WO2012152186A1 - 多端口以太网接口装置及其vpn业务接入的方法 - Google Patents
多端口以太网接口装置及其vpn业务接入的方法 Download PDFInfo
- Publication number
- WO2012152186A1 WO2012152186A1 PCT/CN2012/074680 CN2012074680W WO2012152186A1 WO 2012152186 A1 WO2012152186 A1 WO 2012152186A1 CN 2012074680 W CN2012074680 W CN 2012074680W WO 2012152186 A1 WO2012152186 A1 WO 2012152186A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- port
- vpn service
- vlan
- internal control
- interface device
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000013507 mapping Methods 0.000 claims abstract description 84
- 238000000605 extraction Methods 0.000 claims description 5
- 101150082208 DIABLO gene Proteins 0.000 description 4
- 102100033189 Diablo IAP-binding mitochondrial protein Human genes 0.000 description 4
- MHABMANUFPZXEB-UHFFFAOYSA-N O-demethyl-aloesaponarin I Natural products O=C1C2=CC=CC(O)=C2C(=O)C2=C1C=C(O)C(C(O)=O)=C2C MHABMANUFPZXEB-UHFFFAOYSA-N 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L12/407—Bus networks with decentralised control
- H04L12/413—Bus networks with decentralised control with random access, e.g. carrier-sense multiple-access with collision detection [CSMA-CD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/35—Switches specially adapted for specific applications
- H04L49/351—Switches specially adapted for specific applications for local area network [LAN], e.g. Ethernet switches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/35—Switches specially adapted for specific applications
- H04L49/354—Switches specially adapted for specific applications for supporting virtual local area networks [VLAN]
Definitions
- the present invention relates to the field of communications, and in particular, to a multi-port Ethernet interface device and a method for accessing VPN services. Background technique
- High-end switches and routers are important equipments for the core network and the access network. It is also important to be compatible with multiple types of interfaces while ensuring a certain amount of switching capacity.
- a multi-port Ethernet interface device is usually used to implement interconnection between a network device and a low-end switch.
- the basic implementation of the device is that multiple ports are connected to a switch chip or a switch port of a network processor (NP), and may be multiple 100M ports. Corresponding to a switch chip or a 1GE port of the NP, or multiple 1GE ports corresponding to a switch chip or a 10GE port of the NP, and so on.
- the virtual private network (VPN) service is an important service form of the access network.
- the VPN service access modes supported by the bearer network include: port access, port + VLAN-ID access, port + VLAN- ID+802.1P priority access, port + QING access.
- the port is one of the important components.
- there is a multi-port Ethernet interface device which can make the switch chip or NP correctly distinguish the port, but currently there is no multi-port Ethernet interface.
- the main object of the present invention is to provide a multi-port Ethernet interface device and a VPN service access method thereof, which realize VPN service access of a multi-port Ethernet interface device.
- the present invention provides a method for accessing a VPN service of a multi-port Ethernet interface device, including: a multi-port Ethernet interface device according to a VPN service access mode information and a VPN service message Inbound port information and a preset mapping table to obtain a corresponding internal control VLAN;
- the switch chip or NP accesses the VPN service according to the internal control VLAN and the cascade port;
- the cascade port is a multi-port The switch chip or NP port corresponding to the Ethernet interface device.
- the multi-port Ethernet interface device obtains the corresponding internal control VLAN according to the information of the VPN service access mode, the inbound port information of the VPN service packet, and the preset mapping table: when the VPN service access mode is based on When the port is accessed, the corresponding internal control VLAN is obtained according to the inbound port information of the VPN service packet and the mapping table.
- the obtaining the corresponding internal control VLAN according to the ingress port information of the VPN service packet and the mapping table is:
- the multi-port Ethernet interface device obtains the corresponding internal control VLAN according to the information of the VPN service access mode, the inbound port information of the VPN service packet, and the preset mapping table.
- the VPN service access mode is port-based-VLAN-ID access, port+VLAN-ID+802.1P priority access, or port+QING access, according to the ingress port information of the VPN service packet and the Map the table to obtain the corresponding internal control VLAN.
- the obtaining the corresponding internal control VLAN according to the ingress port information of the VPN service packet and the mapping table is:
- the writing the internal control VLAN to the VPN service is:
- the invention also provides a multi-port Ethernet interface device, comprising:
- the obtaining module is configured to obtain a corresponding internal control VLAN according to the information about the VPN service access mode, the inbound port information of the VPN service packet, and the preset mapping table.
- a writing module configured to write the internal control VLAN into a VPN service packet
- An access module configured to send the VPN service packet written in the internal control VLAN to a switch chip or an NP of the network device, where the switch chip or the NP accesses the VPN service according to the internal control VLAN and the cascade port;
- the cascading port is a switch chip or an NP port corresponding to the multi-port Ethernet interface device.
- the obtaining module comprises:
- the first obtaining unit is configured to obtain a corresponding internal control VLAN according to the inbound port information of the VPN service packet and the mapping table when the VPN service access mode is port-based access.
- the first obtaining unit comprises:
- a first extracting subunit configured to extract inbound port information of the VPN service packet
- a first searching subunit configured to search the mapping table according to the ingress port information and a preset default VLAN, to obtain a corresponding mapping Internal control VLAN.
- the obtaining module further includes:
- the second obtaining unit is configured to: when the VPN service access mode is based on port+VLAN-ID access, port+VLAN-ID+802.1P priority access, or port+QING access, according to the VPN service packet
- the inbound port information and the mapping table obtain the corresponding internal control VLAN.
- the second obtaining unit comprises:
- a second extraction subunit configured to extract the VLAN and the inbound port information in the VPN service packet;
- the second search subunit configured to search the mapping according to the VLAN and the ingress port information Table, get the corresponding internal control VLAN.
- the multi-port Ethernet interface device and the method for accessing the VPN service according to the present invention map VPN service packets into different and unique internal control VLANs according to different VPN service access modes, and use internal control VLANs to distinguish The VPN service packet, and the internal control VLAN is written into the VPN service packet, and the internal control VLAN is sent to the switch chip or NP.
- the switch chip or the NP uses the cascade port (the multi-port Ethernet interface device uniquely corresponds to the switch chip or NP). Port) + Internal control VLAN to access VPN services to the access network.
- FIG. 1 is a schematic flowchart of a method for accessing a VPN service of a multi-port Ethernet interface device according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of obtaining an internal control VLAN when a VPN service is accessed based on a port in a method for accessing a VPN service of a multi-port Ethernet interface device according to an embodiment of the present invention
- FIG. 3 is a schematic flowchart of obtaining an internal control VLAN when a VPN service is accessed based on a port+VLAN in a method for accessing a VPN service of a multi-port Ethernet interface device according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram of a multi-port Ethernet interface device according to an embodiment of the present invention
- FIG. 5 is a schematic structural diagram of a first acquiring unit of an acquiring module in an embodiment of a multi-port Ethernet interface device according to the present invention
- FIG. 6 is another schematic structural diagram of a second acquiring unit of an acquiring module in an embodiment of a multi-port Ethernet interface device according to the present invention. detailed description
- an embodiment of a method for accessing a VPN service of a multi-port Ethernet interface device includes: Step S10: The multi-port Ethernet interface device obtains the corresponding internal control VLAN according to the information of the VPN service access mode, the inbound port information of the VPN service packet, and the preset mapping table.
- the multi-port Ethernet interface device is disposed between the port module of the network device and the switch chip or the NP, and the multi-port Ethernet interface device receives the VPN service packet forwarded by the port module, and obtains the VPN service after being processed.
- the internal control VLAN is a switch chip or a VLAN inside the NP to distinguish VPN services.
- a mapping table is preset in the multi-port Ethernet interface device, and the mapping table embodies a linear relationship between the port of the multi-port Ethernet interface device and the internal control VLAN, but the mapping table is different due to different VPN service access modes.
- the form of VPN service access includes: port access, port + VLAN-ID access, port + VLAN-ID + 802.1P priority access, port + QING access.
- the mapping table is the corresponding relationship between the default VLAN of the port and the internal control VLAN.
- the mapping table is Port + VLAN (this VLAN is the VLAN in the VPN service packet) and the corresponding relationship of the internal control VLAN.
- mapping relationship can be determined based on actual conditions. If the corresponding internal control VLAN is not found in the mapping table, the processing or the other processing mode is discarded. For example, the label is processed to process the VPN service packet, so that the switch chip or the NP does not process the packet.
- Step S11 Write the internal control VLAN into a VPN service packet.
- a port of a multi-port Ethernet interface device is connected to a VPN service, such as port 1, the implementation steps of accessing the VPN service on other ports are similar.
- the VPN service packet that is connected to the port 1 is mapped to the internal control VLAN 2000, and the internal control VLAN 2000 is written into the VPN service packet received by the port 1.
- the method can be used in multiple ways, such as replacing the VPN service packet.
- the original VLAN in the network can also be inserted into the VPN service packet in other ways, such as adding a field or modifying other fields.
- Step S12 Sending a VPN service message written in the internal control VLAN to a switching core of the network device
- the switch or the NP is configured to access the VPN service according to the internal control VLAN and the cascading port;
- the cascading port is a switch chip or an NP port corresponding to the multi-port Ethernet interface device.
- the multi-port Ethernet interface device sends the VPN service packet written to the internal control VLAN to the switch chip or NP.
- the switch chip or the NP uses the cascade port + the internal control VLAN to connect the VPN service to the access network to access the VPN service from the multi-port Ethernet interface device.
- the VPN service packet is mapped to a different and unique internal control VLAN according to the VPN service access mode, and the internal control VLAN is used to distinguish the VPN service packet, and the internal control VLAN is written into the VPN service packet.
- the internal control VLAN is sent to the switch chip or the NP, and the switch chip or the NP uses the cascade port (the port of the multi-port Ethernet interface device corresponding to the switch chip or the NP) + the internal control VLAN to access the VPN service to the access network. .
- step S10 may include:
- the corresponding internal control VLAN is obtained according to the inbound port information of the VPN service packet and the mapping table.
- VLAN information Therefore, for the VPN service that enters the port, a default VLAN such as VLAN O is added to be used for the subsequent mapping table, or when the subsequent mapping table is implemented, for the port-based VPN service access mode. Use the default VLAN directly without adding a default VLAN to VPN service packets.
- the default VLAN is proposed to obtain the corresponding internal control in the mapping table.
- the obtaining the corresponding internal control VLAN according to the VPN service packet and the mapping table further includes:
- Step S101 Extract inbound port information of the VPN service packet.
- the multi-port Ethernet interface device is on the ingress side.
- the VPN service packets are parsed and the packet information is decomposed. To improve the packet processing efficiency, you need to selectively configure the packet.
- the packet information generally includes: ingress port information, DMAC, SMAC, OVLAN, IVLAN, 802. IP precedence, Ethertype, Ip_protocoK DIP, SIP, which can be selectively parsed as needed. Then, the ingress port information of the VPN service packet is extracted.
- Step S102 Search the mapping table according to the ingress port information and a preset default VLAN, and obtain a corresponding internal control VLAN.
- the inbound port information and the default VLAN lookup mapping table are added to the VPN service packet when the multi-port Ethernet interface device receives the VPN service packet, or directly in the process of searching the mapping table. Enter the port information and the default VLAN write keyword, and then use this keyword as an index to find the mapping table. If the corresponding internal control VLAN is not found in the mapping table according to the port + default VLAN, the packet is discarded, or other tags are added.
- the default VLAN can also be modified to another specific VLAN, such as VLAN 3000, indicating that the search fails. And send the modified VPN service packet to the switch chip or NP. The switch chip or NP does not process such VPN service packets.
- step S10 may further include:
- the VPN service access mode is port-based-VLAN-ID access, port+VLAN-ID+802.1P priority access, or port+QING access, according to the ingress port information of the VPN service packet and the Map the table to obtain the corresponding internal control VLAN.
- VPN service packets entering from a specific port can access the network according to the VLAN carried by the text.
- the inbound port information and VLAN carried by the VPN service report body When looking up the mapping table, the inbound port information and VLAN carried by the VPN service report body, The corresponding internal control VLAN can be obtained.
- the information carried in the VPN packet is used to find a mapping table to obtain a corresponding internal control VLAN.
- obtaining the corresponding internal control VLAN according to the VPN service packet and the mapping table may further include:
- Step S103 Extract the VLAN and inbound port information in the VPN service packet; access the VPN service based on port+VLAN-ID access, port+VLAN-ID+802.1P priority access, or port+QING access
- the multi-port Ethernet interface device parses the VPN service packet of the ingress port and decomposes the packet information.
- the packet information generally includes: inbound port information, DMAC, SMAC, OVLAN, I VLAN, 802. IP precedence, Ethertype, Ip_protocoK DIP, SIP, which can be selectively parsed as needed, and then the incoming VPN service packet is extracted.
- Port information and VLAN is based on port+VLAN-ID access, port+VLAN-ID+802.1P priority access, or port+QING access
- the multi-port Ethernet interface device parses the VPN service packet of the ingress port and decomposes the packet information.
- the packet information generally includes: inbound port information, DMAC, SMAC, OVLAN, I VLAN, 802. IP precedence,
- Step S104 Search the mapping table according to the VLAN and the ingress port information, and obtain a corresponding internal control VLAN.
- the VLAN lookup mapping table carried by the inbound port information and the VPN service report text does not find the corresponding internal control VLAN in the mapping table, then discards the packet, or adds Other tags may also modify the default VLAN to another specific VLAN, such as VLAN 3000, indicating that the lookup failed, and send the modified VPN service message to the switch chip or NP.
- the switch chip or NP does not process such VPN service packets.
- an embodiment of a multi-port Ethernet interface device includes:
- the obtaining module 10 is configured to obtain a corresponding internal control VLAN according to the information of the VPN service access mode, the inbound port information of the VPN service packet, and the preset mapping table.
- the writing module 20 is configured to write the internal control VLAN into a VPN service packet
- the sending module 30 is configured to send a VPN service message written into the internal control VLAN to a switching chip or an NP of the network device, where the switching chip or The NP accesses the VPN service according to the internal control VLAN and the cascading port; the cascading port is a switch chip or an NP port corresponding to the multi-port Ethernet interface device.
- the multi-port Ethernet interface device is disposed between the port module of the network device and the switch chip or the NP, and the multi-port Ethernet interface device receives the VPN service packet forwarded by the port module, and is processed by the obtaining module 10 to obtain the VPN service packet.
- the internal control VLAN uniquely corresponding to the VPN service.
- the internal control VLAN is a switch chip or a VLAN inside the NP, and is used to distinguish the VPN service.
- the processing of the obtaining module 10 is to obtain the corresponding internal control VLAN through the mapping relationship.
- a mapping table is preset in the multi-port Ethernet interface device, and the mapping table embodies a linear relationship between the port of the multi-port Ethernet interface device and the internal control VLAN, but the mapping table is different due to different VPN service access modes.
- the form of VPN service access includes: port access, port + VLAN-ID access, port + VLAN-ID + 802.1P priority access, port + QING access.
- the mapping table is the corresponding relationship between the port + default VLAN and the internal control VLAN.
- the mapping table is used.
- the mapping relationship can be determined according to the actual situation. If the obtaining module 10 does not find the corresponding internal control VLAN in the mapping table, the processing or the NP does not process the VPN service packet.
- a port of a multi-port Ethernet interface device such as port 1
- a VPN service is connected to a VPN service.
- the steps for implementing other ports to access VPN services are similar. If the VPN service packet that is entered from the port 1 is mapped to the internal control VLAN 2000, the write module 20 writes the internal control VLAN 2000 into the VPN service packet received by the port 1, and the manner of writing may be multiple. Replace the VPN industry
- the original VLAN in the service packet can also be inserted into the VPN service packet in other ways, such as adding a field or modifying other fields.
- the sending module 30 sends the VPN service packet written in the internal control VLAN to the switching chip or NP.
- the switch chip or the NP adopts the cascade port + internal control VLAN to connect the VPN service to the access network to access the VPN service from the multi-port Ethernet interface device.
- the VPN service packet is mapped to a different and unique internal control VLAN according to the VPN service access mode, and the internal control VLAN is used to distinguish the VPN service packet, and the internal control VLAN is written into the VPN service packet.
- the internal control VLAN is sent to the switch chip or the NP, and the switch chip or the NP uses the cascade port (the port of the multi-port Ethernet interface device corresponding to the switch chip or the NP) + the internal control VLAN to access the VPN service to the access network. .
- the obtaining module 10 may include:
- the first obtaining unit is configured to obtain a corresponding internal control VLAN according to the inbound port information of the VPN service packet and the mapping table when the VPN service access mode is port-based access.
- the port access-based VPN service access mode does not care about the VLAN information of the VPN service. Therefore, the first acquiring unit adds a default VLAN, such as VLAN 0, to the VPN service packets entering the port.
- the mapping table is used by the implementation, or when the subsequent mapping table is implemented, for the port-based VPN service access mode, the first acquiring unit directly uses the default VLAN, and does not need to add a default VLAN in the VPN service packet.
- the default VLAN is used to obtain the corresponding internal control VLAN in the mapping table.
- the first acquiring unit further includes:
- the first extraction sub-unit 11 is configured to extract the ingress port information of the VPN service packet.
- the first search sub-unit 12 is configured to search the mapping table according to the ingress port information and a preset default VLAN, and obtain the mapping table. Corresponding internal control VLAN.
- the first extraction subunit 11 pairs the access port.
- the VPN service packet is parsed and the packet information is decomposed.
- the packet parsing setting needs to be selectively performed.
- the packet information generally includes: inbound port information, DMAC, SMAC, OVLAN, IVLAN, 802. IP precedence, Ethertype, Ip_protocoK DIP, SIP, which can be selectively parsed as needed, and then the ingress port of the VPN service packet is extracted. information.
- the first lookup subunit 12 searches the mapping table by using the ingress port information and the default VLAN.
- the default VLAN is added to the VPN service packet when the multi-port Ethernet interface device receives the VPN service packet, or is in the lookup mapping table.
- the ingress port information and the default VLAN are directly written into the keyword, and then the first lookup subunit 12 searches the mapping table by using the keyword as an index. If the first lookup sub-unit 12 does not find the corresponding internal control VLAN in the mapping table according to the port + default VLAN-ID, the packet is discarded, or other tags are added, and the default VLAN can also be modified into another specific VLAN. For example, if the VLAN is 3000, the search fails and the modified VPN service packet is sent to the switch chip or NP. The switch chip or NP does not process such VPN service packets.
- the obtaining module 10 further includes:
- the second obtaining unit is configured to: when the VPN service access mode is based on port+VLAN-ID access, port+VLAN-ID+802.1P priority access, or port+QING access, according to the VPN service packet
- the inbound port information and the mapping table obtain the corresponding internal control VLAN.
- the second acquiring unit needs to identify the VPN service.
- the VLAN in the packet therefore, the VPN service packet entering from a specific port can access the network according to the VLAN carried by the text.
- the corresponding internal control VLAN can be obtained by using the ingress port information and the VLAN carried by the VPN service text body.
- the information carried in the VPN packet is searched for, and the mapping table is searched to obtain a corresponding internal control VLAN.
- the second obtaining unit further includes:
- a second extracting sub-unit 13 is configured to extract information about a VLAN and an ingress port in the VPN service packet;
- the second search sub-unit 14 is configured to search the mapping table according to the VLAN and the ingress port information to obtain a corresponding internal control VLAN.
- the second extraction sub-unit 13 applies the VPN service packet to the ingress port.
- the analysis is performed to decompose the message information.
- the packet information generally includes: inbound port information, DMAC, SMAC, OVLAN, I VLAN, 802. IP precedence, Ethertype, Ip_protocoK DIP, SIP, which can be selectively parsed as needed, and then the incoming VPN service packet is extracted.
- Port information and VLAN are examples of the packets.
- the second lookup sub-unit 14 searches the mapping table by using the port information and the VLAN of the VPN service packet, such as the VLAN carried according to the port + VPN service report text, and does not find the corresponding internal control VLAN in the mapping table. You can also change the default VLAN to another specific VLAN, such as VLAN 3000, to indicate that the search fails, and send the modified VPN service packet to the switch chip or NP.
- the switch chip or NP handles this type of VPN service without any reason.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明公开了一种多端口以太网接口装置VPN业务接入的方法,包括:多端口以太网接口装置根据VPN业务接入方式的信息、VPN业务报文的入端口信息以及预设的映射表,获取对应的内控VLAN;将所述内控VLAN写入VPN业务报文内;发送所述写入内控VLAN的VPN业务报文至网络设备的交换芯片或NP,供所述交换芯片或NP根据所述内控VLAN以及级联端口,接入VPN业务;所述级联端口为多端口以太网接口装置对应的交换芯片或NP的端口。本发明还提出了对应的装置。本发明提出的一种多端口以太网接口装置及其VPN业务接入的方法,实现多端口以太网接口装置的VPN业务接入。
Description
多端口以太网接口装置及其 VPN业务接入的方法 技术领域 本发明涉及到通信领域, 特别涉及到一种多端口以太网接口装置及其 VPN业务接入的方法。 背景技术
中高端交换机、 路由器作为核心网和接入网的重要设备, 在保证具备 一定数量级的交换容量的同时, 可以兼容多种类型接口也很重要。 通常采 用多端口以太网接口装置来实现网络设备和低端交换机的对接, 该装置的 基本实现是多个端口和交换芯片或者网络处理器(NP ) 的一个交换端口对 接, 可以是多个 100M端口对应交换芯片或者 NP的一个 1GE端口, 或者 多个 1GE端口对应交换芯片或者 NP的一个 10GE端口, 依次类推。
虚拟专用网络( Virtual Private Network, VPN )业务是接入网的重要业 务形式, 目前, 承载网中支持的 VPN业务接入方式包括: 端口接入、 端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入、 端口 +QING接入。 从这些接入方式中可以看出, 端口是其中重要的组成部分之一, 目前已有 多端口以太网接口装置, 可以使交换芯片或 NP正确区分端口,但目前还没 有在多端口以太网接口装置上实现 VPN业务接入的方法。 发明内容
本发明的主要目的为提供一种多端口以太网接口装置及其 VPN业务接 入的方法, 实现多端口以太网接口装置的 VPN业务接入。
本发明提出一种多端口以太网接口装置 VPN业务接入的方法, 包括: 多端口以太网接口装置根据 VPN业务接入方式的信息、 VPN业务报文
的入端口信息以及预设的映射表, 获取对应的内控 VLAN;
将所述内控 VLAN写入 VPN业务才艮文;
发送所述写入内控 VLAN的 VPN业务报文至网络设备的交换芯片或 NP, 所述交换芯片或 NP根据所述内控 VLAN以及级联端口 ,接入 VPN业 务; 所述级联端口为多端口以太网接口装置对应的交换芯片或 NP的端口。
优选地, 所述多端口以太网接口装置根据 VPN业务接入方式的信息、 VPN业务报文的入端口信息以及预设的映射表,获取对应的内控 VLAN为: 当 VPN业务接入方式为基于端口接入时, 根据 VPN业务报文的入端 口信息以及所述映射表, 获取对应的内控 VLAN。
优选地, 所述根据 VPN业务报文的入端口信息以及所述映射表, 获取 对应的内控 VLAN为:
提取所述 VPN业务报文的入端口信息;
根据所述入端口信息和预设的默认 VLAN, 查找所述映射表, 得到对 应的内控 VLANo
优选地, 所述多端口以太网接口装置根据 VPN业务接入方式的信息、 VPN业务报文的入端口信息以及预设的映射表, 获取对应的内控 VLAN还 为:
当 VPN 业务接入方式为基于端口 +VLAN-ID 接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入时 , 根据所述 VPN业务 报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
优选地, 所述根据 VPN业务报文的入端口信息以及所述映射表, 获取 对应的内控 VLAN为:
提取所述 VPN业务才艮文内 VLAN和入端口信息;
根据所述 VLAN 和入端口信息, 查找所述映射表, 得到对应的内控 VLANo
优选地, 所述将所述内控 VLAN写入 VPN业务才艮文为:
将所述内控 VLAN添加至 VPN业务才艮文或将所述 VPN业务才艮文内的 VLAN信息修改为所述内控 VLAN。
本发明还提出一种多端口以太网接口装置, 包括:
获取模块, 用于根据 VPN业务接入方式的信息、 VPN业务报文的入端 口信息以及预设的映射表, 获取对应的内控 VLAN;
写入模块, 用于将所述内控 VLAN写入 VPN业务报文;
接入模块,用于发送所述写入内控 VLAN的 VPN业务报文至网络设备 的交换芯片或 NP,供所述交换芯片或 NP根据所述内控 VLAN以及级联端 口, 接入 VPN业务; 所述级联端口为多端口以太网接口装置对应的交换芯 片或 NP的端口。
优选地, 获取模块包括:
第一获取单元, 用于当 VPN 业务接入方式为基于端口接入时, 根据 VPN业务报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
优选地, 第一获取单元包括:
第一提取子单元, 用于提取所述 VPN业务报文的入端口信息; 第一查找子单元, 用于根据所述入端口信息和预设的默认 VLAN, 查 找所述映射表, 得到对应的内控 VLAN。
优选地, 获取模块还包括:
第二获取单元,用于当 VPN业务接入方式为基于端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入时 , 根据所述 VPN 业务报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
优选地, 所述第二获取单元包括:
第二提取子单元,用于提取所述 VPN业务报文内 VLAN和入端口信息; 第二查找子单元, 用于根据所述 VLAN和入端口信息, 查找所述映射
表, 得到对应的内控 VLAN。
本发明提供的一种多端口以太网接口装置及其 VPN业务接入的方法, 根据 VPN业务接入方式的不同, 将 VPN业务报文映射成不同的且唯一的 内控 VLAN, 用内控 VLAN来区分 VPN业务报文, 并将内控 VLAN写入 VPN业务报文的方式, 将内控 VLAN发送至交换芯片或 NP, 交换芯片或 NP使用级联端口 (多端口以太网接口装置唯一对应的交换芯片或 NP的端 口) +内控 VLAN的方式接入 VPN业务到接入网。 附图说明
图 1 为本发明多端口以太网接口装置 VPN业务接入的方法一实施例的 流程示意图;
图 2 为本发明多端口以太网接口装置 VPN业务接入的方法一实施例中 基于端口接入 VPN业务时获取内控 VLAN的流程示意图;
图 3 为本发明多端口以太网接口装置 VPN业务接入的方法一实施例中 基于端口 +VLAN接入 VPN业务时获取内控 VLAN的流程示意图;
图 4 为本发明多端口以太网接口装置一实施例的结构示意图; 图 5 为本发明多端口以太网接口装置一实施例中获取模块的第一获取 单元的结构示意图;
图 6 为本发明多端口以太网接口装置一实施例中获取模块的第二获取 单元的另一结构示意图。 具体实施方式
应当理解, 此处所描述的具体实施例仅仅用以解释本发明, 并不用于 限定本发明。
参照图 1 , 为本发明多端口以太网接口装置 VPN业务接入的方法一实施 例, 包括:
步驟 S 10、多端口以太网接口装置根据 VPN业务接入方式的信息、 VPN 业务报文的入端口信息以及预设的映射表, 获取对应的内控 VLAN;
本实施例中, 多端口以太网接口装置设置在网络设备的端口模块和交 换芯片或 NP之间, 多端口以太网接口装置接收端口模块转发的 VPN业务 报文, 并经过处理后获取与 VPN业务唯一对应的内控 VLAN。 内控 VLAN 为交换芯片或 NP内部的 VLAN, 用于区分 VPN业务。
在多端口以太网接口装置中预先设置一映射表, 该映射表体现了多端 口以太网接口装置的端口与内控 VLAN的——对应的线性关系, 但是由于 VPN业务接入方式不同,该映射表的形式也不同, VPN业务接入方式包括: 端口接入、 端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入、 端 口 +QING接入等。 当 VPN业务接入方式为端口接入时, 映射表为端口 +预 设的默认 VLAN与内控 VLAN的——对应关系, 当 VPN业务接入方式为 端口 +VLAN-ID方式时, 该映射表为端口 +VLAN (该 VLAN为 VPN业务 报文中的 VLAN ) 与内控 VLAN的——对应关系。 无论采用何种形式的映 射表, 其映射关系均可以根据实际情况来确定。 如果没有在映射表中查找 到对应的内控 VLAN,则丟弃或采取其它处理方式,如添加标记处理该 VPN 业务报文, 使交换芯片或 NP对此类报文不作处理。
步驟 Sll、 将所述内控 VLAN写入 VPN业务报文;
以多端口以太网接口装置一指定端口如端口 1接入 VPN业务为例, 其 他端口接入 VPN业务的实现步驟以此类推。 假定从端口 1接入的 VPN业 务报文映射到内控 VLAN 2000, 则将内控 VLAN 2000写入端口 1接收的 VPN业务报文内, 写入的方式可以是多种, 如可替换 VPN业务报文中的原 有的 VLAN , 也可以是以其它方式插入到 VPN业务报文中, 如再添加字段 或修改其它字段。
步驟 S12、发送写入内控 VLAN的 VPN业务报文至网络设备的交换芯
片或 NP; 供所述交换芯片或 NP根据所述内控 VLAN以及级联端口, 接入 VPN 业务; 所述级联端口为多端口以太网接口装置对应的交换芯片或 NP 的端口。
多端口以太网接口装置将写入内控 VLAN后的 VPN业务报文送到交换 芯片或者 NP。交换芯片或者 NP采用级联端口 +内控 VLAN的方式,将 VPN 业务接入到接入网, 实现从多端口以太网接口装置接入 VPN业务。
本实施例中, 根据 VPN业务接入方式的不同, 将 VPN业务报文映射成 不同的且唯一的内控 VLAN, 用内控 VLAN来区分 VPN业务报文, 并将内控 VLAN写入 VPN业务报文的方式,将内控 VLAN发送至交换芯片或 NP, 交换 芯片或 NP使用级联端口(多端口以太网接口装置唯一对应的交换芯片或 NP 的端口 ) +内控 VLAN的方式接入 VPN业务到接入网。
在一实施例中, 步驟 S10可包括:
当 VPN业务接入方式为基于端口接入时, 根据 VPN业务报文的入端 口信息以及所述映射表, 获取对应的内控 VLAN。
由于基于端口接入的 VPN 业务接入方式不关心 VPN 业务 4艮文的
VLAN信息 ,因此对于从端口进入的 VPN业务 4艮文,统一添加一默认 VLAN 如 VLAN O, 用于后续映射表实现使用, 或者在后续映射表实现时, 对于基 于端口的 VPN业务接入方式, 直接使用该默认 VLAN, 而无须在 VPN业 务报文中添加默认 VLANo
本实施例中, 提出通过默认 VLAN来, 以在映射表中获得对应的内控
VLANo
参照图 2, 在上述实施例中, 所述根据 VPN业务报文以及所述映射表, 获取对应的内控 VLAN进一步包括:
步驟 S101、 提取所述 VPN业务报文的入端口信息;
在基于端口的 VPN业务接入方式中, 多端口以太网接口装置对进入端
口的 VPN业务报文进行解析, 分解出报文信息, 为了提高报文处理效率, 需要有选择地进行报文解析设置。报文信息一般包括:入端口信息、 DMAC、 SMAC、 OVLAN、 IVLAN、 802. IP优先级、 Ethertype, Ip_protocoK DIP, SIP, 可以根据需要进行选择性地解析。 然后提取该 VPN业务报文的入端 口信息。
步驟 S102、 根据所述入端口信息和预设的默认 VLAN, 查找所述映射 表, 得到对应的内控 VLAN。
通过入端口信息和默认 VLAN查找映射表, 该默认 VLAN或者是在多 端口以太网接口装置接收到 VPN业务报文时就添加到 VPN业务报文, 或 者是在查找映射表的过程中,直接将入端口信息和默认 VLAN写入关键字, 然后以此关键字为索引查找映射表。 如根据端口 +默认 VLAN, 没有在映射 表中查找到对应的内控 VLAN, 则丟弃报文, 或者添加其它标记, 也可将 默认 VLAN修改成另一特定的 VLAN如 VLAN 3000,表示查找失败,并发 送修改后的 VPN业务报文到交换芯片或者 NP。交换芯片或 NP对此类 VPN 业务报文不做处理。
本实施例中, 提出基于端口的 VPN接入方式下, 查找映射表的方式。 在一实施例中, 步驟 S10还可包括:
当 VPN 业务接入方式为基于端口 +VLAN-ID 接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入时 , 根据所述 VPN业务 报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
要实现多端口以太网接口装置按照端口 +VLAN-ID 接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入的方式接入 VPN业务, 需要识别 VPN业务报文中的 VLAN, 因此, 从某一特定端口进入的 VPN 业务报文就可以根据报文本身所携带的 VLAN接入网络。
在查找映射表时,通过 VPN业务报文本身携带的入端口信息和 VLAN,
就可获得对应的内控 VLAN。
本实施例中, 提出通过 VPN报文内携带的信息, 查找映射表, 以获得 对应的内控 VLAN。
参照图 3 , 根据所述 VPN业务报文以及所述映射表, 获取对应的内控 VLAN进一步可包括:
步驟 S103、 提取所述 VPN业务报文内 VLAN和入端口信息; 在基于端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入或端 口 +QING接入的 VPN业务接入方式中,多端口以太网接口装置对进入端口 的 VPN业务报文进行解析, 分解出报文信息, 为了提高报文处理效率, 需 要有选择地进行报文解析设置。 报文信息一般包括: 入端口信息、 DMAC、 SMAC、 OVLAN、 I VLAN, 802. IP优先级、 Ethertype, Ip_protocoK DIP, SIP, 可以根据需要进行选择性地解析, 然后提取该 VPN业务报文的入端 口信息和 VLAN。
步驟 S104、 根据所述 VLAN和入端口信息, 查找所述映射表, 得到对 应的内控 VLAN;
通过入端口信息和 VPN业务报文本身携带的 VLAN查找映射表,如根 据端口 +VPN业务报文本身携带的 VLAN,没有在映射表中查找到对应的内 控 VLAN, 则丟弃报文, 或者添加其它标记, 也可将默认 VLAN修改成另 一特定的 VLAN, 如 VLAN 3000, 表示查找失败, 并发送修改后的 VPN业 务报文到交换芯片或者 NP。交换芯片或 NP对此类 VPN业务报文不做处理。
本实施例中, 提出基于端口 +VLAN-ID的 VPN接入方式下, 查找映射 表的方式。
参照图 4、 为本发明多端口以太网接口装置一实施例, 包括:
获取模块 10, 用于根据 VPN业务接入方式的信息、 VPN业务报文的 入端口信息以及预设的映射表, 获取对应的内控 VLAN;
写入模块 20, 用于将所述内控 VLAN写入 VPN业务报文; 发送模块 30, 用于发送写入内控 VLAN的 VPN业务报文至网络设备 的交换芯片或 NP; 供所述交换芯片或 NP根据所述内控 VLAN以及级联端 口, 接入 VPN业务; 所述级联端口为多端口以太网接口装置对应的交换芯 片或 NP的端口。
本实施例中, 多端口以太网接口装置设置在网络设备的端口模块和交 换芯片或 NP之间, 多端口以太网接口装置接收端口模块转发的 VPN业务 报文, 并经过获取模块 10处理后获取与 VPN业务唯一对应的内控 VLAN。 内控 VLAN为交换芯片或 NP内部的 VLAN, 用于区分 VPN业务, 上述获 取模块 10的处理为通过映射关系获得对应的内控 VLAN。
在多端口以太网接口装置中预先设置一映射表, 该映射表体现了多端 口以太网接口装置的端口与内控 VLAN的——对应的线性关系, 但是由于 VPN业务接入方式不同,该映射表的形式也不同, VPN业务接入方式包括: 端口接入、 端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入、 端 口 +QING接入等。 当 VPN业务接入方式为端口接入时, 映射表为端口 +预 设的默认 VLAN与交内控 VLAN的——对应关系, 当 VPN业务接入方式 为端口 +VLAN-ID方式时,该映射表为端口 +VLAN-ID(该 VLAN-ID为 VPN 业务报文中的 VLAN ) 与内控 VLAN的——对应关系。 无论采用何种形式 的映射表, 其映射关系均可以根据实际情况来确定。 如果获取模块 10没有 在映射表中查找到对应的内控 VLAN, 则丟弃或采取其它处理方式如添加 标记处理该 VPN业务报文, 使交换芯片或 NP对此类报文不作处理。
以多端口以太网接口装置一指定端口如端口 1接入 VPN业务为例, 其 他端口接入 VPN业务的实现步驟以此类推。 ^^定从端口 1进入的 VPN业 务报文映射到内控 VLAN 2000, 则写入模块 20将内控 VLAN 2000写入端 口 1接收的 VPN业务报文内, 写入的方式可以是多种, 如可替换 VPN业
务报文中的原有的 VLAN, 也可以是以其它方式插入到 VPN业务报文中, 如再添加字段或修改其它字段。
发送模块 30将写入内控 VLAN后的 VPN业务报文送到交换芯片或者 NP。 交换芯片或者 NP采用级联端口 +内控 VLAN的方式, 将 VPN业务接 入到接入网, 实现从多端口以太网接口装置接入 VPN业务。
本实施例中, 根据 VPN业务接入方式的不同, 将 VPN业务报文映射成 不同的且唯一的内控 VLAN, 用内控 VLAN来区分 VPN业务报文, 并将内控 VLAN写入 VPN业务报文的方式,将内控 VLAN发送至交换芯片或 NP, 交换 芯片或 NP使用级联端口(多端口以太网接口装置唯一对应的交换芯片或 NP 的端口 ) +内控 VLAN的方式接入 VPN业务到接入网。
在上一实施例中, 获取模块 10可包括:
第一获取单元, 用于当 VPN 业务接入方式为基于端口接入时, 根据 VPN业务报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
由于基于端口接入的 VPN 业务接入方式不关心 VPN 业务 4艮文的 VLAN信息, 因此第一获取单元对于从端口进入的 VPN业务报文, 统一添 加一默认 VLAN, 如 VLAN 0, 用于后续映射表实现使用, 或者在后续映射 表实现时, 对于基于端口的 VPN业务接入方式, 第一获取单元直接使用该 默认 VLAN, 而无须在 VPN业务报文中添加默认 VLANo
本实施例中, 提出通过默认 VLAN来, 以在映射表中获得对应的内控 VLANo
参照图 5、 在上述实施例中, 第一获取单元进一步包括:
第一提取子单元 11 , 用于提取所述 VPN业务报文的入端口信息; 第一查找子单元 12, 用于根据所述入端口信息和预设的默认 VLAN, 查找所述映射表, 得到对应的内控 VLAN。
在基于端口的 VPN业务接入方式中, 第一提取子单元 11对进入端口
的 VPN业务报文进行解析, 分解出报文信息, 为了提高报文处理效率, 需 要有选择地进行报文解析设置。 报文信息一般包括: 入端口信息、 DMAC、 SMAC、 OVLAN、 IVLAN、 802. IP优先级、 Ethertype, Ip_protocoK DIP, SIP, 可以根据需要进行选择性地解析, 然后提取该 VPN业务报文的入端 口信息。
第一查找子单元 12通过入端口信息和默认 VLAN查找映射表,该默认 VLAN或者是在多端口以太网接口装置接收到 VPN 业务报文时就添加到 VPN业务报文, 或者是在查找映射表的过程中, 直接将入端口信息和默认 VLAN写入关键字,然后第一查找子单元 12以此关键字为索引查找映射表。 如根据端口 +默认 VLAN-ID, 第一查找子单元 12没有在映射表中查找到对 应的内控 VLAN, 则丟弃报文, 或者添加其它标记, 也可将默认 VLAN修 改成另一特定的 VLAN如 VLAN 3000, 表示查找失败, 并发送修改后的 VPN业务报文到交换芯片或者 NP。 交换芯片或 NP对此类 VPN业务报文 不做处理。
本实施例中, 提出基于端口的 VPN接入方式下, 查找映射表的方式。 在上述实施例中, 获取模块 10还包括:
第二获取单元,用于当 VPN业务接入方式为基于端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入时 , 根据所述 VPN 业务报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
要实现多端口以太网接口装置按照端口 +VLAN-ID 接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入的方式接入 VPN业务, 第二获取单元需要识别 VPN业务报文中的 VLAN, 因此, 从某一特定端口 进入的 VPN业务报文就可以根据报文本身所携带的 VLAN接入网络。
第二获取单元在查找映射表时, 通过 VPN业务报文本身携带的入端口 信息和 VLAN , 就可获得对应的内控 VLAN。
本实施例中, 提出通过 VPN报文内携带的信息, 查找映射表, 以获得 对应的内控 VLAN。
参照图 6、 第二获取单元进一步包括:
第二提取子单元 13 , 用于提取所述 VPN业务报文内 VLAN和入端口 信息;
第二查找子单元 14, 用于根据所述 VLAN和入端口信息, 查找所述映 射表, 得到对应的内控 VLAN。
在基于端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入或端 口 +QING接入的 VPN业务接入方式中, 第二提取子单元 13对进入端口的 VPN业务报文进行解析, 分解出报文信息, 为了提高报文处理效率, 需要 有选择地进行报文解析设置。 报文信息一般包括: 入端口信息、 DMAC、 SMAC、 OVLAN、 I VLAN, 802. IP优先级、 Ethertype, Ip_protocoK DIP, SIP, 可以根据需要进行选择性地解析, 然后提取该 VPN业务报文的入端 口信息和 VLAN。
第二查找子单元 14 通过入端口信息和 VPN 业务报文本身携带的 VLAN查找映射表,如根据端口 +VPN业务报文本身携带的 VLAN,没有在 映射表中查找到对应的内控 VLAN, 则丟弃 4艮文, 或者添加其它标记, 也 可将默认 VLAN修改成另一特定的 VLAN如 VLAN 3000, 表示查找失败, 并发送修改后的 VPN业务报文到交换芯片或者 NP。交换芯片或 NP对此类 VPN业务艮文不故处理。
本实施例中, 提出基于端口 +VLAN-ID的 VPN接入方式下, 查找映射 表的方式。
以上所述仅为本发明的优选实施例, 并非因此限制本发明的专利范围 , 凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换, 或直 接或间接运用在其他相关的技术领域, 均同理包括在本发明的专利保护范
089 LO/ZlOZ l3/13d 98lZSl/ZT0Z OAV
Claims
1、 一种多端口以太网接口装置虚拟专用网络 VPN业务接入的方法, 其特征在于, 所述方法包括:
多端口以太网接口装置根据 VPN业务接入方式的信息、 VPN业务报文 的入端口信息以及预设的映射表, 获取对应的内控 VLAN;
将所述内控 VLAN写入 VPN业务才艮文;
发送所述写入内控 VLAN的 VPN业务报文至网络设备的交换芯片或网 络处理器 NP, 所述交换芯片或 NP根据所述内控 VLAN以及级联端口, 接 入 VPN业务; 其中, 所述级联端口为多端口以太网接口装置对应的交换芯 片或 NP的端口。
2、 如权利要求 1所述的多端口以太网接口装置 VPN业务接入的方法, 其特征在于, 所述多端口以太网接口装置根据 VPN业务接入方式的信息、 VPN业务报文的入端口信息以及预设的映射表,获取对应的内控 VLAN为: 当 VPN业务接入方式为基于端口接入时, 根据 VPN业务报文的入端 口信息以及所述映射表, 获取对应的内控 VLAN。
3、 如权利要求 2所述的多端口以太网接口装置 VPN业务接入的方法, 其特征在于, 所述根据 VPN业务报文的入端口信息以及所述映射表, 获取 对应的内控 VLAN为:
提取所述 VPN业务报文的入端口信息;
根据所述入端口信息和预设的默认 VLAN, 查找所述映射表, 得到对 应的内控 VLAN。
4、 如权利要求 1至 3任一项所述的多端口以太网接口装置 VPN业务 接入的方法, 其特征在于, 所述多端口以太网接口装置根据 VPN业务接入 方式的信息、 VPN业务报文的入端口信息以及预设的映射表, 获取对应的 内控 VLAN为: 当 VPN 业务接入方式为基于端口 +VLAN-ID 接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入时 , 根据所述 VPN业务 报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
5、 如权利要求 4所述的多端口以太网接口装置 VPN业务接入的方法, 其特征在于, 所述根据 VPN业务报文的入端口信息以及所述映射表, 获取 对应的内控 VLAN为:
提取所述 VPN业务才艮文内 VLAN和入端口信息;
根据所述 VLAN 和入端口信息, 查找所述映射表, 得到对应的内控 VLANo
6、 如权利要求 1至 3任一项所述的多端口以太网接口装置 VPN业务 接入的方法, 其特征在于, 所述将所述内控 VLAN写入 VPN业务报文为: 将所述内控 VLAN添加至 VPN业务才艮文或将所述 VPN业务才艮文内的 VLAN信息修改为所述内控 VLAN。
7、 一种多端口以太网接口装置, 其特征在于, 所述装置包括: 获取模块, 用于根据 VPN业务接入方式的信息、 VPN业务报文的入端 口信息以及预设的映射表, 获取对应的内控 VLAN;
写入模块, 用于将所述内控 VLAN写入 VPN业务报文;
接入模块,用于发送所述写入内控 VLAN的 VPN业务报文至网络设备 的交换芯片或 NP,供所述交换芯片或 NP根据所述内控 VLAN以及级联端 口, 接入 VPN业务; 其中, 所述级联端口为多端口以太网接口装置对应的 交换芯片或 NP的端口。
8、 如权利要求 7所述的多端口以太网接口装置, 其特征在于, 所述获 取模块包括:
第一获取单元, 用于当 VPN 业务接入方式为基于端口接入时, 根据 VPN业务报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
9、 如权利要求 8所述的多端口以太网接口装置, 其特征在于, 所述第 一获取单元包括:
第一提取子单元, 用于提取所述 VPN业务报文的入端口信息; 第一查找子单元, 用于根据所述入端口信息和预设的默认 VLAN, 查 找所述映射表, 得到对应的内控 VLAN。
10、 如权利要求 7至 9任一项所述的多端口以太网接口装置, 其特征 在于, 所述获取模块还包括:
第二获取单元,用于当 VPN业务接入方式为基于端口 +VLAN-ID接入、 端口 +VLAN-ID+802.1P优先级接入或端口 +QING接入时 , 根据所述 VPN 业务报文的入端口信息以及所述映射表, 获取对应的内控 VLAN。
11、 如权利要求 10所述的多端口以太网接口装置, 其特征在于, 所述 第二获取单元包括:
第二提取子单元,用于提取所述 VPN业务报文内 VLAN和入端口信息; 第二查找子单元, 用于根据所述 VLAN和入端口信息, 查找所述映射 表, 得到对应的内控 VLAN。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP12782627.9A EP2709316A4 (en) | 2011-05-12 | 2012-04-25 | MULTIPORT ETHERNET INTERFACE DEVICE AND METHOD FOR ACCESSING A VPN SERVICE FOR SAID DEVICE |
RU2013155046/08A RU2562425C2 (ru) | 2011-05-12 | 2012-04-25 | Многопортовое устройство интерфейса ethernet и способ доступа к vpn услуге интерфейса ethernet |
ZA2013/09398A ZA201309398B (en) | 2011-05-12 | 2013-12-12 | Multi-port ethernet interface device and vpn service access method for the same |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110122377.0 | 2011-05-12 | ||
CN201110122377.0A CN102185781B (zh) | 2011-05-12 | 2011-05-12 | 多端口以太网接口装置及其vpn业务接入的方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012152186A1 true WO2012152186A1 (zh) | 2012-11-15 |
Family
ID=44571852
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/074680 WO2012152186A1 (zh) | 2011-05-12 | 2012-04-25 | 多端口以太网接口装置及其vpn业务接入的方法 |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP2709316A4 (zh) |
CN (1) | CN102185781B (zh) |
RU (1) | RU2562425C2 (zh) |
WO (1) | WO2012152186A1 (zh) |
ZA (1) | ZA201309398B (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314941A (zh) * | 2020-03-25 | 2020-06-19 | 天翼电信终端有限公司 | 一种业务服务质量保证方法、装置及终端 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102185781B (zh) * | 2011-05-12 | 2015-06-03 | 中兴通讯股份有限公司 | 多端口以太网接口装置及其vpn业务接入的方法 |
CN102546416A (zh) * | 2012-01-13 | 2012-07-04 | 中兴通讯股份有限公司 | L3vpn业务报文的传输方法和装置 |
CN102624727B (zh) * | 2012-03-07 | 2014-12-24 | 福建星网锐捷网络有限公司 | 接口配置方法及装置、主控中央处理器及网络设备 |
EP2933962A4 (en) * | 2013-01-16 | 2015-12-09 | Huawei Tech Co Ltd | METHOD FOR IMPLEMENTING TRILL OAM PACKAGES, RB AND TRILL NETWORK |
CN105072013B (zh) * | 2015-08-19 | 2018-06-29 | 上海斐讯数据通信技术有限公司 | 多vlan共用的端口的配置方法及系统 |
WO2017177401A1 (en) | 2016-04-13 | 2017-10-19 | Nokia Technologies Oy | A multi-tenant virtual private network based on an overlay network |
CN107135154B (zh) * | 2017-05-26 | 2019-08-06 | 烽火通信科技股份有限公司 | Potn业务转发系统及业务转发、配置下发、保护方法 |
CN109639451A (zh) * | 2018-10-29 | 2019-04-16 | 盛科网络(苏州)有限公司 | 端口配置方法、装置、存储介质及电子装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1838629A (zh) * | 2005-03-24 | 2006-09-27 | 杭州华为三康技术有限公司 | 一种利用QinQ技术实现虚拟交换的方法 |
CN101297523A (zh) * | 2004-08-13 | 2008-10-29 | 高通弗拉里奥恩技术公司 | 用于高效的vpn服务器接口、地址分配和与本地寻址域的信令传递的方法和装置 |
CN101778035A (zh) * | 2010-03-09 | 2010-07-14 | 中兴通讯股份有限公司 | 一种虚拟专用局域网通信的方法及装置 |
CN102185781A (zh) * | 2011-05-12 | 2011-09-14 | 中兴通讯股份有限公司 | 多端口以太网接口装置及其vpn业务接入的方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1299469C (zh) * | 2003-08-06 | 2007-02-07 | 中兴通讯股份有限公司 | 一种基于业务等级交换的交换系统及其交换方法 |
US7633956B1 (en) * | 2006-01-19 | 2009-12-15 | Cisco Technology, Inc. | System and method for providing support for multipoint L2VPN services in devices without local bridging |
-
2011
- 2011-05-12 CN CN201110122377.0A patent/CN102185781B/zh active Active
-
2012
- 2012-04-25 EP EP12782627.9A patent/EP2709316A4/en not_active Withdrawn
- 2012-04-25 WO PCT/CN2012/074680 patent/WO2012152186A1/zh active Application Filing
- 2012-04-25 RU RU2013155046/08A patent/RU2562425C2/ru active
-
2013
- 2013-12-12 ZA ZA2013/09398A patent/ZA201309398B/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101297523A (zh) * | 2004-08-13 | 2008-10-29 | 高通弗拉里奥恩技术公司 | 用于高效的vpn服务器接口、地址分配和与本地寻址域的信令传递的方法和装置 |
CN1838629A (zh) * | 2005-03-24 | 2006-09-27 | 杭州华为三康技术有限公司 | 一种利用QinQ技术实现虚拟交换的方法 |
CN101778035A (zh) * | 2010-03-09 | 2010-07-14 | 中兴通讯股份有限公司 | 一种虚拟专用局域网通信的方法及装置 |
CN102185781A (zh) * | 2011-05-12 | 2011-09-14 | 中兴通讯股份有限公司 | 多端口以太网接口装置及其vpn业务接入的方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314941A (zh) * | 2020-03-25 | 2020-06-19 | 天翼电信终端有限公司 | 一种业务服务质量保证方法、装置及终端 |
CN111314941B (zh) * | 2020-03-25 | 2023-09-22 | 天翼电信终端有限公司 | 一种业务服务质量保证方法、装置及终端 |
Also Published As
Publication number | Publication date |
---|---|
EP2709316A1 (en) | 2014-03-19 |
CN102185781B (zh) | 2015-06-03 |
EP2709316A4 (en) | 2014-12-24 |
RU2013155046A (ru) | 2015-06-20 |
RU2562425C2 (ru) | 2015-09-10 |
ZA201309398B (en) | 2015-04-29 |
CN102185781A (zh) | 2011-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012152186A1 (zh) | 多端口以太网接口装置及其vpn业务接入的方法 | |
EP1942617B1 (en) | Method, device and system for Ethernet-supported Source Specific Multicast forwarding | |
CN104022953B (zh) | 基于开放流Openflow的报文转发方法和装置 | |
CN102215170B (zh) | 抑制网络风暴的方法及处理器 | |
US9294305B2 (en) | Method for sending ethernet frames in ethernet tree service and provider edge device | |
US20090190588A1 (en) | Data Packet Switching | |
WO2015021881A1 (en) | Packet forwarding in software defined networking | |
WO2014187204A1 (zh) | 一种ofs带内通信方法及ofs | |
US10530692B2 (en) | Software FIB ARP FEC encoding | |
WO2013155959A1 (en) | Accessing ip network and edge devices | |
WO2009033428A1 (fr) | Procédé, système et dispositif pour retirer une adresse de commande d'accès au support | |
EP2709313B1 (en) | Multiport ethernet interface device and method for identifying ports thereof | |
WO2018001242A1 (zh) | 一种数据报文处理方法及装置 | |
WO2009021371A1 (fr) | Procédé et dispositif permettant de réaliser une émulation pseudo-filaire de bout en bout | |
WO2011160517A1 (zh) | 一种多协议标签交换业务隧道切换的方法及系统 | |
CN101707545B (zh) | 一种实现私有虚拟局域网的方法和系统 | |
EP3113422B1 (en) | Method and system of enhancing multiple mac registration protocol (mmrp) for protocol internetworking | |
WO2014187428A1 (zh) | 一种实现报文转发的方法及交换机 | |
WO2014169812A1 (zh) | 报文的转发处理方法及装置 | |
CN105991391A (zh) | 一种协议报文上送cpu的方法和装置 | |
WO2014067328A1 (zh) | 二层转发方法及转发设备 | |
WO2011097859A1 (zh) | 一种实现灵活qinq的方法及装置 | |
CN108833284B (zh) | 一种云平台和idc网络的通信方法及装置 | |
EP2908476B1 (en) | Method and apparatus for sending multi-link transparent interconnected data frame | |
WO2012068907A1 (zh) | 一种pw双归保护场景中确定转发路径的方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12782627 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012782627 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2013155046 Country of ref document: RU Kind code of ref document: A |