WO2014075312A1 - 一种网络穿越服务的提供方法、装置及系统 - Google Patents

一种网络穿越服务的提供方法、装置及系统 Download PDF

Info

Publication number
WO2014075312A1
WO2014075312A1 PCT/CN2012/084827 CN2012084827W WO2014075312A1 WO 2014075312 A1 WO2014075312 A1 WO 2014075312A1 CN 2012084827 W CN2012084827 W CN 2012084827W WO 2014075312 A1 WO2014075312 A1 WO 2014075312A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
access point
virtual access
operator
traversal
Prior art date
Application number
PCT/CN2012/084827
Other languages
English (en)
French (fr)
Inventor
陈爱平
张战兵
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP12888448.3A priority Critical patent/EP2819363B1/en
Priority to PCT/CN2012/084827 priority patent/WO2014075312A1/zh
Priority to CN201280006197.9A priority patent/CN103947172B/zh
Publication of WO2014075312A1 publication Critical patent/WO2014075312A1/zh
Priority to US14/488,663 priority patent/US9838261B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/25Routing or path finding in a switch fabric
    • H04L49/251Cut-through or wormhole routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0044Arrangements for allocating sub-channels of the transmission path allocation of payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • G06F15/177Initialisation or configuration control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, device, and system for providing a network traversal service.
  • IP Internet Protocol
  • a network traversal scheme based on a secure traversal gateway is provided.
  • STG Secure Traversing Gateway
  • HTTP Hyper Text Transfer Protocol
  • SSL Secure Socket Layer
  • IPSec Internet Protocol Security
  • DTLS Datagram Transport Layer Security
  • UDP User Datagram Protocol
  • the user service terminal implements the HTTP, SSL, IPSec, DTLS, and UDP secure tunnel client functions, and the various packets between the client and the converged communication server are transmitted through the negotiated HTTP, SSL, IPSec, DTLS, or UDP secure tunnel. It can realize the traversal of network elements such as firewalls, NATs, and Web security gateways, which not only ensures the security and traversal capability of business data, but also guarantees the quality of service.
  • a method, device and system for providing a network traversal service provided in the embodiments of the present invention have strong network scalability.
  • the embodiment of the present invention provides a method for providing a network traversal service, including: receiving a network traversal tunnel resource lease request sent by an operator management server, where the lease request carries the number of virtual access points to be rented and The number of users that are hosted by each virtual access point; sending a network traversal tunnel resource creation instruction to the secure traversal server according to the lease request, where the network traversal tunnel resource creation instruction includes the number of the virtual access points and The number of users carried by each virtual access point;
  • the sending the network traversal tunnel resource creation instruction to the security traversal server according to the lease request includes:
  • the virtual access point is a virtualized secure traversal gateway, which can provide virtual The access capability of the VPN tunnel to be private network.
  • the network traversal service provided by the present invention The methods of providing include:
  • the embodiment of the present invention provides a method for providing a network traversal service, including: receiving a network traversal tunnel resource creation instruction sent by a resource management center, where the network traversing tunnel resource creation instruction carries a virtuality of an operator's lease requirement The number of access points and the number of users each virtual access point can carry;
  • the network traversal tunnel resource includes a virtual connection Incoming point and service channel that interfaces with the virtual access point;
  • the method for providing a network traversal service provided by the present invention further includes:
  • the network traversal tunnel registration request packet includes the selected virtual access point information and the core network address of the operator
  • the method for providing the network traversal service provided by the present invention further includes: Receiving a network traversal tunnel registration request from the terminal, where the network traversal tunnel registration request carries the first virtual access point information to be accessed by the terminal, the identifier of the operator to which the terminal belongs, and the core network address of the operator;
  • the terminal is in the network traversal tunnel resource leased by the operator according to the identifier of the operator. Selecting a second virtual access point;
  • the network traversal tunnel registration success message includes information about the second virtual access point, so that the terminal is established according to the second virtual access point.
  • the network traversal tunnel and the core network address of the operator access the core network of the operator.
  • the determining, by the identifier of the operator, is in a network traversing tunnel resource leased by the operator.
  • the terminal selects the second virtual access point to include:
  • the method for providing the network traversal service provided by the present invention is further Includes:
  • the first virtual access point is a virtual access point selected by the secure traversal server for the terminal, returning a tunnel registration success message to the terminal, so that the terminal is compared with the first virtual
  • the network traversal tunnel established by the access point and the core network address of the operator access the core network of the operator.
  • the present invention provides a resource management center, including:
  • a receiving module configured to receive a network traversal tunnel resource lease request sent by the operator management server, where the lease request carries the number of virtual access points to be leased and the number of users hosted by each virtual access point;
  • a sending module configured to send a network traversal tunnel resource creation instruction to the security traversal server according to the lease request received by the receiving module, where the network traversing tunnel resource creation instruction includes the virtual The number of intended access points and the number of users carried by each of the virtual access points;
  • the receiving module is further configured to receive, by the security traversing server, information about a network traversing tunnel resource created according to the number of the virtual access points in the network traversing tunnel resource creation instruction and the number of users, where
  • the information of the network traversing tunnel resources includes virtual access point information and service channel information;
  • the sending module is further configured to send information about the network traversing tunnel resource to the operator management server, so that the operator management server can provide network traversal to the terminal according to the virtual access point information and service channel information. service.
  • the virtual access point is a virtualized secure access gateway, and provides the terminal with access capability of the virtual private network VPN tunnel.
  • the sending module is specifically configured to be deployed in an operator network according to the lease request.
  • the security traversal server with the most idle resources sends the network traversal tunnel resource creation instruction.
  • a resource management module configured to manage and maintain the network traversal tunnel resource
  • a broadcast module configured to broadcast information about the network traversal tunnel resource leased by the operator to a secure traversal server deployed in the operator network, so that The secure traversal server can provide a network traversal service for the terminal according to the network traversed tunnel resource leased by the operator.
  • the present invention provides a secure traversal server, including:
  • a receiving module configured to receive a network traversal tunnel resource creation instruction sent by the resource management center, where the network traversing tunnel resource creation instruction carries the number of virtual access points that are required by the operator to rent, and each virtual access point can The number of users hosted;
  • a tunnel resource creation module configured to create, according to the number of the virtual access points in the network traversal tunnel resource creation instruction received by the receiving module, and the number of users that can be carried by each virtual access point to meet the lease requirement of the operator.
  • the network traverses the tunnel resource, where the network traversal tunnel resource includes a virtual access point and a service channel that interfaces with the virtual access point;
  • a tunnel resource sending module configured to return to the resource management center to create a tunnel resource creation module
  • the network traverses information of tunnel resources.
  • the receiving module is further configured to receive a network traversal tunnel registration request from the terminal, where the network traversal tunnel registration request carries a first virtual access that the terminal wants to access.
  • Point information an identifier of the operator to which the terminal belongs, and a core network address of the operator;
  • the secure traversal server further includes:
  • a determining module configured to determine whether the first virtual access point is a virtual access point selected by the secure traversing server for the terminal
  • a first selection module configured to: if the first virtual access point is not a virtual access point selected by the secure traversal server for the terminal, the network traversal leased by the operator according to the identifier of the operator Selecting a second virtual access point for the terminal in the tunnel resource;
  • a first response module configured to return a network traversal tunnel registration success message to the terminal, where the network traversal tunnel registration success message includes information about the second virtual access point selected by the first selection module, so that The terminal accesses the core network of the operator according to a network traversal tunnel established with the second virtual access point and a core network address of the operator.
  • the receiving module is further configured to receive an access point query request from the terminal, where The query request carries the identifier of the operator to which the terminal belongs;
  • the secure traversal server further includes:
  • a second selection module configured to select a virtual access point among the network traversal tunnel resources leased by the operator according to the identifier of the operator in the query request received by the receiving module;
  • a second response module configured to return a query response message to the terminal, where the query response message includes information of the selected virtual access point
  • the receiving module is further configured to receive a tunnel registration request from the terminal, where the tunnel registration request includes virtual access point information selected by the second selection module and a core network address of the operator;
  • the second response module is further configured to return a network traversal tunnel registration success message to the terminal, so that the terminal accesses the operator according to the core network address of the operator and a network traversal tunnel established with the virtual access point. Core network.
  • the virtual access point is Virtualization
  • the security traversal gateway can provide the terminal with the access capability of the virtual private network VPN tunnel.
  • the first selecting module is specifically configured to be rented by the operator according to the identifier of the operator.
  • the information of the network traversing tunnel resources selects a virtual access point with the smallest user load or the closest access location or the fastest probe response.
  • the first response module when the determining module determines that the first virtual access point is for the secure traversal server When the virtual access point is selected by the terminal, the first response module is further configured to return a tunnel registration success message to the terminal, so that the terminal according to the network traversal tunnel established with the first virtual access point and The core network address of the operator accesses the core network of the operator.
  • the present invention provides a security traversal service providing system, including a virtual access point, any implementation manner of the foregoing resource management center, and any implementation manner of the foregoing secure traversing server, where:
  • the virtual access point is configured to receive, by using a network traversal tunnel established between the terminal, a packet sent by the terminal, and decapsulating the packet to be sent to an operator core network; and receiving the carrier core
  • the response packet returned by the network is encapsulated and sent to the terminal through the network traversal tunnel.
  • the embodiment of the present invention provides a network traversal service providing method, device, and system, which receive a network traversal tunnel resource lease request sent by an operator management server, and according to the virtual access point to be rented carried in the lease request And the number of users hosted by each virtual access point sends a network traversal tunnel resource creation instruction to the secure traversal server, and receives the security traversal server according to the number of the virtual access points and each virtual access point And the information about the network traversing the tunnel resource is sent to the operator management server, so that the operator management server can be configured according to the virtual access point information and the information
  • the service channel information provides a network traversal service to the terminal.
  • the converged communication carrier can provide network traversal services to the end users by leasing the network traversal service resources provided by the STaaS provider, thereby reducing the converged communication operation.
  • the operating costs of the business increase the scalability of the carrier network.
  • FIG. 1 is a flowchart of an application scenario of a network traversal service providing method according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a network traversal service providing method according to an embodiment of the present invention
  • Another signaling diagram of a network traversal service providing method
  • FIG. 4 is a flowchart of still another method for providing network traversal service according to an embodiment of the present invention
  • FIG. 5 is still another network traversal service according to an embodiment of the present invention
  • FIG. 6 is a flowchart of a network traversal service providing method according to an embodiment of the present invention
  • FIG. 7 is a schematic diagram of a physical structure of a resource management center according to an embodiment of the present invention
  • FIG. 9 is a schematic structural diagram of a security traversing server according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of another security traversing server according to an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of still another security traversing server according to an embodiment of the present invention.
  • FIG. 12 is an embodiment of the present invention;
  • FIG. 1 is an application scenario of an embodiment of the present invention.
  • the embodiment of the present invention refers to a converged communication carrier as an operator.
  • the operators are all converged communication carriers capable of providing converged communication services.
  • the first network may be the access network of the operator A
  • the second network may be the access network of the operator B
  • the third network may be the core network of the operator A
  • the fourth network may be the operator B.
  • the core network, the terminal 110 and the terminal 111 can traverse to the third network or the fourth network through the tiger access point 120
  • the terminal 112 and the terminal 113 can traverse to the third network or the fourth network through the virtual access point 122.
  • the network traversal tunnel resource management center 121 is responsible for the statistics, management, and allocation of the network traversing tunnel resources.
  • the network traversal tunnel resource includes a virtual access point and a service channel that interfaces with the virtual access point, where the virtual access point is virtual.
  • Security traversal gateway which can provide HyperTex Transfer Protoco L (HTTP), Secure Socke Layer (SSL), Internet Security Protocol (Internet Pro toco l Secur ty , IPSec), Datagram Transpor Layer Operation (DTLS) or User Datagram Protocol (UDP) security tunnel access capability.
  • HTTP HyperTex Transfer Protoco L
  • SSL Secure Socke Layer
  • Internet Security Protocol Internet Pro toco l Secur ty
  • IPSec Internet Security Protocol
  • DTLS Datagram Transpor Layer Operation
  • UDP User Datagram Protocol
  • the data packet sent by the terminal 110 is accessed from the virtual access point 120 to the first network (the access network of the converged communication carrier A), and reaches the third network through the service channel that is connected to the virtual access point 120 (integrated communication)
  • the core network of the operator A achieves the purpose of the terminal 110 accessing the core network of the converged communication carrier A.
  • the security traversal server is a collection of multiple virtual access points, which can be deployed in an operator's Internet Data Center (IDC) to provide a network traversal service to the terminal, so that the terminal can securely access the virtual access through the server.
  • the point is to achieve the purpose of accessing the operator's core network.
  • the security traversal server 123 and the secure traversal server 124 are responsible for managing, establishing, and selecting virtual access points.
  • the secure traversal server 123 can create multiple virtual access points (ie, virtualized secure traversal gateways) according to the operator's lease request, for example,
  • the secure traversal server 123 can create a virtual access point 120 and a virtual access point 125, and the secure traversal server 124 can create a virtual access point 122 and a virtual access point 126.
  • the virtual access point is generated by the security traversal server virtualization, and the physical location can be on the secure traversal server.
  • the virtual access point and the secure traversal server are separately illustrated and described.
  • Multiple security traversal servers and virtual access points form a network traversal service cloud, providing network traversal services for multiple operators.
  • FIG. 2 is a flowchart of a method for providing a network traversal service according to an embodiment of the present invention.
  • the method may be performed by a resource management center 121 in a network system as shown in FIG. 1.
  • the method includes :
  • Step 200 Receive a network traversal tunnel resource lease request sent by the operator management server, where the lease request carries the number of virtual access points to be leased and the user carried by each virtual access point. Quantity, proceed to step 205;
  • the network traversing the tunnel resource is leased to the operator in a service manner, and is professional.
  • the service provider undertakes the management and operation of the network traversal service resources, and provides the lease service of the network traversal service resources to the operators through the resource management center, so that the operators can rent the required services to the service providers through the Internet according to their actual needs.
  • the network traverses the tunnel resources, and pays the service provider according to the number of leased services and the time of use.
  • the operator can also obtain services such as maintenance of the network traversal tunnel resources provided by the service provider through the Internet, so that the terminal
  • the network traversal purpose of accessing the carrier core network can be achieved by traversing the tunnel resource through the network leased by the operator.
  • STaaS Secure Traverse As A Serv ice
  • the operator management server sends a network traversal tunnel resource lease request to the resource management center, where the operator management server is used by the operator.
  • the network traversal tunnel resource includes a virtual access point and a service channel that interfaces with the virtual access point.
  • the virtual access point is used for terminal access, and the service channel is used by the core network of the converged communication service provider, so that the terminal can pass the access point. Access the carrier's network and access the carrier's core network through the service channel.
  • the operator can determine the network traversal tunnel resource to be leased according to the number of users and access requirements of the network.
  • the network traversal tunnel resource lease request needs to include the virtual access to be leased.
  • the number of points and the number of users carried by each virtual access point For example, carrier A needs to lease 10 virtual access points, and each virtual access point can simultaneously carry the access requirements of 1000 users.
  • the identifier of the operator may also be carried in the lease request, so that the resource management center can identify which carrier needs to rent the network to traverse the tunnel resource.
  • the network traversal tunnel resource lease request may carry the total number of users to be carried, and the resource management center determines, according to the total number of users, the virtual connection required to be leased by the operator. The number of inbound points and the number of users carried by each virtual access point.
  • Step 205 Send a network traversal tunnel resource creation instruction to the security traversal server according to the lease request, and proceed to step 210;
  • the resource management center may send a network traversal tunnel resource creation instruction to the managed security traversal server according to the lease request, indicating the number of virtual access points in the lease request and each virtual access according to the security traversal server.
  • a network traversal tunnel resource is created by the number of users that are carried by the point.
  • the network traversal tunnel resource includes a virtual access point that interfaces with the terminal and a service channel that interfaces with the carrier core network.
  • the resource management center may check the idle resources in the secure traversal server managed by the resource management center according to the number of virtual access points in the lease request and the total number of users to be carried, and may
  • the security traversal server provides a service area and the principle of load balancing sends a network traversal tunnel resource creation instruction to the security traversal server deployed in the carrier network and has the most idle resources, indicating that the security traversal server performs network traversal tunnel resource creation.
  • Step 210 Receive information about a network traversal tunnel resource created by the security traversing server according to the number of the virtual access points and the number of users, where the information of the network traversing tunnel resources includes virtual access point information and a service channel. Information, proceeds to step 215;
  • the secure traversal server can associate the virtual access point and the service channel according to the operator, and return information of the created network traversal tunnel resource to the resource management center.
  • the information about the network traversing the tunnel resource includes the virtual access point information and the service channel information.
  • the information of the virtual access point may include: an address of the virtual access point, a tenant information of the virtual access point, and a protocol.
  • the service channel information includes: a service channel address and a network segment that provides a service in the core network, where the tenant information of the virtual access point may include the virtual access point. Information about the carrier, the number of the tenant, and so on. . It can be understood that the security traversing server can return the information of the network traversing tunnel resources to the resource management center in an information list.
  • Step 215 Send information about the network traversal tunnel resource to the operator management server, so that the operator management server can provide a network traversal service to the terminal according to the virtual access point information and the service channel information.
  • the resource management center can send the information of the network traversing tunnel resources to the operator management server in a message list, so that the operator management server can send the terminal according to the virtual access point information and the service channel information.
  • a method for implementing a network traversal service provided by an embodiment of the present invention according to the received network traversal
  • the tunnel resource lease request indicates that the security traversal server creates a virtual access point and a service channel required by the operator, and returns the created network traversal tunnel resource information to the operator management server, so that the operator management server can be based on the virtual access.
  • the point information and the service channel information provide a network traversal service to the terminal. Therefore, an operation mode of the security traversal service (SecS) is provided, so that the network traversing the tunnel resources can be uniformly managed and maintained, and the security traversal gateway is deployed in the operator core network.
  • the technical problems caused by the poor network scalability improve the scalability of the operator network and reduce the operating costs of the operators. And further, it can improve the reliability of network traversal.
  • FIG. 3 is a signaling diagram of a fork network service traversing service providing method according to an embodiment of the present invention. As shown in Figure 3, the method includes:
  • Step 300 The operator management server sends a network traversal tunnel resource lease request to the resource management center, where the lease request carries the identifier of the operator, the number of virtual access points to be leased, and each virtual access. The number of users carried by the point proceeds to step 305;
  • the operator identifier is used to enable the resource management center to identify the operator's lease request, for example, whether it is a mobile management server or a lease request issued by the Unicom management server.
  • the operator can determine the network traversal tunnel resources that need to be leased according to the number of users of the network and the access requirements.
  • the network traversal tunnel resources include virtual access points and service channels. Therefore, the number of virtual access points to be leased and the number of users to be hosted by each virtual access point are included in the network traversal tunnel resource lease request. For example, the operator A needs to rent 10 virtual access points. And each virtual access point can simultaneously carry the access requirements of 1000 users.
  • the number of service channels can be equal to the number of virtual access points.
  • the lease request may further include other information such as the certificate of the operator, which is not limited herein.
  • Step 305 The resource management center sends a network traversal tunnel resource creation instruction to the security traversal server according to the lease request, where the creation instruction carries the number of the virtual access points and the number of users;
  • the resource management center may send a network traversal tunnel resource creation instruction to the managed security traversal server according to the lease request, indicating that the security traversal server is configured according to Virtual access in the lease request
  • the number of the points and the number of users carried by each virtual access point create a network traversal tunnel resource.
  • the resource creation instruction also carries the identifier of the operator, the number of the virtual access points, and The number of users.
  • the network traversal tunnel resource includes a virtual access point that interfaces with the terminal and a service channel that interfaces with the carrier core network.
  • the resource management center may check the number of virtual access points in the lease request and the total number of users to be carried in the secure traversal server managed by the resource management center. Idle resources, and the security traversal server with the most idle resources deployed in the carrier network can be selected according to the security traversal service area and the principle of load balancing.
  • Step 310 The security traversing server creates a network tunneling resource according to the network traversing tunnel resource creation instruction.
  • the security traversing server creates a virtual access technology to create a virtual access point that meets the lease requirement and a service channel that interfaces with the virtual access point according to the network traversing tunnel resource creation instruction, for example, the virtual access point can be virtualized.
  • the allocation of resources, the configuration of IP addresses or domain names, and the configuration of other parameters enable each virtual access point to be created to securely traverse the gateway and establish a virtual private network (VPN) tunnel with the terminal.
  • VPN virtual private network
  • HTTP Hyper Text Transfer Protocol
  • SSL Secure Socket Layer
  • IPSec Internet Protocol Security
  • DTLS Datagram Transport Layer Security
  • UDP User Datagram Protocol
  • the virtual access point can receive the tunnel packet sent by the terminal through the VPN tunnel, such as the HTTP tunnel, the SSL tunnel, the IPSec tunnel, the DTLS tunnel, or the UDP tunnel, and decrypt and solve the received tunnel packet. After being encapsulated, it is sent to the server of the carrier's core network, and the response packet returned by the server of the carrier's core network is encapsulated and sent to the terminal through the VPN tunnel.
  • the virtual access point and the server of the carrier core network can transmit packets through the service channel that is connected to the virtual access point, that is, the virtual access point can be based on the address of the service channel and the carrier core network that are connected to the virtual access point. For communication, it should be noted that the address of the service channel is the entry address of the carrier's core network.
  • the relationship between the virtual access point and the secure traversing server hardware device may be one-to-one, one-to-many, many-to-one, and multiple.
  • the one-to-one correspondence belongs to the basic network traversal service deployment scenario.
  • the one-to-many correspondence is through a hardware device to distribute traffic and proxy other security traversal servers of the same access point, so as to logically ensure that multiple security traversal servers provide the same access point service.
  • Many-to-one refers to starting multiple virtual access point services on a secure traversal server.
  • Different virtual access points have tenant attributes, separate authentication and authorization systems, core network resources, and independent overlapping networks. , routing tables and virtual firewalls.
  • Step 315 The security traversing server returns information about the created network traversal tunnel resource to the resource management center.
  • the secure traversal server may The network identifier of the network traversing tunnel resource is associated with the virtual access point and the service channel, and the information about the created network traversal tunnel resource is returned to the resource management center, where the information of the network traversing the tunnel resource includes virtual access. Point information and business channel information.
  • the information of the network traversing tunnel resource includes, but is not limited to, the identifier of the operator, the address of the virtual access point, the address of the service channel, the network segment and the tunnel number of the service provided in the core network, where the address of the virtual access point may be The IP address or the domain name, for example: 10. 10. 10. 10 or cl oud, com, the address of the service channel that is connected to the virtual access point is also the address of the carrier's core network, so that the terminal passes the virtual access. After accessing the carrier network, the network can access the core network through the address of the service channel. It can be understood that the address of the service channel can also be represented by an IP address or a domain name, for example: 200. 1. 1. 1 or cmcc .com.
  • the information of the network traversing the tunnel resource may further include: a protocol type, a tenant number, and the like. It can be understood that the security traversing server can return the information of the network traversing tunnel resources to the resource management center in the form of information list, as shown in the following Table 1:
  • Step 320 The resource management center sends the information of the network traversing tunnel resource to the operator management server.
  • the resource management center After the resource management center obtains information about the network traversing tunnel resource created by the operator, the resource management center sends information about the network traversal tunnel resource created for the resource management center to the operator management server, where The information about the network traversing the tunnel resource includes the virtual access point information and the service channel information, and may also include: a protocol type, a tenant number, a tunnel number, and a network segment providing services in the core network. It is of course to be understood that the resource management center may return the information of the network traversing tunnel resources to the operator management server in the manner of the information list shown in Table 1, and details are not described herein again.
  • Step 325 The resource management center broadcasts information about the network traversal tunnel resource leased by the operator to the secure traversal server deployed in the carrier network.
  • step 315 after the secure traversal server that receives the network traversal tunnel resource creation instruction returns the created network traversal tunnel resource to the resource management center,
  • the resource management center may manage the network traversal tunnel resources leased by the operator, and send information about the network traversed tunnel resources leased by the operator to the network deployed in the carrier by using a broadcast or the like. Securely traversing the server so that all secure traversal servers deployed in the carrier's network can provide network traversal services to the terminal. It can be understood that step 320 and step 325 do not have the order of execution order.
  • the method for providing a network traversal service is provided by the embodiment of the present invention.
  • the resource management center receives the network traversal tunnel resource lease request sent by the operator management server, and creates a corresponding traversal server with the most idle resources deployed in the IDC center of the operator.
  • the virtual access point and the service channel and send the information of the network traversal tunnel resource to all the security traversal servers deployed in the carrier network, so that multiple secure traversal servers deployed in the carrier network can be used.
  • the terminal provides multi-directional access services, and the network traversing tunnel resources can be uniformly managed and maintained, improving operations. The scalability of the network and the reliability of network traversal, and reduce the operating costs of operators.
  • the resource management center may further receive resource usage information of the virtual access point that is sent by the security traversal server, and perform load balancing according to the load condition of the security traversal server.
  • FIG. 4 is a flowchart of a method for providing a network traversal service according to an embodiment of the present invention. The method in this embodiment may be performed by the secure traversal server in FIG. 1. This embodiment describes how to securely traverse the server. According to the network resource creation instruction of the resource management center, the network traversal tunnel resource is created for the operator, and the network traversal service is provided for the terminal. Specifically, as shown in FIG.
  • the method may include: Step 400: Receive network traversal sent by the resource management center a tunnel resource creation instruction, where the resource creation instruction carries the number of virtual access points required by the operator for renting and the number of users that each virtual access point can bear, and proceeds to step 405;
  • the operator identifier may also be carried, where the operator identifier is used to identify the operator.
  • the security traversal server receives the network traversal tunnel resource creation instruction, the network may be created for the operator according to the number of virtual access points to be created and the number of users that each virtual access point can carry.
  • the traversing tunnel resource includes a virtual access point that interfaces with the terminal and a service channel that interfaces with the carrier core network.
  • Step 405 Create a network traversing tunnel resource that meets the lease requirement of the operator according to the number of the virtual access points in the received network traversal tunnel resource creation instruction and the number of users that each virtual access point can bear.
  • the network traversal tunnel resource includes a virtual access point and a service channel that interfaces with the virtual access point, and proceeds to step 410;
  • the security traversing server uses the virtualization technology to create a virtual access point that meets the lease requirement and a service channel that is connected to the virtual access point according to the network traversal tunnel resource creation instruction.
  • the virtual access point resource can be virtualized.
  • the configuration of the allocation, the IP address or the domain name, and the configuration of other parameters, so that each virtual access point created has the function of securely traversing the gateway, and can establish a VPN tunnel with the terminal to provide HTTP, SSL, IPSec, DTLS for the terminal.
  • the access capability of VPN security tunnels such as UDP.
  • the virtual access point can receive the tunnel packet sent by the terminal through the VPN tunnel, such as the HTTP tunnel, the SSL tunnel, the I PSec tunnel, the DTLS tunnel, or the UDP tunnel, and decrypt the received tunnel packet. Decapsulated and sent to the server of the carrier's core network, and the response returned by the server of the carrier's core network After the packet is encapsulated, it is sent to the terminal through the YPN tunnel.
  • the virtual access point and the server of the carrier core network can transmit packets through the service channel that is connected to the virtual access point, that is, the virtual access point can be based on the address of the service channel that is connected with the carrier core network. For communication, it should be noted that the address of the service channel is the entry address of the carrier's core network.
  • Step 410 Return information about the created network traversal tunnel resource to the resource management center.
  • the security traversing server may associate the virtual access point and the service channel according to the operator identifier in the network traversing tunnel resource creation instruction, and return information of the created network traversal tunnel resource to the resource management center, where the network
  • the information traversing the tunnel resources includes virtual access point information and service channel information.
  • the information of the network traversing the tunnel resource includes, but is not limited to, the identifier of the operator, the address of the virtual access point, the network segment and the tunnel number of the service provided in the core network, where the address of the virtual access point may be an IP address or Is the domain name, for example: 10. 10. 10. 10.
  • the address of the service channel that is connected to the virtual access point is also the carrier core network address, so that the terminal accesses the carrier through the virtual access point.
  • the core network can be accessed through the address of the service channel.
  • the address of the service channel can also be represented by an IP address or by a domain name, for example: 200. 1. 1. 1 or cmcc. com.
  • the information of the network traversing tunnel resources may also include: a protocol type, a tenant number, and the like. It can be understood that the security traversing server can return the information of the network traversing the tunnel resource to the resource management center in the form of a list of information, which is not limited herein.
  • the method for creating a network traversing tunnel resource is described from the perspective of the security traversing server.
  • the method for creating a network traversing tunnel resource is described from the perspective of the security traversing server.
  • the method for creating a network traversing tunnel resource may be configured to create a network traversal tunnel resource that meets the operator's lease requirement according to the network traversal tunnel resource creation instruction sent by the resource management center, so that the operator can be rented according to the leased
  • the network traverses the tunnel resource to provide the network traversal service to the terminal, which improves the scalability of the operator network and the reliability of the network traversal, and reduces the operating cost of the operator.
  • FIG. 5 is a flowchart of still another method for providing a network traversal service according to an embodiment of the present invention. The method in this embodiment may also be performed by the secure traversal server in FIG. 1 . How to provide network traversal services for terminals through leased networks through tunnel resources, as shown in the figure As shown in 5, the method includes:
  • Step 500 Receive a network traversal tunnel registration request from the terminal, where the network traversal tunnel registration request carries the first virtual access point information to be accessed by the terminal, the identifier of the operator to which the terminal belongs, and the core of the operator. Web address, proceed to step 505;
  • the terminal 110 is still used as an example.
  • the terminal 110 can directly send a network traversal tunnel registration request to the network traversing service cloud in order to traverse the network of the operator, specifically, the terminal 110 sends the traversal server 123 to the security traversal server 123.
  • the network traversing tunnel registration request the network traversal tunnel registration request carries the first virtual access point information to be accessed by the terminal, the identifier of the operator to which the terminal belongs, and the core network address of the operator, where the A virtual access point is a virtual access point arbitrarily selected by the terminal, such as a virtual access point 120.
  • the network traversal tunnel registration request may further include tenant information, a user name, a password, and a terminal type information, where the terminal type information includes information such as a mobile terminal model, an operating system version, and a browser version, so as to facilitate secure traversal.
  • the server performs access authentication on the terminal.
  • Step 505 Determine whether the first virtual access point is a virtual access point selected by the secure traversal server for the terminal, and if the first virtual access point is not the selected virtual access point, proceed to the step 510, otherwise, proceed to step 520;
  • the security traversing server may determine, according to the first virtual access point information in the network traversal tunnel registration request, whether the first virtual access point is a preferred virtual access selected by the secure traversing server for the terminal. Specifically, the security traversing server may determine, according to the set record table, whether the first virtual access point is a virtual access point selected by the security traversal server for the terminal, and the virtual access point is recorded in the record table. Usage. If not, the terminal is the first access, and the first virtual access point is a virtual access point arbitrarily selected by the terminal, and may not be the best selected by the secure traversing server for the terminal. Virtual access point.
  • the security traversing server may further determine, according to the access location, the load quantity, or the probe response status of the first virtual access point, whether the first virtual access point is the most selected by the secure traversing server for the terminal. A good virtual access point. If not, proceed to step 510, otherwise proceed to step 520.
  • the operator to which the terminal belongs rents multiple virtual access points, it is required to determine whether the first virtual access point in the network traversal tunnel registration request is a secure traversal. a preferred virtual access point selected by the server for the terminal, and not at the first virtual access point When the virtual access point is selected, the process proceeds to step 51 0 to select a virtual access point for the terminal.
  • the first virtual access point in the network traversal tunnel registration request is not a virtual access point leased by the operator to which the terminal belongs, and the step of entering is required. 510 reselects the virtual access point for the terminal by the secure traversal server.
  • the terminal of the operator can only perform according to the virtual access point that it rents.
  • the first virtual access point is the selected access point, and at this point, step 520 can be accessed.
  • Step 510 Select a second virtual access point for the terminal in the network traversal tunnel resource leased by the operator according to the identifier of the operator, and proceed to step 515;
  • the security traversing server may search for information about the network traversing tunnel resource leased by the operator according to the identifier of the operator in the lease request, and select a tiger access point for the terminal, specifically, the network traversing tunnel
  • the resource information includes: tenant information of the virtual access point, user load of the virtual access point, and access area of the virtual access point.
  • the optimal virtual access point may be selected according to the information of the network traversal tunnel resource obtained by the query.
  • the load may be selected according to the information of the network traversing the tunnel resource.
  • the virtual access point with the closest access location or the fastest probe response is the best virtual access point.
  • the security traversing server selects the virtual access point for the terminal, the related information is recorded, or the corresponding identifier is marked, so that the next time the network traversal tunnel registration request of the terminal is received, the request may be fast. Determining whether the first virtual access point in the terminal is the selected virtual access point.
  • Step 515 Return a network traversal tunnel registration success message to the terminal, where the network traversal tunnel registration success message includes second virtual access point information, so that the terminal is established according to the second virtual access point.
  • the network traversal tunnel and the core network address of the operator access the core network of the operator;
  • the security traversing server may directly return a network traversal tunnel registration success message to the terminal, where the network traversal tunnel registration success message includes a registration result and
  • the security traversal server selects the second virtual access point information that is selected by the terminal, and completes the negotiation of the network traversing tunnel between the terminal and the second virtual access point, so that the terminal can be based on the second virtual access
  • the secure traversal network traversing tunnel established between the terminals receives the packet sent by the terminal, and decapsulates the packet and sends the packet to the core network of the operator.
  • the response packet returned by the operator core network is received, and the response is received.
  • the packet is encapsulated, it is sent to the terminal through the network traversal tunnel.
  • the terminal may communicate with the carrier core network by using the virtual IP allocated by the second virtual access point.
  • the encapsulated packet includes the second virtual access point.
  • the virtual IP address assigned by the terminal and the address of the carrier core network, and the encapsulated outer packet includes an IP address of the terminal and an IP address of the second virtual access point.
  • the network traversal tunnel established between the second virtual access point and the terminal may be a VPN security tunnel of the type such as HTTP, SSL, IPSec, DTLS, or UDP, and is no longerching
  • the security traversing server may return a registration failure message to the terminal, where the registration failure message includes the second virtual access point information selected for the terminal, so that the terminal can be configured according to the The second virtual access point information re-initiates the network traversal tunnel registration request.
  • Step 520 Return a network traversal tunnel registration success message to the terminal, so that the terminal accesses the core of the operator according to the network traversal tunnel established with the first virtual access point and the core network address of the operator. network.
  • the network traversal tunnel registration success message is returned to the terminal.
  • the network traversal tunnel registration success message includes a registration result, and may also include information such as a virtual internet protocol IP address and mask, a connection connection sending period, and an access policy.
  • the security tunnel type may include: HTTP, SSL, DTLS, UDP, UDPS, and the like, and is not listed here.
  • the network traversal service providing method provided by the embodiment of the present invention selects a virtual access point for the terminal of the operator according to the network traversing tunnel resource information leased by the operator through the security traversal server deployed in the operator network, and Returning, to the terminal, the second traversal access point information selected by the terminal to the terminal, the network traversal tunnel registration success message is returned to the terminal, so that the terminal does not need to initiate the network traversal tunnel again according to the selected second virtual access point information.
  • the registration request improves the efficiency of terminal access.
  • the virtual access point is the best virtual access point after server selection, different terminals may Network traversal is achieved by selecting different virtual access points, which reduces the burden of traversing the gateway and improves the reliability of network traversal.
  • FIG. 6 is a flowchart of still another method for providing a network traversal service according to an embodiment of the present invention.
  • the method in this embodiment may also be performed by the secure traversal server in FIG. 1.
  • This embodiment describes how to securely traverse the server.
  • the network traversal service is provided for the terminal through the leased network traversing tunnel resource. As shown in FIG. 6, the method includes:
  • Step 600 Receive an access point query request from a terminal, where the query request carries an identifier of an operator to which the terminal belongs;
  • the terminal 110 in FIG. 1 is taken as an example.
  • the terminal 110 is to access the third network or the fourth network through the Internet.
  • the third network or the fourth network is the core network of an operator.
  • the terminal 110 needs to send an access point query request to the network traversing service cloud to query the access point of the access operator network.
  • the terminal 110 can send the connection to the secure traversal server 123 deployed in the carrier network.
  • An inbound query request, where the network traversal tunnel registration request indicates an identifier of an operator to which the terminal belongs.
  • the terminal in the carrier network can directly establish a tunnel with a virtual access point leased by the operator, and pass the tunnel. Access to the carrier's core network without the need to query the virtual access point.
  • a virtual access point is far from satisfying the user's access requirements. Therefore, the operator usually rents multiple virtual access points to the STaaS service provider according to the number of users in the network.
  • the user can initiate a query request of the virtual access point to query the preferred virtual access point.
  • the query request may further include an initial access point of the user and an address of a core network of the operator to be accessed.
  • Step 605 Select a virtual access point in the network traversal tunnel resource leased by the operator according to the identifier of the operator.
  • the security traversing server may search for information about the network traversing tunnel resource leased by the operator according to the identifier of the operator in the lease request, and select a virtual access point for the terminal. Specifically, the traversal may be traversed according to the network.
  • the information of the virtual access point in the information of the tunnel resource selects the virtual terminal for the terminal.
  • the information of the virtual access point may include: tenant information of the virtual access point, user load of the virtual access point, and access area of the virtual access point.
  • the virtual access point with the smallest load or the closest access location or the fastest probe response may be selected according to the information of the network traversing tunnel resource obtained by querying.
  • the first virtual access point 120 is selected as an example for description. It can be understood that, after the secure traversing server selects a virtual access point for the terminal, relevant information is recorded, or a corresponding identifier is marked.
  • Step 610 Return a query response message to the terminal, where the query response message includes information of the selected virtual access point.
  • the query response message may be returned to the terminal, where The response message contains information about the selected virtual access point.
  • Step 615 Receive a network traversal tunnel registration request from the terminal, where the network traversal tunnel registration request includes the selected virtual access point information and the core network address of the operator.
  • the terminal may initiate a network traversal tunnel registration request to the virtual access point, because the secure traversal server is a set of virtual access points, and therefore, the security traversal
  • the server receives the network traversal tunnel registration request initiated by the terminal according to the selected virtual access point, where the network traversal tunnel registration request includes the selected virtual access point information and the core of the operator. Web address.
  • the network traversal tunnel registration request may further include tenant information, a user name, a password, and a terminal type information, where the terminal type information includes a mobile terminal model, an operating system version, a browser version, and the like, so as to securely traverse the server.
  • the terminal performs access authentication.
  • the virtual access point is an access point selected by the operator, and the terminal in the carrier network can directly The virtual access point initiates a network traversal tunnel registration request.
  • Step 620 Return a network traversal tunnel registration success message to the terminal, so that the terminal accesses the core network of the operator according to the core network address of the operator and a network traversal tunnel established with the virtual access point.
  • the network traversal tunnel registration success message includes
  • the registration result may also include information such as a virtual internet protocol IP address and mask, a keep-alive message sending period, and an access policy.
  • the security tunnel type may include: HTTP, SSL, DTLS. UDP,
  • VPN security tunnels such as UDPS are not listed here.
  • the resource usage of the virtual access point created by the security traversal server may be included, and the resource usage of the virtual access point created by the virtual access point may be included.
  • the virtual access point is managed by the resource management center, and the virtual access point is managed by the virtual access point according to the resource load of the virtual access point.
  • the network traversal service providing method receives an access point query request from a terminal through a secure traversal server deployed in the operator network, and selects a tiger for the terminal in the network traversing tunnel resource information leased by the operator. And the access point of the selected access point is sent to the terminal, so that the terminal according to the selected virtual access point access information and the selected virtual access point A network traversal tunnel is established, so that the network traversal can be realized by accessing the core network of the operator according to the established network traversal tunnel. Since the virtual access point is the best virtual access point after server selection, different terminals may implement network traversal through different virtual access points selected, which reduces the burden of traversing the gateway and improves the reliability of network traversal.
  • the operator can rent multiple virtual access points according to service requirements, thereby reducing not only the operating cost of the operator but also the multiple virtual machines that are rented according to the carrier.
  • the access point provides a better network traversal service for the terminal, which improves the reliability of network traversal.
  • FIG. 7 is a schematic diagram of a physical structure of a resource management center according to an embodiment of the present invention.
  • the resource management center may be a server, a computer, or a computing node with computing processing capability, as long as the network tunnel resource can be uniformly managed. , there is no particular limitation here.
  • the resource management center 70 includes:
  • a processor (proces s or) 710, (Communica t i ons Interface) 720, a memory 730, and a communication bus 740.
  • the processor 710, the communication interface 720, and the memory 730 are completed by each other via the communication bus 740. Communication.
  • the communication interface 720 is configured to communicate with a network element, such as an operator management server or a secure traversal server.
  • the processor 710 is configured to execute the program 732, and specifically, the related steps in the method embodiment shown in FIG. 2 to FIG. 3 above may be performed.
  • program 732 can include program code, the program code including computer operating instructions.
  • Processor 710 may be a central processing unit CPU, or an application specific integrated circuit ASIC, or one or more integrated circuits configured to implement embodiments of the present invention.
  • the memory 730 is configured to store the program 732.
  • the memory 730 may include a high speed RAM memory and may also include a non-volatile memory such as at least one disk memory.
  • FIG. 8 is a schematic diagram of a resource management center according to an embodiment of the present invention.
  • the resource management center 80 includes:
  • the receiving module 800 is configured to receive a network traversal tunnel resource lease request sent by the operator management server, where the lease request carries the number of virtual access points to be leased and the number of users carried by each virtual access point;
  • the operator may determine the network traversal tunnel resource that needs to be leased according to the number of users of the network and the access requirement. Therefore, the network traversal tunnel resource lease request needs to include the leased network.
  • the number of virtual access points and the number of users carried by each virtual access point For example, carrier A needs to lease 10 virtual access points, and each virtual access point can simultaneously support the access requirements of 1000 users.
  • the identifier of the operator may also be carried in the lease request, so that the resource management center can identify which carrier needs to rent the network to cross the tunnel resource.
  • the network traversal tunnel resource lease request may only carry the total number of users to be carried, and the resource management center determines, according to the total number of users, the virtual required to be rented by the operator.
  • the sending module 805 is configured to send a network traversal tunnel resource creation instruction to the security traversal server according to the lease request received by the receiving module 800, where the network traversal tunnel resource creation instruction includes the number of the virtual access points and The number of users;
  • the sending module S05 may send a network traversing tunnel resource creation instruction to the managed security traversing server according to the lease request, indicating the security traversal
  • the server creates a network traversal tunnel resource according to the number of virtual access points in the lease request and the number of users carried by each virtual access point, where the network traversal tunnel resource includes a virtual access point that interfaces with the terminal and the operator.
  • the service channel of the core network docking is not limited to the number of virtual access points in the lease request and the number of users carried by each virtual access point.
  • the sending module 805 can check the idle resources in the secure traversal server managed by the virtual access point and the total number of users to be carried in the lease request, and can
  • the security traversal server provides the service area and the principle of load balancing.
  • the security traversal server deployed in the carrier network and having the most idle resources is used to create the network traversal tunnel resources.
  • the receiving module 800 is further configured to receive, by the security traversing server, information about a network traversing tunnel resource created according to the number of the virtual access points in the network traversing tunnel resource creation instruction and the number of users, where the network
  • the information traversing the tunnel resource includes virtual access point information and service channel information;
  • the security traversal server may associate the virtual access point and the service channel according to the operator, and return information of the created network traversal tunnel resource to the receiving module 800.
  • the information about the network traversing the tunnel resource includes the virtual access point information and the service channel information.
  • the information of the network traversing the tunnel resource includes but is not limited to the identifier of the operator, the address of the virtual access point, and the address of the service channel. , the network segment and tenant number of the service.
  • the address of the virtual access point may be an IP address or a domain name, for example: 10. 10. 10. 10. 10 or cloud, com, the address of the service channel that is connected to the virtual access point is also the carrier core network.
  • the address can be used to access the core network through the address of the service channel after accessing the network through the virtual access point. It can be understood that the address of the service channel can also be represented by an IP address or by using a domain name, for example: 200. 1. 1. 1 or cmcc. com.
  • the information of the network traversing the tunnel resource may further include: a protocol type, a tunnel number, and the like. It can be understood that the security traversal server can traverse the network The information of the tunnel resource is returned to the receiving module 800 in the form of a message list.
  • the sending module 805 is further configured to send the information about the network traversing tunnel resource to the operator management server, so that the operator management server can provide a network traversal service to the terminal according to the virtual access point information and the service channel information. .
  • the sending module 805 can send the information of the network traversing tunnel resource to the operator management server in a message list, so that the operator management server can send the terminal according to the virtual access point information and the service channel information. Provide network traversal services.
  • the resource management center 80 may further include: a resource management module 810, configured to manage and maintain network traversal tunnel resources.
  • the resource management module 810 can manage and maintain the network traversal tunnel resource according to the usage of the virtual access point in the network traversing tunnel resource. Specifically, the resource management module 810 can receive the virtual access point sent by the secure traversal server.
  • the resource usage information is used to perform load balancing according to the load of the security traversal server, and the information about the network traversal tunnel resource leased by the operator may be broadcast to the secure traversal server deployed in the carrier network, so that the information can be deployed.
  • Multiple secure traversal servers in the carrier network provide multi-directional access services to the terminals and balance the load of each access point.
  • the broadcast module 815 is configured to send information about the network traversed tunnel resources leased by the operator to a secure traversal server deployed in the carrier network.
  • the broadcast module 815 may send information about the network traversed tunnel resources of the operator to the secure traversal server deployed in the carrier network, so that all are deployed in the operation.
  • the secure traversal server in the commerce network can provide secure traversal services for the terminal.
  • the resource management center receives the network traversal tunnel resource lease request sent by the operator management server, and instructs the secure traversal server deployed in the network center of the operator to create a corresponding virtual access point and service channel, and The created network traversal tunnel resource information is returned to the operator management server, so that the operator management server can provide the network traversal service to the terminal according to the virtual access point information and the service channel information. Therefore, a security traversal service (SaaS) operation mode is provided, so that the network traversing tunnel resources can be uniformly managed and maintained, and the security traversal gateway is deployed in the carrier core.
  • SaaS security traversal service
  • FIG. 9 is a schematic structural diagram of a security traversal server according to an embodiment of the present invention.
  • the security traversal server may be deployed in a network of each operator or deployed in a self-built network of a STaaS service provider. It is a server, a computer, or a computing node with computing processing capability, and is not particularly limited herein.
  • the secure traversal server 90 includes:
  • a processor 910 a communicated ion interface 920, a memory 930, a communication bus 940, an input device 950, and a display 960.
  • the processor 910, the communication interface 920, the memory 930, the input device 950, and the display 960 complete communication with each other via the communication bus 940.
  • the communication interface 920 is configured to communicate with a network element, where the network element includes a resource management center or a terminal.
  • the processor 910 is configured to execute the operating system 932 and the application 934, and includes performing the related steps in the method embodiments shown in FIG. 4 to FIG. 6 above.
  • program 932 can include program code, the program code including computer operating instructions.
  • the processor 910 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the present invention.
  • ASIC Application Specific Integrated Circuit
  • the memory 930 is configured to store the operating system 932 and the application 934.
  • Memory 930 may include high speed RAM memory and may also include non-volatile memory, such as at least one disk memory.
  • the operating system 932 can be Windows NT. Windows 2007 or some other Window is a version of the operating system, or it can be other types of operating systems such as the Macintosh OS.
  • FIG. 10 is a schematic structural diagram of a security traversing server according to an embodiment of the present invention.
  • the security traversing server according to the embodiment of the present invention includes:
  • the receiving module 1000 is configured to receive a network traversal tunnel resource creation instruction sent by the resource management center, where
  • the network traversal tunnel resource creation instruction carries an identifier of the operator, a number of virtual access points to be created, and a number of users that each virtual access point can carry.
  • the tunnel resource creation module 1005 is configured to create a network traversal tunnel resource that meets the lease requirement of the operator according to the number of the virtual access points in the network traversal tunnel resource creation instruction received by the receiving module 1000 and the number of users, where
  • the network traversal tunnel resource includes a virtual access and a service channel that interfaces with the virtual access point.
  • the tunnel resource creation module 1005 may use the virtualization technology to create a virtual access point that meets the lease requirement and a service channel that is connected to the virtual access point according to the network traversal tunnel resource creation instruction, for example, virtual connection may be performed through virtualization.
  • the allocation of the inbound resources, the configuration of the IP address or the domain name, and the configuration of other parameters enable each virtual access point to be created to securely traverse the gateway and establish a virtual private network (VPN) with the terminal.
  • VPN virtual private network
  • Tunnel providing HyperTet Transfer Protocol (HTTP), Secure Socket Layer (SSL), Internet Protocol Security (IPSec), and datagram protocol based on the Hypertext Transfer Protocol (HTTP) Access capability of VPN security tunnels such as Datagram Transport Layer Security (DTLS) or User Datagram Protocol (UDP).
  • HTTP HyperTet Transfer Protocol
  • SSL Secure Socket Layer
  • IPSec Internet Protocol Security
  • HTTP Hypertext Transfer Protocol
  • DTLS Datagram Transport Layer Security
  • UDP User Datagram Protocol
  • the virtual access point and the server of the core network of the carrier can transmit packets through the service channel that is connected to the virtual access point, that is, the virtual access point can communicate with the carrier core network according to the address of the service channel that is connected to the virtual access point.
  • the address of the service channel is the entry address of the core network of the operator.
  • the relationship between the virtual access point and the secure traversal server may be one-to-one, one-to-many, and multiple pairs.
  • One and many-to-many correspondence belongs to the basic network traversal service deployment scenario.
  • the one-to-many correspondence is through a hardware device to distribute traffic and proxy other security traversal servers of the same access point, so as to logically ensure that multiple security traversal servers provide the same access point service.
  • Many-to-one refers to starting multiple virtual access point services on a secure traversal server.
  • Different virtual access points have tenant attributes, separate authentication and authorization systems, core network resources, and independent overlapping networks. , routing tables and virtual firewalls.
  • the tunnel resource creation module 1005 creates a network traversal tunnel resource for the operator according to the network traversal tunnel resource creation instruction
  • the virtual access point may be associated according to the identifier of the operator.
  • business channels The tunnel resource sending module 1010 is configured to return information about the network traversal tunnel resource created by the tunnel resource creating module 1005 to the resource management center.
  • the information about the network traversing the tunnel resource includes virtual access point information and service channel information.
  • the information of the network traversing the tunnel resource includes, but is not limited to, the identifier of the operator, the address of the virtual access point, the network segment, and the tunnel number.
  • the address of the virtual access point may be an IP address or a domain name, for example: 10 10. 10. 10 or cloud, com,
  • the address of the service channel can also be represented by IP address or by domain name, for example: 200. 1. 1. 1 or cmcc. com.
  • the information of the network traversing the tunnel resource may further include: a protocol type, a tenant number, a tunnel number, and a network segment providing services in the core network. It can be understood that the tunnel resource sending module 1010 can return the information of the network traversing tunnel resource to the resource management center in the form of a list of information, which is not limited herein.
  • the security traversing server can create a network traversal tunnel resource for the operator according to the network tunnel resource creation instruction sent by the resource management center, so that the operator can provide the network traversal service to the terminal according to the leased network traversing the tunnel resource. It improves the scalability of the carrier network and the reliability of network traversal, and reduces the operating costs of operators.
  • FIG. 11 is a schematic structural diagram of still another security traversing server according to an embodiment of the present invention. As shown in FIG. 11, the security traversing server 110 is based on the embodiment shown in FIG. 10:
  • the receiving module 1000 is further configured to receive a network traversal tunnel registration request from the terminal, where the network traversal tunnel registration request carries the first virtual access point information to be accessed by the terminal, the identifier of the operator to which the terminal belongs, and The core network address of the operator;
  • the first virtual access point is a virtual access point arbitrarily selected by the terminal.
  • the network traversal tunnel registration request may further include tenant information, a user name, a password, and a terminal type information, where the terminal type information includes information such as a mobile terminal model, an operating system version, and a browser version, so as to securely traverse the server. Performing access authentication on the terminal.
  • the secure traversal server 110 may further include:
  • the determining module 1105 is configured to determine whether the first virtual access point is a virtual access point selected by the secure traversal server for the terminal, and if the first virtual access point is not the selected virtual access point, The first selection module 1110 is triggered, otherwise, the first response module 1115 is triggered.
  • the determining module 1105 may determine, according to the set record table, that the first virtual access point is No is the virtual access point selected by the security traversal server for the terminal, and the usage of the virtual access point is recorded in the record table. If not, the terminal is the first access, and the first virtual access point is an arbitrarily selected virtual access point of the terminal, and is not the best virtual connection selected by the security traversing server for the terminal. Entry point.
  • the security traversing server may further determine, according to the access location, the load quantity, or the probe response status of the first virtual access point, whether the first virtual access point is the most selected by the secure traversing server for the terminal. A good virtual access point. If not, the first selection module 1110 is triggered, otherwise the first response module 1115 is triggered.
  • the first selection module 1110 is configured to select a second virtual access point for the terminal in the network traversal tunnel resource leased by the operator according to the identifier of the operator, and trigger the first response module 1115; specifically, the network
  • the information traversing the tunnel resources includes: tenant information of the virtual access point, user load of the virtual access point, and access area of the virtual access point.
  • the best virtual access point can be selected according to the information of the network traversing tunnel resource obtained by the query.
  • the first selection module 1110 can select the best virtual access point according to the information of the network traversing the tunnel resource. Select the virtual access point with the smallest load or the closest access location or the fastest probe response as the best virtual access point.
  • the determining module 1105 can quickly determine whether the first virtual access point in the terminal is the selected virtual access point.
  • the first response module 1115 is configured to return a network traversal tunnel registration success message to the terminal, where the network traversal tunnel registration success message includes the second virtual access point information selected by the first selection module 1110, so that the terminal Accessing the core network of the operator according to a network traversal tunnel established with the second virtual access point and a core network address of the operator.
  • the security traversing server may directly return a network traversal tunnel registration success message to the terminal, where the network traversal tunnel registration success message includes a registration result and
  • the security traversal server selects the second virtual access point information that is selected by the terminal, and completes the negotiation of the network traversing tunnel between the terminal and the second virtual access point, so that the terminal can be based on the second virtual access
  • the network traversal tunnel established between the points and the core network address of the operator accesses the core network of the operator.
  • the second virtual access point may receive the terminal by using a network traversal tunnel established between the terminals. Send the packet and decapsulate the packet. The packet is sent to the core network of the carrier.
  • the response packet sent by the carrier core network is received, and the response packet is encapsulated and sent to the terminal through the network traversal tunnel.
  • the terminal may communicate with the carrier core network by using the virtual IP allocated by the second virtual access point.
  • the encapsulated packet includes the second virtual access point.
  • the virtual IP address assigned by the terminal and the address of the carrier core network, and the encapsulated outer packet includes an IP address of the terminal and an IP address of the second virtual access point. It should be noted that the network traversal tunnel established between the second virtual access point and the terminal may be
  • the first response module 1115 is further configured to return a registration failure message to the terminal, where the registration failure message includes the second virtual access point information selected for the terminal, so that the terminal The network traversal tunnel registration request can be re-initiated according to the second virtual access point information.
  • the first response module 1115 is further used for The terminal returns a network traversal tunnel registration success message, so that the terminal accesses the core network of the operator according to the network traversal tunnel established with the first virtual access point and the core network address of the operator.
  • the first The response module 1115 may further return a network traversal tunnel registration success message to the terminal, complete negotiation of a network traversal tunnel between the terminal and the first virtual access point, so that the terminal can pass the first The network traversal tunnel established by the virtual access point and the core network address of the operator access the core network of the operator.
  • the network traversal tunnel registration success message includes a registration result, and may also include information such as a virtual internet protocol IP address and mask, a keep-alive message sending period, and an access policy.
  • the security traversing server provided by the embodiment of the present invention selects a virtual access point for the terminal of the operator according to the network traversing tunnel resource information leased by the operator, and directly reports to the network traversal tunnel registration success message returned to the terminal.
  • the terminal returns the second virtual access point information selected by the terminal, so that the terminal does not need to initiate the network traversal tunnel registration request again according to the selected second virtual access point information, thereby improving the efficiency of terminal access.
  • FIG. 12 is a schematic structural diagram of another security traversing server according to an embodiment of the present invention, as shown in FIG. 12 As shown, the secure traversal server 120 is based on the embodiment shown in FIG. 10:
  • the receiving module 1 000 is further configured to receive an access point query request from the terminal, where the query request carries an identifier of an operator to which the terminal belongs;
  • the terminal in the carrier network can directly establish a network traversal tunnel with a virtual access point leased by the operator, and pass the tunnel.
  • the network traverses the tunnel to access the core network of the operator without sending an access point query request.
  • a virtual access point is far from satisfying the user's access requirements. Therefore, the operator usually rents multiple virtual access points to the STaaS service provider according to the number of users in the network.
  • the user can initiate a query request of the virtual access point to query the preferred virtual access point.
  • the query request may further include an initial access point of the user and an address of a core network of the operator to be accessed.
  • the secure traversal server may further include:
  • the second selection module 1205 is configured to select a virtual access point among the network traversal tunnel resources leased by the operator according to the identifier of the operator in the query request received by the receiving module 1000;
  • the security traversing server may search for information about the network traversing tunnel resource that is rented by the operator according to the identifier of the operator in the lease request, and select a virtual access point for the terminal.
  • the information of the network traversing the tunnel resource includes: Tenant information of the virtual access point, user load of the virtual access point, and access area of the virtual access point.
  • the optimal virtual access point may be selected according to the information of the network traversing tunnel resource obtained by the query.
  • the second selection module 1205 may select the best virtual access point according to the information of the network traversing the tunnel resource. Select the virtual access point with the smallest load or the closest access location or the fastest probe response as the best virtual access point.
  • the virtual access point with the first virtual access point 120 being the best is taken as an example for description. It can be understood that when the security traversal server selects a virtual access point for the terminal, relevant information is recorded or a corresponding identifier is marked.
  • the second response module 1210 is configured to return a query response message to the terminal, where the query response message includes information of the selected virtual access point.
  • the query response message may be returned to the terminal, where the query response The message contains information about the selected virtual access point.
  • the receiving module 1 000 is further configured to receive a network traversal tunnel registration request from the terminal, where The network traversal tunnel registration request includes the selected virtual access point information and the core network address of the operator;
  • the terminal may initiate a network traversal tunnel registration request to the virtual access point, because the secure traversal server is a set of virtual access points, therefore,
  • the security traversing server receives the network traversal tunnel registration request initiated by the terminal according to the selected virtual access point, where the network traversal tunnel registration request includes the selected virtual access point information and the operator. Core network address.
  • the network traversal tunnel registration poem can also include tenant information, a user name, a password, and a terminal type information, where the terminal type information includes a mobile terminal model, an operating system version, a browser version, and the like, so as to securely traverse the server pair.
  • the terminal performs access authentication.
  • the second response module 1210 is further configured to return a network traversal tunnel registration success message to the terminal, so that the terminal accesses the network traversal tunnel according to the core network address of the operator and the virtual access point.
  • the core network of the operator is further configured to return a network traversal tunnel registration success message to the terminal, so that the terminal accesses the network traversal tunnel according to the core network address of the operator and the virtual access point.
  • the core network of the operator is further configured to return a network traversal tunnel registration success message to the terminal, so that the terminal accesses the network traversal tunnel according to the core network address of the operator and the virtual access point.
  • the core network of the operator is further configured to return a network traversal tunnel registration success message to the terminal, so that the terminal accesses the network traversal tunnel according to the core network address of the operator and the virtual access point.
  • the network traversal tunnel registration success message includes the registration result, and may also include information such as a virtual internet protocol IP address and mask, a keep-alive packet sending period, and an access policy.
  • the security tunnel type may include: Hyper Text Transfer Protocol (HTTP). Secure Socket Layer (SSL), Internet Protocol Security (IPSec), datagram protocol-based A virtual private network (VPN) tunnel of the type such as Datagram Transport Layer Security (DTLS) or User Datagram Protocol (UDP) is not listed here.
  • the security traversal service of the embodiment of the present invention receives an access point query request from the terminal, selects a virtual access point for the terminal in the network traversal tunnel resource information leased by the operator, and connects the selected virtual access point.
  • the inbound information is sent to the terminal, so that the terminal establishes a network traversal tunnel with the selected virtual access point according to the selected access information of the virtual access point, so that the tunnel can be accessed according to the established network traversing tunnel.
  • the carrier's core network is implemented to achieve network traversal. Since the virtual access point is the best virtual access point after the server is selected, different terminals may implement network traversal through different virtual access points selected, which reduces the burden of traversing the gateway and improves the reliability of network traversal. It should be noted that the embodiments shown in FIG.
  • FIG. 11 and FIG. 12 may be used in combination or may be used alone, and are not limited herein. It can be understood that when the embodiments shown in FIG. 11 and FIG. 12 are used in combination, the second selection module 1205 and the first i selection module 1110 can be combined into one module, and the second response module 1210 and the first response module 1115 are also Can be combined into one module.
  • FIG. 13 is a network system diagram of a Secure Traverse As A Service (STaaS) according to an embodiment of the present invention.
  • the network system 130 includes a resource management center. 1300.
  • the security traversing server 1305 may have one or more, and the virtual access point 1310 may have one or more.
  • the security traversal server 1305 is a collection of multiple virtual access points 1310, which can be deployed in the operator's Internet data center (IDC) or deployed in the self-built network of the SATA server.
  • the resource management center 1300 is used for unified management of the network traversal tunnel resources created by all the security traversing servers 1305.
  • the number of the security traversing servers 1305 can be set according to the service area, the number of users, and the like, and the virtual access point 1310
  • the quantity can be created according to the operator's rental request. among them:
  • the resource management center 1300 is configured to receive a network traversal tunnel resource lease request sent by the operator management server, where the leased request contains the number of virtual access points to be leased and the number of users carried by each virtual access point. Transmitting, according to the lease request, a network traversal tunnel resource creation instruction to the security traversing server; receiving information about the network traversal tunnel resource created by the security traversing server according to the number of the virtual access points and the number of users; The information about the network traversing the tunnel resource is sent by the operator management server, where the information of the network traversing the tunnel resource includes virtual access point information and service channel information;
  • the security traversing server 1 305 is configured to perform network traversal tunnel resource creation according to the network traversal tunnel resource creation instruction sent by the resource management center 1 300, and return the created network traversal tunnel resource information to the resource management center 1 300, where
  • the information about the network traversing the tunnel resource includes the virtual access point information and the service channel information; receiving the access point query request sent by the terminal, where the query request carries the identifier of the operator to which the terminal belongs; according to the operator Selecting a virtual access point in the network traversal tunnel resource leased by the operator; returning a query response message to the terminal, where the query response message includes information of the selected virtual access point; receiving the information from the terminal
  • the network traversing the tunnel registration request where the network traversal tunnel registration request includes the selected virtual access point information and the operator a core network address; returning a network traversal tunnel registration success message to the terminal, so that the terminal accesses the operator according to the core network address of the operator and the network traversal tunnel established with the virtual access point Core network.
  • the virtual access point 131 0 is configured to receive the packet sent by the terminal by using a network traversal tunnel established between the terminal, and decapsulate the packet and send the packet to the core network of the operator; The response packet is encapsulated and sent to the terminal through the network traversal tunnel.
  • the STaaS provider provides the operator with the lease service of the network traversal service resource through the resource management center 1300, and the STaaS provider undertakes the management operation of the network traversal service resource, and the operator can pass the actual demand according to the actual needs.
  • the Internet leases the required network traversal tunnel resources to the STaaS provider, and pays the STaaS provider according to the number of leased services and the time of use, and the operator can also obtain the network traversal tunnel provided by the STaaS provider through the Internet. Services such as maintenance of resources.
  • the STaaS network system creates an operation mode of the security traversal service (Secury traversal service), and can create a network traversal tunnel resource for the operator according to the lease requirement of the operator.
  • the network traversal tunnel resource is created by the operator, and the network traversal service is provided to the terminal through the leased network, so that the terminal can access the core network of the operator. Therefore, the network traversing tunnel resources can be uniformly managed and maintained, and the network scalability caused by the centralized deployment of the security traversal gateway to the operator core network is poor, and the stable network traversal service cannot be provided for the dispersed Internet access users.
  • Technical issues have improved the scalability of the carrier network and the reliability of network traversal, reducing the operating costs of operators.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the steps of the foregoing method embodiments are included; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
  • the disclosed apparatus and method can It is achieved in other ways.
  • the device embodiments described above are only schematic.
  • the division of the modules is only a logical function division.
  • there may be another division manner for example, multiple modules or components may be combined or Can be integrated into another device, or some features can be ignored, or not executed.
  • the mutual coupling or direct or communication connection shown or discussed may be an indirect coupling or communication connection through some communication interface, device or module, and may be in electrical, mechanical or other form.
  • modules described as separate components may or may not be physically separate, and the components displayed as modules may or may not be physical units, i.e., may be located in one place, or may be distributed over multiple network elements. Some or all of the modules may be selected according to actual needs to implement the purpose of the solution of the embodiment.
  • each functional module in each embodiment of the present invention may be integrated into one processing module, or each module may exist physically separately, or two or more modules may be integrated into one module.
  • the above embodiments are merely illustrative of the technical solutions of the present invention, and are not intended to be limiting; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art The technical solutions described in the foregoing embodiments may be modified, or some or all of the technical features may be equivalently replaced; and the modifications or substitutions do not deviate from the technical solutions of the embodiments of the present invention. range.

Abstract

本发明实施例提供了一种网络穿越服务提供方法、装置及系统,根据接收的运营商管理服务器发送的网络穿越隧道资源租用请求向安全穿越服务器发送网络穿越隧道资源创建指令,并将所述安全穿越服务器创建的网络穿越隧道资源的信息发送给向所述运营商管理服务器,其中,所述网络穿越隧道资源的信息包括虚拟接入点信息和业务通道信息,使得所述运营商管理服务器能够根据所述虚拟接入点信息和业务通道信息向终端提供网络穿越服务。本发明实施例提供的网络穿越服务提供方法能够提升运营商网络的可扩展性以及网络穿越的可靠性。

Description

一种网络穿 良务的提供方法、 装置及系统 技术领域
本发明涉及通信技术领域, 尤其涉及一种网络穿越服务的提供方法、装置及 系统。 背景技术 近年来随着信息技术与通信技术融合的不断加速, 互联网通信与传统无线 / 固网通信的界限已经迅速淡化。全球通信运营商为了应对互联网业务运营商的挑 战, 加速部署基于网际协议 (Internet Protocol, IP)的融合通信业务。 由于互联网的开放性, 企业、 个人、 家庭、 公共场所等接入环境复杂多样, 对于融合通信运营来说,存在诸多安全和接入挑战。在互联网上推广融合通信业 务的过程中, 既涉及到个人隐私或者企业机密的保护, 又涉及到如何保障业务在 各种复杂的接入网络环境中畅通无阻地到达融合通信运营商的核心网。在开放的 互联网环境下使用融合通信业务, 存在因防火墙的端口限制、 网络地址转换 ( Network Address Translation, NAT )应用层网关 ( Application Layer Gateway, ALG )处理或代理服务器限制等造成某些业务流量无法到达融合通信运营商的核 心网的问题,且还可能因为互联网和移动互联网接入的动态性和复杂性导致业务 数据被非法窃听或篡改。 基于上述问题, 如何实现业务流量的安全穿越, 并通过 安全穿越方案保障融合通信业务的安全性和可用性,是提供高融合通信业务质量 的必备要素。
现有技术中提供了一种基于安全穿越网关的网络穿越方案, 通过在运营商 网絡中部署安全穿越网关 (Secure Traversing Gateway, STG ), 提供超文本传 输协议( Hyper Text Transfer Protocol, HTTP )、 安全套接字层( Secure Socket Layer, SSL)、 互联网安全协议( Internet Protocol Security, IPSec )、 基 于数据 协议的传输层安全(Datagram Transport Layer Security, DTLS )协 议或用户数据报协议 (User Datagram Protocol, UDP ) 安全隧道的接入能力, 用户业务终端实现 HTTP、 SSL、 IPSec、 DTLS和 UDP安全隧道客户端功能, 客户端 与融合通信服务器之间的各种报文通过协商的 HTTP、 SSL、 IPSec、 DTLS或 UDP安 全隧道进行传输,从而能够实现防火墙、 NAT.代理、 Web安全网关等网元的穿越, 既保障了业务数据的安全性和穿越能力, 又保障了服务质量。
但是,现有技术中,由于安全穿越网关集中部署于融合通信运营商核心网, 需要融合通信运营商自行釆购和维护安全穿越网关设备,运营成本较高, 并且可 扩展性较差。 发明内容
本发明实施例中提供的一种网络穿越服务的提供方法、装置及系统, 具有较 强的网络扩展性。
第一方面, 本发明实施例提供一种网络穿越服务的提供方法, 包括: 接收运营商管理服务器发送的网絡穿越隧道资源租用请求,所述租用请求中 携带有待租用的虚拟接入点的数量以及每个虚拟接入点承栽的用户数量; 根据所述租用请求向安全穿越服务器发送网络穿越隧道资源创建指令,所述 网络穿越隧道资源创建指令中包含有所述虚拟接入点的数量以及所述每个虛拟 接入点承载的用户数量;
接收所述安全穿越服务器根据所述虚拟接入点的数量以及所述每个虛拟接 入点承载的用户数量创建的网络穿越隧道资源的信息,其中所述网络穿越隧道资 源的信息包括虛拟接入点信息和业务通道信息;
向所述运营商管理服务器发送所述网络穿越隧道资源的信息,使所述运营商 管理服务器能够根据所述虚拟接入点信息和所述业务通道信息向终端提供网络 穿越服务。
在第一方面的第一种可能的实现方式中,所述根据所述租用请求向安全穿越 服务器发送网络穿越隧道资源创建指令包括:
根据所述租用请求向部署于运营商网络中的空闲资源最多的安全穿越服务 器发送所述网络穿越隧道资源创建指令。
结合第一方面或第一方面的第一种可能的实现方式,在第一方面的第二种可 能的实现方式中, 所述虚拟接入点为虚拟化的安全穿越网关, 能够为终端提供虚 拟专用网 VPN隧道的接入能力。 结合第一方面、 第一方面的第一种可能的实现方 式或第一方面的第二种可能的实现方式,在第一方面的第三种可能的实现方式中, 本发明提供的网络穿越服务的提供方法还包括:
向部署于运营商网络中的安全穿越服务器广播所述运营商租用的网络穿越 隧道资源的信息,以使所述安全穿越服务器能够根据所述运营商租用的网络穿越 隧道资源为终端提供网络穿越服务。
第二方面, 本发明实施例提供一种网络穿越服务的提供方法, 包括: 接收资源管理中心发送的网络穿越隧道资源创建指令,所述网络穿越隧道资 源创建指令中携带有运营商租用需求的虛拟接入点的数量以及每个虚拟接入点 能够承载的用户数量;
根据接收的所述虚拟接入点的数量和所述每个虚拟接入点能够承栽的用户 数量创建满足所述运营商租用需求的网络穿越隧道资源,其中所述网络穿越隧道 资源包括虚拟接入点以及与虚拟接入点对接的业务通道;
向所述资源管理中心返回创建的所述网络穿越隧道资源的信息。
在第二方面的第一种可能的实现方式中,本发明提供的网络穿越服务的提供 方法还包括:
接收来自终端的接入点查询请求, 所述查询请求中携带有所述终端所属的 运营商的标识;
根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中选择虛拟 接入点;
向所述终端返回查询响应消息, 所述查询响应消息中包含有选择的虚拟接 入点的信息;
接收来自终端的网络穿越隧道注册请求, 所述网络穿越隧道注册奇求中包 含有所述选择的虚拟接入点信息和所述运营商的核心网地址;
向所述终端返回网络穿越隧道注册成功消息,使所述终端才艮据所述运营商的 核心网地址以及与所述虛拟接入点建立的网络穿越隧道访问所述运营商的核心 网。
结合第二方面或第二方面的第一种可能的实现方式,在第二方面的第二种可 能的实现方式中, 本发明提供的网络穿越服务的提供方法还包括: 接收来自终端的网络穿越隧道注册请求,所述网络穿越隧道注册请求中携带 有终端要访问的第一虛拟接入点信息、所述终端所属运营商的标识以及所述运营 商的核心网地址;
判断所述第一虚拟接入点是否为安全穿越服务器为所述终端选择的虚拟接 入点;
如果所述第一虚拟接入点不是所述安全穿越服务器为所述终端选择的虛拟 接入点,则根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中为所 述终端选择第二虚拟接入点;
向所述终端返回网络穿越隧道注册成功消息,所述网络穿越隧道注册成功消 息中包含有所述第二虚拟接入点的信息,使所述终端根据与所述第二虚拟接入点 建立的网络穿越隧道以及所述运营商的核心网地址访问所述运营商的核心网。
结合第二方面的第二种可能的实现方式,在第二方面的第三种可能的实现方 式中,所述根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中为所 述终端选择第二虚拟接入点包括:
根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中选择用户 负栽量最小或接入位置最近或探测响应最快的虚拟接入点。
结合第二方面的第二种可能的实现方式或第二方面的第三种可能的实现方 式,在第二方面的第四种可能的实现方式中, 本发明提供的网络穿越服务的提供 方法还包括:
如果所述第一虚拟接入点是所述安全穿越服务器为所述终端选择的虚拟接 入点, 则向所述终端返回隧道注册成功消息,使所述终端才艮据与所述第一虚拟接 入点建立的网络穿越隧道以及所述运营商的核心网地址访问所述运营商的核心 网。
第三方面, 本发明提供一种资源管理中心, 包括:
接收模块, 用于接收运营商管理服务器发送的网络穿越隧道资源租用请求, 所述租用请求中携带有待租用的虚拟接入点的数量以及每个虚拟接入点承栽的 用户数量;
发送模块,用于根据所述接收模块接收的所述租用请求向安全穿越服务器发 送网络穿越隧道资源创建指令,所述网络穿越隧道资源创建指令中包含有所述虚 拟接入点的数量以及所述每个虚拟接入点承载的用户数量;
所述接收模块,还用于接收所述安全穿越服务器根据所述网络穿越隧道资源 创建指令中的所述虚拟接入点的数量以及所述用户数量创建的网络穿越隧道资 源的信息,其中所述网络穿越隧道资源的信息包括虚拟接入点信息和业务通道信 息;
所述发送模块,还用于向所述运营商管理服务器发送所述网络穿越隧道资源 的信息,使所述运营商管理服务器能够根据所述虚拟接入点信息和业务通道信息 向终端提供网络穿越服务。
在第三方面的第一种可能的实现方式中,所述虚拟接入点为虚拟化的安全穿 越网关, 为终端提供虚拟专用网 VPN隧道的接入能力。
结合第三方面或第三方面的第一种可能的实现方式,在第三方面的第二种可 能的实现方式中,所述发送模块具体用于根据所述租用请求向部署于运营商网络 中的空闲资源最多的安全穿越服务器发送所述网络穿越隧道资源创建指令。
结合第三方面、第三方面的第一种可能的实现方式或第三方面的第二种可能 的实现方式,在第三方面的第三种可能的实现方式中,本发明提供的资源管理中 心还包括:
资源管理模块, 用于对所述网络穿越隧道资源进行管理和维护; 广播模块,用于向部署于运营商网络中的安全穿越服务器广播所述运营商租 用的网絡穿越隧道资源的信息,以使所述安全穿越服务器能够根据所述运营商租 用的网络穿越隧道资源为终端提供网络穿越服务。
第四方面, 本发明提供一种安全穿越服务器, 包括:
接收模块, 用于接收资源管理中心发送的网络穿越隧道资源创建指令, 所述 网络穿越隧道资源创建指令中携带有运营商租用需求的虚拟接入点的数量以及 所述每个虚拟接入点能够承载的用户数量;
隧道资源创建模块,用于根据接收模块接收的网络穿越隧道资源创建指令中 的所述虛拟接入点的数量和所述每个虚拟接入点能够承载的用户数量创建满足 所述运营商租用需求的网络穿越隧道资源,其中所述网络穿越隧道资源包括虛拟 接入点以及与虚拟接入点对接的业务通道;
隧道资源发送模块,用于向所述资源管理中心返回隧道资源创建模块创建的 所述网络穿越隧道资源的信息。
在第四方面的第一种实现方式中, 所述接收模块,还用于接收来自终端的网 络穿越隧道注册奇求,所述网络穿越隧道注册请求中携带有终端要访问的第一虚 拟接入点信息、 所述终端所属运营商的标识以及所述运营商的核心网地址; 所述安全穿越服务器还包括:
判断模块,用于判断所述第一虚拟接入点是否为所述安全穿越服务器为所述 终端选择的虚拟接入点;
第一选择模块,用于如果所述第一虚拟接入点不是所述安全穿越服务器为所 述终端选择的虚拟接入点,则根据所述运营商的标识在所述运营商租用的网络穿 越隧道资源中为所述终端选择第二虚拟接入点;
第一响应模块, 用于向所述终端返回网络穿越隧道注册成功消息, 所述网络 穿越隧道注册成功消息中包含有所述第一选择模块选择的所述第二虚拟接入点 的信息,使所述终端根据与所述第二虚拟接入点建立的网络穿越隧道以及所述运 营商的核心网地址访问所述运营商的核心网。
结合第四方面或第四方面的第一种可能的实现方式,在第四方面的第二种可 能的实现方式中, 所述接收模块,还用于接收来自终端的接入点查询请求, 所述 查询请求中携带有所述终端所属的运营商的标识;
所述安全穿越服务器还包括:
第二选择模块,用于根据所述接收模块接收的所述查询请求中的所述运营商 的标识在所述运营商租用的网络穿越隧道资源中选择虚拟接入点;
第二响应模块, 用于向所述终端返回查询响应消息, 所述查询响应消息中包 含有选择的虚拟接入点的信息;
所述接收模块,还用于接收来自终端的隧道注册请求, 所述隧道注册请求中 包含有所述第二选择模块选择的虚拟接入点信息和所述运营商的核心网地址; 所述第二响应模块,还用于向所述终端返回网络穿越隧道注册成功消息,使 所述终端根据所述运营商的核心网地址以及与所述虚拟接入点建立的网络穿越 隧道访问所述运营商的核心网。
结合第四方面、第四方面的第一种可能的实现方式或第四方面的第二种可能 的实现方式,在第四方面的第三种可能的实现方式中, 所述虛拟接入点为虚拟化 的安全穿越网关, 能够为终端提供虚拟专用网 VPN隧道的接入能力。
结合第四方面的第一种可能的实现方式,在第四方面的第四种可能的实现方 式中,所述第一选择模块具体用于根据所述运营商的标识在所述运营商租用的网 络穿越隧道资源的信息中选择用户负载量最小或接入位置最近或探测响应最快 的虛拟接入点。
结合第四方面的第一种可能的实现方式,在第四方面的第五种可能的实现方 式中,当所述判断模块判断所述第一虚拟接入点是为所述安全穿越服务器为所述 终端选择的虚拟接入点时,所述第一响应模块,还用于向所述终端返回隧道注册 成功消息,使所述终端根据与所述第一虛拟接入点建立的网络穿越隧道以及所述 运营商的核心网地址访问所述运营商的核心网。
第五方面, 本发明提供一种安全穿越服务提供系统, 包括虚拟接入点、 上述 的资源管理中心的任意一种实现方式以及上述的安全穿越服务器的任意一种实 现方式, 其中:
所述虚拟接入点, 用于通过与终端之间建立的网络穿越隧道接收所述终端 发送的报文, 并将所述报文解封装后发送给运营商核心网; 接收所述运营商核心 网返回的响应报文,将所述响应报文封装后通过所述网络穿越隧道发送给所述终 端。 本发明实施例中提供了一种实现网絡穿越服务提供方法、 装置及系统, 通过 接收运营商管理服务器发送的网络穿越隧道资源租用请求,根据所述租用请求中 携带的待租用的虚拟接入点的数量以及每个虚拟接入点承栽的用户数量向安全 穿越服务器发送网络穿越隧道资源创建指令,接收所述安全穿越服务器根据所述 虚拟接入点的数量以及所述每个虚拟接入点承载的用户数量创建的网络穿越隧 道资源的信息,并将所述网络穿越隧道资源的信息发送给所述运营商管理服务器, 使所述运营商管理服务器能够根据所述虚拟接入点信息和所述业务通道信息向 终端提供网络穿越服务。从而解决了由于安全穿越网关集中部署于运营商核心网 所带来的网络扩展性差的技术问题, 并且, 由于将安全穿越即服务作为一种运营 模式来提供, 可以由安全穿越即服务( Secure Traverse As A Serv ice , STaaS ) 提供商统一承担网络穿越服务资源的管理运营, 融合通信运营商可以通过租用 STaaS提供商提供的网络穿越服务资源来向终端用户提供网络穿越服务, 从而能 够降低融合通信运营商的运营成本, 提升了运营商网络的可扩展性。 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施 例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中 的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创 造性劳动性的前提下 , 还可以根据这些附图获得其他的附图。
图 1是本发明实施例中提供的一种网络穿越服务提供方法的应用场景图; 图 2为本发明实施例提供的一种网络穿越服务提供方法的流程图; 图 3为本发明实施例提供的又一种网络穿越服务提供方法的信令图; 图 4为本发明实施例提供的又一种网络穿越服务提供方法的流程图; 图 5为本发明实施例提供的又一种网络穿越服务提供方法的流程图; 图 6为本发明实施例提供的又一种网络穿越服务提供方法流程图; 图 7为本发明实施例提供的一种资源管理中心的物理结构示意图; 图 8为本发明实施例提供的又一种资源管理中心的结构示意图; 图 9为本发明实施例提供的一种安全穿越服务器的结构示意图; 图 10为本发明实施例提供的又一种安全穿越服务器的结构示意图; 图 11为本发明实施例提供的又一种安全穿越服务器的结构示意图; 图 12为本发明实施了提供的又一种安全穿越服务器的结构示意图; 图 13为本发明实施例提供的一种安全穿越即服务的网絡系统图。 具体实施方式
为了使本技术领域的人员更好地理解本发明方案, 下面将结合本发明实施 例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描 述的实施例仅仅是本发明一部分的实施例, 而不是全部的实施例。基于本发明中 的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他 实施例, 都应当属于本发明保护的范围。
如图 1所示, 图 1为本发明实施例的一种应用场景, 为了描述方便, 本发明 实施例将融合通信运营商简称为运营商,没有特殊说明的情况下, 本发明实施例 所述的运营商均为能够提供融合通信业务的融合通信运营商。 在图 1所述的一种 应用场景中, 第一网络可以为运营商 A的接入网, 第二网络可以为运营商 B的接入 网, 第三网络可以为运营商 A的核心网, 第四网络可以为运营商 B的核心网, 终端 110和终端 111可以通过虎拟接入点 120穿越到第三网络或第四网络,终端 112和终 端 113可以通过虚拟接入点 122穿越到第三网络或第四网络。网络穿越隧道资源管 理中心 121负责网络穿越隧道资源的统计、 管理和分配, 其中, 网络穿越隧道资 源包含有虚拟接入点和与虚拟接入点对接的业务通道, 其中,虚拟接入点是虛拟 化的安全穿越网关,能够提供超文本传榆协议(Hyper Tex t Transfer Protoco L , HTTP )、安全套接字层(Secure Socke t Layer , SSL ), 互联网安全协议( Internet Pro t oco l Secur i ty , IPSec )、 基于数据报协议的传输层安全协议 ( Datagram Transpor t Layer Secur i ty , DTLS )或用户数据报协议( Us er Datagram Protocol , UDP )安全隧道的接入能力。 例如, 终端 110发出的数据包从虚拟接入点 120接入 第一网络(融合通信运营商 A的接入网), 并通过与虚拟接入点 120对接的业务通 道到达第三网络(融合通信运营商 A的核心网), 达到终端 110访问融合通信运营 商 A的核心网的目的。
安全穿越服务器为多个虚拟接入点的集合,可以部署于运营商的互联网数据 中心 (Internet Data Cent er , IDC ), 向终端提供网络穿越服务, 使终端能够 通过安全穿越服务器选择的虚拟接入点达到访问运营商核心网的目的。安全穿越 服务器 123和安全穿越服务器 124负责管理、建立和选择虛拟接入点, 安全穿越 服务器 123可以根据运营商的租用请求创建多个虚拟接入点(即虚拟化的安全穿 越网关),例如,安全穿越服务器 123可以创建虚拟接入点 120和虚拟接入点 125 , 安全穿越服务器 124可以创建虚拟接入点 122和虚拟接入点 126。 虚拟接入点由 安全穿越服务器虚拟化生成, 物理位置可以处于安全穿越服务器上, 图 1中为了 表述清楚, 将虚拟接入点和安全穿越服务器分开进行图示和描迷。 多个安全穿越 服务器及虚拟接入点构成了网络穿越服务云, 为多个运营商提供网络穿越服务。
图 2为本发明实施例提供的一种网络穿越服务提供方法的流程图,该方法可 以由如图 1所示的网络系统中的资源管理中心 121来执行,如图 2所示,该方法 包括:
步驟 200, 接收运营商管理服务器发送的网络穿越隧道资源租用请求, 所述 租用请求中携带有待租用的虚拟接入点的数量以及每个虚拟接入点承载的用户 数量, 进入步骤 205 ;
在本发明实施例中,为了减少运营商自行维护安全穿越网关所带来的运营成 本高、 网络扩展能力差等问题,将网络穿越隧道资源以一种服务的方式租用给运 营商, 由专业的服务提供商承担网络穿越服务资源的管理运营, 并通过资源管理 中心向运营商提供网络穿越服务资源的出租式服务,使运营商可以根据自己的实 际需求,通过互联网向服务提供商租用所需的网络穿越隧道资源, 并按租用的服 务的数量及使用时间向服务提供商支付费用,同时运营商也可以通过互联网获得 服务提供商对其所提供的网络穿越隧道资源的维护等服务,以使终端能够通过运 营商租用的网络穿越隧道资源实现访问运营商核心网的网络穿越目的。我们可以 将这种运营模式称为安全穿越即服务 ( Secure Traverse As A Serv ice , STaaS ) 的运营模式, 将这种服务提供商称为 STaaS )提供商。
具体的, 在本步骤中, 当运营商需要租用网络穿越隧道资源时, 由运营商管 理服务器将向资源管理中心发送网络穿越隧道资源租用请求, 其中,运营商管理 服务器是运营商设置的用于管理其网络中的网络穿越隧道资源的服务器。网络穿 越隧道资源包括虚拟接入点以及与虚拟接入点对接的业务通道,虚拟接入点供终 端接入使用, 业务通道供融合通信业务运营商的核心网使用,使终端能够通过接 入点接入运营商的网络, 并通过业务通道访问运营商的核心网。 为了满足业务流 量的需求,运营商可以根据本网络的用户数量及接入需求确定需要租用的网络穿 越隧道资源, 因此,在所述网络穿越隧道资源租用请求中需要包含有要租用的虚 拟接入点数量以及每个虚拟接入点承载的用户数量, 例如, 运营商 A要租用 10 个虚拟接入点,且每个虚拟接入点能够同时承载 1000个用户的接入需求。当然, 可以理解的是,在所述租用请求中还可以携带所述运营商的标识, 以使资源管理 中心能够识别是哪一个运营商需要租用网络穿越隧道资源。
可以理解的是,在另一种情况下, 网络穿越隧道资源租用请求中可以携带有 待承载的总用户数量,由资源管理中心根据所述总用户数量为所述运营商确定所 需租用的虚拟接入点数量以及每个虚拟接入点所承载的用户数量。
步骤 205, 根据所述租用请求向安全穿越服务器发送网络穿越隧道资源创建 指令, 进入步驟 210;
具体的,当资源管理中心接收运营商管理服务器发送的网络穿越隧道资源租 用请求后 ,资源管理中心可以根据所述租用请求向管理的安全穿越服务器发送网 络穿越隧道资源创建指令,指示安全穿越服务器根据所述租用请求中的虚拟接入 点的数量以及每个虛拟接入点承载的用户数量创建网络穿越隧道资源, 其中, 网 络穿越隧道资源包括与终端对接的虚拟接入点以及与运营商核心网对接的业务 通道。
当网络中具有多个安全穿越服务器时,资源管理中心可以根据所述租用请求 中的虚拟接入点数量以及需承载的总用户数量检查其所管理的安全穿越服务器 中的空闲资源,并可以根据安全穿越服务器提供服务的区域以及负载均衡的原理 向部署于运营商网络中的且空闲资源最多的安全穿越服务器发送网络穿越隧道 资源创建指令, 指示该安全穿越服务器进行网络穿越隧道资源的创建。
步骤 210 , 接收所述安全穿越服务器根据所述虚拟接入点的数量以及所述用 户数量创建的网络穿越隧道资源的信息,其中所述网络穿越隧道资源的信息包括 虛拟接入点信息和业务通道信息, 进入步骤 215;
具体的, 当安全穿越服务器完成接入点及业务通道的虛拟化创建后,安全穿 越服务器可以根据运营商关联虚拟接入点和业务通道,并返回创建的网络穿越隧 道资源的信息给资源管理中心, 其中, 所述网絡穿越隧道资源的信息包括虚拟接 入点信息和业务通道信息, 具体的, 虛拟接入点的信息可以包括: 虚拟接入点的 地址、 虚拟接入点的租户信息、 协议类型、 隧道编号信息等, 所述业务通道信息 包括: 业务通道地址以及核心网中提供业务的网段等信息, 其中, 所述虚拟接入 点的租户信息,可以包括所述虚拟接入点所属的运营商、 以及该租户的编号等信 息。。 可以理解的是, 安全穿越服务器可以将所述网络穿越隧道资源的信息以信 息列表的方式返回给资源管理中心。
步驟 215, 向所述运营商管理服务器发送所述网络穿越隧道资源的信息, 使 所述运营商管理服务器能够根据所述虚拟接入点信息和业务通道信息向终端提 供网络穿越服务。
可以理解的是,资源管理中心可以将所述网络穿越隧道资源的信息以信息列 表的方式发送给运营商管理服务器,使运营商管理服务器能够根据所述虚拟接入 点信息和业务通道信息向终端提供网络穿越服务。
本发明实施例提供的一种实现网络穿越服务提供方法,根据接收的网络穿越 隧道资源租用请求指示安全穿越服务器创建运营商所需的虚拟接入点和业务通 道,并将创建的网络穿越隧道资源信息返回给运营商管理服务器,使运营商管理 服务器能够根据所述虛拟接入点信息和业务通道信息向终端提供网络穿越服务。 从而提供了一种安全穿越即服务 ( Secur i ty Traver s e a s a Serv ice , STaaS ) 的运营模式,使得网络穿越隧道资源能够得到统一的管理和维护, 解决了由于安 全穿越网关集中部署于运营商核心网所带来的网络扩展性差的技术问题,提升了 运营商网络的可扩展性, 且降低了运营商的运营成本。 而且进一步地, 还可以提 高网络穿越的可靠性
图 3为本发明实施例提供的叉一种网络穿越服务提供方法的信令图。 如图 3 所示, 该方法包括:
步骤 300 , 运营商管理服务器向资源管理中心发送网络穿越隧道资源租用请 求, 其中, 所述租用请求中携带有所述运营商的标识、待租用的虚拟接入点的数 量以及每个虛拟接入点承载的用户数量, 进入步骤 305 ;
其中, 运营商标识是用于使资源管理中心识别运营商的租用请求, 例如, 是 移动的管理服务器还是联通的管理服务器发出的租用请求。为了满足业务流量的 需求,运营商可以根据本网絡的用户数量及接入需求等业务需求确定需要租用的 网络穿越隧道资源,其中,网絡穿越隧道资源包括虚拟接入点和业务通道。因此, 在所述网络穿越隧道资源租用请求中需要包含有要租用的虚拟接入点数量以及 每个虚拟接入点承栽的用户数量, 例如, 运营商 A要租用 10个虚拟接入点, 且 每个虚拟接入点能够同时承载 1000个用户的接入需求。 可以理解的是, 由于业 务通道是与虚拟接入点对接的, 因此, 业务通道的数量可以等于虚拟接入点的数 量。 当然, 可以理解的是, 所述租用请求中还可以包括所述运营商的认证证书等 其他信息, 在此不做限定。
步骤 305 , 资源管理中心根据所述租用请求向安全穿越服务器发送网络穿越 隧道资源创建指令,所述创建指令中携带有所述虚拟接入点数量以及所述用户数 量;
具体的,当资源管理中心接收运营商管理服务器发送的网络穿越隧道资源租 用请求后,资源管理中心可以根据所述租用请求向管理的安全穿越服务器发送网 络穿越隧道资源创建指令,指示安全穿越服务器根据所述租用请求中的虛拟接入 点的数量以及每个虛拟接入点承载的用户数量创建网络穿越隧道资源,可以理解 的是, 所述资源创建指令中也携带有所述运营商的标识、所述虚拟接入点的数量 以及所述用户数量。 其中, 网络穿越隧道资源包括与终端对接的虚拟接入点以及 与运营商核心网对接的业务通道。
在一种情形下, 当网络中具有多个安全穿越服务器时, 资源管理中心可以根 据所述租用请求中的虛拟接入点数量以及需承载的总用户数量检查其所管理的 安全穿越服务器中的空闲资源,并可以根据安全穿越服务器提供服务的区域以及 负载均衡的原理选择部署于运营商网络中的空闲资源最多的安全穿越服务器进 行网络穿越隧道资源的创建。
步驟 310, 安全穿越服务器根据所述网络穿越隧道资源创建指令创建网络穿 越隧道资源;
具体的,安全穿越服务器根据所述网络穿越隧道资源创建指令釆用虚拟化技 术创建满足租用需求的虚拟接入点和与虛拟接入点对接的业务通道,例如可以通 过虛拟化进行虚拟接入点资源的分配、 IP地址或域名的配置及其他参数的配置, 使创建的每个虚拟接入点具有安全穿越网关的功能,能够与终端之间建立虚拟专 用网(Virtual Private Network, VPN)隧道,为终端提供超文本传输协议( Hyper Text Transfer Protocol, HTTP )、 安全套接字层( Secure Socket Layer, SSL), 互联网安全协议( Internet Protocol Security, IPSec ), 基于数据报协议的传 输层安全协议 (Datagram Transport Layer Security, DTLS )或用户数据报协 iSL (User Datagram Protocol , UDP ) 等 VPN安全隧道的接入能力。 具体的, 虚 拟接入点可以通过与终端之间建立的 HTTP隧道、 SSL隧道、 IPSec隧道、 DTLS 隧道或 UDP隧道等 VPN隧道接收终端发送的隧道报文,并将接收的隧道报文解密、 解封装后发送给运营商核心网的服务器,并将运营商核心网的服务器返回的响应 报文封装后通过 VPN隧道发送给终端。具体的,虚拟接入点与运营商核心网的服 务器之间可以通过与虚拟接入点对接的业务通道传输报文,即虚拟接入点可以根 据与其对接的业务通道的地址与运营商核心网进行通信, 需要说明的是, 业务通 道的地址就是所述运营商核心网的入口地址。
需要说明的是, 当安全穿越服务器采用虚拟化技术创建虚拟接入点后,虛拟 接入点与安全穿越服务器硬件设备的关系可以是一对一、一对多、 多对一以及多 对多的对应关系。 其中, 一对一的对应关系属于基本的网络穿越服务部署场景。 一对多的对应关系则是通过一台硬件设备做分流,代理同一个接入点的其他安全 穿越服务器, 使在逻辑上保证多台安全穿越服务器对外提供同一个接入点服务。 多对一是指在一台安全穿越服务器上启动多个虚拟接入点服务,同时不同的虚拟 接入点具备租户属性、各自独立的认证授权系统、核心网资源以及各自独立的可 重叠的网络、 路由表和虚拟防火墙。
步骤 315 , 安全穿越服务器向资源管理中心返回所述创建的网络穿越隧道资 源的信息;
具体的,当接收到网络穿越隧道资源创建指令的安全穿越服务器根据所述虚 拟接入点的数量以及所述用户数量为所述运营商创建了网络穿越隧道资源后,该 安全穿越服务器可以根据所述网络穿越隧道资源创建指令中的运营商标识关联 虛拟接入点和业务通道,并向资源管理中心返回创建的网络穿越隧道资源的信息 , 其中, 所述网络穿越隧道资源的信息包括虛拟接入点信息和业务通道信息。具体 的, 网络穿越隧道资源的信息包括但不限于运营商标识、 虛拟接入点的地址、 业 务通道的地址、核心网中提供业务的网段和隧道编号, 其中, 虚拟接入点的地址 可以是 IP地址也可以是域名 , 例如: 10. 10. 10. 10或 c l oud, com, 与虚拟接入点 对接的业务通道的地址也就是所述运营商核心网地址,从而终端通过虚拟接入点 接入运营商网络后可以通过所述业务通道的地址访问核心网, 可以理解的是, 业 务通道的地址也可以用 IP地址或用域名来表示,例如: 200. 1. 1. 1或 cmcc. com。 此外, 网络穿越隧道资源的信息还可以包括: 协议类型、 租户编号等信息。 可以 理解的是,安全穿越服务器可以将所述网络穿越隧道资源的信息以信息列表的方 式返回给资源管理中心, 例如如下表一所示:
运 营 商 租户 虚拟接入点地 业务通道地 协 议 隧道 网段
标识 编号 址 址 类型 编号
移动 01 10. 10. 10. 10 100. 1. 1. 10 HTTP M01
移动 01 10. 10. 10. 11 100. 1. 1. 10 DTLS M02 200. 1. 1. 30 移动 01 10. 10. 10. 12 100. 1. 1. 10 UDP M03 200. 1. 1. 40 联通 02 10. 10. 10. 15 200. 1. 1. 10 SSL M05 192. 168. 1. 1 0
联通 02 c l oud, com IPSec M06
Figure imgf000017_0001
步骤 320 , 资源管理中心将所述网络穿越隧道资源的信息发送给运营商管理 服务器。
具体的,当资源管理中心获得为所述运营商创建的网络穿越隧道资源的信息 后,资源管理中心会向所述运营商管理服务器发送为其创建的所述网络穿越隧道 资源的信息,其中所述网络穿越隧道资源的信息包括虛拟接入点信息和业务通道 信息, 还可以包括: 协议类型、 租户编号、 隧道编号以及核心网中提供业务的网 段等信息。 当然可以理解的是, 资源管理中心可以将所述网络穿越隧道资源的信 息以表一所示信息列表的方式返回给所述运营商管理服务器, 在此不再赘述。
步骤 325 , 资源管理中心向部署于所述运营商网络中的安全穿越服务器广播 所述运营商租用的网络穿越隧道资源的信息。
具体的, 当网络中部署有多个安全穿越服务器时, 当在步驟 315中, 接收到 网络穿越隧道资源创建指令的安全穿越服务器向所述资源管理中心返回创建的 网络穿越隧道资源后,在本步驟中, 资源管理中心可以对所述运营商租用的网络 穿越隧道资源进行管理,并通过广播等方法将所述运营商租用的网络穿越隧道资 源的信息发送给部署于所述运营商网络中的安全穿越服务器,以使所有部署于运 营商网絡中的安全穿越服务器都能够为终端提供网络穿越服务。其中可以理解的 是, 步骤 320和步骤 325没有执行顺序的先后之分。
本发明实施例提供的一种实现网络穿越服务提供方法,通过资源管理中心接 收运营商管理服务器发送的网络穿越隧道资源租用请求, 通过部署于运营商 IDC 中心的空闲资源最多的安全穿越服务器创建相应的虚拟接入点和业务通道,并向 所有部署于所述运营商网络中的安全穿越服务器发送所述网络穿越隧道资源的 信息,从而可以通过部署于运营商网络中的多个安全穿越服务器向终端提供多方 位的接入服务, 并且网络穿越隧道资源能够得到统一的管理和维护,提升了运营 商网络的可扩展性以及网络穿越的可靠性, 且降低了运营商的运营成本。
在一种情形下, 上述实施例中, 所述资源管理中心还可以接收安全穿越服务 器发送的所述虚拟接入点的资源使用情况信息,并根据安全穿越服务器的负栽情 况进行负载均衡。 图 4为本发明实施例提供的叉一种网络穿越服务提供方法的流程图 ,本实施 例所述方法可以由图 1中的安全穿越服务器来执行, 本实施例从安全穿越服务器 的角度描述如何根据资源管理中心的网络资源创建指令为运营商创建网络穿越 隧道资源, 为终端提供网络穿越服务, 具体的, 如图 4所示, 该方法可以包括: 步驟 400, 接收资源管理中心发送的网络穿越隧道资源创建指令, 所述资源 创建指令中携带有运营商租用需求的虚拟接入点的数量以及所述每个虚拟接入 点能够承栽的用户数量, 进入步驟 405 ;
可选地, 还可以携有运营商标识, 其中, 所述运营商标识用于识別运营商。 当安全穿越服务器接收到所述网络穿越隧道资源创建指令后,可以根据所述要创 建的虚拟接入点的数量以及所述每个虚拟接入点能够承载的用户数量为所述运 营商创建网络穿越隧道资源, 其中, 网络穿越隧道资源包括与终端对接的虚拟接 入点以及与运营商核心网对接的业务通道。
步骤 405 , 根据接收的网络穿越隧道资源创建指令中的所述虚拟接入点的数 量和所述每个虚拟接入点能够承栽的用户数量创建满足所述运营商租用需求的 网络穿越隧道资源,其中所述网络穿越隧道资源包括虚拟接入点以及与虚拟接入 点对接的业务通道, 进入步驟 410;
具体的,安全穿越服务器根据所述网络穿越隧道资源创建指令采用虚拟化技 术创建满足租用需求的虚拟接入点和与虛拟接入点对接的业务通道,例如可以通 过虚拟化进行虚拟接入点资源的分配、 I P地址或域名的配置及其他参数的配置, 使创建的每个虚拟接入点具有安全穿越网关的功能, 能够与终端之间建立 VPN隧 道, 为终端提供 HTTP、 SSL, IPSec、 DTLS或 UDP等 VPN安全隧道的接入能力。 具体 的,虛拟接入点可以通过与终端之间建立的 HTTP隧道、 SSL隧道、 I PSec隧道、 DTLS 隧道或 UDP隧道等 VPN隧道接收终端发送的隧道报文, 并将接收的隧道报文解密、 解封装后发送给运营商核心网的服务器,并将运营商核心网的服务器返回的响应 报文封装后通过 YPN隧道发送给终端。 具体的, 虚拟接入点与运营商核心网的服 务器之间可以通过与虛拟接入点对接的业务通道传输报文,即虚拟接入点可以根 据与其对接的业务通道的地址与运营商核心网进行通信, 需要说明的是, 业务通 道的地址就是所述运营商核心网的入口地址。
步骤 410 , 向所述资源管理中心返回创建的所述网络穿越隧道资源的信息。 具体的,安全穿越服务器可以根据所述网络穿越隧道资源创建指令中的运营 商标识关联虚拟接入点和业务通道,并向资源管理中心返回创建的网络穿越隧道 资源的信息, 其中, 所述网络穿越隧道资源的信息包括虚拟接入点信息和业务通 道信息。 具体的, 网络穿越隧道资源的信息包括但不限于运营商标识、 虚拟接入 点的地址、 核心网中提供业务的网段和隧道编号, 其中, 虛拟接入点的地址可以 是 IP地址也可以是域名, 例如: 10. 10. 10. 10或 c l oud, com, 与虚拟接入点对接 的业务通道的地址也就是所述运营商核心网地址,从而终端通过虚拟接入点接入 运营商网络后可以通过所述业务通道的地址访问核心网, 可以理解的是, 业务通 道的地址也可以用 IP地址或用域名来表示, 例如: 200. 1. 1. 1或 cmcc. com. 此 外, 网络穿越隧道资源的信息还可以包括: 协议类型、 租户编号等信息。 可以理 解的是,安全穿越服务器可以将所述网络穿越隧道资源的信息以信息列表的方式 返回给资源管理中心, 在此不做限定。
本发明实施例提供的创建网络穿越隧道资源的方法是从安全穿越服务器一 側的角度来描述,具体的实现细节可以参见从资源管理中心角度描述的图 2与图 3实施例中对应过程的描述, 此处不再赘述。
本发明实施例提供的创建网络穿越隧道资源的方法,可以根据资源管理中心 发送的网络穿越隧道资源创建指令为运营商创建满足运营商租用需求的网络穿 越隧道资源,以使运营商能够根据租用的网络穿越隧道资源向终端提供网络穿越 服务,提升了运营商网络的可扩展性以及网络穿越的可靠性,且降低了运营商的 运营成本。 图 5为本发明实施例提供的又一种网络穿越服务提供方法的流程图,本实施 例所述方法也可以由图 1中的安全穿越服务器来执行,本实施例从安全穿越服务 器的角度描述如何通过租用的网络穿越隧道资源为终端提供网络穿越服务,如图 5所示, 该方法包括:
步驟 500 , 接收来自终端的网络穿越隧道注册请求, 所述网络穿越隧道注册 请求中携带有终端要访问的第一虚拟接入点信息、所述终端所属运营商的标识以 及所述运营商的核心网地址, 进入步骤 505 ;
本步骤中, 仍以终端 110为例, 终端 110为了穿越 In t erne t访问运营商的 核心网, 可以直接向网络穿越服务云发送网络穿越隧道注册请求, 具体为终端 110向安全穿越服务器 123发送网络穿越隧道注册请求, 该网络穿越隧道注册请 求中携带有终端要访问的第一虚拟接入点信息、所述终端所属运营商的标识以及 所述运营商的核心网地址,其中, 所述第一虚拟接入点是所述终端任意选择的一 个虚拟接入点, 例如虚拟接入点 120。
此外, 所述网络穿越隧道注册奇求中还可以包括租户信息、 用户名、 密码、 终端类型信息, 其中, 终端类型信息包括移动终端型号、 操作系统版本、 浏览器 版本等信息, 以便于安全穿越服务器对所述终端进行接入认证。
步骤 505 , 判断所述第一虚拟接入点是否为所述安全穿越服务器为所述终端 选择的虚拟接入点, 如果所述第一虚拟接入点不是选择的虛拟接入点, 则进入步 骤 510 , 否则, 进入步骤 520;
具体的,安全穿越服务器可以根据所述网络穿越隧道注册请求中的第一虛拟 接入点信息判断所述第一虚拟接入点是否是安全穿越服务器为所述终端选择的 较佳的虚拟接入点, 具体的,安全穿越服务器可以根据设置的记录表判断所述第 一虚拟接入点是否为安全穿越服务器为所述终端选择的虚拟接入点,所述记录表 中记录有虚拟接入点的使用情况。 如果不是, 则说明所述终端为第一次接入, 所 述第一虚拟接入点是所述终端任意选择的虚拟接入点,而可能并不是安全穿越服 务器为所述终端选择的最佳的虚拟接入点。此外,安全穿越服务器还可以根据所 述第一虚拟接入点的接入位置、负载量或探测响应情况判断所述第一虚拟接入点 是否为所述安全穿越服务器为所述终端选择的最佳的虚拟接入点。如果不是, 则 进入步骤 510, 否则进入步骤 520。
可以理解的是,在一种情形下,如果所述终端所属的运营商租用了多个虛拟 接入点,则需要判断所述网络穿越隧道注册请求中的第一虛拟接入点是否是安全 穿越服务器为所述终端选择的较佳的虛拟接入点,并在所述第一虚拟接入点不是 选择的虚拟接入点时,进入步骤 51 0为所述终端选择虚拟接入点。在另一种情形 下,如果所述终端处于漫游状态, 所述网络穿越隧道注册请求中的第一虚拟接入 点并不是所述终端所属的运营商租用的虚拟接入点,则需要进入步骤 510由安全 穿越服务器为所述终端重新选择虚拟接入点。在另一种情形下, 如果所述运营商 只租用了一个虚拟接入点且所述终端并未处于漫游状态,所述运营商的终端均只 能根据其租用的这一个虚拟接入点进行接入,则所述第一虛拟接入点就是选择的 接入点, 此时, 可以进入步骤 520
步驟 510 , 根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中 为所述终端选择第二虛拟接入点, 进入步驟 515 ;
本步骤中,安全穿越服务器可以根据所述租用请求中的运营商的标识查找所 述运营商租用的网络穿越隧道资源的信息,为所述终端选择虎拟接入点,具体的, 网络穿越隧道资源的信息包括: 虚拟接入点的租户信息、虚拟接入点的用户负载 量和虚拟接入点的接入区域。优选的,可以根据查询获得的网络穿越隧道资源的 信息选择最佳的虚拟接入点, 具体的,在选择最佳的虚拟接入点时可以根据网络 穿越隧道资源的信息来选择负载量最小或接入位置最近或探测响应最快的虚拟 接入点作为最佳的虛拟接入点。 当然, 当所述安全穿越服务器为所述终端选择了 虛拟接入点后, 会记录下相关的信息, 或打上相应的标识, 以便下一次接收到所 述终端的网络穿越隧道注册请求时可以快速判断出所述终端中的第一虚拟接入 点是否为选择的虚拟接入点。
步驟 515, 向所述终端返回网络穿越隧道注册成功消息, 所述网络穿越隧道 注册成功消息中包含有第二虚拟接入点信息,使所述终端根据与所述第二虚拟接 入点建立的网络穿越隧道以及所述运营商的核心网地址访问所述运营商的核心 网;
具体的, 在一种情况下, 当安全穿越服务器对所述终端认证通过后, 安全穿 越服务器可以直接向终端返回网络穿越隧道注册成功消息,所述网络穿越隧道注 册成功消息中包含有注册结果以及所述安全穿越服务器为所述终端选择的第二 虛拟接入点信息, 完成终端与第二虚拟接入点之间网络穿越隧道的协商,使所述 终端可以根据与所述第二虚拟接入点之间建立的网络穿越隧道以及所述运营商 的核心网地址访问所述运营商的核心网,具体的, 第二虚拟接入点可以通过与终 端之间建立的安全穿越网络穿越隧道接收所述终端发送的报文,并将所述报文解 封装后发送给运营商核心网;接收运营商核心网返回的响应报文, 将所述响应报 文封装后通过所述网络穿越隧道发送给终端。其中, 所述终端可以通过第二虛拟 接入点为其分配的虛拟 IP与所述运营商核心网通信, 具体的, 被封装的报文中 包含有所述第二虚拟接入点为所述终端分配的虚拟 IP地址以及所述运营商核心 网的地址, 封装的外层报文中包含有所述终端的 IP地址以及所述第二虚拟接入 点的 IP地址。 需要说明的是, 第二虚拟接入点与所述终端之间建立的网络穿越 隧道可以是 HTTP、 SSL、 IPSec、 DTLS或 UDP等类型的 VPN安全隧道, 在此不再 ——歹'】举„
在另一种情况下,安全穿越服务器可以向所述终端返回注册失败消息, 其中 注册失败消息中包含有为所述终端选择的第二虛拟接入点信息,使所述终端能够 根据所述第二虚拟接入点信息重新发起网络穿越隧道注册请求。
步驟 520 , 向所述终端返回网络穿越隧道注册成功消息, 使所述终端根据与 所述第一虚拟接入点建立的网络穿越隧道以及所述运营商的核心网地址访问所 述运营商的核心网。
在所述第一虚拟接入点为安全穿越服务器为所述终端选择的虚拟接入的情 形下, 当安全穿越服务器对所述终端认证通过,会向所述终端返回网络穿越隧道 注册成功消息,完成所述终端与所述第一虚拟接入点之间的网络穿越隧道的协商, 使所述终端能够通过与所述第一虚拟接入点建立的网络穿越隧道以及所述运营 商的核心网地址访问所述运营商的核心网。具体的,该网络穿越隧道注册成功消 息中包含有注册结果, 此外还可以包括虚拟互联网协议 IP地址及掩码、 保持连 接报文发送周期和访问策略等信息。其中,安全隧道类型可以包括: HTTP、 SSL、 DTLS . UDP, UDPS等类型的 VPN安全隧道, 在此不 列举。
本发明实施例提供的网络穿越服务提供方法,通过部署在运营商网络中的安 全穿越服务器根据所述运营商租用的网络穿越隧道资源信息为所述运营商的终 端选择虚拟接入点,并在向终端返回的网络穿越隧道注册成功消息中直接向终端 返回为所述终端选择的第二虚拟接入点信息,使得所述终端无需再根据选择的第 二虚拟接入点信息再次发起网络穿越隧道注册请求,提高了终端接入的效率。 并 且, 由于虚拟接入点是通过服务器选择之后的最佳虚拟接入点, 不同的终端可能 通过选择的不同的虛拟接入点实现网络穿越,减轻了穿越网关的负担,提升了网 络穿越的可靠性。 此外, 由于虚拟接入点是所述运营商租用的, 运营商可以根据 业务需求租用多个虛拟接入点, 降低了运营商的运营成本。 图 6为本发明实施例提供的又一种网络穿越服务提供方法流程图,本实施例 所述方法也可以由图 1中的安全穿越服务器来执行,本实施例从安全穿越服务器 的角度描述如何通过租用的网络穿越隧道资源为终端提供网络穿越服务, 如图 6 所示, 该方法包括:
步骤 600 , 接收来自终端的接入点查询请求, 所述查询请求中携带有所述终 端所属的运营商的标识;
本步驟中, 以图 1中的终端 110为例, 终端 110要穿越 Internet网络访问 第三网络或第四网络,其中,第三网络或第四网络为某个运营商的核心网,此时, 终端 110需要向网络穿越服务云发送接入点查询请求,用来查询接入运营商网络 的接入点, 具体的, 终端 110可以向部署于所述运营商网络中的安全穿越服务器 123发送接入点查询请求, 其中, 所述网络穿越隧道注册请求中指明了终端所属 的运营商的标识。
在一种情形下, 如果所述运营商只租用了一个虚拟接入点, 则所述运营商网 络中的终端可以直接与所述运营商租用的一个虚拟接入点建立隧道,并通过该隧 道接入所述运营商的核心网, 而无须进行查询虚拟接入点的步骤。 然而, 在实际 应用中, 一个虚拟接入点远远不能满足用户的接入需求, 因此, 运营商通常会根 据网络中的用户量向 STaaS服务提供商租用多个虚拟接入点。此时, 为了能够向 用户提供更好的服务,用户可以发起一个虚拟接入点的查询请求来查询较佳的虚 拟接入点。具体的, 所述查询请求中还可以包括所述用户的初始接入点以及要访 问的运营商的核心网的地址。
步驟 605,根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中 选择虚拟接入点;
本步驟中, 安全穿越服务器可以根据所述租用请求中的运营商的标识查找 所述运营商租用的网络穿越隧道资源的信息, 为所述终端选择虚拟接入点, 具体 的,可以根据网络穿越隧道资源的信息中的虚拟接入点的信息为所述终端选择虚 拟接入点, 其中, 虚拟接入点的信息具体可以包括: 虚拟接入点的租户信息、 虚 拟接入点的用户负载量和虚拟接入点的接入区域。优选的, 可以根据查询菽得的 网络穿越隧道资源的信息选择负载量最小或接入位置最近或探测响应最快的虚 拟接入点。 例如, 本实施例中, 以选择第一虚拟接入点 12 0为例进行说明。 可以 理解的是, 当所述安全穿越服务器为所述终端选择了虚拟接入点后,会记录下相 关的信息, 或打上相应的标识。
步驟 610 , 向所述终端返回查询响应消息, 所述查询响应消息中包含有选择 的虚拟接入点的信息;
具体的, 当安全穿越服务器根据所述运营商标识在所述运营商租用的网络 穿越隧道资源中为所述终端选择了虚拟接入点后,可以向所述终端返回查询响应 消息, 其中, 查询响应消息中包含有选择的虚拟接入点的信息。
步驟 615 , 接收来自终端的网络穿越隧道注册请求, 所述网络穿越隧道注册 请求中包含有所述选择的虛拟接入点信息和所述运营商的核心网地址;
当终端接收到安全穿越服务器返回的选择的虚拟接入点的信息后, 可以向 所述虚拟接入点发起网络穿越隧道注册请求,由于安全穿越服务器是虚拟接入点 的集合, 因此,安全穿越服务器会接收到所述终端根据所述选择的虚拟接入点发 起的网络穿越隧道注册请求,所述网络穿越隧道注册请求中包含有所述选择的虛 拟接入点信息和所述运营商的核心网地址。此外, 网络穿越隧道注册请求中还可 以包括租户信息、 用户名、 密码、 终端类型信息, 其中, 终端类型信息包括移动 终端型号、 操作系统版本、 浏览器版本等信息, 以便于安全穿越服务器对所述终 端进行接入认证。
需要说明的是, 在一种情形下, 当运营商只租用了一个虚拟接入点时, 则该 虛拟接入点就是运营商选择的接入点,所述运营商网络中的终端可以直接向该虚 拟接入点发起网络穿越隧道注册请求。
步驟 620 , 向所述终端返回网络穿越隧道注册成功消息, 使所述终端根据所 述运营商的核心网地址以及与所述虛拟接入点建立的网络穿越隧道访问所述运 营商的核心网。
当安全穿越服务器对所述终端认证通过,会向所述终端返回网络穿越隧道注 册成功消息, 完成网絡穿越隧道的协商。该网络穿越隧道注册成功消息中包含有 注册结果, 此外还可以包括虚拟互联网协议 IP地址及掩码、 保持连接报文发送 周期和访问策略等信息。其中,安全隧道类型可以包括: HTTP、 SSL、 DTLS . UDP、
UDPS等类型的 VPN安全隧道, 在此不 列举。
需要说明的是, 在上述图 5和图 6所示的实施例中, 还可以包括统计安全穿 越服务器创建的虚拟接入点的资源使用情况,并将其创建的虚拟接入点的资源使 用情况发送给资源管理中心, 以便对其创建的虚拟接入点进行管理, 具体的, 所 述对虚拟接入点进行管理包括根据虚拟接入点的资源负载情况对虚拟接入点进 行负载均衡。
本发明实施例所述网络穿越服务提供方法,通过部署在运营商网络中的安全 穿越服务器接收来自终端的接入点查询请求,在运营商租用的网络穿越隧道资源 信息中为所述终端选择虎拟接入点,将选择的處拟接入点的接入信息发送给所述 终端,以使所述终端根据所述选择的虚拟接入点的接入信息与所述选择的虚拟接 入点建立网络穿越隧道,从而能够根据建立的网络穿越隧道访问所述运营商的核 心网,实现网络穿越。由于虚拟接入点是通过服务器选择之后的最佳虚拟接入点, 不同的终端可能通过选择的不同的虚拟接入点实现网络穿越,减轻了穿越网关的 负担, 提升了网络穿越的可靠性。 并且, 由于虚拟接入点是所述运营商租用的, 运营商可以根据业务需求租用多个虚拟接入点,因此不仅降低了运营商的运营成 本,也使运营商能够根据租用的多个虚拟接入点为终端提供更好的网络穿越服务, 提升了网络穿越的可靠性。
需要说明的是, 上述图 4、 图 5及图 6所示的实施例都可以由安全穿越服务 器来执行, 上述三个实施例可以由安全穿越服务器分别执行, 也可以组合执行。 图 7为本发明实施例提供的一种资源管理中心的物理结构示意图,该资源管 理中心可以是一台服务器、计算机或具有计算处理能力的计算节点, 只要能够实 现网络隧道资源的统一管理即可, 在此并不做特别限定。 如图 7所示, 所述资源 管理中心 70包括:
处理器(proces s or) 710, (Communica t i ons Interface) 720 , 存储 器(memory) 730, 通信总线 740。
处理器 710、 通信接口 720以及存储器 730通过通信总线 740完成相互间的 通信。
通信接口 720, 用于与网元通信, 比如运营商管理服务器或安全穿越服务器 等。
处理器 710, 用于执行程序 732 , 具体可以执行上述图 2至图 3所示的方法 实施例中的相关步骤。
具体地, 程序 732可以包括程序代码, 所述程序代码包括计算机操作指令。 处理器 710 可能是一个中央处理器 CPU , 或者是特定集成电路 ASIC ( Appl ica t ion Specif i c Integra ted C i rcu i t ), 或者是被配置成实施本发明实 施例的一个或多个集成电路。
存储器 730, 用于存放程序 732。 存储器 730可能包含高速 RAM存储器, 也 可能还包括非易失性存储器(non- vo la t i le memory ),例如至少一个磁盘存储器。
程序 732中各功能模块的具体实现可以参见下述图 8所示实施例中的相应模 块, 在此不再赘述。 图 8为本发明实施例提供的一种资源管理中心的结枸示意图, 如图 8所示, 所述资源管理中心 80包括:
接收模块 800, 用于接收运营商管理服务器发送的网络穿越隧道资源租用请 求,所述租用请求中携带有待租用的虚拟接入点的数量以及每个虚拟接入点承载 的用户数量;
具体的, 为了满足业务流量的需求,运营商可以根据本网络的用户数量及接 入需求确定需要租用的网络穿越隧道资源, 因此,在所述网络穿越隧道资源租用 请求中需要包含有要租用的虚拟接入点数量以及每个虚拟接入点承载的用户数 量, 例如, 运营商 A要租用 10个虚拟接入点, 且每个虚拟接入点能够同时承栽 1000 个用户的接入需求。 当然, 可以理解的是, 在所述租用请求中还可以携带 所述运营商的标识,以使资源管理中心能够识别是哪一个运营商需要租用网络穿 越隧道资源。
可以理解的是,在另一种情况下, 网络穿越隧道资源租用请求中可以只携带 有待承载的总用户数量,由资源管理中心根据所述总用户数量为所述运营商确定 所需租用的虛拟接入点数量以及每个虛拟接入点所承载的用户数量。 发送模块 805, 用于根据所述接收模块 800接收的所述租用请求向安全穿越 服务器发送网络穿越隧道资源创建指令,所述网络穿越隧道资源创建指令中包含 有所述虚拟接入点的数量以及所述用户数量;
具体的, 当接收模块 S 00接收到运营商管理服务器发送的网络穿越隧道资源 租用请求后, 发送模块 S05可以根据所述租用请求向管理的安全穿越服务器发送 网络穿越隧道资源创建指令,指示安全穿越服务器根据所述租用请求中的虚拟接 入点的数量以及每个虚拟接入点承载的用户数量创建网络穿越隧道资源, 其中, 网络穿越隧道资源包括与终端对接的虚拟接入点以及与运营商核心网对接的业 务通道。
当网络中具有多个安全穿越服务器时, 发送模块 805可以根据所述租用请求 中的虚拟接入点数量以及需承载的总用户数量检查其所管理的安全穿越服务器 中的空闲资源,并可以根据安全穿越服务器提供服务的区域以及负载均衡的原理 选择部署于运营商网络中的且空闲资源最多的安全穿越服务器进行网络穿越隧 道资源的创建。
接收模块 800, 还用于接收所述安全穿越服务器根据所述网络穿越隧道资源 创建指令中的所述虛拟接入点的数量以及所述用户数量创建的网络穿越隧道资 源的信息,其中所述网络穿越隧道资源的信息包括虚拟接入点信息和业务通道信 息;
具体的, 当安全穿越服务器完成接入点及业务通道的虛拟化创建后,安全穿 越服务器可以根据运营商关联虚拟接入点和业务通道,并返回创建的网络穿越隧 道资源的信息给接收模块 800 , 其中, 所述网络穿越隧道资源的信息包括虚拟接 入点信息和业务通道信息,具体的, 网络穿越隧道资源的信息包括但不限于运营 商标识、 虚拟接入点的地址、 业务通道的地址、 提供业务的网段和租户编号。 其 中, 虚拟接入点的地址可以是 IP 地址也可以是域名, 例如: 10. 10. 10. 10 或 cloud, com,与虚拟接入点对接的业务通道的地址也就是所述运营商核心网地址, 从而可以使通过虚拟接入点接入运营商网络后可以通过所述业务通道的地址访 问核心网, 可以理解的是, 业务通道的地址也可以用 IP地址或用域名来表示, 例如: 200. 1. 1. 1或 cmcc. com。 此外, 网络穿越隧道资源的信息还可以包括: 协 议类型、 隧道编号等信息。 可以理解的是, 安全穿越服务器可以将所述网络穿越 隧道资源的信息以信息列表的方式返回给接收模块 800。
发送模块 805 , 还用于向所述运营商管理服务器发送所述网络穿越隧道资源 的信息,使所述运营商管理服务器能够根据所述虚拟接入点信息和业务通道信息 向终端提供网络穿越服务。
可以理解的是,发送模块 805可以将所述网络穿越隧道资源的信息以信息列 表的方式发送给运营商管理服务器,使运营商管理服务器能够根据所述虚拟接入 点信息和业务通道信息向终端提供网络穿越服务。
此外, 在一种情形下, 本发明实施例提供的资源管理中心 80还可以包括: 资源管理模块 810 , 用于对网络穿越隧道资源进行管理和维护。
资源管理模块 810 可以根据网络穿越隧道资源中的虚拟接入点的使用情况 对网络穿越隧道资源进行管理和维护, 具体的, 资源管理模块 810可以接收安全 穿越服务器发送的所述虚拟接入点的资源使用情况信息,并根据安全穿越服务器 的负栽情况进行负载均衡,还可以向部署于运营商网络中的安全穿越服务器广播 所述运营商租用的网络穿越隧道资源的信息,从而可以通过部署于运营商网络中 的多个安全穿越服务器向终端提供多方位的接入服务,并能均衡各接入点的负载 量。
广播模块 815, 用于将所述运营商租用的网络穿越隧道资源的信息发送给部 署于所述运营商网络中的安全穿越服务器。
当网络中部署有多个安全穿越服务器时,广播模块 815可以将所述运营商租 用的网络穿越隧道资源的信息发送给部署于所述运营商网络中的安全穿越服务 器,以使所有部署于运营商网络中的安全穿越服务器都能够为终端提供安全穿越 服务。
本发明实施例提供的一种资源管理中心,通过接收运营商管理服务器发送的 网络穿越隧道资源租用请求,指示部署于运营商网络中心的安全穿越服务器创建 相应的虚拟接入点和业务通道,并将创建的网络穿越隧道资源信息返回给运营商 管理服务器,使运营商管理服务器能够根据所述虚拟接入点信息和业务通道信息 向终端提供网络穿越服务。从而提供了一种安全穿越即服务(Secur i ty Traverse as a Serv ice , STaaS ) 的运营模式, 使得网络穿越隧道资源能够得到统一的管 理和维护,解决了由于安全穿越网关集中部署于运营商核心网所带来的网络扩展 性差且无法为分散的互联网接入用户提供稳定的网络穿越服务的技术问题,提升 了运营商网络的可扩展性以及网络穿越的可靠性, 且降低了运营商的运营成本。 图 9为本发明实施例提供的一种安全穿越服务器的结构示意图,所述安全穿 越服务器可以部署于各运营商的网络中或部署于 STaaS 服务提供商自建的网络 中,该安全穿越服务器可以是一台服务器、计算机或具有计算处理能力的计算节 点, 在此并不做特别限定。 如图 9所示, 所述安全穿越服务器 90包括:
处理器(processor) 910, 通信接口(Communicat ions Interface) 920, 存储 器(memory) 930, 通信总线 940、 输入设备 950以及显示器 960。
处理器 910、 通信接口 920、 存储器 930、 输入设备 950以及显示器 960通 过通信总线 940完成相互间的通信。
通信接口 920, 用于与网元通信, 其中, 网元包括资源管理中心或终端等。 处理器 910, 用于执行操作系统 932以及应用程序 934, 包括执行上述图 4 至图 6所示的方法实施例中的相关步骤。
具体地, 程序 932可以包括程序代码, 所述程序代码包括计算机操作指令。 处理器 910 可能是一个中央处理器 CPU, 或者是特定集成电路 ASIC ( Application Specific Integrated Circuit ), 或者是被配置成实施本发明实 施例的一个或多个集成电路。
存储器 930, 用于存放操作系统 932以及应用程序 934。 存储器 930可能包 含高速 RAM存储器, 也可能还包括非易失性存储器(non- volatile memory ), 例 如至少一个磁盘存储器。
操作系统 932可以是 Windows NT. Windows2007或其他一些 Window是版本 的操作系统, 也可以是 Macintosh OS等其他类型的操作系统。
应用程序 934中各功能模块的具体实现可以参见下述图 10至图 12所示实施 例中的相应模块, 在此不再赘述。 图 10 为本发明实施了提供的一种安全穿越服务器的结构示意图, 如图 10 所示, 本发明实施例所述安全穿越服务器包括:
接收模块 1000, 用于接收资源管理中心发送的网络穿越隧道资源创建指令, 所述网络穿越隧道资源创建指令中携带有运营商的标识、要创建的虚拟接入点的 数量以及所述每个虛拟接入点能够承载的用户数量。
隧道资源创建模块 1005,用于根据接收模块 1000接收的网络穿越隧道资源创 建指令中的所述虚拟接入点的数量和所述用户数量创建满足所述运营商租用需 求的网络穿越隧道资源,其中所述网络穿越隧道资源包括虛拟接入以及与虚拟接 入点对接的业务通道。
具体的,隧道资源创建模块 1005可以根据所述网络穿越隧道资源创建指令采 用虚拟化技术创建满足租用需求的虚拟接入点和与虚拟接入点对接的业务通道, 例如可以通过虚拟化进行虚拟接入点资源的分配、 IP地址或域名的配置及其他参 数的配置,使创建的每个虚拟接入点具有安全穿越网关的功能, 能够与终端之间 建立虚拟专用网 (Virtual Private Network, VPN) 隧道, 为终端提供超文本传 输协议(Hyper Te t Transfer Protocol, HTTP )、 安全套接字层 ( Secure Socket Layer, SSL), 互联网安全十办议( Internet Protocol Security, IPSec)、 基于 数据报协议的传输层安全协议 ( Datagram Transport Layer Security, DTLS ) 或用户数据报协议 (User Datagram Protocol, UDP)等 VPN安全隧道的接入能 力。虚拟接入点与运营商核心网的服务器之间可以通过与虛拟接入点对接的业务 通道传输报文,即虚拟接入点可以根据与其对接的业务通道的地址与运营商核心 网进行通信,需要说明的是,业务通道的地址就是所述运营商核心网的入口地址。
需要说明的是, 当安全穿越服务器中的隧道资源创建模块 1005釆用虚拟化 技术创建虚拟接入点后,虚拟接入点与安全穿越服务器的关系可以是一对一、一 对多、 多对一以及多对多的对应关系。 其中, 一对一的对应关系属于基本的网络 穿越服务部署场景。一对多的对应关系则是通过一台硬件设备做分流,代理同一 个接入点的其他安全穿越服务器,使在逻辑上保证多台安全穿越服务器对外提供 同一个接入点服务。多对一是指在一台安全穿越服务器上启动多个虚拟接入点服 务, 同时不同的虚拟接入点具备租户属性、 各自独立的认证授权系统、 核心网资 源以及各自独立的可重叠的网络、 路由表和虚拟防火墙。
可以理解的是, 当所述隧道资源创建模块 1005根据所述网络穿越隧道资源 创建指令为所述运营商创建了网络穿越隧道资源后,可以根据所述运营商的标识 关联创建的虛拟接入点和业务通道。 隧道资源发送模块 1010 , 用于向所述资源管理中心返回隧道资源创建模块 1005创建的所述网络穿越隧道资源的信息。
其中, 所述网络穿越隧道资源的信息包括虚拟接入点信息和业务通道信息。 具体的,网络穿越隧道资源的信息包括但不限于运营商标识、虚拟接入点的地址、 网段和隧道编号,其中,虚拟接入点的地址可以是 IP地址也可以是域名,例如: 10. 10. 10. 10或 cloud, com, 业务通道的地址也可以用 IP地址或用域名来表示, 例如: 200. 1. 1. 1或 cmcc. com。 此外, 网络穿越隧道资源的信息还可以包括: 协 议类型、 租户编号、 隧道编号以及核心网中提供业务的网段等信息。 可以理解的 是, 隧道资源发送模块 1010可以将所述网络穿越隧道资源的信息以信息列表的 方式返回给资源管理中心, 在此不^:限定。
本发明实施例所述的安全穿越服务器能够根据资源管理中心发送的网络隧 道资源创建指令为运营商创建网络穿越隧道资源,以使运营商能够根据租用的网 络穿越隧道资源向终端提供网络穿越服务,提升了运营商网络的可扩展性以及网 络穿越的可靠性, 且降低了运营商的运营成本。 图 11为本发明实施例提供的又一种安全穿越服务器的结构示意图, 如图 11 所示, 该安全穿越服务器 110在图 10所示的实施例的基础上:
所述接收模块 1000, 还用于接收来自终端的网络穿越隧道注册请求, 所述 网络穿越隧道注册请求中携带有终端要访问的第一虚拟接入点信息、所述终端所 属运营商的标识以及所述运营商的核心网地址;
其中, 所述第一虚拟接入点是所述终端任意选择的一个虚拟接入点。 此外, 所述网络穿越隧道注册请求中还可以包括租户信息、 用户名、 密码、 终端类型信 息,其中,终端类型信息包括移动终端型号、操作系统版本、浏览器版本等信息, 以便于安全穿越服务器对所述终端进行接入认证。
所述安全穿越服务器 110还可以包括:
判断模块 1105, 用于判断所述第一虚拟接入点是否为所述安全穿越服务器 为所迷终端选择的虛拟接入点,如果所述第一虚拟接入点不是选择的虚拟接入点, 则触发第一选择模块 1110, 否则, 触发第一响应模块 1115
具体的, 判断模块 1105可以才艮据设置的记录表判断所述第一虚拟接入点是 否为安全穿越服务器为所述终端选择的虛拟接入点,所述记录表中记录有虚拟接 入点的使用情况。 如果不是, 则说明所述终端为第一次接入, 所述第一虚拟接入 点是所述终端任意选择的虚拟接入点并不是安全穿越服务器为所述终端选择的 最佳的虚拟接入点。此外, 安全穿越服务器还可以根据所述第一虚拟接入点的接 入位置、负载量或探测响应情况判断所述第一虚拟接入点是否为所述安全穿越服 务器为所述终端选择的最佳的虚拟接入点。如果不是,则触发第一选择模块 1110, 否则, 触发第一响应模块 1115。
第一选择模块 1110, 用于根据所述运营商的标识在所述运营商租用的网络 穿越隧道资源中为所述终端选择第二虚拟接入点, 触发第一响应模块 1115 ; 具体的, 网络穿越隧道资源的信息包括: 虚拟接入点的租户信息、 虚拟接入 点的用户负载量和虚拟接入点的接入区域。优选的,可以根据查询获得的网络穿 越隧道资源的信息选择最佳的虚拟接入点, 具体的, 第一选择模块 1110在选择 最佳的虛拟接入点时可以根据网络穿越隧道资源的信息来选择负载量最小或接 入位置最近或探测响应最快的虚拟接入点作为最佳的虚拟接入点。 当然,可以理 解的是, 当所述第一选择模块 1110为所述终端选择了虚拟接入点后, 会记录下 相关的信息, 或打上相应的标识, 以便下一次接收模块 1000接收到所述终端的 网络穿越隧道注册请求时, 判断模块 1105可以快速判断出所述终端中的第一虛 拟接入点是否为选择的虚拟接入点。
第一响应模块 1115, 用于向所述终端返回网络穿越隧道注册成功消息, 所 述网络穿越隧道注册成功消息中包含有第一选择模块 1110选择的第二虚拟接入 点信息,使所述终端根据与所述第二虚拟接入点建立的网络穿越隧道以及所述运 营商的核心网地址访问所述运营商的核心网。
具体的, 在一种情况下, 当安全穿越服务器对所述终端认证通过后, 安全穿 越服务器可以直接向终端返回网络穿越隧道注册成功消息,所述网络穿越隧道注 册成功消息中包含有注册结果以及所述安全穿越服务器为所述终端选择的第二 虚拟接入点信息, 完成终端与第二虚拟接入点之间网络穿越隧道的协商,使所述 终端可以根据与所述第二虚拟接入点之间建立的网络穿越隧道以及所述运营商 的核心网地址访问所述运营商的核心网,具体的, 第二虚拟接入点可以通过与终 端之间建立的网络穿越隧道接收所述终端发送的报文,并将所述报文解封装后发 送给运营商核心网; 接收运营商核心网返回的响应报文, 将所述响应报文封装后 通过所述网络穿越隧道发送给终端。 其中,所述终端可以通过第二虚拟接入点为 其分配的虚拟 IP与所述运营商核心网通信, 具体的, 被封装的报文中包含有所 述第二虚拟接入点为所述终端分配的虛拟 IP地址以及所述运营商核心网的地址, 封装的外层报文中包含有所述终端的 IP地址以及所述第二虚拟接入点的 IP地址。 需要说明的是, 第二虛拟接入点与所述终端之间建立的网络穿越隧道可以是
HTTP. SSL. IPSec. DTLS或 UDP等类型的 VPN安全隧道, 在此不再 列举。
在另一种情况下,第一响应模块 1115 ,还用于向所述终端返回注册失败消息, 其中注册失败消息中包含有为所述终端选择的第二虚拟接入点信息,使所述终端 能够根据所述第二虛拟接入点信息重新发起网络穿越隧道注册请求。
在叉一种情形下, 当判断模块 1105的判断结果为所述第一虚拟接入点为安 全穿越服务器为所述终端选择的虚拟接入点时, 第一响应模块 1115 , 还用于向 所述终端返回网络穿越隧道注册成功消息,使所述终端根据与所述第一虚拟接入 点建立的网络穿越隧道以及所述运营商的核心网地址访问所述运营商的核心网。
具体的, 当判断模块 1105的判断结果为所述第一虚拟接入点为安全穿越服 务器为所述终端选择的虚拟接入点的情形下,若安全穿越服务器对所述终端认证 通过, 第一响应模块 1115还可以向所述终端返回网络穿越隧道注册成功消息, 完成所述终端与所述第一虚拟接入点之间的网络穿越隧道的协商,使所述终端能 够通过与所述第一虛拟接入点建立的网络穿越隧道以及所述运营商的核心网地 址访问所述运营商的核心网。具体的,该网络穿越隧道注册成功消息中包含有注 册结果, 此外还可以包括虚拟互联网协议 IP地址及掩码、 保持连接报文发送周 期和访问策略等信息。
本发明实施例提供的安全穿越服务器,根据所述运营商租用的网络穿越隧道 资源信息为所述运营商的终端选择虚拟接入点,并在向终端返回的网络穿越隧道 注册成功消息中直接向终端返回为所述终端选择的第二虚拟接入点信息,使得所 述终端无需再根据选择的第二虚拟接入点信息再次发起网络穿越隧道注册请求, 提高了终端接入的效率。 图 12为本发明实施例提供的又一种安全穿越服务器的结构示意图, 如图 12 所示, 该安全穿越服务器 120在图 10所示的实施例的基础上:
所述接收模块 1 000 , 还用于接收来自终端的接入点查询请求, 所述查询请 求中携带有所述终端所属的运营商的标识;
在一种情形下, 如果所述运营商只租用了一个虛拟接入点, 则所述运营商网 络中的终端可以直接与所述运营商租用的一个虚拟接入点建立网络穿越隧道,并 通过该网络穿越隧道接入所述运营商的核心网, 而无须发送接入点查询请求。 然 而, 在实际应用中, 一个虚拟接入点远远不能满足用户的接入需求, 因此, 运营 商通常会根据网络中的用户量向 STaaS服务提供商租用多个虚拟接入点。 此时, 为了能够向用户提供更好的服务,用户可以发起一个虚拟接入点的查询请求来查 询较佳的虚拟接入点。具体的, 所述查询请求中还可以包括所述用户的初始接入 点以及要访问的运营商的核心网的地址。
所述安全穿越服务器还可以包括:
第二选择模块 1205, 用于根据接收模块 1000接收的所述查询请求中的所述 运营商的标识在所述运营商租用的网络穿越隧道资源中选择虚拟接入点;
安全穿越服务器可以根据所述租用请求中的运营商的标识查找所述运营商 租用的网络穿越隧道资源的信息, 为所述终端选择虚拟接入点, 具体的, 网络穿 越隧道资源的信息包括: 虚拟接入点的租户信息、虛拟接入点的用户负栽量和虚 拟接入点的接入区域。优选的,可以根据查询获得的网络穿越隧道资源的信息选 择最佳的虚拟接入点, 具体的, 第二选择模块 1205在选择最佳的虚拟接入点时 可以根据网络穿越隧道资源的信息来选择负载量最小或接入位置最近或探测响 应最快的虚拟接入点作为最佳的虚拟接入点。 例如, 本实施例中, 以第一虚拟接 入点 120为最佳的虚拟接入点为例进行说明。可以理解的是, 当所述安全穿越服 务器为所述终端选择了虚拟接入点后,会记录下相关的信息,或打上相应的标识。
第二响应模块 1210 , 用于向所述终端返回查询响应消息, 所述查询响应消 息中包含有选择的虚拟接入点的信息;
当第二选择模块 1205根据所述运营商标识在所述运营商租用的网络穿越隧 道资源中为所述终端选择了虚拟接入点后, 可以向所述终端返回查询响应消息, 其中, 查询响应消息中包含有选择的虚拟接入点的信息。
所述接收模块 1 000, 还用于接收来自终端的网络穿越隧道注册请求, 所述 网络穿越隧道注册请求中包含有所述选择的虚拟接入点信息和所述运营商的核 心网地址;
当终端接收到第二响应模块 1210返回的选择的虚拟接入点的信息后, 可以 向所述虚拟接入点发起网络穿越隧道注册请求,由于安全穿越服务器是虛拟接入 点的集合, 因此,安全穿越服务器会接收到所述终端根据所述选择的虚拟接入点 发起的网络穿越隧道注册请求,所述网络穿越隧道注册请求中包含有所述选择的 虚拟接入点信息和所述运营商的核心网地址。此外, 网络穿越隧道注册诗求中还 可以包括租户信息、 用户名、 密码、 终端类型信息, 其中, 终端类型信息包括移 动终端型号、 操作系统版本、 浏览器版本等信息, 以便于安全穿越服务器对所述 终端进行接入认证。
第二响应模块 1210, 还用于向所述终端返回网络穿越隧道注册成功消息, 使所述终端才艮据所述运营商的核心网地址以及与所述虚拟接入点建立的网络穿 越隧道访问所述运营商的核心网。
当安全穿越服务器对所述终端认证通过,会向所述终端返回网络穿越隧道注 册成功消息, 完成网络穿越隧道的协商。该网络穿越隧道注册成功消息中包含有 注册结果, 此外还可以包括虚拟互联网协议 IP地址及掩码、 保持连接报文发送 周期和访问策略等信息。其中,安全隧道类型可以包括: 超文本传输协议( Hyper Text Transfer Protocol, HTTP ). 安全套接字层( Secure Socket Layer, SSL), 互联网安全协议( Internet Protocol Security, IPSec )、 基于数据报协议的传 输层安全协议 (Datagram Transport Layer Security, DTLS )或用户数据报协 议 ( User Datagram Protocol, UDP ) 等类型的虚拟专用网 (Virtual Private Network, VPN) 隧道, 在此不 列举。
本发明实施例所述安全穿越服务,接收来自终端的接入点查询请求,在运营 商租用的网络穿越隧道资源信息中为所述终端选择虚拟接入点,将选择的虚拟接 入点的接入信息发送给所述终端,以使所述终端根据所述选择的虚拟接入点的接 入信息与所述选择的虛拟接入点建立网络穿越隧道,从而能够根据建立的网络穿 越隧道访问所述运营商的核心网, 实现网络穿越。 由于虚拟接入点是通过服务器 选择之后的最佳虚拟接入点,不同的终端可能通过选择的不同的虚拟接入点实现 网絡穿越, 减轻了穿越网关的负担, 提升了网络穿越的可靠性。 需要说明的是, 上述图 10、 图 11及图 12所示的实施例可以结合使用, 也 可以单独使用, 在此不做限定。 可以理解的是, 当图 11和图 12所示的实施例结 合使用时, 第二选择模块 1205与第一 i 择模块 1110可以合并为一个模块, 第二 响应模块 1210与第一响应模块 1115也可以合并为一个模块。
如图 13所示, 图 1 3为本发明实施例提供的一种安全穿越即服务(Secure Traverse As A Service , STaaS ) 的网络系统图, 如图 13所示, 该网络系统 130 包括资源管理中心 1300、 安全穿越服务器 1305以及虎拟接入点 1310 , 其中, 安 全穿越服务器 1305可以有一个或多个, 虚拟接入点 1310也可以有一个或多个。 安全穿越服务器 1305为多个虚拟接入点 1310的集合,可以部署于运营商的互联 网数据中心 ( Int erne t Data Center , IDC ) 也可以部署于 S taaS提供商自建的 网络中。资源管理中心 1 300用于对所有安全穿越服务器 1305创建的网络穿越隧 道资源进行统一管理,具体的,安全穿越服务器 1305的数量可以根据服务区域、 用户数量等进行设定, 虚拟接入点 1310的数量可以根据运营商的租用请求来进 行创建。 其中:
资源管理中心 1 300, 用于接收运营商管理服务器发送的网络穿越隧道资源 租用请求,所述租用 ΐ青求中携带有待租用的虚拟接入点的数量以及每个虚拟接入 点承载的用户数量;根据所述租用请求向安全穿越服务器发送网络穿越隧道资源 创建指令;接收所述安全穿越服务器根据所述虚拟接入点的数量以及所述用户数 量创建的网络穿越隧道资源的信息;向所述运营商管理服务器发送所述网絡穿越 隧道资源的信息,其中所述网络穿越隧道资源的信息包括虛拟接入点信息和业务 通道信息;
安全穿越服务器 1 305, 用于根据资源管理中心 1 300发送的网络穿越隧道资 源创建指令进行网络穿越隧道资源的创建,并向资源管理中心 1 300返回创建的网 络穿越隧道资源的信息, 其中, 所述网络穿越隧道资源的信息包括虚拟接入点信 息和业务通道信息; 接收终端发送的接入点查询请求, 所述查询请求中携带有所 述终端所属的运营商的标识;根据所述运营商的标识在所述运营商租用的网络穿 越隧道资源中选择虛拟接入点; 向所述终端返回查询响应消息, 所述查询响应消 息中包含有选择的虚拟接入点的信息; 接收来自终端的网络穿越隧道注册请求, 所述网络穿越隧道注册请求中包含有所述选择的虚拟接入点信息和所述运营商 的核心网地址; 向所述终端返回网络穿越隧道注册成功消息,使所述终端才艮据所 述运营商的核心网地址以及与所述虚拟接入点建立的网络穿越隧道访问所述运 营商的核心网。
虚拟接入点 131 0 , 用于通过与终端之间建立的网络穿越隧道接收所述终端 发送的报文, 并将所述报文解封装后发送给运营商核心网; 接收运营商核心网返 回的响应报文, 将所述响应报文封装后通过所述网络穿越隧道发送给终端。
在本发明实施例中, STaaS提供商通过资源管理中心 1300向运营商提供网 络穿越服务资源的出租式服务, STaaS提供商承担网络穿越服务资源的管理运营, 运营商可以根据自己的实际需求,通过互联网向 STaaS提供商租用所需的网络穿 越隧道资源, 并按租用的服务的数量及使用时间向 STaaS提供商支付费用, 同时 运营商也可以通过互联网获得 STaaS 提供商对其所提供的网络穿越隧道资源的 维护等服务。 其中资源管理中心 1 300、 安全穿越服务器 1305的详细描述可以参 见前述相关实施例, 在此不再赘述。
本发明实施例提供的 STaaS 网络系统, 创建了安全穿越即服务(Secur i ty Traver s e a s a Serv i ce , STaaS ) 的运营模式, 可以根据运营商的租用需求为所 述运营商创建网络穿越隧道资源, 并向运营商出租创建的网络穿越隧道资源,使 得运营商可以通过租用的网络穿越隧道资源向终端提供网络穿越服务,使得终端 可以访问运营商的核心网。从而使得网络穿越隧道资源能够得到统一的管理和维 护,解决了由于安全穿越网关集中部署于运营商核心网所带来的网络扩展性差且 无法为分散的互联网接入用户提供稳定的网络穿越服务的技术问题,提升了运营 商网络的可扩展性以及网络穿越的可靠性, 降低了运营商的运营成本。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以 通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介 质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述的存储介质包 括: R0M、 RAM, 磁碟或者光盘等各种可以存储程序代码的介质。
所属领域的技术人员可以清楚地了解到, 为描述的方便和简洁, 上述描述的 设备和模块的具体工作过程, 可以参考前述方法实施例中的对应过程描述,在此 不再赘述。
在本申请所提供的几个实施例中, 应该理解到, 所揭露的设备和方法, 可以 通过其它的方式实现。 例如, 以上所描述的装置实施例仅仅是示意性的, 例如, 所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式, 例如多个模块或组件可以结合或者可以集成到另一个设备中,或一些特征可以忽 略, 或不执行。 另一点, 所显示或讨论的相互之间的耦合或直接 合或通信连接 可以是通过一些通信接口, 装置或模块的间接耦合或通信连接, 可以是电性, 机 械或其它的形式。
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模 块显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者也可 以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部,模块 来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能模块可以集成在一个处理模块中, 也 可以是各个模块单独物理存在, 也可以两个或两个以上模块集成在一个模块中。 最后应说明的是: 以上各实施例仅用以说明本发明的技术方案, 而非对其限制; 尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当 理解: 其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分 或者全部技术特征进行等同替换; 而这些修改或者替换, 并不使相应技术方案的 本质脱离本发明各实施例技术方案的范围。

Claims

权 利 要 求
1、 一种网絡穿越服务的提供方法, 其特征在于, 包括:
接收运营商管理服务器发送的网络穿越隧道资源租用请求,所述租用请求中 携带有待租用的虚拟接入点的数量以及每个虚拟接入点承载的用户数量;
根据所述租用请求向安全穿越服务器发送网络穿越隧道资源创建指令,所述 网络穿越隧道资源创建指令中包含有所述虚拟接入点的数量以及所述每个虛拟 接入点承载的用户数量;
接收所述安全穿越服务器根据所述虚拟接入点的数量以及所述每个虚拟接 入点承载的用户数量创建的网络穿越隧道资源的信息,其中所述网络穿越隧道资 源的信息包括虚拟接入点信息和业务通道信息;
向所述运营商管理服务器发送所述网络穿越隧道资源的信息,使所述运营商 管理服务器能够根据所述虚拟接入点信息和所述业务通道信息向终端提供网络 穿越服务。
2、根据权利要求 1所述的方法, 其特征在于, 所述根据所述租用请求向安全 穿越服务器发送网络穿越隧道资源创建指令包括:
根据所述租用请求向部署于运营商网絡中的空闲资源最多的安全穿越服务 器发送所述网络穿越隧道资源创建指令。
3、 根据权利要求 1或 2所述的方法, 其特征在于:
所述网络穿越隧道资源租用请求中还携带有运营商标识,所述运营商标识用 于识别运营商。
4、根据权利要求卜 3任意一项所述的方法, 其特征在于, 所述虚拟接入点为 虚拟化的安全穿越网关, 能够为终端提供虚拟专用网 VPN隧道的接入能力。
5、 根据权利要求 1 -4任意一项所述的方法, 其特征在于, 还包括: 向部署于运营商网络中的安全穿越服务器广播所述运营商租用的网络穿越 隧道资源的信息,以使所述安全穿越服务器能够根据所述运营商租用的网络穿越 隧道资源为终端提供网络穿越服务。
6、 根据权利要求 1 -5任意一项所述的方法, 其特征在于, 还包括: 接收所述安全穿越服务器发送的所述每个虚拟接入点的资源使用情况信息, 并根据安全穿越服务器的负载情况进行负载均衡。
7、 一种网络穿越服务的提供方法, 其特征在于, 包括:
接收资源管理中心发送的网络穿越隧道资源创建指令,所述网络穿越隧道资 源创建指令中携带有运营商租用需求的虚拟接入点的数量以及每个虚拟接入点 能够承载的用户数量;
根据接收的所述虚拟接入点的数量和所述每个虚拟接入点能够承载的用户 数量创建满足所述运营商租用需求的网络穿越隧道资源,其中所述网络穿越隧道 资源包括虛拟接入点以及与虛拟接入点对接的业务通道;
向所述资源管理中心返回创建的所述网络穿越隧道资源的信息。
8、 根据权利要求 7所述的方法, 其特征在于, 还包括:
接收来自终端的接入点查询请求, 所述查询请求中携带有所述终端所属的 运营商的标识;
根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中选择虚拟 接入点;
向所述终端返回查询响应消息, 所述查询响应消息中包含有选择的虚拟接 入点的信息;
接收来自终端的网络穿越隧道注册请求, 所述网络穿越隧道注册请求中包 含有所述选择的虚拟接入点信息和所述运营商的核心网地址;
向所述终端返回网络穿越隧道注册成功消息,使所述终端 居所述运营商的 核心网地址以及与所述虚拟接入点建立的网絡穿越隧道访问所述运营商的核心 网。
9、 根据权利要求 7或 8所述的方法, 其特征在于, 还包括:
接收来自终端的网络穿越隧道注册请求,所述网络穿越隧道注册请求中携带 有终端要访问的第一虛拟接入点信息、所述终端所属运营商的标识以及所述运营 商的核心网地址;
判断所述第一虚拟接入点是否为安全穿越服务器为所述终端选择的虚拟接 入点;
如果所述第一虛拟接入点不是所述安全穿越服务器为所述终端选择的虛拟 接入点,则根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中为所 述终端选择第二虚拟接入点; 向所述终端返回网络穿越隧道注册成功消息,所述网络穿越隧道注册成功消 息中包含有所述第二虛拟接入点的信息,使所述终端根据与所述第二虚拟接入点 建立的网络穿越隧道以及所述运营商的核心网地址访问所述运营商的核心网。
10、根据权利要求 9所述的方法, 其特征在于, 所述根据所述运营商的标识 在所述运营商租用的网络穿越隧道资源中为所述终端选择第二虚拟接入点包括: 根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中选择用户 负载量最小或接入位置最近或探测响应最快的虛拟接入点。
11、 根据权利要求 9或 10所述的方法, 其特征在于, 还包括:
如果所述第一虛拟接入点是所述安全穿越服务器为所述终端选择的虚拟接 入点, 则向所述终端返回隧道注册成功消息,使所述终端才 居与所述第一虚拟接 入点建立的网络穿越隧道以及所述运营商的核心网地址访问所述运营商的核心 网。
12、 一种资源管理中心, 其特征在于, 包括:
接收模块, 用于接收运营商管理服务器发送的网络穿越隧道资源租用请求, 所述租用请求中携带有待租用的虚拟接入点的数量以及每个虚拟接入点承栽的 用户数量;
发送模块,用于根据所述接收模块接收的所述租用请求向安全穿越服务器发 送网络穿越隧道资源创建指令,所述网络穿越隧道资源创建指令中包含有所述虚 拟接入点的数量以及所述每个虚拟接入点承栽的用户数量;
所述接收模块,还用于接收所述安全穿越服务器根据所述网络穿越隧道资源 创建指令中的所述虚拟接入点的数量以及所述用户数量创建的网络穿越隧道资 源的信息,其中所述网络穿越隧道资源的信息包括虚拟接入点信息和业务通道信 息;
所述发送模块,还用于向所述运营商管理服务器发送所述网络穿越隧道资源 的信息,使所述运营商管理服务器能够根据所述虚拟接入点信息和业务通道信息 向终端提供网络穿越服务。
13、 根据权利要求 12所述的资源管理中心, 其特征在于, 所述虚拟接入点 为虚拟化的安全穿越网关, 为终端提供虚拟专用网 VPN隧道的接入能力。
14、 根据权利要求 12所述的资源管理中心, 其特征在于: 所述网络穿越隧道资源租用请求中还携带有运营商标识,所述运营商标识用 于识别运营商。
15、 根据权利要求 12- 14任意一项所述的资源管理中心, 其特征在于: 所述发送模块具体用于根据所述租用请求向部署于运营商网络中的空闲资 源最多的安全穿越服务器发送所述网络穿越隧道资源创建指令。
16、根据权利要求 12- 15任意一项所述的资源管理中心, 其特征在于, 还包 括:
资源管理模块, 用于对所述网络穿越隧道资源进行管理和维护; 广播模块,用于向部署于运营商网络中的安全穿越服务器广播所述运营商租 用的网络穿越隧道资源的信息,以使所述安全穿越服务器能够根据所述运营商租 用的网络穿越隧道资源为终端提供网络穿越服务。
17、一种安全穿越服务器, 其特征在于, 包括:
接收模块, 用于接收资源管理中心发送的网络穿越隧道资源创建指令, 所述 网络穿越隧道资源创建指令中携带有运营商租用需求的虚拟接入点的数量以及 所述每个虚拟接入点能够承栽的用户数量;
隧道资源创建模块,用于根据接收模块接收的网络穿越隧道资源创建指令中 的所述虚拟接入点的数量和所述每个虚拟接入点能够承载的用户数量创建满足 所述运营商租用需求的网络穿越隧道资源,其中所述网络穿越隧道资源包括虛拟 接入点以及与虚拟接入点对接的业务通道;
隧道资源发送模块,用于向所述资源管理中心返回隧道资源创建模块创建的 所述网络穿越隧道资源的信息。
18、 根据权利要求 17所述的安全穿越服务器, 其特征在于:
所述接收模块,还用于接收来自终端的网络穿越隧道注册请求, 所述网络穿 越隧道注册请求中携带有终端要访问的第一虚拟接入点信息、所述终端所属运营 商的标识以及所述运营商的核心网地址;
所述安全穿越服务器还包括:
判断模块,用于判断所述第一虚拟接入点是否为所述安全穿越服务器为所述 终端选择的虚拟接入点;
第一选择模块,用于如果所述第一虚拟接入点不是所述安全穿越服务器为所 述终端选择的虚拟接入点,则根据所述运营商的标识在所述运营商租用的网络穿 越隧道资源中为所述终端选择第二虚拟接入点;
第一响应模块, 用于向所述终端返回网络穿越隧道注册成功消息, 所述网络 穿越隧道注册成功消息中包含有所述第一选择模块选择的所述第二虚拟接入点 的信息,使所述终端根据与所述第二虚拟接入点建立的网络穿越隧道以及所述运 营商的核心网地址访问所述运营商的核心网。
19、 根据权利要求 17或 18所述的安全穿越服务器, 其特征在于: 所述接收模块,还用于接收来自终端的接入点查询请求, 所述查询请求中携 带有所述终端所属的运营商的标识;
所述安全穿越服务器还包括:
第二选择模块,用于根据所述接收模块接收的所述查询请求中的所述运营商 的标识在所述运营商租用的网络穿越隧道资源中选择虚拟接入点;
第二响应模块, 用于向所述终端近回查询响应消息, 所述查询响应消息中包 含有选择的虚拟接入点的信息;
所述接收模块,还用于接收来自终端的隧道注册请求, 所述隧道注册请求中 包含有所述第二选择模块选择的虚拟接入点信息和所述运营商的核心网地址; 所述第二响应模块,还用于向所述终端返回网络穿越隧道注册成功消息,使 所述终端根据所述运营商的核心网地址以及与所述虚拟接入点建立的网络穿越 隧道访问所述运营商的核心网。
20、 根据权利要求 17- 19任意一项所述的安全穿越服务器, 其特征在于: 所述虚拟接入点为虚拟化的安全穿越网关, 能够为终端提供虚拟专用网 VPN 隧道的接入能力。
21、根据权利要求 18所述的安全穿越服务器, 其特征在于, 所述第一选择模 块具体用于才 居所述运营商的标识在所述运营商租用的网络穿越隧道资源的信 息中选择用户负载量最小或接入位置最近或探测响应最快的虚拟接入点。
22、根据权利要求 19所述的安全穿越服务器, 其特征在于, 所述第二选择模 块具体用于才 M居所述运营商的标识在所述运营商租用的网络穿越隧道资源的信 息中选择用户负载量最小或接入位置最近或探测响应最快的虚拟接入点。
23、根据权利要求 18所述的安全穿越服务器, 其特征在于, 当所述判断模块 判断所述第一虚拟接入点是为所述安全穿越服务器为所述终端选择的虚拟接入 点时, 所述第一响应模块, 还用于向所述终端返回隧道注册成功消息, 使所述终 端 4艮据与所述第一虚拟接入点建立的网络穿越隧道以及所述运营商的核心网地 址访问所述运营商的核心网。
24、 一种资源管理中心, 其特征在于:
所述资源管理中心包括处理器、 通信接口、 存储器和通信总线; 其中 , 所述处理器和所述通信接口通过所述通信总线进行通信; 所述通信接口, 用于与运营商管理服务器以及安全穿越服务器进行通信; 所述存储器用于存储程序;
所述处理器用于执行所述程序,以实现接收运营商管理服务器发送的网络穿 越隧道资源租用请求,所述租用请求中携带有待租用的虚拟接入点的数量以及每 个虚拟接入点承栽的用户数量;
根据所述租用请求向安全穿越服务器发送网络穿越隧道资源创建指令,所述 网络穿越隧道资源创建指令中包含有所述虚拟接入点的数量以及所述每个虛拟 接入点承栽的用户数量;
接收所述安全穿越服务器根据所述虚拟接入点的数量以及所述每个虚拟接 入点承载的用户数量创建的网络穿越隧道资源的信息,其中所述网络穿越隧道资 源的信息包括虚拟接入点信息和业务通道信息;
向所述运营商管理服务器发送所述网络穿越隧道资源的信息,使所述运营商 管理服务器能够根据所述虚拟接入点信息和所述业务通道信息向终端提供网络 穿越服务。
25、根据权利要求 24所述的资源管理中心, 其特征在于, 所述处理器还用于 根据所述租用请求向部署于运营商网络中的空闲资源最多的安全穿越服务器发 送网络穿越隧道资源创建指令。
26、 根据权利要求 24-25任意一项所述的资源管理中心, 其特征在于, 所述 处理器还用于对网络穿越隧道资源进行管理和维护;并向部署于运营商网络中的 安全穿越服务器广播所迷运营商租用的网络穿越隧道资源的信息,以使所述安全 穿越服务器能够根据所述运营商租用的网络穿越隧道资源为终端提供网络穿越 服务。
27、一种安全穿越服务器, 其特征在于:
所述安全穿越服务器包括处理器、 通信接口、 存储器以及通信总线; 其中, 所述处理器以及所述存储器通过通信总线完成相互间的通信; 所述通信接口用于与资源管理中心或终端通信;
所述存储器, 用于存放操作系统以及应用程序;
所述处理器用于执行所述操作系统以及所述应用程序, 包括:
接收资源管理中心发送的网络穿越隧道资源创建指令,网络穿越隧道资源创 建指令中携带有运营商租用需求的虚拟接入点的数量以及每个虛拟接入点能够 承载的用户数量;
根据接收的所述虚拟接入点的数量和所述每个虚拟接入点能够承载的用户 数量创建满足所述运营商租用需求的网络穿越隧道资源,其中所述网络穿越隧道 资源包括虚拟接入以及与虚拟接入点对接的业务通道;
向所述资源管理中心返回隧道资源创建模块创建的所述网络穿越隧道资源 的信息。
28、 根据权利要求 27所述的安全穿越服务器, 其特征在于:
所述处理器还用于接收来自终端的网络穿越隧道注册请求,所述网络穿越隧 道注册请求中携带有终端要访问的第一虛拟接入点信息、所述终端所属运营商的 标识以及所述运营商的核心网地址;
判断所述第一虚拟接入点是否为所述安全穿越服务器为所述终端选择的虚 拟接入点;
如果所述第一虚拟接入点不是所述安全穿越服务器为所述终端选择的虚拟 接入点,则根据所述运营商的标识在所述运营商租用的网络穿越隧道资源中为所 述终端选择第二虚拟接入点;
向所述终端返回网络穿越隧道注册成功消息,所述网络穿越隧道注册成功消 息中包含有所述选择模块选择的所述第二虚拟接入点的信息,使所述终端根据与 所述第二虚拟接入点建立的网络穿越隧道以及所述运营商的核心网地址访问所 述运营商的核心网。
29、 根据权利要求 2S所述的安全穿越服务器, 其特征在于:
所述处理器具体根据所述运营商的标识在所述运营商租用的网络穿越隧道 资源的信息中选择用户负载量最小或接入位置最近或探测响应最快的虚拟接入
30、 根据权利要求 28或 29所述的安全穿越服务器, 其特征在于: 如果所述第一虚拟接入点是所述安全穿越服务器为所述终端选择的虚拟接 入点, 所述处理器, 还用于向所述终端返回隧道注册成功消息, 使所述终端才艮据 与所述第一虚拟接入点建立的网络穿越隧道以及所述运营商的核心网地址访问 所述运营商的核心网。
31、 根据权利要求 27所述的安全穿越服务器, 其特征在于:
所述处理器还用于接收来自终端的接入点查询请求,所述查询请求中携带有 所述终端所属的运营商的标识;
根据所述接收模块接收的所述查询请求中的所述运营商的标识在所述运营 商租用的网络穿越隧道资源中选择虚拟接入点;
向所述终端返回查询响应消息,所述查询响应消息中包含有选择的虚拟接入 点的信息;
接收来自终端的隧道注册请求,所述隧道注册请求中包含有所述第二选择模 块选择的虚拟接入点信息和所述运营商的核心网地址;
向所述终端返回网络穿越隧道注册成功消息,使所述终端才艮据所述运营商的 核心网地址以及与所述虚拟接入点建立的网络穿越隧道访问所述运营商的核心 网。
32、 根据权利要求 31所述的安全穿越服务器, 其特征在于, 所述处理器具 体根据所述运营商的标识在所述运营商租用的网络穿越隧道资源的信息中选择 用户负载量最小或接入位置最近或探测响应最快的虚拟接入点。
33、一种安全穿越服务提供系统, 其特征在于, 包括虚拟接入点、 如权利要 求 12- 16任意一项所述的资源管理中心以及如权利要求 17- 23任意一项所述的安 全穿越服务器, 其中:
所述虚拟接入点,用于通过与终端之间建立的网络穿越隧道接收所述终端发 送的报文, 并将所述报文解封装后发送给运营商核心网;接收所述运营商核心网 返回的响应报文,将所述响应报文封装后通过所述网络穿越隧道发送给所述终端。
PCT/CN2012/084827 2012-11-19 2012-11-19 一种网络穿越服务的提供方法、装置及系统 WO2014075312A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP12888448.3A EP2819363B1 (en) 2012-11-19 2012-11-19 Method, device and system for providing network traversing service
PCT/CN2012/084827 WO2014075312A1 (zh) 2012-11-19 2012-11-19 一种网络穿越服务的提供方法、装置及系统
CN201280006197.9A CN103947172B (zh) 2012-11-19 2012-11-19 一种网络穿越服务的提供方法、装置及系统
US14/488,663 US9838261B2 (en) 2012-11-19 2014-09-17 Method, apparatus, and system for providing network traversing service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/084827 WO2014075312A1 (zh) 2012-11-19 2012-11-19 一种网络穿越服务的提供方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/488,663 Continuation US9838261B2 (en) 2012-11-19 2014-09-17 Method, apparatus, and system for providing network traversing service

Publications (1)

Publication Number Publication Date
WO2014075312A1 true WO2014075312A1 (zh) 2014-05-22

Family

ID=50730526

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/084827 WO2014075312A1 (zh) 2012-11-19 2012-11-19 一种网络穿越服务的提供方法、装置及系统

Country Status (4)

Country Link
US (1) US9838261B2 (zh)
EP (1) EP2819363B1 (zh)
CN (1) CN103947172B (zh)
WO (1) WO2014075312A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10349454B1 (en) 2018-05-16 2019-07-09 At&T Intellectual Property I, L.P. Software demarcation in edge computing environment

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9882713B1 (en) 2013-01-30 2018-01-30 vIPtela Inc. Method and system for key generation, distribution and management
US20140334336A1 (en) * 2013-05-10 2014-11-13 Relay2, Inc. Multi-Tenant Virtual Access Point- Network Resources Virtualization
US9473506B1 (en) 2013-10-15 2016-10-18 Progress Software Corporation Secure file transfer and notification server
US9531678B1 (en) 2013-10-15 2016-12-27 Progress Software Corporation On-premises data access and firewall tunneling
US9467478B1 (en) * 2013-12-18 2016-10-11 vIPtela Inc. Overlay management protocol for secure routing based on an overlay network
US10515538B2 (en) * 2014-11-24 2019-12-24 Carrier Corporation Communication systems
EP3251301A4 (en) * 2015-01-28 2018-10-10 Umbra Technologies Ltd. System and method for a global virtual network
US9980303B2 (en) 2015-12-18 2018-05-22 Cisco Technology, Inc. Establishing a private network using multi-uplink capable network devices
CN107306386B (zh) * 2016-04-22 2020-02-14 华为技术有限公司 接入点触发终端漫游的方法及接入点
US10856243B2 (en) * 2016-06-24 2020-12-01 The University Of Western Ontario System, method, and apparatus for end-to-end synchronization, adaptive link resource reservation and data tunneling
CN111130980B (zh) * 2016-06-29 2021-06-29 华为技术有限公司 用于实现组合虚拟专用网vpn的方法与装置
US10681677B2 (en) * 2016-12-27 2020-06-09 Intel Corporation Coordinated transmissions among virtual access points (VAPS)
US11051239B2 (en) * 2017-07-07 2021-06-29 Nokia Solutions And Networks Oy Multiple air interface aggregation supporting multivendor 4G/5G networks
US10616182B1 (en) 2017-11-30 2020-04-07 Progress Software Corporation Data access and firewall tunneling using a custom socket factory
JP7028035B2 (ja) * 2018-04-10 2022-03-02 日本電信電話株式会社 通信システム、及び通信方法
US11979826B2 (en) * 2021-09-29 2024-05-07 Hewlett Packard Enterprise Development Lp Selection of a transmitting VAP for a MBSSID set
CN114338153B (zh) * 2021-12-28 2023-07-25 杭州迪普科技股份有限公司 一种IPSec的协商方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060191005A1 (en) * 2005-02-23 2006-08-24 Sbc Knowledge Ventures, L.P. Centralized access control system and methods for distributed broadband access points
CN101599979A (zh) * 2009-07-10 2009-12-09 迈普通信技术股份有限公司 基于隧道的ip电信网实现方法
WO2010045264A1 (en) * 2008-10-13 2010-04-22 Spidercloud Wireless Method for encapsulating femtocell traffic
CN101843131A (zh) * 2007-11-01 2010-09-22 高通股份有限公司 在无线通信系统中的资源调节

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7000014B2 (en) * 1999-04-02 2006-02-14 Nortel Networks Limited Monitoring a virtual private network
US7415512B1 (en) * 2001-05-24 2008-08-19 Cisco Technology, Inc. Method and apparatus for providing a general purpose computing platform at a router on a network
US7379465B2 (en) * 2001-12-07 2008-05-27 Nortel Networks Limited Tunneling scheme optimized for use in virtual private networks
US20050026596A1 (en) * 2003-07-28 2005-02-03 Oren Markovitz Location-based AAA system and method in a wireless network
US7496651B1 (en) * 2004-05-06 2009-02-24 Foundry Networks, Inc. Configurable geographic prefixes for global server load balancing
JP4394590B2 (ja) * 2005-02-22 2010-01-06 株式会社日立コミュニケーションテクノロジー パケット中継装置および通信帯域制御方法
US8725138B2 (en) * 2005-03-30 2014-05-13 Alcatel Lucent Methods for network selection and discovery of service information in public wireless hotspots
US9288276B2 (en) * 2006-11-03 2016-03-15 At&T Intellectual Property I, L.P. Application services infrastructure for next generation networks including a notification capability and related methods and computer program products
US8543673B2 (en) * 2009-04-21 2013-09-24 Alcatel Lucent Rapid provisioning of network devices using automated configuration
US8498267B2 (en) * 2009-05-01 2013-07-30 At&T Mobility Ii Llc Access control for macrocell to femtocell handover
US8606173B2 (en) * 2009-06-11 2013-12-10 Electronics And Telecommunications Research Institute Communication relay method and apparatus based on object sensing function
JP5370946B2 (ja) * 2011-04-15 2013-12-18 株式会社日立製作所 リソース管理方法及び計算機システム
US8539055B2 (en) * 2011-06-30 2013-09-17 Aruba Networks, Inc. Device abstraction in autonomous wireless local area networks
US9276838B2 (en) * 2012-10-05 2016-03-01 Futurewei Technologies, Inc. Software defined network virtualization utilizing service specific topology abstraction and interface

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060191005A1 (en) * 2005-02-23 2006-08-24 Sbc Knowledge Ventures, L.P. Centralized access control system and methods for distributed broadband access points
CN101843131A (zh) * 2007-11-01 2010-09-22 高通股份有限公司 在无线通信系统中的资源调节
WO2010045264A1 (en) * 2008-10-13 2010-04-22 Spidercloud Wireless Method for encapsulating femtocell traffic
CN101599979A (zh) * 2009-07-10 2009-12-09 迈普通信技术股份有限公司 基于隧道的ip电信网实现方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2819363A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10349454B1 (en) 2018-05-16 2019-07-09 At&T Intellectual Property I, L.P. Software demarcation in edge computing environment
US10667308B2 (en) 2018-05-16 2020-05-26 At&T Intellectual Property I, L.P. Software demarcation in edge computing environment
US11083029B2 (en) 2018-05-16 2021-08-03 At&T Intellectual Property I, L.P. Software demarcation in edge computing environment

Also Published As

Publication number Publication date
US20150006737A1 (en) 2015-01-01
CN103947172B (zh) 2018-02-02
US9838261B2 (en) 2017-12-05
EP2819363A1 (en) 2014-12-31
CN103947172A (zh) 2014-07-23
EP2819363B1 (en) 2017-01-11
EP2819363A4 (en) 2015-05-20

Similar Documents

Publication Publication Date Title
WO2014075312A1 (zh) 一种网络穿越服务的提供方法、装置及系统
EP2590368B1 (en) Method, equipment and network system for terminal communicating with ip multimedia subsystem(ims) core network server by traversing private network
CN107995052B (zh) 用于针对有线和无线节点的公共控制协议的方法和设备
US8885649B2 (en) Method, apparatus, and system for implementing private network traversal
US9667485B2 (en) Methods and apparatus for a self-organized layer-2 enterprise network architecture
TWI578836B (zh) 多租戶虛擬存取點-網路資源虛擬化之技術
JP6619894B2 (ja) アクセス制御
EP3459318B1 (en) Using wlan connectivity of a wireless device
US9967738B2 (en) Methods and arrangements for enabling data transmission between a mobile device and a static destination address
WO2013056585A1 (zh) 一种虚拟私云接入认证方法及相关装置
US10454880B2 (en) IP packet processing method and apparatus, and network system
WO2013155943A1 (zh) 一种虚拟网络实现方法及系统
US9203694B2 (en) Network assisted UPnP remote access
CN103580980A (zh) 虚拟网络自动发现和自动配置的方法及其装置
WO2009132594A1 (zh) 实现私网之间转发数据的方法和系统
US8611358B2 (en) Mobile network traffic management
EP4131884A1 (en) Vxlan access authentication method and vtep device
WO2009143729A1 (zh) 实现dhcp用户业务批发的方法、系统和设备
WO2014029367A1 (zh) 一种动态配置方法及装置、系统
JPWO2017056201A1 (ja) 移動体通信システムのゲートウェイの制御装置
CN115442184A (zh) 一种接入系统及方法、接入服务器、系统及存储介质
CN104168302B (zh) 设备操控实现方法、系统和代理网关
WO2024000975A1 (zh) 一种会话建立系统、方法、电子设备及存储介质
JP5982706B2 (ja) セキュアトンネリング・プラットフォームシステムならびに方法
EP2804346B1 (en) Method and system for discovering dlna device automatically

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12888448

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2012888448

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2012888448

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE