address and an IP address.
  • the mapping table determines whether the message is sent by the host that manually specifies the IP address;
  • the processing module is configured to allow the packet to pass when the packet is sent by the host that is not manually designated by the IP address. If the packet is sent by the host with the manually specified IP address, the packet is prohibited from passing.
  • the packet sent by the terminal is parsed to determine whether the message is sent by the host that manually specifies the IP address, and the packet is sent by the host that manually specifies the IP address. It is forbidden to solve the problem that the IP address in the LAN is easily caused by manually specifying the IP address in the prior art, and the data service of the host that manually specifies the IP address can be prohibited, and the probability of conflict of IP addresses in the LAN is reduced.
  • FIG. 1 is a schematic flow chart of a method for preventing manual assignment of an IP address in a local area network according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a mapping table for updating a MAC address and an IP address according to the present invention
  • FIG. 3 is a schematic flowchart of an update packet filtering rule table according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a process for filtering a packet according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a detailed processing flow of a method for preventing manual designation of an IP address in a local area network according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of an apparatus for preventing manual designation of an IP address in a local area network according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram showing a preferred structure of an apparatus for preventing manual assignment of an IP address in a local area network according to an embodiment of the present invention.
  • the present invention provides a method and apparatus for preventing manual designation of an IP address in a local area network.
  • a user in the local area network manually assigns an IP address, it is prohibited.
  • the user performs a data service request such as surfing the Internet.
  • FIG. 1 is a schematic flowchart of a method for preventing manual designation of an IP address in a local area network according to an embodiment of the present invention, as shown in FIG.
  • the method for preventing manual designation of an IP address in a local area network according to an embodiment of the invention includes the following processing:
  • Step 101 Receive a packet sent by the terminal, and determine, according to a preset packet filtering rule table and a mapping table of the MAC address and the IP address, whether the packet is sent by a host that manually specifies the IP address; wherein the packet sent by the terminal
  • the text includes: establishing a Transmission Control Protocol (TCP) connection, a User Datagram Protocol (UDP) packet, and an ARP packet;
  • TCP Transmission Control Protocol
  • UDP User Datagram Protocol
  • ARP ARP
  • step 101 the MAC address and IP address mapping table and the packet filtering rule table are the only basis for packet detection.
  • step 101 the following processing is performed:
  • Step A The packet filtering rule in the packet filtering rule table is matched with the packet, where the packet filtering rule includes: a first filtering rule that allows a host that does not manually specify an IP address to perform data service, and prohibits manual designation.
  • the host of the IP address performs the second filtering rule of the data service. Step A2. If the matching with the first filtering rule is successful, it is determined that the packet is manually specified. If the host sends an IP address, if the match with the second filter rule is successful, it is determined that the message is sent by the host that manually specifies the IP address.
  • Step A3 If the first filtering rule and the second filtering rule are not matched successfully, the MAC address and the IP address in the packet are extracted, and the MAC address and the IP address are determined to exist in the mapping table. If yes, it is determined that the message is sent by the host that does not manually specify the IP address. If it does not exist, it is determined that the message is sent by the host that manually specifies the IP address.
  • the host is configured to allow the host to send the packet to perform the data service filtering rule, and update the packet filtering rule table; If the match between the MAC address and the IP address of the packet and the mapping table fails, the host that prohibits the sending of the packet performs the filtering rule for the data service and updates the packet filtering rule table.
  • the network connection mode of the host that prohibits the data service in the filtering rule needs to be determined. If the network connection mode of the host is a wireless connection, the disconnection is performed. The wireless connection between the host and the network.
  • Step 102 When it is determined that the packet is sent by a host that does not manually specify an IP address, the packet is allowed to pass, and in the case that the packet is sent by the host that manually specifies the IP address, the packet is prohibited from passing.
  • step 102 if it is determined that the message is sent by the host that manually specifies the IP address, if the message is to establish a TCP connection message, the terminal is replied to re-establish the TCP connection message.
  • the packet filtering rule table needs to be periodically cleared, that is, Clearing the packet filtering rule table in a predetermined period;
  • the update message sent by the DHCP server and the manual configuration of the graphical user interface (GUI) management interface may be further configured. New mapping table.
  • FIG. 2 is a schematic flowchart of a mapping table for updating a MAC address and an IP address according to the present invention.
  • a DHCP server receives two trigger conditions for updating a mapping table of a MAC address and an IP address.
  • the DHCP client sends a DHC Discover message to the DHCP server.
  • the DHCP server responds to the DHCP client with a DHCP Offer message, dynamically assigns an IP address to the DHCP client on the LAN, and then DHCP.
  • the server sends an update message to synchronously update the mapping table of the MAC address and the IP address. Administrators can also manually configure the GUI and the IP address mapping table through new operations such as creating, editing, and deleting.
  • the technical solution of the embodiment of the present invention detects the three types of packets, namely, TCP, UDP, and ARP, and dynamically creates a packet filtering rule according to the detection result; when the packet is sent by a host that manually specifies an IP address, If it is a wireless connection, disconnect the wireless connection; if it is a wired connection, disable its data outgoing request.
  • FIG. 3 is a schematic flowchart of an update packet filtering rule table according to an embodiment of the present invention. As shown in FIG. 3, the following processing is included:
  • Step 301 Receive a packet sent by the client, and match the packet according to the packet filtering rule table and the mapping table of the MAC address and the IP address to obtain a matching result.
  • Step 302 Determine, according to the matching result, whether the packet is legal. If it is legal, go to step 303. Otherwise, go to step 304.
  • Step 303 Create a packet filtering rule, and allow the host that sends the packet to perform the normal data service, that is, the subsequent packets from the same host are allowed to pass, and step 306 is performed;
  • Step 304 Create a packet filtering rule, and the host that sends the packet is not allowed to perform the data service, that is, the subsequent packets from the same host are forbidden to pass, and steps 305 and 306 are performed;
  • Step 305 determining whether the host that is not allowed to perform the data service is connected by using a wireless connection. Connect to the network, if the judgment is yes, disconnect the wireless connection of the host;
  • Step 306 Update the packet filtering rule table according to the created packet filtering rule, and periodically clear the packet filtering rule table.
  • the interval of the period is 5 minutes by default, and can be adjusted according to requirements.
  • FIG. 4 is a schematic flowchart of a process for filtering a packet according to an embodiment of the present invention.
  • a packet filtering rule table and a MAC address and IP address mapping table referred to as a MAC-IP mapping table
  • TCP SYN, UDP, and ARP are used.
  • the three types of packets are detected, the detection result is output, and the MAC-IP mapping table and the packet filtering rule table are synchronously updated according to the detection result.
  • the following processing is included:
  • Step 401 Load a packet filtering rule table, and perform packet matching on the TCP SYN packet, the UDP packet, and the ARP packet according to the packet filtering rule table.
  • Step 402 If it is determined to be a legal message, the process is allowed to pass, and the process ends.
  • Step 403 If it is determined that the packet is an illegal packet, the packet is prohibited from passing. If the packet is a TCP SYN packet, the TCP RESET packet is returned to end the TCP handshake process, and the process ends.
  • Step 404 if there is no rule matching, it is determined that the message is unknown.
  • Step 405 Extract the MAC address and the IP address of the unknown message, where the MAC address and the IP address are the MAC address and the IP address of the terminal that sends the message;
  • Step 406 The MAC-IP mapping table is loaded to determine whether the MAC address and the IP address of the unknown packet are in the mapping table, and the matching result is obtained. If the matching is successful, the packet is determined to be a legal packet, and the packet is allowed to pass. If the match is unsuccessful, it is determined that the packet is an illegal packet, and the packet is prohibited from passing. If it is a TCP SYN packet, the TCP RESET packet is returned.
  • Step 407 Update the packet filtering rule table according to the matching result.
  • FIG. 5 is a schematic diagram of a detailed processing flow of a method for preventing manual assignment of an IP address in a local area network according to an embodiment of the present invention. As shown in FIG. 5, the following processing is included:
  • Step 501 The terminal initiates a data service request.
  • Step 502 Load a packet filtering rule table, and perform packet matching on the packets in the three formats of TCP, UDP, and ARP according to the packet filtering rule table.
  • Step 503 If it is determined to be a legal message, the process is allowed to pass, and the process ends.
  • Step 504 If it is determined that the packet is an illegal packet, the packet is prohibited from passing. If the packet is a TCP SYN packet, the TCP RESET packet is returned to end the TCP handshake process, and the process ends.
  • Step 505 If no rules match, determine that the message is an unknown message
  • Step 506 Extract a MAC and an IP address of the unknown packet.
  • Step 507 Load a MAC-IP mapping table, determine whether the MAC address and the IP address of the unknown packet are in the mapping table, and obtain a matching result. If the matching result is present, go to step 510. If the matching result is non-existent, Then perform step 508;
  • Step 508 the message is prohibited from being passed. If it is a TCP SYN message, the TCP RESET message is returned, and it is determined whether the host that does not allow the data service is connected to the network by using a wireless connection. If the determination is yes, step 509 is performed. Otherwise, step 510 is performed;
  • Step 509 disconnect the wireless connection of the host, step 510;
  • Step 510 Create a packet filtering rule according to the matching result, update the packet filtering rule table according to the created packet filtering rule, and periodically clear the packet filtering rule table.
  • the packet sent by the terminal is parsed to determine whether the packet is sent by the host with the manually specified IP address, and the packet sent by the host with the manually specified IP address is prohibited.
  • the problem that the IP address in the LAN is easily caused by manually specifying the IP address in the prior art is solved, and the data service of the host that manually specifies the IP address can be prohibited, and the probability of conflict of IP addresses in the LAN is reduced.
  • FIG. 6 is a schematic structural diagram of an apparatus for preventing manual designation of an IP address in a local area network according to an embodiment of the present invention, as shown in FIG. Preventing manual operation in a local area network according to an embodiment of the present invention
  • the device for specifying the IP address includes: a determining module 60 and a processing module 62. The modules of the embodiments of the present invention are described in detail below.
  • the determining module 60 is configured to receive a packet sent by the terminal, and send the packet according to the preset packet filtering rule, where the packet sent by the terminal includes: establishing a TCP connection packet, a UDP packet, and an ARP packet;
  • the MAC address and IP address mapping table and the packet filtering rule table are the only basis for packet detection.
  • the determining module is specifically configured to: 1. Match the packet filtering rule in the packet filtering rule table with the packet, where the packet filtering rule includes: allowing the host that does not manually specify the IP address to perform the first filtering of the data service. Rules, and a second filtering rule for performing data service for a host that is not allowed to manually specify an IP address; 2. If the first filtering rule is successfully matched, it is determined that the packet is sent by a host that does not manually specify an IP address, and if If the filtering rule is successfully matched, it is determined that the packet is sent by the host that manually specifies the IP address. 3. If the first filtering rule and the second filtering rule are not matched successfully, the MAC address in the packet is extracted.
  • IP address An IP address, and whether the MAC address and the IP address exist in the mapping table. If yes, it is determined that the packet is sent by a host that does not manually specify the IP address. If not, the packet is determined to be manually specified by the IP address. The host sent.
  • the processing module 62 is configured to allow the packet to pass when it is determined that the packet is sent by the host that does not manually specify the IP address, and prohibit the packet from passing when the packet is determined to be sent by the host that manually specifies the IP address. .
  • the processing module 62 is specifically configured to: when the packet is sent by the host with the manually specified IP address, if the packet is a TCP connection packet, the terminal re-establishes the TCP connection packet.
  • the apparatus for preventing manual designation of an IP address in a local area network further includes: The module is configured to: when the matching between the MAC address and the IP address of the packet and the mapping table is successful, create a packet filtering rule for the host to send the packet, and update the packet filtering rule.
  • the module is configured to: when the matching between the MAC address and the IP address of the packet and the mapping table is successful, create a packet filtering rule for the host to send the packet, and update the packet filtering rule.
  • the packet filtering rule for the data service is prohibited from being sent by the host that sends the packet, and the packet filtering rule table is updated.
  • the disconnection module is configured to determine, after the creation of the module creates a packet filtering rule for the data service of the host that prohibits the sending of the packet, the network connection mode of the host for which the data service is prohibited in the filtering rule, if the network connection mode of the host is For wireless connection, disconnect the host from the network wirelessly;
  • the clearing module periodically clears the packet filtering rule table.
  • An update module is configured to update the mapping table according to an update message sent by the DHCP server and a manual configuration of the GUI management interface.
  • the mapping table may be updated according to an update message sent by the DHCP server and a manual configuration of the management interface of the GUI.
  • DHCP server there are two trigger conditions for updating the MAC address and IP address mapping table: DHCP server, and GUI management interface.
  • the DHCP client sends a DHC Discover message to the DHCP server.
  • the DHCP server responds to the DHCP client with a DHCP Offer message, dynamically assigns an IP address to the DHCP client on the LAN, and then DHCP.
  • the server sends an update message, and the update module synchronously updates the mapping table of the MAC address and the IP address. Administrators can also manually configure the GUI management interface to perform custom configuration management of the MAC and IP mapping tables through operations such as creating, editing, and deleting.
  • the technical solution of the embodiment of the present invention passes three reports of TCP, UDP, and ARP.
  • the text is detected, and the packet filtering rule is dynamically created according to the detection result; when the message is manually specified
  • the host of the IP When the host of the IP is sent, if it is a wireless connection, the wireless connection is disconnected; if it is a wired connection, the data outgoing request is prohibited.
  • FIG. 7 is a schematic diagram of a preferred structure of an apparatus for preventing manual assignment of an IP address in a local area network according to an embodiment of the present invention.
  • an access control module and a packet detection module are set in a router, where an access control module is provided.
  • the mode is wireless access (such as Wi-Fi), and if so, instruct the wireless module to disconnect its wireless connection.
  • the access control module periodically clears the packet filtering rule table.
  • the packet detection module is mainly used to match the packets sent by the terminal according to the mapping table and the packet filtering rule table. If it is legal, the packet is allowed to pass. If it is illegal, the packet is forbidden to pass, and the matching result is sent to the access control module.
  • the present example is in the router access control module and the packet detection module, and the access control module is responsible for managing the MAC-IP mapping table and the packet filtering rule table, and these two tables are used as packet detection modules for packet detection. Basis.
  • the access control module also synchronously updates the MAC-IP mapping table and the packet filtering rule table according to the detection result of the packet detecting module.
  • the packet sent by the terminal is parsed to determine whether the packet is sent by the host with the manually specified IP address, and the packet sent by the host with the manually specified IP address is prohibited.
  • the problem that the IP address in the LAN is easily caused by manually specifying the IP address in the prior art is solved, and the data service of the host that manually specifies the IP address can be prohibited, and the probability of conflict of IP addresses in the LAN is reduced.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种局域网内防止手动指定IP地址的方法及装置。该方法包括:接收终端发送的报文,根据预先设置的报文过滤规则表以及媒体接入控制MAC地址与IP地址的映射表确定报文是否是由手动指定IP地址的主机发送的;在判断报文是由非手动指定IP地址的主机发送的情况下,允许报文通过,在判断报文是由手动指定IP地址的主机发送的情况下,禁止报文通过。借助于本发明的技术方案,能够禁止手动指定IP地址的主机的数据业务,减少局域网内IP地址发生冲突的机率。

Description

局域网内防止手动指定 IP地址的方法及装置 技术领域
本发明涉及移动通讯领域, 特别是涉及一种局域网内防止手动指定 IP 地址的方法及装置。 背景技术
目前, 局域网组网应用越来越广泛。 在局域网组网过程中, 一般都采 用动态主机设置协议 ( Dynamic Host Configuration Protocol, DHCP )服务 器来动态分配和管理网络协议 ( Internet Protocol, IP )地址。在现有技术中, 对于解决 IP沖突问题,可以采用固定的静态 IP地址与媒体接入控制( Media Access Control, MAC )地址的绑定, 或者采用检测地址解析协议( Address Resolution Protocol, ARP )才艮文等。
但是, 当有用户手动指定 IP地址时, DHCP服务器则无法管理。 手动 指定 IP地址很容易造成局域网内 IP沖突, 给从 DHCP服务器获取 IP地址 的正常用户带来困扰。 网络管理员也很难检测和排查 IP沖突问题。 为此, 目前急需一种用于局域网内防止用户手动指定 IP的方法。 发明内容
有鉴于此, 本发明提供一种局域网内防止手动指定 IP地址的方法及装 置, 以解决现有技术中手动指定 IP地址容易造成局域网内 IP沖突的问题。
本发明提供一种局域网内防止手动指定 IP地址的方法, 包括: 接收终端发送的报文, 根据预先设置的报文过滤规则表以及媒体接入 机发送的; 在判断报文是由非手动指定 IP地址的主机发送的情况下, 允许报文通 过,在判断报文是由手动指定 IP地址的主机发送的情况下,禁止报文通过。
本发明还提供了一种局域网内防止手动指定 IP地址的装置, 包括: 确定模块, 用于接收终端发送的报文, 根据预先设置的报文过滤规则 表以及媒体接入控制 MAC地址与 IP地址的映射表确定报文是否是由手动 指定 IP地址的主机发送的;
处理模块, 用于在判断报文是由非手动指定 IP地址的主机发送的情况 下,允许报文通过,在判断报文是由手动指定 IP地址的主机发送的情况下, 禁止报文通过。
本发明有益效果如下:
借助于本发明实施例的技术方案, 通过对终端发送的报文进行解析, 确定该 4艮文是否是由手动指定 IP地址的主机发送的 ,并对由手动指定 IP地 址的主机发送的报文禁止通过, 解决了现有技术中手动指定 IP地址容易造 成局域网内 IP沖突的问题, 能够禁止手动指定 IP地址的主机的数据业务, 减少局域网内 IP地址发生沖突的机率。 附图说明
图 1是本发明实施例的局域网内防止手动指定 IP地址的方法的流程示 意图;
图 2是本发明的更新 MAC地址与 IP地址的映射表的流程示意图; 图 3是本发明实施例的更新报文过滤规则表的流程示意图;
图 4是本发明实施例的对报文进行过滤的处理流程示意图;
图 5是本发明实施例的局域网内防止手动指定 IP地址的方法详细处理 流程示意图;
图 6是本发明实施例的局域网内防止手动指定 IP地址的装置的结构示 意图; 图 Ί是本发明实施例的局域网内防止手动指定 IP地址的装置的优选结 构示意图。 具体实施方式
为了解决现有技术中手动指定 IP地址容易造成局域网内 IP沖突的问 题, 本发明提供了一种局域网内防止手动指定 IP地址的方法及装置, 当局 域网内有用户采用手动指定 IP地址时, 禁止该用户进行上网等数据业务请 求。 以下结合附图以及实施例, 对本发明进行进一步详细说明。 应当理解, 此处所描述的具体实施例仅仅用以解释本发明, 并不限定本发明。
方法实施例
根据本发明的实施例, 提供了一种局域网内防止手动指定 IP地址的方 法, 图 1是本发明实施例的局域网内防止手动指定 IP地址的方法的流程示 意图, 如图 1所示, 根据本发明实施例的局域网内防止手动指定 IP地址的 方法包括如下处理:
步驟 101 ,接收终端发送的报文,根据预先设置的报文过滤规则表以及 MAC地址与 IP地址的映射表确定 ^艮文是否是由手动指定 IP地址的主机发 送的;其中,终端发送的报文包括:建立传输控制协议(Transmission Control Protocol, TCP )连接才艮文、用户数据包协议 ( User Datagram Protocol, UDP ) 报文、 以及 ARP报文;
在步驟 101 中, MAC地址与 IP地址的映射表和报文过滤规则表是进 行报文检测的唯一依据。
具体地, 在步驟 101中, 进行如下处理:
步驟 Al、将报文过滤规则表中的报文过滤规则与报文进行匹配,其中, 报文过滤规则包括: 允许非手动指定 IP地址的主机进行数据业务的第一过 滤规则, 以及禁止手动指定 IP地址的主机进行数据业务的第二过滤规则; 步驟 A 2、 如果与第一过滤规则匹配成功, 则确定报文是由非手动指定 IP地址的主机发送的, 如果与第二过滤规则匹配成功, 则确定报文是由手 动指定 IP地址的主机发送的;
步驟 A 3、 在与第一过滤规则和第二过滤规则均未匹配成功的情况下, 则提取报文中的 MAC地址和 IP地址, 并判断 MAC地址和 IP地址是否存 在于映射表中, 如果存在, 则确定报文是由非手动指定 IP地址的主机发送 的, 如果不存在, 则确定报文是由手动指定 IP地址的主机发送的。
优选地, 在 ^艮文的 MAC地址和 IP地址与映射表的匹配结果为匹配成 功的情况下, 创建允许发送该报文的主机进行数据业务的过滤规则, 并更 新报文过滤规则表; 在报文的 MAC地址和 IP地址与映射表的匹配结果为 匹配失败的情况下, 创建禁止发送该报文的主机进行数据业务的过滤规则, 并更新报文过滤规则表。
此外, 创建禁止发送该报文的主机进行数据业务的过滤规则之后, 还 需要判断该过滤规则中禁止进行数据业务的主机的网络连接方式, 如果该 主机的网络连接方式为无线连接, 则断开主机与网络的无线连接。
步驟 102, 在判断报文是由非手动指定 IP地址的主机发送的情况下, 允许报文通过, 在判断报文是由手动指定 IP地址的主机发送的情况下, 禁 止才艮文通过。
优选地, 在步驟 102中, 在判断报文是由手动指定 IP地址的主机发送 的情况下, 如果报文为建立 TCP连接报文, 则向终端回复重新建立 TCP连 接报文。
优选地, 为阻止恶意用户先通过 DHCP服务器获取 IP地址, 再手动指 定 IP地址以欺骗进行报文检测的路由器, 因此, 在本发明实施例中, 需要 周期性清空报文过滤规则表, 即, 以预定周期清空报文过滤规则表;
此外, 在本发明实施例中, 可以根据 DHCP服务器发送的更新消息以 及图形用户接口 (Graphical User Interface, GUI )的管理界面的手动配置更 新映射表。
图 2是本发明的更新 MAC地址与 IP地址的映射表的流程示意图, 如 图 2所示, MAC地址与 IP地址的映射表的更新有两个触发条件: DHCP 服务器、 以及 GUI管理界面。 当有新的 DHCP客户端加入进来时, DHCP 客户端向 DHCP服务器发送 DHC Discover报文, DHCP服务器向 DHCP客 户端回应 DHCP Offer报文, 向局域网中的 DHCP客户端动态分配 IP地址, 随后, DHCP服务器发送更新消息, 以同步更新 MAC地址与 IP地址的映 射表。 管理员也可以通过 GUI管理界面进行手动配置, 通过新建、 编辑、 删除等操作对 MAC地址与 IP地址的映射表进行自定义配置管理。
综上所述, 本发明实施例的技术方案通过对 TCP、 UDP、 ARP三种报 文进行检测, 并根据检测结果动态创建报文过滤规则; 当报文为手动指定 IP地址的主机发出时, 如果其为无线连接, 则断开无线连接; 如果为有线 连接, 则禁止其数据外发请求。
以下结合附图, 对本发明实施例的上述技术方案进行详细说明。
图 3是本发明实施例的更新报文过滤规则表的流程示意图, 如图 3所 示, 包括如下处理:
步驟 301 , 接收客户端发送的报文, 根据报文过滤规则表和 MAC地址 与 IP地址的映射表对该 ^艮文进行匹配, 获取匹配结果;
步驟 302,根据匹配结果判断报文是否合法,如果合法,执行步驟 303 , 否则, 执行步驟 304;
步驟 303 ,创建报文过滤规则, 允许发送该报文的主机进行正常的数据 业务, 即, 后续来自同一主机的报文允许通过, 执行步驟 306;
步驟 304,创建报文过滤规则,不允许发送该报文的主机进行数据业务, 即, 后续来自同一主机的报文禁止通过, 执行步驟 305和步驟 306;
步驟 305,判断不允许进行数据业务的主机是否采用无线连接的方式连 接网络, 如果判断为是, 则断开该主机的无线连接;
步驟 306,根据创建的报文过滤规则更新报文过滤规则表, 并对该报文 过滤规则表进行周期性清空, 该周期的时间间隔默认为 5分钟, 可根据需 要进行调整。
图 4是本发明实施例的对报文进行过滤的处理流程示意图, 根据报文 过滤规则表和 MAC地址与 IP地址的映射表 (简称为 MAC-IP映射表), 对 TCP SYN、 UDP、 ARP三种报文进行检测, 输出检测结果, 并根据这个检 测结果, 同步更新 MAC-IP映射表以及报文过滤规则表, 如图 4所示, 包 括如下处理:
步驟 401 , 加载报文过滤规则表, 根据报文过滤规则表对 TCP SYN报 文、 UDP报文、 ARP报文进行报文匹配;
步驟 402, 如果判断是合法报文, 则允许通过, 流程结束;
步驟 403 , 如果判断是非法报文, 则禁止报文通过, 如果是 TCP SYN 报文, 则回复 TCP RESET报文, 以结束 TCP握手流程, 结束流程;
步驟 404, 如果无任何规则匹配, 确定该 4艮文是未知 4艮文;
步驟 405 , 提取该未知 4艮文的 MAC地址和 IP地址, 此处的 MAC地址 和 IP地址为发出 ^艮文的终端的 MAC地址和 IP地址;
步驟 406, 加载 MAC-IP映射表, 判断该未知报文的 MAC地址和 IP 地址是否在该映射表中, 获取匹配结果, 如果匹配成功, 则确定该报文是 合法报文, 允许报文通过, 如果匹配不成功, 则确定该报文是非法报文, 禁止报文通过, 如果是 TCP SYN报文, 则回复 TCP RESET报文;
步驟 407, 根据匹配结果更新报文过滤规则表。
图 5是本发明实施例的局域网内防止手动指定 IP地址的方法详细处理 流程示意图, 如图 5所示, 包括如下处理:
步驟 501 , 终端发起数据业务请求; 步驟 502, 加载报文过滤规则表, 根据报文过滤规则表对 TCP、 UDP、 ARP三种格式的报文进行报文匹配;
步驟 503 , 如果判断是合法报文, 则允许通过, 流程结束;
步驟 504, 如果判断是非法报文, 则禁止报文通过, 如果是 TCP SYN 报文, 则回复 TCP RESET报文, 以结束 TCP握手流程, 结束流程;
步驟 505 , 如果无任何规则匹配, 确定该报文是未知报文;
步驟 506, 提取该未知报文的 MAC和 IP地址;
步驟 507, 加载 MAC-IP映射表, 判断该未知报文的 MAC地址和 IP 地址是否在该映射表中, 获取匹配结果, 如果匹配结果为存在, 则执行步 驟 510, 如果匹配结果为不存在, 则执行步驟 508;
步驟 508, 禁止报文通过, 如果是 TCP SYN报文, 则回复 TCP RESET 报文, 并判断不允许进行数据业务的主机是否采用无线连接的方式连接网 络, 如果判断为是, 则执行步驟 509, 否则, 执行步驟 510;
步驟 509, 断开该主机的无线连接, 执行步驟 510;
步驟 510,根据匹配结果创建报文过滤规则,根据创建的报文过滤规则 更新报文过滤规则表, 并对该报文过滤规则表进行周期性清空。
借助于本发明实施例的技术方案, 通过对终端发送的报文进行解析, 确定该报文是否由手动指定 IP地址的主机发送的 ,并对由手动指定 IP地址 的主机发送的报文禁止通过, 解决了现有技术中手动指定 IP地址容易造成 局域网内 IP沖突的问题, 能够禁止手动指定 IP地址的主机的数据业务, 减 少局域网内 IP地址发生沖突的机率。
装置实施例
根据本发明的实施例, 提供了一种局域网内防止手动指定 IP地址的装 置, 位于路由器, 图 6是本发明实施例的局域网内防止手动指定 IP地址的 装置的结构示意图, 如图 6所示, 根据本发明实施例的局域网内防止手动 指定 IP地址的装置包括: 确定模块 60、 处理模块 62, 以下对本发明实施例 的各个模块进行详细的说明。
确定模块 60, 用于接收终端发送的报文, 根据预先设置的报文过滤规 的主机发送的; 其中, 终端发送的报文包括: 建立 TCP连接报文、 UDP报 文、 以及 ARP报文; MAC地址与 IP地址的映射表和报文过滤规则表是进 行报文检测的唯一依据。
确定模块 60具体用于: 1、 将报文过滤规则表中的报文过滤规则与报 文进行匹配, 其中, 报文过滤规则包括: 允许非手动指定 IP地址的主机进 行数据业务的第一过滤规则, 以及禁止手动指定 IP地址的主机进行数据业 务的第二过滤规则; 2、 如果与第一过滤规则匹配成功, 则确定报文是由非 手动指定 IP地址的主机发送的, 如果与第二过滤规则匹配成功, 则确定报 文是由手动指定 IP地址的主机发送的; 3、在与第一过滤规则和第二过滤规 则均未匹配成功的情况下, 则提取报文中的 MAC地址和 IP地址, 并判断 MAC地址和 IP地址是否存在于映射表中, 如果存在, 则确定报文是由非 手动指定 IP地址的主机发送的, 如果不存在, 则确定报文是由手动指定 IP 地址的主机发送的。
处理模块 62,用于在判断报文是由非手动指定 IP地址的主机发送的情 况下, 允许报文通过, 在判断报文是由手动指定 IP地址的主机发送的情况 下, 禁止报文通过。
处理模块 62具体用于:在判断报文是由手动指定 IP地址的主机发送的 情况下, 如果报文为建立 TCP连接报文, 则向终端回复重新建立 TCP连接 报文。
优选地, 根据本发明实施例的局域网内防止手动指定 IP地址的装置还 包括: 创建模块, 用于在报文的 MAC地址和 IP地址与映射表的匹配结果为 匹配成功的情况下, 创建允许发送该报文的主机进行数据业务的报文过滤 规则, 并更新报文过滤规则表; 在报文的 MAC地址和 IP地址与映射表的 匹配结果为匹配失败的情况下, 创建禁止发送该报文的主机进行数据业务 的报文过滤规则, 并更新报文过滤规则表。
断开模块, 用于在创建模块创建禁止发送该报文的主机进行数据业务 的报文过滤规则之后, 判断该过滤规则中禁止进行数据业务的主机的网络 连接方式, 如果该主机的网络连接方式为无线连接, 则断开主机与网络的 无线连接;
清空模块, 用于以预定周期清空报文过滤规则表;
具体地, 为阻止恶意用户先通过 DHCP服务器获取 IP地址, 再手动指 定 IP地址以欺骗进行报文检测的路由器, 因此, 在本发明实施例中, 需要 清空模块周期性清空报文过滤规则表。
更新模块, 用于根据 DHCP服务器发送的更新消息以及 GUI管理界面 的手动配置更新映射表。
具体地, 在本发明实施例中, 可以根据 DHCP服务器发送的更新消息 以及 GUI的管理界面的手动配置更新映射表。如图 2所示, MAC地址与 IP 地址的映射表的更新有两个触发条件: DHCP服务器、 以及 GUI管理界面。 当有新的 DHCP客户端加入进来时, DHCP客户端向 DHCP服务器发送 DHC Discover报文, DHCP服务器向 DHCP客户端回应 DHCP Offer报文, 向局 域网中的 DHCP客户端动态分配 IP地址, 随后, DHCP服务器发送更新消 息, 更新模块同步更新 MAC地址与 IP地址的映射表。 管理员也可以通过 GUI管理界面进行手动配置, 通过新建、 编辑、 删除等操作对 MAC与 IP 的映射表进行自定义配置管理。
综上所述, 本发明实施例的技术方案通过对 TCP、 UDP、 ARP三种报 文进行检测, 并根据检测结果动态创建报文过滤规则; 当报文为手动指定
IP的主机发出时, 如果其为无线连接, 则断开无线连接; 如果为有线连接, 则禁止其数据外发请求。
以下结合实例对本发明上述技术方案进行举例说明。
图 7是本发明实施例的局域网内防止手动指定 IP地址的装置的优选结 构示意图, 如图 7所示, 在路由器中, 设置了接入控制模块和报文检测模 块, 其中, 接入控制模块有两大功能: MAC地址与 IP地址的映射表的管 理和报文过滤规则表的管理, 并根据报文检测模块的匹配结果动态创建报 文过滤规则, 判断手动指定 IP地址的主机的网络连接方式是否为无线接入 (例如 Wi-Fi ), 如果是, 则通知无线模块断开其无线连接。 此外, 接入控 制模块会周期性清空报文过滤规则表。 报文检测模块主要用于根据映射表 和报文过滤规则表对终端发送的报文进行匹配, 如果合法, 则允许通过, 如果非法, 则禁止通过, 并将匹配结果发送给接入控制模块。
也就是说, 本实例在路由器接入控制模块和报文检测模块, 接入控制 模块负责 MAC-IP映射表和报文过滤规则表的管理, 这两个表作为报文检 测模块进行报文检测的依据。 同时, 接入控制模块也会根据报文检测模块 的检测结果, 同步更新 MAC-IP映射表和报文过滤规则表。
借助于本发明实施例的技术方案, 通过对终端发送的报文进行解析, 确定该报文是否由手动指定 IP地址的主机发送的 ,并对由手动指定 IP地址 的主机发送的报文禁止通过, 解决了现有技术中手动指定 IP地址容易造成 局域网内 IP沖突的问题, 能够禁止手动指定 IP地址的主机的数据业务, 减 少局域网内 IP地址发生沖突的机率。
尽管为示例目的, 已经公开了本发明的优选实施例, 本领域的技术人 员将意识到各种改进、 增加和取代也是可能的, 因此, 本发明的范围应当 不限于上述实施例。

Claims

权利要求书
1、 一种局域网内防止手动指定网络协议 IP地址的方法, 其特征在于, 包括:
接收终端发送的报文, 根据预先设置的报文过滤规则表以及媒体接入 的主机发送的;
在判断所述报文是由非手动指定 IP地址的主机发送的情况下, 允许所 述报文通过, 在判断所述报文是由手动指定 IP地址的主机发送的情况下, 禁止所述报文通过。
2、 如权利要求 1所述的方法, 其特征在于, 所述根据预先设置的报文 过滤规则表以及映射表确定所述报文是否是由手动指定 IP地址的主机发送 的具体包括:
将所述报文过滤规则表中的报文过滤规则与所述报文进行匹配, 其中, 所述报文过滤规则包括: 允许非手动指定 IP地址的主机进行数据业务的第 一过滤规则, 以及禁止手动指定 IP地址的主机进行数据业务的第二过滤规 则;
如果与所述第一过滤规则匹配成功, 则确定所述报文是由非手动指定
IP地址的主机发送的, 如果与所述第二过滤规则匹配成功, 则确定所述报 文是由手动指定 IP地址的主机发送的;
在与所述第一过滤规则和所述第二过滤规则均未匹配成功的情况下, 则提取所述报文中的 MAC地址和 IP地址, 并判断所述 MAC地址和所述 IP地址是否存在于所述映射表中, 如果存在, 则确定所述报文是由非手动 指定 IP地址的主机发送的, 如果不存在, 则确定所述 ·^艮文是由手动指定 IP 地址的主机发送的。
3、 如权利要求 2所述的方法, 其特征在于, 所述方法还包括: 在所述 4艮文的 MAC地址和 IP地址与所述映射表的匹配结果为匹配成 功的情况下, 创建允许发送该报文的主机进行数据业务的报文过滤规则, 并更新所述报文过滤规则表;
在所述 4艮文的 MAC地址和 IP地址与所述映射表的匹配结果为匹配失 败的情况下, 创建禁止发送该报文的主机进行数据业务的报文过滤规则, 并更新所述报文过滤规则表。
4、 如权利要求 3所述的方法, 其特征在于, 创建禁止发送该报文的主 机进行数据业务的报文过滤规则之后, 所述方法还包括:
判断该过滤规则中禁止进行数据业务的主机的网络连接方式, 如果该 主机的网络连接方式为无线连接, 则断开所述主机与网络的无线连接。
5、 如权利要求 1所述的方法, 其特征在于, 所述报文包括: 建立传输 控制协议 TCP连接报文、 用户数据包协议 UDP报文、 以及地址解析协议 ARP报文;
在判断所述报文是由手动指定 IP地址的主机发送的情况下, 禁止所述 报文通过具体包括:
在判断所述报文是由手动指定 IP地址的主机发送的情况下, 如果所述 报文为所述建立 TCP连接报文,则向所述终端回复重新建立 TCP连接报文。
6、如权利要求 1至 5任一所述的方法,其特征在于, 所述方法还包括: 以预定周期清空所述报文过滤规则表;
根据动态主机设置协议 DHCP服务器发送的更新消息以及图形用户接 口 GUI的管理界面的手动配置更新所述映射表。
7、 一种局域网内防止手动指定网络协议 IP地址的装置, 其特征在于, 包括:
确定模块, 用于接收终端发送的报文, 根据预先设置的报文过滤规则 表以及媒体接入控制 MAC地址与 IP地址的映射表确定所述报文是否是由 手动指定 IP地址的主机发送的;
处理模块, 用于在判断所述报文是由非手动指定 IP地址的主机发送的 情况下, 允许所述报文通过, 在判断所述报文是由手动指定 IP地址的主机 发送的情况下, 禁止所述艮文通过。
8、 如权利要求 7所述的装置, 其特征在于, 所述确定模块具体用于: 将所述报文过滤规则表中的报文过滤规则与所述报文进行匹配, 其中, 所述报文过滤规则包括: 允许非手动指定 IP地址的主机进行数据业务的第 一过滤规则, 以及禁止手动指定 IP地址的主机进行数据业务的第二过滤规 则;
如果与所述第一过滤规则匹配成功, 则确定所述报文是由非手动指定 IP地址的主机发送的, 如果与所述第二过滤规则匹配成功, 则确定所述报 文是由手动指定 IP地址的主机发送的;
在与所述第一过滤规则和所述第二过滤规则均未匹配成功的情况下, 则提取所述报文中的 MAC地址和 IP地址, 并判断所述 MAC地址和所述 IP地址是否存在于所述映射表中, 如果存在, 则确定所述报文是由非手动 指定 IP地址的主机发送的, 如果不存在, 则确定所述 ·^艮文是由手动指定 IP 地址的主机发送的。
9、 如权利要求 8所述的装置, 其特征在于, 所述装置还包括: 创建模块, 用于在所述报文的 MAC地址和 IP地址与所述映射表的匹 配结果为匹配成功的情况下, 创建允许发送该报文的主机进行数据业务的 报文过滤规则,并更新所述报文过滤规则表;在所述报文的 MAC地址和 IP 地址与所述映射表的匹配结果为匹配失败的情况下, 创建禁止发送该报文 的主机进行数据业务的报文过滤规则, 并更新所述报文过滤规则表; 和 /或, 断开模块, 用于判断该过滤规则中禁止进行数据业务的主机的网络连 接方式, 如果该主机的网络连接方式为无线连接, 则断开所述主机与网络 的无线连接; 和 /或,
清空模块, 用于以预定周期清空所述报文过滤规则表; 和 /或, 更新模块, 用于根据 DHCP服务器发送的更新消息以及 GUI管理界面 的手动配置更新所述映射表。
10、 如权利要求 7、 8或 9所述的装置, 其特征在于, 所述报文包括: 建立 TCP连接报文、 UDP报文、 以及 ARP报文;
所述处理模块具体用于: 在判断所述报文是由手动指定 IP地址的主机 发送的情况下, 如果所述报文为所述建立 TCP连接报文, 则向所述终端回 复重新建立 TCP连接报文。
PCT/CN2011/082553 2011-09-06 2011-11-21 局域网内防止手动指定ip地址的方法及装置 WO2012151927A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110261830.6 2011-09-06
CN201110261830.6A CN102316034B (zh) 2011-09-06 2011-09-06 局域网内防止手动指定ip地址的方法及装置

Publications (1)

Publication Number Publication Date
WO2012151927A1 true WO2012151927A1 (zh) 2012-11-15

Family

ID=45428866

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/082553 WO2012151927A1 (zh) 2011-09-06 2011-11-21 局域网内防止手动指定ip地址的方法及装置

Country Status (2)

Country Link
CN (1) CN102316034B (zh)
WO (1) WO2012151927A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152255B (zh) * 2013-02-20 2016-06-29 神州数码网络(北京)有限公司 一种数据转发的方法和装置
CN105978844A (zh) * 2015-06-04 2016-09-28 乐视致新电子科技(天津)有限公司 一种基于路由器的网络访问控制方法、路由器和系统
CN106131235A (zh) * 2016-06-28 2016-11-16 上海斐讯数据通信技术有限公司 一种ip地址配置方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7213047B2 (en) * 2002-10-31 2007-05-01 Sun Microsystems, Inc. Peer trust evaluation using mobile agents in peer-to-peer networks
CN101022340A (zh) * 2007-03-30 2007-08-22 武汉烽火网络有限责任公司 实现城域以太网交换机接入安全的智能控制方法
CN101834864A (zh) * 2010-04-30 2010-09-15 中兴通讯股份有限公司 一种三层虚拟专用网中攻击防范的方法及装置
CN102170484A (zh) * 2011-04-08 2011-08-31 华为数字技术有限公司 一种ip地址冲突检测方法和设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100372322C (zh) * 2003-07-23 2008-02-27 华为技术有限公司 一种控制私网用户访问权限的方法
US8966608B2 (en) * 2006-12-22 2015-02-24 Telefonaktiebolaget L M Ericsson (Publ) Preventing spoofing
CN101378350A (zh) * 2007-08-27 2009-03-04 上海市闵行中学 局域网ip地址非法使用的解决方法
CN101895587B (zh) * 2010-07-06 2015-09-16 中兴通讯股份有限公司 防止用户私自修改ip地址的方法、装置和系统
CN102185840B (zh) * 2011-04-22 2015-08-19 上海华为技术有限公司 一种认证方法、设备及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7213047B2 (en) * 2002-10-31 2007-05-01 Sun Microsystems, Inc. Peer trust evaluation using mobile agents in peer-to-peer networks
CN101022340A (zh) * 2007-03-30 2007-08-22 武汉烽火网络有限责任公司 实现城域以太网交换机接入安全的智能控制方法
CN101834864A (zh) * 2010-04-30 2010-09-15 中兴通讯股份有限公司 一种三层虚拟专用网中攻击防范的方法及装置
CN102170484A (zh) * 2011-04-08 2011-08-31 华为数字技术有限公司 一种ip地址冲突检测方法和设备

Also Published As

Publication number Publication date
CN102316034B (zh) 2017-05-10
CN102316034A (zh) 2012-01-11

Similar Documents

Publication Publication Date Title
RU2556468C2 (ru) Способ аутентификации доступа терминала и оборудование, расположенное на территории абонента
KR101396042B1 (ko) 다이나믹 호스트 컨피규레이션 및 네트워크 액세스 인증
US7380025B1 (en) Method and apparatus providing role-based configuration of a port of a network element
KR101620479B1 (ko) 다중 인터넷 액세스를 제공하기 위한 방법 및 게이트웨이
EP3032859B1 (en) Access control method and system, and access point
US20180019945A1 (en) Role based router functionality
JP2006114991A (ja) ファイアウォールシステム及びファイアウォール制御方法
WO2010072096A1 (zh) IPv6环境下提高邻居发现安全性的方法及宽带接入设备
WO2012163215A1 (zh) 一种DHCPSnooping绑定表生成的方法、装置、设备及系统
WO2015085715A1 (zh) 一种处理无线接入的方法、转发设备及网络控制器
US20220311733A1 (en) Communication device and communication system
WO2012126335A1 (zh) 一种访问控制方法、接入设备及系统
WO2017105630A1 (en) Method and device for managing messages delayed following a loss of network connectivity
JP2006033206A (ja) 認証システム、ネットワーク集線装置及びそれらに用いる認証方法並びにそのプログラム
WO2008151548A1 (fr) Procédé et appareil pour empêcher l'usurpation de l'adresse de commande d'accès au support (mac) côté réseau
WO2012151927A1 (zh) 局域网内防止手动指定ip地址的方法及装置
JP2001326696A (ja) アクセス制御方法
US7567522B2 (en) Suppression of router advertisement
JP2010166142A (ja) 通信制御装置、通信制御方法、およびプログラム
US20090150975A1 (en) Method and apparatus for providing internet gateway service using plurality of universal plug and play internet gateway devices
JP2009044632A (ja) 認証装置およびネットワーク認証システム、ならびに端末装置を認証するための方法およびプログラム
JP7226808B2 (ja) 制御装置、フィルタリング制御方法、及びフィルタリング制御プログラム
WO2012100494A1 (zh) 一种提高邻居发现监听安全性的方法及装置
JP3792654B2 (ja) ネットワーク接続装置及び不正アクセス防止方法
WO2015014167A1 (zh) 一种处理原始ip报文的方法和相应装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11865265

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11865265

Country of ref document: EP

Kind code of ref document: A1