WO2014075213A1 - 双向转发检测bfd会话协商方法、设备及系统 - Google Patents

双向转发检测bfd会话协商方法、设备及系统 Download PDF

Info

Publication number
WO2014075213A1
WO2014075213A1 PCT/CN2012/084513 CN2012084513W WO2014075213A1 WO 2014075213 A1 WO2014075213 A1 WO 2014075213A1 CN 2012084513 W CN2012084513 W CN 2012084513W WO 2014075213 A1 WO2014075213 A1 WO 2014075213A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication value
bfd
bfd control
local
control message
Prior art date
Application number
PCT/CN2012/084513
Other languages
English (en)
French (fr)
Inventor
黎景棠
熊宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP12888564.7A priority Critical patent/EP2782309B1/en
Priority to PCT/CN2012/084513 priority patent/WO2014075213A1/zh
Priority to CN201280002103.0A priority patent/CN104040984B/zh
Publication of WO2014075213A1 publication Critical patent/WO2014075213A1/zh
Priority to US14/314,441 priority patent/US9444709B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/24Negotiation of communication capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context

Definitions

  • the present invention relates to communication technologies, and in particular, to a bidirectional forwarding detection BFD session negotiation method, device, and system.
  • BFD Bidirectional Forwarding Detection
  • P2P mode it is used for fast fault detection on any type of channel between network devices.
  • each network device In order to associate the received BFD control packet with the corresponding BFD session, each network device needs to select an opaque authentication value for each BFD session, and the authentication values of all BFD sessions in each network device are unique. .
  • the local authentication value of each network device is sent in the "My Discriminator (MD)" field of the BFD control packet and returned in the "Your Discriminator (YD)” field of the response packet of the remote network device.
  • MD My Discriminator
  • YD Your Discriminator
  • the sent and received packets and the modified session parameters are only matched according to MD and YD.
  • MD and YD the probability of the same MD in the BFD session is very high.
  • the MDs generated in the BFD session are in conflict.
  • the BFD session cannot be negotiated normally.
  • the BFD control packet authentication mode is used to ensure correct negotiation between BFD sessions.
  • this requires that the network device can support the BFD authentication function, and the implementation is complicated. The user must configure the authentication in addition to the basic configuration of the BFD.
  • the embodiment of the invention provides a bidirectional forwarding detection BFD session negotiation method, device and system, which are used to solve the BFD session negotiation error problem.
  • a first aspect of the embodiments of the present invention provides a bidirectional forwarding detection BFD session negotiation method, including:
  • Another aspect of the present invention provides a bidirectional forwarding detection BFD session negotiation device, including:
  • An authentication value generating unit configured to generate a first authentication value, where the first authentication value is unique within a local area network to which the local device belongs;
  • a ⁇ ⁇ generating unit configured to generate a first BFD control, wherein the first BFD control includes the first authentication value
  • a further aspect of the embodiments of the present invention provides a bidirectional forwarding detection BFD session negotiation system, including a local device and a peer device, where the local device is configured to generate a first authentication value, where the first authentication value is The first BFD control packet is sent to the peer end, and the first BFD control packet is sent to the peer end, and the first BFD control packet is sent to the peer end.
  • the peer device is configured to perform session negotiation with the local device according to the first authentication value.
  • the local authentication value is set to the unique value in the local area network of the local device, which eliminates the possibility of generating the same MD for different BFD sessions in the LAN, thereby solving the session negotiation error caused by misconfiguration or miscellaneous packet spoofing, and improving the BFD session.
  • the efficiency and security of the consultation. 1 is a flowchart of a bidirectional forwarding detection BFD session negotiation method according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a structure of a bidirectional forwarding detection BFD session negotiation device according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of a bidirectional forwarding detection BFD session negotiation system according to an embodiment of the present invention.
  • Step 11 Generate a first authentication value, where the first authentication value is only in a local area network to which the local device belongs
  • generating the first authentication value may generate a first authentication value according to the identification information of the local device.
  • the first authentication value may be a local authentication value.
  • the identification information of the local device includes one or more of a media access control (MAC) address, a device name, an interface IP, and an outbound interface of the local device.
  • the generating the first authentication value may include: combining the result of mapping the identification information of the local device according to the set mapping algorithm, and combining the sequence number of the session corresponding to the first BFD control message into the first authentication value.
  • the first BFD control packet is described in the following step 12.
  • the set mapping algorithm may include a hash algorithm, and the result of the mapping may include a hash index.
  • the local device maps the identification information of the device, such as the system bridge MAC address, device name, interface IP address, interface IP address, and outbound interface index, to the MD field in the BFD control packet through a hash algorithm.
  • the last two bytes of the MD field are assigned to the BFD session sequence number. Since the content of the MD field is the local authentication value, the first two bytes of the local authentication value are the identification information of the local device, and the last two bytes are the BFD session number.
  • the local authentication value is unique across the entire network, thereby basically eliminating the possibility of generating the same MD for different BFD sessions.
  • Step 12 Generate a first BFD control packet, where the BFD control packet includes the first authentication value.
  • 00011 Diagnostic Code: Neighbor Signaled Session Down ( 0X03 )
  • the "My Discriminator: 0X01000007" is the first two bytes of the MD.
  • the identification information of the local device is obtained by the mapping algorithm.
  • the last two bytes 0007 are the session number.
  • Step 13 Send the first BFD control packet to the peer device, so that the peer device performs session negotiation with the local device according to the first authentication value.
  • the method further includes: Receiving a second BFD control packet sent by the peer device, where the second BFD control packet sent by the peer device carries a second authentication value generated by the peer device; using the first authentication value and the second identifier The value identifies a session.
  • the second authentication value of the peer device is unique within the local area network to which the peer device belongs.
  • the second discrimination value reference may be made to the generation of the first discrimination value in the above step 11.
  • the local device and the peer device can be network devices such as routers and switches.
  • This embodiment provides a technical solution to avoid session negotiation errors caused by misconfiguration or miscellaneous packet spoofing in a BFD session.
  • the miscellaneous packet spoofing refers to the same BFD control packet sent by the malicious attack in the network.
  • the device can avoid BFD session negotiation errors caused by the same MD and save costs when the device does not have the authentication function. For example, as shown in FIG. 2, the first router RT1 is connected to the second router RT2 and the third router RT3, respectively.
  • Two BFD sessions Session1 and Session2 are established between the first router RT1 and the second router RT2. It is assumed that the Session1 of the first router RT1 and the Session1 of the second router RT2 are in physical information configuration-corresponding to the Session2 of the first router RT1.
  • the Session 2 of the second router RT2 is corresponding to the physical information configuration, and the MD generated according to the commonly used method is as shown in FIG. 2, then the Session1 of the first router RT1 and the second router RT2 are normally negotiated.
  • a normal BFD session is established. Session 2 negotiates another normal BFD session.
  • the first router RT1 receives a BFD control packet of the third router RT3 for negotiating the BFD session.
  • the MD of the negotiation packet is 1 .
  • the physical information in the BFD control packet used to negotiate the BFD session matches the session Session1 of the first router RT1 due to misconfiguration or spoofing attack.
  • the first router RT1 learns.
  • the YD to Sessionl is 1.
  • the first router RT1 is routed to the second router RT2. Therefore, the BFD control packet whose status of the Session1 of the first router RT1 is "Init" is sent to the second router RT2.
  • the BFD control report with the status "Init” The text has a YD of 1.
  • the second router RT2 receives the message.
  • the YD in the BFD control packet with the status "Init” is matched with the MD set by the local device, that is, the second router RT2, for the BFD session.
  • the BFD control packet whose session status is "Init” is separated into the session session2. Then, the second router RT2 and the first router RT1 erroneously negotiate the Session2 of the second router RT2 with the Session1 of the first router RT1, and the Session 2 state of the second router RT2 becomes UP.
  • the YD field in the BFD control packet with the status "Down” is 0, and the first router is configured according to the first router.
  • the physical configuration information of both the RT1 and the second router RT2 the BFD session negotiated by the second router RT2 with the first router RT1 should be the Session 2 of the second router RT2 (see the description of 6.8.6 in the protocol RFC5880 "If the Your Discriminator field is Zero and the State field is not Down or AdminDown, the packet MUST be discarded.” ) prevail However, at this time, the Session 2 state of the second router RT2 is already in the “UP” state, and the second router RT2 discards the state as “Down”.
  • the Session1 negotiation packet sent by the second router RT2 is also discarded by the first router RT1.
  • the first router RT1 cannot negotiate with the second router RT2 to start the Session 2 of the first router RT1.
  • the second router RT2 cannot negotiate with the first router RT1 to start the Session1 of the second router RT2.
  • the first router RT1 learns the negotiation packet sent from the third router RT3 to the YD of the Session1, and after the BFD control packet with the status "Init" is sent to the second router RT2, the second router RT2 receives the The YD cannot be matched with the locally set MD.
  • the second router RT2 discards the received BFD control packet carrying the YD status "Init", which avoids an error between the second router RT2 and the second router RT2.
  • Negotiation This is because, according to the technical solution provided by the embodiment of the present invention, the MD in the negotiation packet sent by the third router RT3 is unique in the whole network, and the MD set in the second router RT2 is also unique in the whole network, and the MDs of the two are impossible. The same is true. Therefore, in the case of third-party network spoofing or misconfiguration, the devices at both ends can still negotiate normally, and the devices at both ends do not need to have the authentication function, which is easy to implement.
  • the first router RT1, the second router RT2, and the third router RT3 are still taken as an example.
  • each router maps the system bridge MAC address of the device to the HASH algorithm.
  • the first two bytes of the four bytes of the MD field are such that the MD is unique at least within the LAN.
  • the last two bytes of the MD field are assigned to the BFD session sequence number to distinguish different sessions on the same device.
  • the MDs of the respective sessions generated by the first router RT 1, the second router RT2, and the third router RT3 are unique, and no conflict occurs.
  • the first router RT1 learns that the YD of the Session1 is 30001. .
  • “3" is the value calculated by the hash algorithm
  • "0001” is the BFD session number.
  • the status of Session1 of the first router RT1 changes to the "Init" state.
  • the first router RT1 sends the BFD control message of the session "Init" to the second router RT2, because the YD of the BFD control message with the status "Init” and the MD of all the sessions set by the second router RT2 are both Inconsistent, the second router RT2 discards the BFD control message with the status "Init”.
  • the second router RT2 can correctly negotiate Session 2 with the first router RT1 to the "UP" state.
  • the first router RT1 can not switch back to the "Down" state after receiving the BFD control text for the BFD session. Since the second router RT2 also sends the BFD control packet of the session "Down" to the first router RT1, the two devices re-negotiate correctly and return to normal.
  • the first router RT1 and the second router RT2 negotiate correctly, the first router RT1 and the second router.
  • the first router RT1 receives the BFD control packet whose status is "Down” on the third router RT3, or causes the Session1 of the first router RT1 to become Down.
  • the first router RT1 receives the BFD control packet of the third router RT3, the BFD control packet whose status is "Down", the error BFD control packet
  • the YD in the text does not match the MD set by the first router RT1.
  • the error BFD control packet is directly discarded by the first router RT1. Therefore, the error BFD control packet of the third router RT3 does not belong to the first router.
  • the BFD session negotiation between the RT1 and the second router RT2 has an impact.
  • the first router RT1, the second router RT2, and the third router RT3 are used as an example. As shown in FIG. 4, each router adds the source IP address of the outbound interface of the BFD control packet of the local device to the interface index.
  • the first two bytes of the four bytes of the MD field are mapped.
  • the last two bytes of the MD field are assigned to the BFD session sequence number. That is to say, the device identification information is the source IP address of the outbound interface of the BFD control packet, and the interface index is the interface of the BFD control packet.
  • the source IP address is added to the interface interface 1 to map the MD to be unique within the LAN.
  • the last two bytes of the MD are BFD session numbers, which can distinguish different sessions on the same device.
  • the IP address Since the IP address is unique in the network, the IP address can also be used as the identification information of the device. However, in the case of a misconfiguration or a malicious attack, the IP address may be in conflict. Therefore, the source IP address of the outbound interface of the BFD control packet of the device and the outbound interface index of the packet can be used for hash calculation to obtain a hash index. As the first two bytes of the MD field. As shown in FIG. 4, the BFD control packet sent by the outbound interface corresponding to the outbound interface index 1 of the first router RT1 is sent to the third router RT3, and the BFD control packet sent by the outbound interface corresponding to the outbound interface index 2 of the first router RT1 Go to the second router RT2.
  • the Session1 of the first router RT1 is maliciously attacked or misconfigured, even if the first router RT1 receives the first The BFD control packet sent by the third router RT3, because the outbound interface index in the BFD control packet sent by the third router RT3 is inconsistent with the outbound interface index of the normal second router RT2, so that the third router RT3 and the second router RT2 generate The MD is different.
  • the BFD control packet of the third router RT3 is discarded normally on the first router RT1. This does not cause mismatch.
  • the technical effects achieved by the technical solution provided by this embodiment are the same as those in the first embodiment.
  • the identifier information of the local device is the device name of the local device.
  • Device names are generally described in strings. Convert the string of the device name to the corresponding hexadecimal number, then use this set of numbers to generate the HASH index, and fill in the first two bytes of the four bytes of the MD field. The last two bytes of the MD field are assigned to the BFD session sequence number. Due to the normal use of the device on the network, the operator generally modifies the device name of the device so that the device name of the network device is unique within a certain range.
  • the first two bytes in the MD are mapped by the device name so that the MD is unique within the LAN and the last two bytes of the MD are assigned to the BFD session sequence number to distinguish different sessions on the same device.
  • the technical effect achieved by the technical solution provided by this embodiment is the same as that of the foregoing embodiment 1.
  • the value is set to the unique value in the local area network of the local device, which eliminates the possibility of generating the same MD for different BFD sessions in the LAN, thus solving the session negotiation error caused by misconfiguration or miscellaneous spoofing, and improving the efficiency of BFD session negotiation. safety.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
  • FIG. 5 is a schematic structural diagram of a bidirectional forwarding detection BFD session negotiation device according to an embodiment of the present invention.
  • the device provided in this embodiment is used to implement the method provided in the embodiment shown in FIG. 1.
  • the device includes: an authentication value generating unit 51, a message generating unit 52, and a message sending unit 53.
  • the authentication value generating unit 51 is configured to generate a first authentication value, where the first authentication value is used in the local area network to which the local device belongs to generate the first BFD control message, where the first BFD control message is used.
  • the first authentication value generated by the discrimination value generating unit 51 is included.
  • the message sending unit 53 is configured to send the first BFD control message generated by the message generating unit 52 to the peer device, so that the peer device performs session negotiation with the local device according to the first authentication value.
  • the BFD session negotiation device provided by the embodiment of the present invention further includes a message receiving unit and a session negotiation unit.
  • the packet receiving unit is configured to receive a second BFD control packet of the peer device, where the second BFD control packet carries a second authentication value generated by the peer device.
  • the session negotiation unit is configured to identify a session by using the first authentication value and the second authentication value.
  • the bidirectional forwarding detection BFD session negotiation device provided by the device embodiment is generated by using an authentication value.
  • the unit sets the local authentication value to the unique value in the local area network of the local device, which eliminates the possibility of generating the same MD for different BFD sessions in the LAN, thereby solving the session negotiation error caused by misconfiguration or miscellaneous packet spoofing, and improving the BFD session. The efficiency and security of the consultation.
  • the processor is used to perform the following operations:
  • the first BFD control packet is sent to the peer device, so that the peer device performs session negotiation with the local device according to the first authentication value.
  • the processor further performs the following operations:
  • a session is identified by the first authentication value and the second authentication value.
  • the processor is further configured to generate the first identification value according to the identifier information of the local device.
  • the processor is further configured to combine the sequence information corresponding to the first BFD control message into a first authentication value by mapping the identification information of the local device according to the set mapping algorithm.
  • the bidirectional forwarding detection BFD session negotiation device provided by the foregoing device embodiment sets the local authentication value to a unique value in the local area network of the local device by using the processor, thereby eliminating the possibility of generating the same MD for different BFD sessions in the local area network, thereby solving the error due to the error.
  • the session negotiation error caused by configuration or miscellaneous packet spoofing improves the efficiency and security of BFD session negotiation.
  • FIG. 6 is a schematic diagram of a bidirectional forwarding detection BFD session negotiation system according to an embodiment of the present invention.
  • the BFD session negotiation system provided by the embodiment of the present invention is used to implement the method shown in FIG. 1 .
  • the BFD session negotiation system includes a local device 61 and a peer device 62 .
  • the local device 61 is configured to generate a first authentication value, which is unique within the local area network to which the local device 61 belongs. For details, refer to the description in the foregoing method embodiment.
  • the local device 61 is further configured to generate a first BFD control packet, where the first BFD control packet includes the foregoing first authentication value.
  • the local device 61 is further configured to send the first BFD control packet to the peer device 62.
  • the peer device 62 is configured to perform session negotiation with the local device 61 according to the foregoing first authentication value.
  • the peer device 62 is specifically configured to send a second BFD control message to the local device 61, where the second BFD control packet carries a second authentication value generated by the peer device, and the second authentication value is used.
  • the local device 61 is further configured to receive the foregoing second BFD control packet, and identify a session by using the first authentication value and the second authentication value.
  • the foregoing system embodiment sets the first authentication value, such as the local authentication value, to a unique value in the local area network of the local device by using the local device, thereby eliminating the possibility of generating the same MD for different BFD sessions in the local area network, thereby solving the problem of misconfiguration or miscellaneous packets.
  • the session negotiation error caused by spoofing improves the efficiency and security of BFD session negotiation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明涉及一种双向转发检测BFD会话协商方法、设备及系统,双向转发检测BFD会话协商方法包括:生成第一鉴别值,所述第一鉴别值在本地设备所属的局域网内唯一;生成第一BFD控制报文,所述第一BFD控制报文中包含有所述第一鉴别值;将所述第一BFD控制报文发送给对端设备,以使得所述对端设备根据所述第一鉴别值与所述本地设备进行会话协商。通过将本地鉴别值设置为本地设备所属局域网内唯一的值,杜绝了局域网内对不同BFD会话生成相同MD的可能,从而解决了由于错误配置或者杂包欺骗导致的会话协商错误,提高了BFD会话协商的效率和安全性。

Description

双向转发检测 BFD会话协商方法、 设备及系统
技术领域 本发明涉及一种通信技术,尤其涉及一种双向转发检测 BFD会话协商方 法、 设备及系统。
背景技术
双向转发检测 ( Bidirectional Forwarding Detection, BFD )运行在单播、
P2P模式下, 用于在网络设备之间的任何类型通道上进行快速的故障检测。
一对网络设备之间, 如果存在多条通道, 即至少在一个方向上有多条通 道, 则在这对网络设备之间需要对应建立多个 BFD会话。
为了将接收到的 BFD控制报文与相应的 BFD会话对应起来, 每个网络 设备需要对每个 BFD会话选择一个不透明的鉴别值,每个网络设备中所有的 BFD会话的鉴别值都是唯一的。 每个网络设备的本地鉴别值在 BFD控制报文的 "My Discriminator (以下 简称 MD )"域发送出去,并在远端网络设备的回应报文的 "Your Discriminator (以下简称 YD )" 域返回。 一旦远端网络设备返回了本地鉴别值, 后面接收 到的 BFD控制报文都只根据该本地鉴别值进行分离, 即通过该鉴别值区分不 同的 BFD会话。 因此, 可以说 MD和 YD是标识一对 BFD会话的唯一依据 , 会话协商 UP以后, 收发报文和修改会话参数只根据 MD和 YD匹配。 但是, 同一个局域网内, BFD会话出现相同 MD的概率很大, BFD会话 之间生成的 MD会产生冲突, 导致 BFD会话不能正常协商。 现有技术是通过设置 BFD控制报文里面认证选项的方式来保证 BFD会 话之间的正确协商。 但是, 这需要网络设备都能支持 BFD的认证功能, 并且 实现复杂, 用户除了 BFD的基本配置还要配置认证。
发明内容 本发明实施例提供一种双向转发检测 BFD会话协商方法、 设备及系统, 用于解决 BFD会话协商错误问题。
本发明实施例的第一个方面是提供一种双向转发检测 BFD会话协商方 法, 包括:
生成第一鉴别值, 所述第一鉴别值在本地设备所属的局域网内唯一; 生成第一 BFD控制报文, 所述第一 BFD控制报文中包含有所述第一鉴 别值;
将所述第一 BFD控制报文发送给对端设备, 以使得所述对端设备根据所 述第一鉴别值与所述本地设备进行会话协商。
本发明实施例的另一个方面是提供一种双向转发检测 BFD会话协商设 备, 包括:
鉴别值生成单元, 用于生成第一鉴别值, 所述第一鉴别值在本地设备所 属的局域网内唯一;
•艮文生成单元, 用于生成第一 BFD控制 ·艮文, 所述第一 BFD控制 4艮文 中包含有所述第一鉴别值;
报文发送单元, 用于发送所述第一 BFD控制报文给对端设备, 以使得所 述对端设备根据所述第一鉴别值与所述本地设备进行会话协商。 本发明实施例的又一个方面是提供一种双向转发检测 BFD会话协商系 统, 包括本地设备以及对端设备, 其中, 所述本地设备, 用于生成第一鉴别值, 所述第一鉴别值在所述本地设备 所属的局域网内唯一, 生成第一 BFD控制报文, 所述第一 BFD控制报文包 含有所述第一鉴别值, 将所述第一 BFD控制报文发送给所述对端设备;
所述对端设备,用于根据所述第一鉴别值与所述本地设备进行会话协商。 过将本地鉴别值设置为本地设备所属局域网内唯一的值, 杜绝了局域网内对 不同 BFD会话生成相同 MD的可能,从而解决了由于错误配置或者杂包欺骗 导致的会话协商错误, 提高了 BFD会话协商的效率和安全性。 附图说明 图 1为本发明实施例提供的一种双向转发检测 BFD会话协商方法的流程 图;
示意图;
示意图;
用示意图; 图 5为本发明实施例提供的一种双向转发检测 BFD会话协商设备的结构 示意图; 图 6为本发明实施例提供的一种双向转发检测 BFD会话协商系统的示意 图。
具体实施方式 图 1为本发明实施例提供的一种双向转发检测 BFD会话协商方法的流程 图。本实施例提供的方法为用于 BFD会话协商的设备的处理流程,用于 BFD 会话协商的设备为网络设备。 如图 1所示, 该方法包括: 步骤 11、 生成第一鉴别值, 该第一鉴别值在本地设备所属的局域网内唯
本步骤中,生成第一鉴别值可根据本地设备的标识信息生成第一鉴别值。 其中, 第一鉴别值可为本地鉴别值。 本地设备的标识信息包括该本地设备的 媒体访问控制 (Media Access Control, MAC )地址、 设备名称、 接口 IP、 出 接口索引中的一种或多种。 生成第一鉴别值可包括: 将该本地设备的标识信 息按照设定的映射算法映射得到的结果,与第一 BFD控制报文对应的会话的 序号组合成所述第一鉴别值。 其中, 第一 BFD控制报文详见下述步骤 12中 的说明。 设定的映射算法可包括哈希算法, 映射得到的结果可包括哈希索引。 例如, 本地设备将本设备的标识信息如系统桥 MAC地址、 设备名称、 接口 IP、接口 IP和出接口索引中的一项或多项, 通过哈希算法, 映射到 BFD 控制报文中 MD字段的前两个字节。 MD字段的后两个字节分配给 BFD会话 序号。 由于 MD字段的内容为本地鉴别值, 因此也就是说本地鉴别值的前两 个字节为本地设备的标识信息, 后两个字节为 BFD会话序号。
由于网络设备标识的唯一性, 且两个字节的最大值为 65535 , 使得本地 鉴别值在全网唯一, 从而基本杜绝了对不同 BFD会话生成相同 MD的可能。
步骤 12、 生成第一 BFD控制报文, 该 BFD控制报文中包含有上述第一 鉴别值。
1*列 ^口: "BFD Control message
001 =Protocol Version: 1
00011=Diagnostic Code: Neighbor Signaled Session Down ( 0X03 )
01 =Session State: Down ( 0X01 )
Message Flags: 0X00
Detect Time Multiplier: 3 ( =6300ms Detection time )
Message Length: 24bytes
My Discriminator: 0X01000007
Your Discriminator: 0X00000000
Desired Min TX Interval: 2100ms ( 2100000us )
Required Min RX Interval: 2100ms ( 2100000us )
Required Min Echo Interval: 0ms ( Ous ),,。
其中, "My Discriminator: 0X01000007" 即 MD的前两个字节 0100为本 地设备的标识信息通过映射算法得到, 后两个字节 0007为会话序号。
步骤 13、将上述第一 BFD控制报文发送给对端设备, 以使得该对端设备 根据上述第一鉴别值与本地设备进行会话协商。
可选地, 将上述第一 BFD控制报文发送给对端设备之后, 还包括: 接收对端设备发送的第二 BFD控制报文, 该对端设备发送的第二 BFD 控制报文中携带有该对端设备生成的第二鉴别值; 用上述第一鉴别值以及上述第二鉴别值标识一条会话。
其中, 可选地, 该对端设备的第二鉴别值在该对端设备所属的局域网内 唯一。 该第二鉴别值的生成可参照上述步骤 11中第一鉴别值的生成。
上述本地设备及对端设备均可以为路由器、 交换机等网络设备。 本实施例提供技术方案能够避免在 BFD会话场景下, 由于错误配置或者 杂包欺骗情况下, 导致的会话协商错误。 其中, 杂包欺骗是指网络中恶意攻 击发过来的 MD相同的 BFD控制报文。设备可以在不具备认证功能的情况下 避免 MD相同导致的 BFD会话协商错误, 节约了成本。 例如图 2所示, 第一路由器 RT1 分别跟第二路由器 RT2、 第三路由器 RT3相连。
第一路由器 RT1和第二路由器 RT2之间建立了两个 BFD会话 Sessionl、 Session2, 假设第一路由器 RT1的 Sessionl和第二路由器 RT2的 Sessionl在 物理信息配置上——对应,第一路由器 RT1的 Session2和第二路由器 RT2的 Session2 在物理信息配置上——对应, 并且根据通常所用的方法各自生成的 MD如图 2所示, 那么正常情况下, 第一路由器 RT1和第二路由器 RT2的 Sessionl会协商成一对正常的 BFD会话, Session2协商成另外一对正常的 BFD 会话。
但是, 在协商的初始阶段, 当第一路由器 RT1 上的 BFD会话 Sessionl 和 Session2还处于 Down状态时,第一路由器 RT1收到第三路由器 RT3的一 个用来协商 BFD会话的 BFD控制报文, 该协商报文所带的 MD为 1 , 由于 误配置或者网络欺骗攻击, 该用来协商 BFD会话的 BFD控制报文中的物理 信息与第一路由器 RT1 的会话 Sessionl相匹配, 则第一路由器 RT1 学习到 Sessionl的 YD为 1。 由于第一路由器 RT1 路由是到第二路由器 RT2 的, 因此, 第一路由器 RT1的 Sessionl的状态为 "Init" 的 BFD控制报文发到第二路由器 RT2, 该 状态为 "Init" 的 BFD控制报文所带 YD为 1。 第二路由器 RT2收到该报文, 用该状态为 "Init" 的 BFD控制报文中的 YD与本地设备即第二路由器 RT2 为 BFD会话设置的 MD进行匹配, 匹配到了 Session2即将状态为 "Init" 的 BFD控制报文分离到会话 Session2, 于是第二路由器 RT2与第一路由器 RT1 之间错误地将第二路由器 RT2的 Session2跟第一路由器 RT1的 Sessionl协商 起来, 第二路由器 RT2的 Session2状态变为 UP。
当第一路由器 RT1发出的 Session2的状态为 "Down" 的 BFD控制报文 到达第二路由器 RT2时, 由于该状态为 "Down" 的 BFD控制报文中的 YD 域为 0, 且根据第一路由器 RT1和第二路由器 RT2双方的物理配置信息, 第 二路由器 RT2与第一路由器 RT1协商的 BFD会话应该是第二路由器 RT2的 Session2 (参见协议 RFC5880中 6.8.6的记载 "If the Your Discriminator field is zero and the State field is not Down or AdminDown, the packet MUST be discarded." )„ 但是此时第二路由器 RT2的 Session2状态已经是 "UP" 状态, 于是第二路由器 RT2丟弃了该状态为 "Down" 的 BFD控制报文。 类似地, 第二路由器 RT2发出的 Sessionl的协商报文也被第一路由器 RT1丟弃。最后 导致第一路由器 RT1 无法跟第二路由器 RT2 协商起第一路由器 RT1 的 Session2, 第二路由器 RT2无法跟第一路由器 RT1协商起第二路由器 RT2的 Sessionl。 釆用本发明实施例提供的技术方案后, 第一路由器 RT1将从第三路由器 RT3发送的协商报文学习到 Sessionl的 YD, 通过状态为 "Init" 的 BFD控制 报文发送到第二路由器 RT2后, 第二路由器 RT2接收到的 YD无法与本地设 置的 MD 匹配, 第二路由器 RT2将接收到的携带有 YD的状态为 "Init" 的 BFD控制报文丟弃,避免了第二路由器 RT2与第二路由器 RT2之间产生错误 的协商。 这是因为根据本发明实施例提供的技术方案, 第三路由器 RT3发送 的协商报文中的 MD全网唯一, 第二路由器 RT2设置的 MD也是全网唯一, 二者的 MD不可能一致, 因此, 保证了在第三方网络欺骗或错误配置的情况 下, 两端设备之间仍能正常协商, 且两端设备无需具备认证功能, 易于实现。
实施例一 仍以第一路由器 RT1、 第二路由器 RT2和第三路由器 RT3为例, 如图 3 所示, 各个路由器均将本设备的系统桥 MAC地址通过 HASH算法, 映射到 MD字段四个字节的前两个字节, 以使 MD至少在局域网范围内唯一。 MD 字段的后两个字节分配给 BFD会话序号, 以区分同一设备上的不同会话。
由于系统桥 MAC地址的唯一性 ,使得第一路由器 RT 1、第二路由器 RT2、 第三路由器 RT3生成的各个会话的 MD均唯一, 不会产生冲突。
这样, 第一路由器 RT1收到第三路由器 RT3发过来的协商报文(存在网 络误配置或者恶意攻击,其带的物理信息和第一路由器 RT1的 Sessionl 匹配) 后, 学习到 Sessionl的 YD为 30001。 其中 "3"是通过 hash算法计算出来的 值, "0001"为 BFD会话序号。,第一路由器 RT1的 Sessionl的状态变为 "Init" 状态。
第一路由器 RT1将 Sessionl的状态为 "Init" 的 BFD控制报文发送到第 二路由器 RT2, 由于状态为 "Init" 的 BFD控制报文所带 YD与第二路由器 RT2设置的所有 Session的 MD都不一致, 于是第二路由器 RT2丟弃该状态 为 "Init"的 BFD控制报文。当第一路由器 RT1的用来建立 BFD会话 Session2 的所有 BFD控制报文正常发到第二路由器 RT2,第二路由器 RT2能够正确和 第一路由器 RT1将 Session2协商为 "UP" 状态。
当第三路由器 RT3的攻击中断,第一路由器 RT1在收不到进一步的用来 协商 BFD会话的 BFD控制 文后, 第一路由器 RT1的 Sessionl状态重新切 回到 "Down"状态。由于第二路由器 RT2也一直发 Sessionl的状态为 "Down" 的 BFD控制报文到第一路由器 RTl , 因此两者重新正确协商, 恢复正常。
在上述组网下, 如果是第二路由器 RT2的状态为 "Down" 的 BFD控制 报文首先到达第一路由器 RT1 ,第一路由器 RT1和第二路由器 RT2正确协商, 第一路由器 RT1和第二路由器 RT2的 Sessionl状态为 UP后, 通常情况下, 第一路由器 RT1收到第三路由器 RT3的状态为 "Down" 的 BFD控制报文, 还是会让第一路由器 RT1的 Sessionl变 Down。 但是釆用图 1所示实施例提 供的技术方案后, 即使第一路由器 RT1收到第三路由器 RT3的错误 BFD控 制报文即状态为 "Down" 的 BFD控制报文, 由于该错误 BFD控制报文中的 YD与第一路由器 RT1设置的 MD匹配不上,该错误 BFD控制报文被第一路 由器 RT1直接被丟弃, 因此, 第三路由器 RT3的错误 BFD控制报文不会对 第一路由器 RT1与第二路由器 RT2之间的 BFD会话协商产生影响。 实施例二 仍以第一路由器 RT1、 第二路由器 RT2和第三路由器 RT3为例, 如图 4 所示, 各个路由器均将本设备的 BFD控制报文的出接口的源 IP地址加出接 口索引后, 通过 HASH算法, 映射到 MD字段四个字节的前两个字节。 MD 字段的后两个字节分配给 BFD会话序号。也就是说,设备的标识信息为 BFD 控制报文的出接口的源 IP地址加出接口索引, 或者说, MD中的前两个字节 通过对本地设备的标识信息即 BFD控制报文出接口的源 IP地址加出接口索 弓 1进行映射得到,能够使 MD在局域网范围内唯一, MD的后两个字节为 BFD 会话序号, 能够区分同一设备上的不同会话。
由于在网络中, IP地址具有唯一性, 因此, IP地址也可用来作为设备的 标识信息。 但在误配置或者恶意攻击的情况下, IP地址也可能存在冲突的情 况, 因此可以将本设备 BFD控制报文出接口的源 IP地址加报文出接口索引 用于 hash计算, 得到 hash索引, 作为 MD字段的前两个字节。 如图 4所示, 第一路由器 RT1的出接口索引 1对应的出接口发送的 BFD 控制报文到第三路由器 RT3 , 第一路由器 RT1的出接口索引 2对应的出接口 发送的 BFD控制报文到第二路由器 RT2。 第一路由器 RT1通过出接口索引 2 对应的出接口和第二路由器 RT2先协商起来 BFD会话 Sessionl后, 第一路 由器 RT1的 Sessionl在恶意攻击或者误配置的情况下, 即使第一路由器 RT1 收到了第三路由器 RT3发送的 BFD控制报文, 由于第三路由器 RT3发送的 BFD控制报文中的出接口索引跟正常第二路由器 RT2的出接口索引不一致, 使得第三路由器 RT3和第二路由器 RT2生成的 MD不一样,第三路由器 RT3 的 BFD控制报文在第一路由器 RT1被正常丟弃, 不会引发误匹配情况。 对于其他操作场景, 釆用本实施例提供的技术方案达到的技术效果同上 述实施例一。
实施例三 本实施例中, 本地设备的标识信息为本地设备的设备名称。 设备名称一 般以字符串来描述。 将设备名称的字符串转换成对应的 16进制数字, 再用这 组数字生成 HASH索引, 填充在 MD字段四个字节的前两个字节。 MD字段 的后两个字节分配给 BFD会话序号。 由于网上正常使用的设备, 运营商一般都会修改设备的设备名称, 以使 网络设备的设备名称在一定范围内唯一。 因此, MD 中的前两个字节通过设 备名称进行映射, 以使 MD在局域网范围内唯一, 并将 MD的后两个字节分 配给 BFD会话序号, 以区分同一设备上的不同会话。 对于其他操作场景, 釆用本实施例提供的技术方案达到的技术效果同上 述实施例一。
值设置为本地设备所属局域网内唯一的值,杜绝了局域网内对不同 BFD会话 生成相同 MD的可能, 从而解决了由于错误配置或者杂包欺骗导致的会话协 商错误, 提高了 BFD会话协商的效率和安全性。 本领域普通技术人员可以理解: 实现上述各方法实施例的全部或部分步 骤可以通过程序指令相关的硬件来完成。 前述的程序可以存储于一计算机可 读取存储介质中。 该程序在执行时, 执行包括上述各方法实施例的步骤; 而 前述的存储介质包括: ROM, RAM, 磁碟或者光盘等各种可以存储程序代码 的介质。
图 5为本发明实施例提供的一种双向转发检测 BFD会话协商设备的结构 示意图。 本实施例提供的设备用于实现图 1 所示实施例提供的方法, 如图 5 所示, 该设备包括: 鉴别值生成单元 51、 报文生成单元 52和报文发送单元 53。 鉴别值生成单元 51用于生成第一鉴别值,该第一鉴别值在本地设备所属 的局域网内唯一 艮文生成单元 52用于生成第一 BFD控制 4艮文,该第一 BFD 控制报文中包含有鉴别值生成单元 51生成的第一鉴别值。 报文发送单元 53 用于发送报文生成单元 52生成的第一 BFD控制报文给对端设备, 以使得该 对端设备根据第一鉴别值与本地设备进行会话协商。
可选地,本发明实施例提供的 BFD会话协商设备还包括报文接收单元和 会话协商单元。 报文接收单元用于接收对端设备的第二 BFD控制报文, 该第 二 BFD控制报文携带有该对端设备生成的第二鉴别值。会话协商单元用于用 上述第一鉴别值以及上述第二鉴别值标识一条会话。 上述设备实施例提供的双向转发检测 BFD会话协商设备通过鉴别值生成 单元将本地鉴别值设置为本地设备所属局域网内唯一的值, 杜绝了局域网内 对不同 BFD会话生成相同 MD的可能,从而解决了由于错误配置或者杂包欺 骗导致的会话协商错误, 提高了 BFD会话协商的效率和安全性。
CPU, 该处理器用来执行如下操作:
生成第一鉴别值, 该第一鉴别值详见上述方法实施例中的说明, 在本地 设备所属的局域网内唯一;
生成第一 BFD控制报文, 该第一 BFD控制报文中包含有生成的上述第 一鉴别值;
将上述第一 BFD控制报文发送给对端设备, 以使得该对端设备根据上述 第一鉴别值与本地设备进行会话协商。
可选地, 该处理器还执行如下操作:
接收上述对端设备的第二 BFD控制报文, 该第二 BFD控制报文携带有 该对端设备生成的第二鉴别值;
用上述第一鉴别值以及上述第二鉴别值标识一条会话。
可选地, 该处理器还用于根据上述本地设备的标识信息生成上述第一鉴 别值。
可选地, 该处理器还用于将上述本地设备的标识信息按照设定的映射算 法映射得到的结果,与上述第一 BFD控制报文对应的会话的序号组合成第一 鉴别值。
上述设备实施例提供的双向转发检测 BFD会话协商设备通过处理器将本 地鉴别值设置为本地设备所属局域网内唯一的值, 杜绝了局域网内对不同 BFD会话生成相同 MD的可能, 从而解决了由于错误配置或者杂包欺骗导致 的会话协商错误, 提高了 BFD会话协商的效率和安全性。 图 6为本发明实施例提供的一种双向转发检测 BFD会话协商系统的示意 图。 本发明实施例提供的 BFD会话协商系统用于实现上述图 1所示的方法, 如图 6所示, 该 BFD会话协商系统包括本地设备 61以及对端设备 62。 本地设备 61用于生成第一鉴别值, 该第一鉴别值在本地设备 61所属的 局域网内唯一, 具体详见上述方法实施例中的说明。 本地设备 61还用于生成 第一 BFD控制报文, 该第一 BFD控制报文包含有上述第一鉴别值。 本地设 备 61还用于将该第一 BFD控制报文发送给对端设备 62。 对端设备 62用于根据上述第一鉴别值与本地设备 61进行会话协商。 可选地, 对端设备 62具体用于向本地设备 61发送第二 BFD控制 4艮文, 该第二 BFD控制报文携带有所述对端设备生成的第二鉴别值,该第二鉴别值 在对端设备 62所属的局域网内唯一。 其中, 第二鉴别值详见上述方法实施例 中的说明。 可选地, 本地设备 61还用于接收上述第二 BFD控制报文, 用上述第一 鉴别值以及上述第二鉴别值标识一条会话。 上述系统实施例通过本地设备将第一鉴别值如本地鉴别值设置为本地设 备所属局域网内唯一的值,杜绝了局域网内对不同 BFD会话生成相同 MD的 可能, 从而解决了由于错误配置或者杂包欺骗导致的会话协商错误, 提高了 BFD会话协商的效率和安全性。 最后应说明的是: 以上各实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述各实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分或者全部技术特征进行等同替换; 而这些修改或者替换, 并 不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims

权 利 要求
1、 一种双向转发检测 BFD会话协商方法, 其特征在于, 包括: 生成第一鉴别值, 所述第一鉴别值在本地设备所属的局域网内唯一; 生成第一 BFD控制报文, 所述第一 BFD控制报文中包含有所述第一鉴 别值;
将所述第一 BFD控制报文发送给对端设备, 以使得所述对端设备根据所 述第一鉴别值与所述本地设备进行会话协商。
2、 根据权利要求 1所述的方法, 其特征在于, 所述将所述第一 BFD控 制报文发送给对端设备之后还包括: 接收所述对端设备的第二 BFD控制报文, 所述第二 BFD控制报文携带 有所述对端设备生成的第二鉴别值; 用所述第一鉴别值以及所述第二鉴别值标识一条会话。
3、根据权利要求 1所述方法, 其特征在于, 所述生成第一鉴别值, 包括: 根据所述本地设备的标识信息生成所述第一鉴别值。
4、 根据权利要求 3所述的方法, 其特征在于, 所述本地设备的标识信息 包括所述本地设备的媒体访问控制 MAC地址、 设备名称、 接口 IP、 出接口 索引中的一种或多种。
5、 根据权利要求 3所述方法, 其特征在于, 所述生成第一鉴别值包括: 将所述本地设备的标识信息按照设定的映射算法映射得到的结果, 与所 述第一 BFD控制报文对应的会话的序号组合成所述第一鉴别值。
6、 根据权利要求 5所述方法, 其特征在于, 所述设定的映射算法包括哈 希算法, 所述映射得到的结果包括哈希索引。
7、 一种双向转发检测 BFD会话协商设备, 其特征在于, 包括: 鉴别值生成单元, 用于生成第一鉴别值, 所述第一鉴别值在本地设备所 属的局域网内唯一;
•艮文生成单元, 用于生成第一 BFD控制 ·艮文, 所述第一 BFD控制 4艮文 中包含有所述第一鉴别值; 报文发送单元, 用于发送所述第一 BFD控制报文给对端设备, 以使得所 述对端设备根据所述第一鉴别值与所述本地设备进行会话协商。
8、 根据权利要求 7所述的设备, 其特征在于, 所述设备还包括报文接收 单元和会话协商单元; 所述报文接收单元, 用于接收所述对端设备的第二 BFD控制报文, 所述 第二 BFD控制报文携带有所述对端设备生成的第二鉴别值; 所述会话协商单元, 用于用所述第一鉴别值以及所述第二鉴别值标识一 条会话。
9、 一种双向转发检测 BFD会话协商系统, 包括本地设备以及对端设备, 其特征在于, 所述本地设备, 用于生成第一鉴别值, 所述第一鉴别值在所述本地设备 所属的局域网内唯一, 生成第一 BFD控制报文, 所述第一 BFD控制报文包 含有所述第一鉴别值, 将所述第一 BFD控制报文发送给所述对端设备; 所述对端设备,用于根据所述第一鉴别值与所述本地设备进行会话协商。
10、 根据权利要求 9所述的系统, 其特征在于, 所述对端设备具体用于 向所述本地设备发送第二 BFD控制报文, 所述第二 BFD控制报文携带有所 述对端设备生成的第二鉴别值, 所述第二鉴别值在所述对端设备所属的局域 网内唯一。
11、 根据权利要求 10所述的系统, 其特征在于, 所述本地设备还用于接 收所述第二 BFD控制报文,用所述第一鉴别值以及所述第二鉴别值标识一条 会话。
PCT/CN2012/084513 2012-11-13 2012-11-13 双向转发检测bfd会话协商方法、设备及系统 WO2014075213A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP12888564.7A EP2782309B1 (en) 2012-11-13 2012-11-13 Bidirectional forwarding detection (bfd) session negotiation method, device and system
PCT/CN2012/084513 WO2014075213A1 (zh) 2012-11-13 2012-11-13 双向转发检测bfd会话协商方法、设备及系统
CN201280002103.0A CN104040984B (zh) 2012-11-13 2012-11-13 双向转发检测bfd会话协商方法、设备及系统
US14/314,441 US9444709B2 (en) 2012-11-13 2014-06-25 Bidirectional forwarding detection BFD session negotiation method, device, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/084513 WO2014075213A1 (zh) 2012-11-13 2012-11-13 双向转发检测bfd会话协商方法、设备及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/314,441 Continuation US9444709B2 (en) 2012-11-13 2014-06-25 Bidirectional forwarding detection BFD session negotiation method, device, and system

Publications (1)

Publication Number Publication Date
WO2014075213A1 true WO2014075213A1 (zh) 2014-05-22

Family

ID=50730451

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/084513 WO2014075213A1 (zh) 2012-11-13 2012-11-13 双向转发检测bfd会话协商方法、设备及系统

Country Status (4)

Country Link
US (1) US9444709B2 (zh)
EP (1) EP2782309B1 (zh)
CN (1) CN104040984B (zh)
WO (1) WO2014075213A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743746A (zh) * 2018-12-07 2019-05-10 盛科网络(苏州)有限公司 一种双向转发检测bfd参数协商方法、装置及芯片

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067220B (zh) * 2012-12-19 2016-02-10 中兴通讯股份有限公司 参数更新情况下双向链路转发检测方法及装置
US9497107B1 (en) * 2013-06-06 2016-11-15 Cisco Technology, Inc. Seamless path monitoring and rapid fault isolation using bidirectional forwarding detection in a network environment
US10044610B2 (en) * 2013-12-31 2018-08-07 Alcatel Lucent System, method and apparatus providing bi-directional forwarding detection support to unnumbered IP interfaces
US9509599B2 (en) * 2014-08-04 2016-11-29 Telefonaktiebolaget L M Ericsson (Publ) Self-bootstrapping BFD session over MPLS LSP
US10069708B2 (en) * 2015-03-02 2018-09-04 Cisco Technology, Inc. Monitoring through S-BFD (seamless bidirectional forwarding detection)
CN105847460B (zh) * 2016-03-15 2018-12-28 迈普通信技术股份有限公司 一种实现双向转发检测的方法及设备
CN107342908B (zh) * 2016-11-30 2021-02-19 新华三技术有限公司 一种发送双向转发检测报文的方法和装置
US10541904B2 (en) * 2016-12-14 2020-01-21 Hewlett Packard Enterprise Development Lp Establishing a network fault detection session
CN107277058B (zh) * 2017-08-07 2020-03-20 南京南瑞集团公司 一种基于bfd协议的接口认证方法及系统
US10623278B2 (en) * 2018-03-20 2020-04-14 Cisco Technology, Inc. Reactive mechanism for in-situ operation, administration, and maintenance traffic
US10771317B1 (en) * 2018-11-13 2020-09-08 Juniper Networks, Inc. Reducing traffic loss during link failure in an ethernet virtual private network multihoming topology
CN111654406B (zh) * 2020-02-29 2022-08-30 新华三信息安全技术有限公司 一种双向转发检测方法和装置
CN111654407B (zh) * 2020-04-14 2022-05-27 新华三信息安全技术有限公司 一种堆叠系统及其双向转发检测方法
CN112653699B (zh) * 2020-12-22 2022-08-12 迈普通信技术股份有限公司 一种bfd认证方法、装置及电子设备
CN113453262B (zh) * 2021-06-29 2023-10-20 新华三大数据技术有限公司 一种双向转发检测bfd方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1905516A (zh) * 2005-07-28 2007-01-31 华为技术有限公司 一种分配双向转发检测会话鉴别符的方法
CN101052045A (zh) * 2007-05-16 2007-10-10 中兴通讯股份有限公司 同步源标识符分配方法
US20080247324A1 (en) * 2007-04-06 2008-10-09 Nadeau Thomas D Detection of specific bfd path failures
CN102075390A (zh) * 2011-02-16 2011-05-25 华为技术有限公司 一种传输状态检测方法以及相关装置
CN102457404A (zh) * 2010-10-15 2012-05-16 中兴通讯股份有限公司 检测通信路径mtu的方法、装置和系统

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7561527B1 (en) * 2003-05-02 2009-07-14 David Katz Bidirectional forwarding detection
WO2007016841A1 (fr) * 2005-08-05 2007-02-15 Huawei Technologies Co., Ltd. Procédé de mise en œuvre de détection de panne de plan de transfert ip
CN100558051C (zh) * 2005-08-10 2009-11-04 华为技术有限公司 对双向转发链路进行故障检测的方法
CN100563251C (zh) * 2006-02-28 2009-11-25 华为技术有限公司 一种双向转发检测会话建立方法
US8543718B2 (en) * 2006-03-02 2013-09-24 Cisco Technology, Inc. Technique for efficiently and dynamically maintaining bidirectional forwarding detection on a bundle of links
US8488444B2 (en) * 2007-07-03 2013-07-16 Cisco Technology, Inc. Fast remote failure notification
US8437272B2 (en) * 2007-08-16 2013-05-07 Cisco Technology, Inc. Distinguishing between connectivity verification availability and forwarding protocol functionality in a computer network
CN101459594B (zh) * 2007-12-14 2011-04-13 华为技术有限公司 Bfd报文的发送方法、链路故障的探测方法及装置
US7921219B2 (en) * 2008-08-19 2011-04-05 Cisco Technology, Inc. Maintaining protocol adjacency state with forwarding failure
CN101729500B (zh) * 2008-10-31 2013-03-27 华为技术有限公司 一种ip会话标识方法、装置和系统
CN101783773B (zh) * 2009-01-21 2013-01-09 华为技术有限公司 Ip会话存活监控方法及系统、家庭网关和网络设备
JP5146377B2 (ja) * 2009-03-18 2013-02-20 富士通株式会社 通信装置および監視パケット転送方法
US8543728B2 (en) * 2010-03-25 2013-09-24 Verizon Patent And Licensing Inc. Dampening interface flapping
EP2572473B1 (en) * 2010-05-19 2014-02-26 Telefonaktiebolaget L M Ericsson (PUBL) Methods and apparatus for use in an openflow network
US9094344B2 (en) * 2011-09-16 2015-07-28 Cisco Technology, Inc. Establishing a bidirectional forwarding detection (BFD) asynchronous mode session without knowing a Prior layer-2 or layer-3 information
CN102571601B (zh) * 2012-02-13 2018-05-15 中兴通讯股份有限公司 一种保证双向转发检测可靠性的方法及标记交换路径设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1905516A (zh) * 2005-07-28 2007-01-31 华为技术有限公司 一种分配双向转发检测会话鉴别符的方法
US20080247324A1 (en) * 2007-04-06 2008-10-09 Nadeau Thomas D Detection of specific bfd path failures
CN101052045A (zh) * 2007-05-16 2007-10-10 中兴通讯股份有限公司 同步源标识符分配方法
CN102457404A (zh) * 2010-10-15 2012-05-16 中兴通讯股份有限公司 检测通信路径mtu的方法、装置和系统
CN102075390A (zh) * 2011-02-16 2011-05-25 华为技术有限公司 一种传输状态检测方法以及相关装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2782309A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743746A (zh) * 2018-12-07 2019-05-10 盛科网络(苏州)有限公司 一种双向转发检测bfd参数协商方法、装置及芯片
WO2020113936A1 (zh) * 2018-12-07 2020-06-11 盛科网络(苏州)有限公司 一种双向转发检测bfd参数协商方法、装置及芯片
US12015950B2 (en) 2018-12-07 2024-06-18 Suzhou Centec Communications Co., Ltd. Bidirectional forwarding detection (BFD) parameter negotiation method, apparatus and chip

Also Published As

Publication number Publication date
EP2782309A1 (en) 2014-09-24
CN104040984A (zh) 2014-09-10
US20140307564A1 (en) 2014-10-16
EP2782309B1 (en) 2016-05-04
US9444709B2 (en) 2016-09-13
CN104040984B (zh) 2017-05-10
EP2782309A4 (en) 2015-03-04

Similar Documents

Publication Publication Date Title
WO2014075213A1 (zh) 双向转发检测bfd会话协商方法、设备及系统
JP3844762B2 (ja) Eponにおける認証方法及び認証装置
KR100910818B1 (ko) 비-macsec 노드들을 통해 macsec 패킷들을터널링하기 위한 방법 및 시스템
US8023506B2 (en) Method and provider edge device for advertising and processing pseudo-wire information
US20150207793A1 (en) Feature Enablement or Disablement Based on Discovery Message
WO2015074394A1 (zh) 一种报文转发方法及装置
WO2014067043A1 (zh) 网络流量检测方法、系统、设备及控制器
WO2014019348A1 (zh) 操作、管理和维护oam配置的方法、设备及系统
WO2013020437A1 (zh) 一种双向转发检测会话的验证方法及节点
WO2009082889A1 (fr) Procédé de négociation pour échange de clés internet et dispositif et système associés
WO2015143802A1 (zh) 业务功能链处理方法及装置
US20120060209A1 (en) Network devices and authentication methods thereof
WO2012163215A1 (zh) 一种DHCPSnooping绑定表生成的方法、装置、设备及系统
US8971195B2 (en) Querying health of full-meshed forwarding planes
WO2019223534A1 (zh) 一种转发表项的监测方法及装置
WO2014117737A1 (zh) Oam报文处理方法、设备及系统
US11855888B2 (en) Packet verification method, device, and system
WO2015070614A1 (zh) 检测l2vpn网络用户侧接口连通性的方法及设备
WO2012142888A1 (zh) 基于多协议标签交换网络的隧道组保护实现方法及装置
US20110242988A1 (en) System and method for providing pseudowire group labels in a network environment
WO2012120990A1 (ja) コンピュータシステム、サーバ、オープンフローコントローラ及び通信方法
WO2015127736A1 (zh) 一种用户隐私保护的方法、设备和系统
WO2015176257A1 (zh) OpenFlow设备与IP网络设备通信的方法、装置和系统
WO2015085746A1 (zh) 虚拟路由转发实例处理方法及装置
WO2015117377A1 (zh) 一种网络连通性验证方法、装置和计算机可读存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2012888564

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12888564

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE