WO2015100645A1 - 管理网络安全的方法及接入设备 - Google Patents

管理网络安全的方法及接入设备 Download PDF

Info

Publication number
WO2015100645A1
WO2015100645A1 PCT/CN2013/091178 CN2013091178W WO2015100645A1 WO 2015100645 A1 WO2015100645 A1 WO 2015100645A1 CN 2013091178 W CN2013091178 W CN 2013091178W WO 2015100645 A1 WO2015100645 A1 WO 2015100645A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
access device
online
network
authentication information
Prior art date
Application number
PCT/CN2013/091178
Other languages
English (en)
French (fr)
Inventor
黄河
吴文竞
王海军
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201380002558.7A priority Critical patent/CN104982004B/zh
Priority to PCT/CN2013/091178 priority patent/WO2015100645A1/zh
Publication of WO2015100645A1 publication Critical patent/WO2015100645A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Definitions

  • Embodiments of the present invention relate to the field of communications, and, more particularly, to a method and an access device for managing network security. Background technique
  • MAC1 is used to access the network.
  • the upper-level network device learns that MAC1 corresponds to the port where User A is located. If an illegal user User B exists and MAC 1 is used as the source MAC to access the network, MAC 1 in the upper-level network device will drift to the port where User B is located. Thus, the data originally sent to User A is sent to User B. Alternatively, User A uses IP1 to access the network.
  • the upper-layer network device learns the MAC address of User A through the ARP (Address Resolution Protocol) packet and generates an ARP entry.
  • ARP Address Resolution Protocol
  • the network device searches for the MAC address and port of User A based on IP1 based on the learned ARP entry, and then forwards the file to User A. If the user B is connected to the network, the ARP packet is sent to the user A. The ARP packet is sent to User B. The ARP packet is sent to User B. . Thus, the business of User A of legitimate users will be affected.
  • DHCP Dynamamic Host Configuration Protocol
  • PPPoE Point-to-Point Protocol over Ethernet
  • the embodiments of the present invention provide a method for managing network security and an access device, which can ensure network security without affecting user experience.
  • an embodiment of the present invention provides an access device for managing network security, including: a listening unit and a control unit, wherein, in a set period, the listening unit is configured to listen for a control message; If the detected control packet indicates that the corresponding user equipment is in the online process, the control unit is configured to forward the data packet of the user equipment, and after the user equipment is successfully online, use the online request message of the user equipment or the network side representation. The user equipment is successfully authenticated by the response packet to generate the authentication information. After the set period, the control unit is configured to use the generated authentication information to authenticate the data packet sent to the network side, and forward the authenticated data packet to the data packet. Network side.
  • the control unit is specifically configured to acquire the access device. Receiving the port information of the DHCP request message from the corresponding user equipment, and capturing the DHCP response message from the user equipment corresponding to the network device, and obtaining the Internet Protocol IP address of the corresponding user equipment from the DHCP response message, The obtained IP address and port information are combined to form authentication information.
  • the set period is not less than a user lease period of the user equipment.
  • the control unit is specifically configured to acquire the access device. After receiving the port information of the PPPoE request packet from the user equipment, after the user equipment is successfully online, the device obtains the media access control MAC address of the user equipment from the PPPoE request packet, and associates the obtained MAC address with the port information to form an authentication. information.
  • the set period is not less than a time interval for the user equipment to perform re-dialing.
  • control unit After a set period of time, the control unit is also used to discard packets that have not passed the authentication.
  • control unit is further configured to enable the network security function according to the configuration command.
  • the embodiment of the present invention provides a method for managing network security, including: in an established period, an access device listens to a control packet; if the intercepted control packet represents a corresponding user After the device is online, the device forwards the data packet of the user device. After the user device is successfully online, the device generates an authentication message by using the online request message of the user device or the response packet from the network side to indicate that the user device is successfully online. After the period, the access device authenticates the data packet sent to the network side by using the generated authentication information, and forwards the data packet that has passed the authentication to the network side.
  • the access device obtains the corresponding access on the access device.
  • the port information of the DHCP request packet of the user equipment captures the DHCP response packet from the user equipment that is correspondingly authenticated by the network side, and obtains the Internet Protocol IP address of the corresponding user equipment from the DHCP response message, and the obtained IP address will be obtained.
  • the address and port information are associated to form authentication information.
  • the set period is not less than a user lease period of the user equipment.
  • the access device obtains the access device from the access device. After the user equipment is successfully online, the user equipment obtains the media access control MAC address of the user equipment from the PPPoE request packet, and associates the obtained MAC address with the port information to form authentication information.
  • the set period is not less than a time interval for the user equipment to perform re-dialing.
  • the method further includes: the access device discarding the packet that fails the authentication.
  • the method before the access device is configured to listen to the control packet, the method further includes: the access device starts the network security function according to the configuration command. .
  • the access device Based on the above technical solution, the access device generates authentication information within a set period, but cannot help but The message transmission between the user equipment and the network side device is performed. After the set period, the access device authenticates the packets sent to the network, and forwards the authenticated packets to the network.
  • the embodiment of the invention does not affect the user experience while ensuring network security. At the same time, it reduces the difficulty of turning on the network security function in practical applications.
  • FIG. 1 is a schematic structural diagram of a communication system to which an embodiment of the present invention is applicable.
  • FIG. 2 is a schematic flow chart of a method for managing network security according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a method for managing network security according to another embodiment of the present invention.
  • FIG. 4 is a schematic block diagram of an access device according to an embodiment of the present invention.
  • FIG. 5 is a schematic block diagram of an access device according to another embodiment of the present invention. detailed description
  • FIG. 1 is a schematic structural diagram of a communication system to which an embodiment of the present invention is applicable.
  • the communication system of Fig. 1 includes user equipment (101a, 101b), access equipment 102, and network server 103.
  • the user equipment (101a, 101b) is connected to the access device 102, and the access device 102 is connected to the network server 103 via a network.
  • the number of user equipments, access devices, and network servers in the communication system is not limited in the embodiment of the present invention.
  • An access device provides an interface for communication between a network side device (eg, a network server) and a local exchange (connected to a user device).
  • a network side device eg, a network server
  • a local exchange connected to a user device.
  • OLT Optical Line Terminal
  • DSLAM Digital Subscriber Line Access Multiplexer
  • the network server provides network services for user equipment, which can support DHCP (Dynamic Host Configuration Protocol) and/or PPPoE (Point-to-Point). Protocol over Ethernet (Ethernet Point-to-Point Protocol) network server, for example, BRAS (Broadband Remote Access Server), DHCP server, etc.
  • MAC1 corresponds to the communication port in which the user equipment 101a is located in order to forward the network side data to be transmitted to the user equipment 101a to the communication port.
  • the access device 102 also learns that the MAC1 corresponds to the communication port where the user equipment 101b is located.
  • the access device 102 transmits the data sent to the user device 101a to the communication port where the user device 101b is located, affecting the normal service of the user device 101a.
  • the access device can enable the network security function to prevent the illegal user device from impersonating the legitimate user device for communication by dynamically binding the device's IP address or MAC address. If the user equipment 101a has completed the process of obtaining the legal IP address or the PPPoE dialing process, if the access device 102 starts the network security function, the legal IP address and MAC address of the user equipment cannot be obtained through the DHCP process or the PPPoE process. The service of the user equipment 101a is interrupted, that is, the message transmission between the user equipment 101a and the network side equipment is prohibited.
  • the normal service of the user equipment 101a can be restored only by informing the user equipment 101a to re-initiate the process of obtaining the legal IP by the DHCP or the PPPoE dialing process. This creates difficulties for opening network security functions and affects the user experience.
  • the embodiment of the invention provides a method for managing network security, which can smoothly open the network security function, and ensures network security without affecting the user experience.
  • FIG. 2 is a schematic flow chart of a method for managing network security according to an embodiment of the present invention.
  • the method 200 of FIG. 2 can be performed by an access device, such as the access device 102 shown in FIG.
  • the access device listens to the control packet during the set period.
  • the detected control packet indicates that the corresponding user equipment is in the online process, forward the data packet of the user equipment, and after the user equipment is successfully online, use the online request message of the user equipment or the user equipment from the network side.
  • the response message sent successfully on the line generates authentication information.
  • the access device uses the generated authentication information to authenticate the data packet sent to the network side, and forwards the data packet that has passed the authentication to the network side.
  • the access device Based on the above technical solution, the access device generates authentication information within a set period, but cannot help but The message transmission between the user equipment and the network side device is performed. After the set period, the access device authenticates the packets sent to the network, and forwards the authenticated packets to the network.
  • the embodiment of the invention does not affect the user experience while ensuring network security. At the same time, it reduces the difficulty of turning on the network security function in practical applications.
  • the message exchanged between the user equipment and the network server on the network side may have either a control message or a data message.
  • a transition period is set on the access device.
  • the access device listens to the control packet, collects the authentication information of the user equipment from the control packet, and collects the authentication information of the user equipment from the control packet.
  • the device's data packets are forwarded. The process of forwarding the data packet may be whether it is from a legitimate user equipment or an illegal user equipment.
  • the control packet transmitted between the user equipment and the network side device may continue to be listened to and the authentication information is maintained.
  • the authentication information is recreated, modified, or deleted according to the detected control message.
  • the access device acquires the DHCP request message from the corresponding user equipment on the access device.
  • the port information of the packet captures the DHCP response packet from the user equipment corresponding to the network side, and obtains the Internet Protocol IP address of the corresponding user equipment from the DHCP response packet, and associates the obtained IP address with the port information.
  • Authentication information can be included in the DHCP request message.
  • the DHCP response message can be a DHCP Ack message.
  • the set period is not less than a user lease of the user equipment.
  • the control packet transmitted between the user equipment and the network side device is not detected during the transition period because the set period is too short, so that the corresponding user equipment cannot be generated. Certification Information.
  • the access device determines that the user device is an illegal user, and prohibits the user device from transmitting packets between the device and the network device. Therefore, the performance of the access device management network security is improved, and the user experience is improved.
  • the access device obtains the port information of the PPPoE request packet received from the user equipment on the access device, where After the user equipment is successfully online, the device obtains the media access control MAC address of the user equipment from the PPPoE request packet, and associates the obtained MAC address with the port information to form authentication information.
  • the PPPoE request message can be a PADI report.
  • a packet or a PADR packet indicates that the packet that the user equipment successfully goes online can be a PADS packet.
  • the set period is not less than a time interval during which the user equipment performs re-dialing.
  • the control packet transmitted between the user equipment and the network side device is not detected during the transition period because the set period is too short, so that the corresponding user equipment cannot be generated. Certification Information.
  • the access device determines that the user device is an illegal user, and prohibits the user device from transmitting packets between the device and the network device. Therefore, the performance of the access device management network security is improved, and the user experience is improved.
  • the access device discards the unauthenticated message.
  • the access device before the access device listens to the control packet, the access device starts the network security function according to the configuration command.
  • the set period may be not less than the user lease period of the user equipment, and the user The lease period may be a fixed value set on the network server. If the detected control message indicates that all users are online through the PPPoE protocol, the set period may be not less than the user equipment to perform dial-up. Time interval; If the detected control message indicates that both protocols are used, the set period selects the larger of the user lease and the redial interval.
  • the access device uses the generated authentication information to authenticate the data packet sent to the network side
  • the IP address or MAC address carried in the intercepted data packet may be intercepted.
  • the correspondence between the communication ports of the data packets is compared with the correspondence table in the authentication information. If the user equipment is a valid user, the user equipment is authenticated. If the user equipment is an unauthorized user, the user equipment authentication fails.
  • the access device after the authentication information is generated, the access device maintains the authentication information according to the control message transmitted between the detected user equipment and the network side device.
  • the access device maintains the authentication information according to the intercepted control message, for example, modifying or deleting the authentication information.
  • the access device can ensure that the authentication information is valid in real time, and does not erroneously prohibit or allow the user equipment and the network.
  • the packets are transmitted between the side devices, which further enhances the user experience.
  • the access device after the set period of time, during the global maintenance, the access device maintains the authentication information according to the control packet transmitted between the user equipment and the network side device that is detected, and does not The device is not allowed to transmit packets between the user device and the network device.
  • the access device restores the packet transmission between the user device and the network device.
  • the access device maintains the normal maintenance authentication information (for example, creates, modifies, or deletes the authentication information), so that when the global maintenance is stopped, the normal network security management state can be quickly restored without having to go through a transition period first. .
  • the access device transmits the information between the user equipment and the network side device according to the interception.
  • the control packet is used to maintain the authentication information.
  • the user equipment in the VLAN is not allowed to transmit packets between the user equipment and the network side device.
  • the access device is restored to the non-authenticated user equipment and the network device. Perform message transmission.
  • the access device suspends the network security function of the access device in the VLAN, and the user equipment in the VLAN is not forbidden to transmit packets between the user equipment and the network side device.
  • the problem of accessing the network improves the user experience.
  • the access device maintains the authentication information (for example, creates, modifies, or deletes the authentication information), so that when the VLAN maintenance is stopped, the normal network security management state can be quickly restored without first having to go through a transition period. .
  • the access device transmits the control packet transmitted between the user equipment and the network side device according to the interception.
  • the authentication information is maintained.
  • the user equipment and the network side device are not allowed to transmit packets.
  • the access device is restored to the user equipment and network equipment that are not authenticated. Message transmission between the two.
  • the access device when the access device performs maintenance on the port corresponding to one of the user devices, the network security function of the user device is suspended, and the packet between the user device and the network device is no longer prohibited, so that the legitimate user cannot be accessed normally.
  • the problem of the network has improved the user experience.
  • the access device normally maintains authentication information (for example, creates, modifies, or deletes authentication information), so that when the global maintenance is stopped, the normal network security management state can be quickly restored without having to First go through a transition period.
  • FIG. 3 is a schematic flowchart of a method for managing network security according to another embodiment of the present invention. As shown
  • the access device can manage network security by following the steps below.
  • the user can set a transition period for the access device.
  • the access device listens for control packets transmitted between the user equipment and the network side device, and generates authentication information according to the control packet.
  • the access device can continue to listen to the control packet transmitted between the user equipment and the network side device, and maintain the authentication information according to the detected control packet, for example, modify or delete the authentication. information. This ensures the validity of the authentication information in real time, which in turn improves management efficiency.
  • the access device listens to control packets transmitted between the user equipment and the network side device. For example, the access device listens to the control packet that the user equipment interacts with the network side device during the process of obtaining the legal IP address. Alternatively, the access device listens for control packets transmitted between the user equipment and the network side device during the PPPoE dialing process.
  • the access device generates authentication information.
  • the access device generates the authentication information according to the control packet detected in step 301, for example, extracting an IP address or a MAC address from the control packet, and generating a correspondence table between the IP address or the MAC address and the communication port.
  • the correspondence table is used as authentication information.
  • the access device authenticates the user equipment when the user equipment receives the control packet or the data packet sent by the user equipment to the network side device, and allows the user equipment and the network side device to perform the packet exchange between the authenticated user equipment and the network side device. Transmission, prohibits the transmission of packets between the user equipment that has not passed the authentication and the network side device.
  • the user equipment sends a control packet or a data packet to the access device.
  • the packet is sent to the access device.
  • the access device authenticates the user equipment.
  • the access device needs to authenticate the user according to the control packet or data packet when the access device has received the control packet or data packet sent by the user equipment. If the correspondence between the IP address or the MAC address carried in the control packet or the data packet and the communication port is consistent with the correspondence between the authentication information, the user setting The device is authenticated. Otherwise, the user device authentication fails.
  • control packet or the data packet received from the user equipment in step 303 is forwarded to the network side device, and the user equipment can access the network normally.
  • step 303 the control packet or the data packet received from the user equipment is discarded in step 303, and the user equipment cannot access the network.
  • the access device Based on the foregoing technical solution, the access device generates the authentication information during the transition period after the network security function is enabled, but does not prohibit the message transmission between the user equipment and the network side device.
  • the access device authenticates the user equipment, and prohibits the packet transmission between the unauthenticated user equipment and the network side device.
  • the embodiment of the invention does not affect the user experience while ensuring network security. At the same time, it reduces the difficulty of turning on the network security function in practical applications.
  • the access device 40 of Figure 4 includes a listening unit 401 and a control unit 402.
  • the listening unit 401 is configured to listen for the control message
  • control unit 402 is configured to forward the data packet of the user equipment, and after the user equipment is successfully online, use the online request message of the user equipment or from the network side.
  • the authentication message is generated by the response packet indicating that the user equipment is successfully online;
  • control unit 402 is configured to authenticate the data packet sent to the network side by using the generated authentication information, and forward the data packet that has passed the authentication to the network side.
  • the access device Based on the foregoing technical solution, the access device generates the authentication information during the set period, but does not prohibit the message transmission between the user equipment and the network side device. After the set period, the access device authenticates the packets sent to the network and forwards the authenticated packets to the network.
  • the embodiment of the present invention does not affect the user experience while ensuring network security. At the same time, it reduces the difficulty of turning on the network security function in practical applications.
  • the message exchanged between the user equipment and the network server on the network side may have either a control message or a data message.
  • a transition period is set on the access device.
  • the access device listens to the control packet, collects the authentication information of the user equipment from the control packet, and collects the authentication information of the user equipment from the control packet.
  • the device's data packets are forwarded. The process of forwarding the data packet may be whether it is from a legitimate user equipment or an illegal user equipment.
  • the access device After the access device generates the authentication information, it can continue to listen to the user equipment and Control packets transmitted between network-side devices and maintain the authentication information. For example, the authentication information is recreated, modified, or deleted according to the detected control message.
  • the control unit 402 is specifically configured to: obtain the access device from the corresponding user equipment.
  • Port information of the DHCP request packet which captures the DHCP response packet from the user equipment that is correspondingly authenticated by the network side, and obtains the Internet Protocol IP address of the corresponding user equipment from the DHCP response packet, and obtains the IP address and port.
  • the information is combined to form authentication information.
  • the DHCP request message can be a DHCP Request message
  • the DHCP response message can be a DHCP Ack message.
  • the set period is not less than a user lease of the user equipment.
  • the control packet transmitted between the user equipment and the network side device is not detected during the transition period because the set period is too short, so that the corresponding user equipment cannot be generated. Certification Information.
  • the access device determines that the user device is an illegal user, and prohibits the user device from transmitting packets between the device and the network device. Therefore, the performance of the access device management network security is improved, and the user experience is improved.
  • the control unit 402 is specifically configured to obtain, by the access device, the PPPoE request packet from the user equipment. After the user equipment is successfully online, the device obtains the media access control MAC address of the user equipment from the PPPoE request packet, and associates the obtained MAC address with the port information to form authentication information.
  • the PPPoE request packet may be one of a PADI packet or a PADR packet, indicating that the packet successfully sent by the user equipment may be a PADS packet.
  • the set period is not less than a time interval for the user equipment to perform dialing.
  • the control packet transmitted between the user equipment and the network side device is not detected during the transition period because the set period is too short, so that the corresponding user equipment cannot be generated. Certification Information.
  • the access device determines that the user device is an illegal user, and prohibits the user device from transmitting packets between the device and the network device. Therefore, the performance of the access device management network security is improved, and the user experience is improved.
  • control unit 402 is further configured to discard the unauthenticated message.
  • control unit 402 is further configured to enable the network security function according to the configuration command.
  • control unit 402 is specifically configured to: in the authentication information, the correspondence between the IP address or the MAC address carried in the data packet and the communication port of the intercepted data packet The correspondence table is compared. If the user is a valid user, the user device is authenticated. If the user device is an unauthorized user, the user device fails to be authenticated.
  • control unit 402 is further configured to maintain the authentication information according to the control packet transmitted between the user equipment and the network side device that is detected by the intercepting unit 401.
  • the access device maintains the authentication information according to the intercepted control message, for example, modifying or deleting the authentication information.
  • the access device can ensure that the authentication information is valid in real time, and does not erroneously prohibit or allow the user equipment to transmit packets between the network device and the network side device, further improving the user experience.
  • control unit 402 when the global maintenance is performed, the control unit 402 is configured to: according to the control packet transmitted between the user equipment and the network side device that is detected by the listening unit, maintain the authentication information, and does not prohibit the authentication information.
  • the message transmission between the user equipment and the network side device is performed; when the global maintenance is stopped, the control unit 402 restores the message transmission between the user equipment that is not authenticated and the network device.
  • the control unit 402 normally maintains authentication information (for example, creates, modifies, or deletes authentication information), so that when the global maintenance is stopped, the access device can quickly return to the normal network security management state without first having to go through A transition period.
  • control unit when performing virtual local area network VLAN maintenance, the control unit
  • the 402 is configured to: according to the control packet transmitted between the user equipment and the network side device, which is monitored by the listening unit, maintains the authentication information, and does not prohibit the message transmission between the user equipment and the network side device in the VLAN; During the maintenance of the VLAN, the control unit 402 restores the message transmission between the user equipment that has not passed the authentication and the network device.
  • the control unit 402 normally maintains the authentication information (for example, creates, modifies, or deletes the authentication information), so that when the VLAN maintenance is stopped, the access device can quickly restore the normal network security management state without first having to go through the process. A transition period.
  • the control unit 402 when performing maintenance on the communication port corresponding to the user equipment, is configured to: according to the control packet transmitted between the user equipment and the network side device that is detected by the interception unit, The authentication information is maintained, and the user equipment and the network side device in the maintenance are not prohibited from performing the "3 ⁇ 4 text transmission"; when the communication port corresponding to the user equipment is stopped, the control unit 402 is restored to the user equipment and the network equipment that are not authenticated. Message transmission between the two.
  • the control unit 402 normally maintains authentication information (for example, creates, modifies, or deletes authentication information), so that when the global maintenance is stopped, the access device can quickly return to the normal network security management state without first having to go through a Transition period.
  • FIG. 5 is a schematic block diagram of an access device according to another embodiment of the present invention.
  • the access device 50 includes a transmit circuit 502, a receive circuit 503, a processor 504, a memory 505, and an interface 501.
  • Processor 504 controls the operation of access device 50 and can be used to process signals.
  • the processor 504 may also be referred to as a CPU (Central Processing Unit).
  • Memory 505 can include read only memory and random access memory and provides instructions and data to processor 504.
  • a portion of memory 505 may also include non-volatile line random access memory (NVRAM).
  • Transmitting circuit 502 and receiving circuit 503 can be coupled to interface 501.
  • NVRAM non-volatile line random access memory
  • bus system 509 which in addition to the data bus includes a power bus, a control bus, and a status signal bus.
  • bus system 509 various buses are labeled as bus system 509 in the figure.
  • the memory 505 can store instructions that cause the processor 504 to: listen for control messages during a set period of time;
  • the data packet of the user equipment is forwarded. After the user equipment is successfully online, the user equipment is requested to go online or the network side is used to indicate that the user equipment is successfully online.
  • the response message generates authentication information; After the set period of time, the data packets sent to the network side are authenticated by using the generated authentication information, and the authenticated data packets are forwarded to the network side.
  • the access device Based on the foregoing technical solution, the access device generates the authentication information during the set period, but does not prohibit the message transmission between the user equipment and the network side device. After the set period, the access device authenticates the packets sent to the network and forwards the authenticated packets to the network.
  • the embodiment of the present invention does not affect the user experience while ensuring network security. At the same time, it reduces the difficulty of turning on the network security function in practical applications.
  • the message exchanged between the user equipment and the network server on the network side may have either a control message or a data message.
  • a transition period is set on the access device.
  • the access device listens to the control packet, collects the authentication information of the user equipment from the control packet, and collects the authentication information of the user equipment from the control packet.
  • the device's data packets are forwarded. The process of forwarding the data packet may be whether it is from a legitimate user equipment or an illegal user equipment.
  • control packet transmitted between the user equipment and the network side device may continue to be listened to and the authentication information is maintained. For example, the authentication information is recreated, modified, or deleted according to the detected control message. Operation instructions:
  • the port information of the DHCP request packet from the corresponding user equipment is obtained on the access device, and the user corresponding to the network side is captured.
  • the DHCP response packet sent by the device is obtained.
  • the IP address of the corresponding user device is obtained from the DHCP response packet, and the obtained IP address and port information are associated with each other to form authentication information.
  • the set period is not less than the user lease of the user equipment.
  • the control packet transmitted between the user equipment and the network side device is not detected during the transition period because the set period is too short, so that the corresponding user equipment cannot be generated. Certification Information.
  • the access device determines that the user equipment is an illegal user, and prohibits the user equipment from transmitting packets between the user equipment and the network side device. Therefore, the performance of the access device management network security is improved, and the user experience is improved.
  • the access device obtains the port information of the PPPoE request packet from the user equipment on the access device. After the user equipment is successfully online, the PPPoE request is reported. The device obtains the media access control MAC address of the user equipment, and associates the obtained MAC address with the port information to form authentication information.
  • the set period is not less than the time interval for the user equipment to re-dial.
  • the control packet transmitted between the user equipment and the network side device is not detected during the transition period because the set period is too short, so that the corresponding user equipment cannot be generated. Certification Information.
  • the access device determines that the user device is an illegal user, and prohibits the user device from transmitting packets between the device and the network device. Therefore, the performance of the access device management network security is improved, and the user experience is improved.
  • the access device maintains the authentication information based on the control packets transmitted between the user equipment and the network-side device. The device does not prohibit the packet transmission between the user device and the network device. During maintenance, the access device reverts to the message transmission between the user equipment that is not authenticated and the network device.
  • the access device In this way, during the global maintenance of the access device, the network security function is suspended, and the packet between the user device and the network device is no longer prohibited. This prevents the legitimate user from accessing the network and improves the user experience.
  • the access device normally maintains authentication information (for example, creates, modifies, or deletes authentication information) so that it can be quickly stopped when global maintenance is stopped. Revert to normal network security management status without having to go through a transition period first.
  • the access device maintains the authentication information based on the control packets transmitted between the user equipment and the network device.
  • the user equipment in the VLAN is not allowed to transmit packets between the network device and the network device.
  • the access device restores the packet transmission between the user equipment that is not authenticated and the network device.
  • the access device suspends the network security function of the access device in the VLAN, and the user equipment in the VLAN is not forbidden to transmit packets between the user equipment and the network side device.
  • the problem of accessing the network improves the user experience.
  • the access device maintains the authentication information (for example, creates, modifies, or deletes the authentication information), so that when the VLAN maintenance is stopped, the normal network security management state can be quickly restored without first having to go through a transition period.
  • the access device When the preset communication period expires, if the communication port corresponding to the user equipment is maintained, the access device maintains the authentication information according to the control packet transmitted between the user equipment and the network side device, and does not prohibit maintenance. The message is transmitted between the user equipment and the network side device. When the communication port corresponding to the user equipment is stopped, the access device restores the packet transmission between the user equipment and the network device that are not authenticated.
  • the access device performs maintenance on the port corresponding to one of the user devices, the network security function of the user device is suspended, and the packet between the user device and the network device is no longer prohibited, so that the legitimate user cannot be accessed normally.
  • the problem of the network has improved the user experience.
  • the access device maintains the normal maintenance authentication information (for example, creates, modifies, or deletes the authentication information), so that when the global maintenance is stopped, the normal network security management state can be quickly restored without first having to go through a transition period.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, or an electrical, mechanical or other form of connection.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention contributes in essence or to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM),

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

 本发明实施例公开了一种管理网络安全的方法及接入设备,该方法包括:在设定的时期内,接入设备对控制报文进行侦听;如果侦听到的控制报文表征对应的用户设备处于上线过程,则转发用户设备的数据报文,在用户设备成功上线后,利用用户设备的上线请求报文或者来自网络侧表征用户设备上线成功的响应报文生成认证信息;经过设定的时期后,接入设备利用生成的认证信息对发往网络侧的数据报文进行认证,将通过认证的数据报文转发到网络侧。基于上述技术方案,本发明实施例在保证了网络安全的同时,不会影响用户体验。同时,降低了实际应用中开启网络安全功能的难度。

Description

管理网络安全的方法及接入设备 技术领域
本发明实施例涉及通信领域, 并且更具体地, 涉及一种管理网络安全的 方法及接入设备。 背景技术
随着网络环境复杂程度的加深,针对合法用户的各种网络攻击也随之产 生。较为常见的是对以太网转发要素中的 IP ( Internet Protocol , 互联网协议 ) 地址和 MAC ( Media Access Control, 媒体接入控制 )地址进行仿冒, 破坏 网络设备基于 IP地址和 MAC地址的转发表项, 进而影响合法用户上网。这 类攻击被称之为 MAC欺骗和 IP欺骗。
例如, 用户 User A为合法用户, 使用 MAC1访问网络, 上一级网络设 备将学习到 MAC1对应于 User A所在的端口。若此时存在一个非法用户 User B , 同样使用 MAC 1作为源 MAC访问网络, 则上一级网络设备中的 MAC 1 将漂移至 User B所在的端口。这样,原本发送给 User A的数据会发送给 User B。 或者, User A使用 IP1访问网络, 上一级网络设备通过 ARP ( Address Resolution Protocol, 地址解析协议 )报文学习到 User A的 MAC地址, 并生 成 ARP表项。 在进行下行转发时, 网络设备基于学习到的 ARP表项, 根据 IP1查找 User A的 MAC地址和所在端口, 然后将 文转发至 User A。 若此 时存在非法用户 User B , 使用与 User A相同的 IP地址 IP1访问网络, 发送 ARP报文干扰上一级网络设备的 ARP学习, 导致原本要发送给 User A的报 文将转发至 User B。 从而, 合法用户 User A的业务将受到影响。
由于最靠近用户侧的接入设备一般无法判断用户的合法性, 目前通常采 用 DHCP( Dynamic Host Configuration Protocol ,动态主机配置协议)和 PPPoE ( Point- to-Point Protocol over Ethernet, 以太网点到点协议 )对用户的 MAC 进行动态绑定, 要求用户访问网络时携带的 MAC地址必须是通过 DHCP过 程获取到合法 IP或通过 PPPoE完成拨号的 MAC地址, 否则禁止该用户访 问网络。
然而, 当网络设备已经处于运行状态, 大量合法用户已经完成了 DHCP 获取 IP地址或 PPPoE拨号过程, 且在访问网络。 若此时将防 MAC欺骗或 防 IP欺骗功能开启, 网络设备无法通过 DHCP和 PPPoE过程获取到用户设 备的合法 IP和 MAC地址, 将会中断所有用户设备的业务, 直到用户设备重 新发起 DHCP过程和 PPPoE拨号过程。 因此, 在实际应用中难以开启网络 安全功能, 严重影响了用户体验。 发明内容
本发明实施例提供了一种管理网络安全的方法及接入设备, 能够在保证 网络安全的同时, 不影响用户体验。
第一方面, 本发明实施例提供了一种管理网络安全的接入设备, 包括: 包括侦听单元和控制单元, 其中, 在设定的时期内, 侦听单元用于侦听控制 报文; 如果侦听到的控制报文表征对应的用户设备处于上线过程, 控制单元 用于, 转发用户设备的数据报文, 在用户设备成功上线后, 利用用户设备的 上线请求报文或者来自网络侧表征用户设备上线成功的响应报文生成认证 信息; 经过设定的时期后, 控制单元用于, 利用生成的认证信息对发往网络 侧的数据报文进行认证, 将通过认证的数据报文转发到网络侧。
结合第一方面, 在第一方面的第一种实现方式中, 如果侦听到的控制报 文表征对应的用户设备通过动态主机配置协议 DHCP协议上线,控制单元具 体用于,获取接入设备上接收来自对应的用户设备的 DHCP请求报文的端口 信息, 捕获来自网络侧表征对应的用户设备成功上线的 DHCP响应报文,从 DHCP响应报文中获取对应的用户设备的互联网协议 IP地址, 将获取的 IP 地址和端口信息对应起来形成认证信息。
结合第一方面及其上述实现方式, 在第一方面的第二种实现方式中, 设 定的时期不小于用户设备的用户租期。
结合第一方面及其上述实现方式, 在第一方面的第三种实现方式中, 如 果侦听到的报文表征用户设备通过以太网点对点 PPPoE协议上线,控制单元 具体用于, 获取接入设备上接收来自用户设备的 PPPoE请求报文的端口信 息,在用户设备成功上线后,从 PPPoE请求报文中获取用户设备的媒体接入 控制 MAC地址, 将获取的 MAC地址和端口信息对应起来形成认证信息。
结合第一方面及其上述实现方式, 在第一方面的第四种实现方式中, 设 定的时期不小于用户设备进行重新拨号的时间间隔。
结合第一方面及其上述实现方式, 在第一方面的第五种实现方式中, 经 过设定的时期后, 控制单元还用于, 丟弃未通过认证的报文。
结合第一方面及其上述实现方式, 在第一方面的第六种实现方式中, 控 制单元还用于, 根据配置命令开启网络安全功能。
第二方面, 本发明实施例提供了一种管理网络安全的方法, 包括: 在设 定的时期内, 接入设备对控制报文进行侦听; 如果侦听到的控制报文表征对 应的用户设备处于上线过程, 则转发用户设备的数据报文, 在用户设备成功 上线后, 利用用户设备的上线请求报文或者来自网络侧表征用户设备上线成 功的响应报文生成认证信息; 经过设定的时期后, 接入设备利用生成的认证 信息对发往网络侧的数据报文进行认证,将通过认证的数据报文转发到网络 侧。
结合第二方面, 在第一方面的第一种实现方式中, 如果侦听到的控制报 文表征对应的用户设备通过动态主机配置协议 DHCP协议上线,接入设备获 取接入设备上接收来自对应的用户设备的 DHCP请求报文的端口信息,捕获 来自网络侧表征对应的用户设备成功上线的 DHCP响应报文, 从 DHCP响 应 4艮文中获取对应的用户设备的互联网协议 IP地址, 将获取的 IP地址和端 口信息对应起来形成认证信息。
结合第二方面及其上述实现方式, 在第一方面的第二种实现方式中, 设 定的时期不小于用户设备的用户租期。
结合第二方面及其上述实现方式, 在第一方面的第三种实现方式中, 如 果侦听到的报文表征用户设备通过以太网点对点 PPPoE协议上线,接入设备 获取接入设备上接收来自用户设备的 PPPoE请求报文的端口信息,在用户设 备成功上线后,从 PPPoE请求报文中获取用户设备的媒体接入控制 MAC地 址, 将获取的 MAC地址和端口信息对应起来形成认证信息。
结合第二方面及其上述实现方式, 在第一方面的第四种实现方式中, 设 定的时期不小于用户设备进行重新拨号的时间间隔。
结合第二方面及其上述实现方式, 在第一方面的第五种实现方式中, 经 过设定的时期后, 该方法还包括: 接入设备丟弃未通过认证的报文。
结合第二方面及其上述实现方式, 在第一方面的第六种实现方式中, 在 接入设备对控制报文进行侦听之前, 该方法还包括: 接入设备根据配置命令 开启网络安全功能。
基于上述技术方案, 在设定的时期内, 接入设备生成认证信息, 但不禁 止用户设备与网络侧设备之间进行报文传输。 在设定的时期后, 接入设备对 发往网络侧的报文进行认证, 将通过认证的报文转发到网络侧。 本发明实施 例在保证了网络安全的同时, 不会影响用户体验。 同时, 降低了实际应用中 开启网络安全功能的难度。 附图说明
为了更清楚地说明本发明实施例的技术方案, 下面将对本发明实施例中 所需要使用的附图作筒单地介绍, 显而易见地, 下面描述中的附图仅仅是本 发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的 前提下, 还可以根据这些附图获得其他的附图。
图 1是本发明实施例可应用的通信系统的示意性结构图。
图 2是本发明一个实施例的管理网络安全的方法的示意性流程图。
图 3是本发明另一实施例的管理网络安全的方法的示意性流程图。
图 4是本发明一个实施例的接入设备的示意性框图。
图 5是本发明另一实施例的接入设备的示意性框图。 具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例是本发明的一部分实施例, 而不 是全部实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作出创 造性劳动的前提下所获得的所有其他实施例, 都应属于本发明保护的范围。
图 1是本发明实施例可应用的通信系统的示意性结构图。 图 1的通信系 统中括用户设备 ( 101a, 101b )、 接入设备 102和网络服务器 103。 在该通信 系统中, 用户设备(101a, 101b )连接到接入设备 102, 接入设备 102通过 网络连接到网络服务器 103。 本发明实施例对通信系统中用户设备、 接入设 备和网络服务器的数量不作限定。
接入设备为网络侧设备 (例如, 网络服务器 )与本地交换机(连接到用 户设备 )之间的通信提供接口。 例如, OLT ( Optical Line Terminal, 光线路 终端)和 DSLAM ( Digital Subscriber Line Access Multiplexer, 数字用户线集 中器)。 网络服务器为用户设备提供网络服务, 可以是支持 DHCP ( Dynamic Host Configuration Protocol, 动态主机配置十办议 )和 /或 PPPoE ( Point-to-Point Protocol over Ethernet, 以太网点对点协议) 的网络服务器, 例如, BRAS ( Broadband Remote Access Server, 宽带接入服务器)、 DHCP服务器等。
在接入设备上需要对合法用户提供安全上的保障,现实中往往合法用户 会受到非法用户个各种攻击。
例如, 假设用户设备 101a为合法用户, 使用 MAC1与网络侧设备 (例 如, 网络服务器 103 )进行通信。 接入设备 102将学习到 MAC1对应于用户 设备 101a所在的通信端口, 以便于将欲发送给用户设备 101a的网络侧数据 转发到该通信端口。此时,若非法用户设备 101b同样使用 MAC1访问网络, 接入设备 102也会学习到 MAC1对应于用户设备 101b所在的通信端口。 这 样, 接入设备 102会将发送给用户设备 101a的数据发送到用户设备 101b所 在的通信端口, 影响了用户设备 101a的正常业务。
这种情况下, 接入设备可以开启网络安全功能, 通过动态绑定用设备的 IP地址或 MAC地址, 来防止非法用户设备仿冒合法用户设备进行通信。 由 于用户设备 101a已经完成了 DHCP获取合法 IP的过程或 PPPoE拨号过程, 若此时接入设备 102 开启网络安全功能, 会因为无法通过 DHCP 过程或 PPPoE过程获取到用户设备的合法 IP和 MAC地址而中断用户设备 101a 的 业务, 也即禁止了用户设备 101a与网络侧设备之间进行报文传输。 只有通 知用户设备 101a重新发起 DHCP获取合法 IP的过程或者 PPPoE拨号过程, 才能恢复用户设备 101a的正常业务。 从而为开启网络安全功能带来了困难, 同时影响了用户体验。
本发明实施例提供一种管理网络安全的方法机接入设备, 能够平滑开启 网络安全功能, 在保证了网络安全的同时, 不会影响用户体验。
图 2是本发明一个实施例的管理网络安全的方法的示意性流程图。 图 2 的方法 200可以由接入设备执行, 例如, 图 1所示的接入设备 102。
201 , 在设定的时期内, 接入设备对控制报文进行侦听。
202, 如果侦听到的控制报文表征对应的用户设备处于上线过程, 则转 发用户设备的数据报文, 在用户设备成功上线后, 利用用户设备的上线请求 报文或者来自网络侧表征用户设备上线成功的响应报文生成认证信息。
203 , 经过设定的时期后, 接入设备利用生成的认证信息对发往网络侧 的数据报文进行认证, 将通过认证的数据报文转发到网络侧。
基于上述技术方案, 在设定的时期内, 接入设备生成认证信息, 但不禁 止用户设备与网络侧设备之间进行报文传输。 在设定的时期后, 接入设备对 发往网络侧的报文进行认证, 将通过认证的报文转发到网络侧。 本发明实施 例在保证了网络安全的同时, 不会影响用户体验。 同时, 降低了实际应用中 开启网络安全功能的难度。
应理解,用户设备和位于网络侧的网络服务器之间交互的报文既可能有 控制报文也可能有数据报文。 本实施例在接入设备上设定一个过渡的时期, 在这个设定的时期内, 由接入设备对控制报文进行侦听, 从控制报文中收集 用户设备的认证信息, 并对用户设备的数据报文进行转发。 其中, 对数据报 文进行转发的过程可以是不区分是来自合法的用户设备还是非法的用户设 备。
还应理解, 在接入设备生成认证信息之后, 还可以继续侦听用户设备与 网络侧设备之间传输的控制报文, 并维护该认证信息。 例如, 根据侦听到的 控制报文重新创建、 修改或者删除该认证信息。
可选地, 作为一个实施例, 如果侦听到的控制 "¾文表征对应的用户设备 通过动态主机配置协议 DHCP协议上线,接入设备获取接入设备上接收来自 对应的用户设备的 DHCP请求报文的端口信息,捕获来自网络侧表征对应的 用户设备成功上线的 DHCP响应报文, 从 DHCP响应报文中获取对应的用 户设备的互联网协议 IP地址, 将获取的 IP地址和端口信息对应起来形成认 证信息。 在这种情况下, DHCP请求报文可以是 DHCP Request报文, DHCP 响应报文可以是 DHCP Ack报文。
可选地, 作为另一实施例, 设定的时期不小于用户设备的用户租期。 这样, 在开启网络安全功能之后, 不会因为设定的时期太短, 导致在过 渡时段内没有侦听到用户设备与网络侧设备之间传输的控制报文,从而不能 生成该用户设备对应的认证信息。 在经过设定的时期后, 接入设备认定该用 户设备为非法用户, 禁止该用户设备与网络侧设备之间传输报文。 因此, 提 高了接入设备管理网络安全的性能, 同时提升了用户体验。
可选地, 作为另一实施例, 如果侦听到的报文表征用户设备通过以太网 点对点 PPPoE 协议上线, 接入设备获取接入设备上接收来自用户设备的 PPPoE请求报文的端口信息, 在用户设备成功上线后, 从 PPPoE请求报文 中获取用户设备的媒体接入控制 MAC地址, 将获取的 MAC地址和端口信 息对应起来形成认证信息。 在这种情况下, PPPoE请求报文可以是 PADI报 文或者 PADR报文中的一种,表明用户设备成功上线的报文可以是 PADS报 文。
可选地, 作为另一实施例, 设定的时期不小于用户设备进行重新拨号的 时间间隔。
这样, 在开启网络安全功能之后, 不会因为设定的时期太短, 导致在过 渡时段内没有侦听到用户设备与网络侧设备之间传输的控制报文,从而不能 生成该用户设备对应的认证信息。 在经过设定的时期后, 接入设备认定该用 户设备为非法用户, 禁止该用户设备与网络侧设备之间传输报文。 因此, 提 高了接入设备管理网络安全的性能, 同时提升了用户体验。
可选地, 作为另一实施例, 经过设定的时期后, 接入设备丟弃未通过认 证的报文。
可选地, 作为另一实施例, 在接入设备对控制报文进行侦听之前, 接入 设备根据配置命令开启网络安全功能。
可选地, 对于设定的时期的时长, 如果侦听到控制报文表明所有的用户 设备都是通过 DHCP协议上线,则设定的时期可以是不小于所述用户设备的 用户租期, 用户租期可以是网络服务器上设定的一个固定值; 如果侦听到的 控制报文表明所有的用户都是通过 PPPoE协议上线,则设定的时期可以是不 小于所述用户设备进行重新拨号的时间间隔; 如果侦听到的控制报文表明这 2种协议都会使用, 则设定的时期选择用户租期和重新拨号的时间间隔中较 大的一个。
可选地, 作为另一实施例, 接入设备利用生成的认证信息对发往网络侧 的数据报文进行认证时,可以将侦听到数据报文中携带的 IP地址或 MAC地 址与侦听到数据报文的通信端口的对应关系, 与认证信息中的对应关系表进 行比较。 如果与对应关系表一致, 说明该用户设备为合法用户, 该用户设备 通过认证; 如果与对应关系表不一致, 说明该用户设备为非法用户, 该用户 设备认证失败。
可选地, 作为另一实施例, 在生成认证信息之后, 接入设备根据侦听到 的用户设备与网络侧设备之间传输的控制报文, 维护认证信息。
这样, 接入设备根据侦听到的控制报文, 对认证信息进行维护, 例如, 修改或者删除该认证信息。 这种情况下, 在用户设备进行合法迁移时, 接入 设备能够保证该认证信息实时有效, 不会错误地禁止或允许用户设备与网络 侧设备之间传输报文, 进一步提升了用户体验。
可选地, 作为另一实施例, 经过设定的时期后, 在进行全局维护时, 接 入设备根据侦听到的用户设备与网络侧设备之间传输的控制报文, 维护认证 信息,不禁止用户设备与网络侧设备之间进行报文传输;在停止全局维护时, 接入设备恢复到禁止未通过认证的用户设备与网络设备之间进行报文传输。
这样, 接入设备进行全局维护的过程中, 暂停网络安全功能, 不再禁止 用户设备与网络侧设备之间传输报文,避免了合法用户不能正常访问网络的 问题, 提升了用户体验。 同时, 在全局维护期间接入设备正常维护认证信息 (例如, 创建、 修改或删除认证信息), 以便在停止全局维护时, 可以快速 恢复到正常的网络安全管理状态, 而不必先经历一个过渡时段。
可选地,作为另一实施例,经过设定的时期后,若进行虚拟局域网 VLAN ( Virtual Local Area Network, 虚拟局域网)维护, 接入设备根据侦听到的用 户设备与网络侧设备之间传输的控制报文,维护认证信息,不禁止 VLAN内 的用户设备与网络侧设备之间进行报文传输;在停止 VLAN维护时,接入设 备恢复到禁止未通过认证的用户设备与网络设备之间进行报文传输。
这样, 接入设备进行 VLAN维护的过程中, 暂停接入设备在该 VLAN 内的网络安全功能,不再禁止该 VLAN内的用户设备与网络侧设备之间传输 报文, 避免了合法用户不能正常访问网络的问题, 提升了用户体验。 同时, 在 VLAN维护期间接入设备正常维护认证信息(例如, 创建、修改或删除认 证信息), 以便在停止 VLAN维护时, 可以快速恢复到正常的网络安全管理 状态, 而不必先经历一个过渡时段。
可选地, 作为另一实施例, 经过设定的时期后, 在对用户设备对应的通 信端口进行维护时,接入设备根据侦听到的用户设备与网络侧设备之间传输 的控制报文, 维护认证信息, 不禁止维护中的用户设备与网络侧设备之间进 行报文传输; 在停止维护用户设备对应的通信端口时, 接入设备恢复到禁止 未通过认证的用户设备与网络设备之间进行报文传输。
这样, 接入设备对其中一个用户设备对应的端口进行维护时, 暂停对该 用户设备的网络安全功能, 不再禁止该用户设备与网络侧设备之间传输报 文, 避免了合法用户不能正常访问网络的问题, 提升了用户体验。 同时, 在 维护期间接入设备正常维护认证信息(例如, 创建、 修改或删除认证信息), 以便在停止全局维护时, 可以快速恢复到正常的网络安全管理状态, 而不必 先经历一个过渡时段。
下面将结合具体的例子详细描述本发明实施例。 应注意, 这些例子只是 为了帮助本领域技术人员更好地理解本发明实施例, 而非限制本发明实施例 的范围。
图 3是本发明另一实施例的管理网络安全的方法的示意性流程图。如图
3所示, 在接入设备开启网络安全功能后, 接入设备可以按照以下步骤管理 网络安全。
用户可以为接入设备设置一个过渡时段, 在过渡时段内, 接入设备侦听 用户设备与网络侧设备之间传输的控制报文, 并根据控制报文生成认证信 息。 另外, 在生成认证信息后, 接入设备可以继续侦听用户设备与网络侧设 备之间传输的控制报文, 并根据侦听到的控制报文对认证信息进行维护, 例 如, 修改或删除认证信息。 这样可以实时保证认证信息的有效性, 进而可以 提高管理效率。
301 , 接入设备侦听用户设备与网络侧设备之间传输的控制报文。 例如, 接入设备侦听用户设备 DHCP获取合法 IP地址过程中与网络侧设备交互的 控制报文。或者,接入设备侦听用户设备 PPPoE拨号过程中与网络侧设备之 间传输的控制报文。
302, 接入设备生成认证信息。 接入设备根据步骤 301 中侦听到的控制 报文生成认证信息, 例如, 从该控制报文中提取 IP地址或者 MAC地址, 生 成该 IP地址或 MAC地址与通信端口之间的对应关系表,将该对应关系表作 为认证信息。
在过渡时段期满后,接入设备接收到用户设备向网络侧设备发送的控制 报文或数据报文时, 对用户设备进行认证, 允许通过认证的用户设备与网络 侧设备之间进行报文传输, 禁止未通过认证的用户设备与网络侧设备之间进 行报文传输。
303 , 用户设备向接入设备发送控制报文或数据报文。 用户设备与网络 侧设备进行通信时, 先将报文发送至接入设备。
304, 接入设备对用户设备进行认证。 由于, 过渡时段已经期满, 接入 设备接收到用户设备发送的控制报文或数据报文时, 需要根据该控制报文或 数据报文对该用户进行认证。 若该控制报文或数据报文中携带的 IP地址或 MAC 地址与通信端口的对应关系与认证信息中的对应关系一致, 该用户设 备通过认证, 否则, 该用户设备认证失败。
305 , 认证通过时, 将在步骤 303 中从用户设备接收到的控制报文或数 据报文转发到网络侧设备, 该用户设备能够正常访问网络。
306, 认证失败时, 将在步骤 303 中从用户设备接收到的控制报文或数 据报文丟弃, 该用户设备不能访问网络。
基于上述技术方案, 在开启网络安全功能之后的过渡时段内, 接入设备 生成认证信息, 但不禁止用户设备与网络侧设备之间进行报文传输。 在过渡 时段期满时, 接入设备对用户设备进行认证, 禁止未通过认证的用户设备与 网络侧设备之间进行报文传输。 本发明实施例在保证了网络安全的同时, 不 会影响用户体验。 同时, 降低了实际应用中开启网络安全功能的难度。
图 4是本发明一个实施例的接入设备的示意性框图。图 4的接入设备 40 包括侦听单元 401和控制单元 402。
在设定的时期内, 侦听单元 401用于侦听控制报文;
如果侦听到的控制报文表征对应的用户设备处于上线过程, 控制单元 402用于, 转发用户设备的数据报文, 在用户设备成功上线后, 利用用户设 备的上线请求报文或者来自网络侧表征用户设备上线成功的响应报文生成 认证信息;
经过设定的时期后, 控制单元 402用于, 利用生成的认证信息对发往网 络侧的数据报文进行认证, 将通过认证的数据报文转发到网络侧。
基于上述技术方案, 在设定的时期内, 接入设备生成认证信息, 但不禁 止用户设备与网络侧设备之间进行报文传输。 在设定的时期后, 接入设备对 发往网络侧的报文进行认证, 将通过认证的报文转发到网络侧。 本发明实施 例在保证了网络安全的同时, 不会影响用户体验。 同时, 降低了实际应用中 开启网络安全功能的难度。
应理解,用户设备和位于网络侧的网络服务器之间交互的报文既可能有 控制报文也可能有数据报文。 本实施例在接入设备上设定一个过渡的时期, 在这个设定的时期内, 由接入设备对控制报文进行侦听, 从控制报文中收集 用户设备的认证信息, 并对用户设备的数据报文进行转发。 其中, 对数据报 文进行转发的过程可以是不区分是来自合法的用户设备还是非法的用户设 备。
还应理解, 在接入设备生成认证信息之后, 还可以继续侦听用户设备与 网络侧设备之间传输的控制报文, 并维护该认证信息。 例如, 根据侦听到的 控制报文重新创建、 修改或者删除该认证信息。
可选地, 作为一个实施例, 如果侦听到的控制 4艮文表征对应的用户设备 通过动态主机配置协议 DHCP协议上线,控制单元 402具体用于, 获取接入 设备上接收来自对应的用户设备的 DHCP请求报文的端口信息,捕获来自网 络侧表征对应的用户设备成功上线的 DHCP响应报文, 从 DHCP响应报文 中获取对应的用户设备的互联网协议 IP地址, 将获取的 IP地址和端口信息 对应起来形成认证信息。 在这种情况下, DHCP 请求报文可以是 DHCP Request报文, DHCP响应报文可以是 DHCP Ack报文。
可选地, 作为另一实施例, 设定的时期不小于用户设备的用户租期。 这样, 在开启网络安全功能之后, 不会因为设定的时期太短, 导致在过 渡时段内没有侦听到用户设备与网络侧设备之间传输的控制报文,从而不能 生成该用户设备对应的认证信息。 在经过设定的时期后, 接入设备认定该用 户设备为非法用户, 禁止该用户设备与网络侧设备之间传输报文。 因此, 提 高了接入设备管理网络安全的性能, 同时提升了用户体验。
可选地, 作为另一实施例, 如果侦听到的报文表征用户设备通过以太网 点对点 PPPoE协议上线,控制单元 402具体用于,获取接入设备上接收来自 用户设备的 PPPoE请求报文的端口信息,在用户设备成功上线后,从 PPPoE 请求报文中获取用户设备的媒体接入控制 MAC地址, 将获取的 MAC地址 和端口信息对应起来形成认证信息。 在这种情况下, PPPoE请求报文可以是 PADI报文或者 PADR报文中的一种, 表明用户设备成功上线的报文可以是 PADS才艮文。
可选地在, 作为另一实施例, 设定的时期不小于用户设备进行重新拨号 的时间间隔。
这样, 在开启网络安全功能之后, 不会因为设定的时期太短, 导致在过 渡时段内没有侦听到用户设备与网络侧设备之间传输的控制报文,从而不能 生成该用户设备对应的认证信息。 在经过设定的时期后, 接入设备认定该用 户设备为非法用户, 禁止该用户设备与网络侧设备之间传输报文。 因此, 提 高了接入设备管理网络安全的性能, 同时提升了用户体验。
可选地, 作为另一实施例, 经过设定的时期后, 控制单元 402还用于, 丟弃未通过认证的报文。 可选地, 作为另一实施例, 控制单元 402还用于, 根据配置命令开启网 络安全功能。
可选地, 作为另一实施例, 控制单元 402具体用于, 将侦听到数据报文 中携带的 IP地址或 MAC地址与侦听到数据报文的通信端口的对应关系,与 认证信息中的对应关系表进行比较。 如果与对应关系表一致, 说明该用户设 备为合法用户, 该用户设备通过认证; 如果与对应关系表不一致, 说明该用 户设备为非法用户, 该用户设备认证失败。
可选地, 作为另一实施例, 控制单元 402还用于, 根据侦听单元 401侦 听到的用户设备与网络侧设备之间传输的控制报文, 维护认证信息。
这样, 接入设备根据侦听到的控制报文, 对认证信息进行维护, 例如, 修改或者删除该认证信息。 这种情况下, 在用户设备进行合法迁移时, 接入 设备能够保证该认证信息实时有效, 不会错误地禁止或允许用户设备与网络 侧设备之间传输报文, 进一步提升了用户体验。
可选地, 作为另一实施例, 在进行全局维护时, 控制单元 402用于, 根 据侦听单元侦听到的用户设备与网络侧设备之间传输的控制报文, 维护认证 信息,不禁止用户设备与网络侧设备之间进行报文传输;在停止全局维护时, 控制单元 402恢复到禁止未通过认证的用户设备与网络设备之间进行报文传 输。
这样, 接入设备进行全局维护的过程中, 暂停网络安全功能, 不再禁止 用户设备与网络侧设备之间传输报文,避免了合法用户不能正常访问网络的 问题, 提升了用户体验。 同时, 在全局维护期间控制单元 402正常维护认证 信息 (例如, 创建、 修改或删除认证信息), 以便在停止全局维护时, 接入 设备可以快速恢复到正常的网络安全管理状态, 而不必先经历一个过渡时 段。
可选地, 作为另一实施例, 在进行虚拟局域网 VLAN维护时, 控制单元
402用于, 根据侦听单元侦听到的用户设备与网络侧设备之间传输的控制报 文, 维护认证信息,不禁止 VLAN内的用户设备与网络侧设备之间进行报文 传输;在停止 VLAN维护时,控制单元 402恢复到禁止未通过认证的用户设 备与网络设备之间进行报文传输。
这样, 接入设备进行 VLAN维护的过程中, 暂停接入设备在该 VLAN 内的网络安全功能,不再禁止该 VLAN内的用户设备与网络侧设备之间传输 报文, 避免了合法用户不能正常访问网络的问题, 提升了用户体验。 同时, 在 VLAN维护期间控制单元 402正常维护认证信息(例如, 创建、修改或删 除认证信息), 以便在停止 VLAN维护时, 接入设备可以快速恢复到正常的 网络安全管理状态, 而不必先经历一个过渡时段。
可选地, 作为另一实施例, 在对用户设备对应的通信端口进行维护时, 控制单元 402用于,根据侦听单元侦听到的用户设备与网络侧设备之间传输 的控制报文, 维护认证信息, 不禁止维护中的用户设备与网络侧设备之间进 行 "¾文传输; 在停止维护用户设备对应的通信端口时, 控制单元 402恢复到 禁止未通过认证的用户设备与网络设备之间进行报文传输。
这样, 接入设备对其中一个用户设备对应的端口进行维护时, 暂停对该 用户设备的网络安全功能, 不再禁止该用户设备与网络侧设备之间传输报 文, 避免了合法用户不能正常访问网络的问题, 提升了用户体验。 同时, 在 维护期间控制单元 402正常维护认证信息(例如, 创建、 修改或删除认证信 息), 以便在停止全局维护时, 接入设备可以快速恢复到正常的网络安全管 理状态, 而不必先经历一个过渡时段。
图 5是本发明另一实施例的接入设备的示意性框图。 的实施例中, 接入设备 50包括发射电路 502、 接收电路 503、 处理器 504、 存储器 505及接口 501。处理器 504控制接入设备 50的操作,并且可用于处 理信号。 处理器 504还可以称为 CPU ( Central Processing Unit, 中央处理单 元)。 存储器 505可以包括只读存储器和随机存取存储器, 并向处理器 504 提供指令和数据。存储器 505的一部分还可以包括非易失行随机存取存储器 ( NVRAM )。 发射电路 502和接收电路 503可以耦合到接口 501。 控制存储 设备机群磨损均衡的设备 50的各个组件通过总线系统 509耦合在一起, 其 中总线系统 509除包括数据总线之外, 还包括电源总线、 控制总线和状态信 号总线。 但是为了清楚说明起见, 在图中将各种总线都标为总线系统 509。
具体地, 存储器 505可存储使得处理器 504执行以下操作的指令: 在设定的时期内, 对控制报文进行侦听;
如果侦听到的控制报文表征对应的用户设备处于上线过程, 则转发用户 设备的数据报文, 在用户设备成功上线后, 利用用户设备的上线请求报文或 者来自网络侧表征用户设备上线成功的响应报文生成认证信息; 经过设定的时期后, 利用生成的认证信息对发往网络侧的数据报文进行 认证, 将通过认证的数据报文转发到网络侧。
基于上述技术方案, 在设定的时期内, 接入设备生成认证信息, 但不禁 止用户设备与网络侧设备之间进行报文传输。 在设定的时期后, 接入设备对 发往网络侧的报文进行认证, 将通过认证的报文转发到网络侧。 本发明实施 例在保证了网络安全的同时, 不会影响用户体验。 同时, 降低了实际应用中 开启网络安全功能的难度。
应理解,用户设备和位于网络侧的网络服务器之间交互的报文既可能有 控制报文也可能有数据报文。 本实施例在接入设备上设定一个过渡的时期, 在这个设定的时期内, 由接入设备对控制报文进行侦听, 从控制报文中收集 用户设备的认证信息, 并对用户设备的数据报文进行转发。 其中, 对数据报 文进行转发的过程可以是不区分是来自合法的用户设备还是非法的用户设 备。
还应理解, 在接入设备生成认证信息之后, 还可以继续侦听用户设备与 网络侧设备之间传输的控制报文, 并维护该认证信息。 例如, 根据侦听到的 控制报文重新创建、 修改或者删除该认证信息。 操作的指令:
如果侦听到的控制报文表征对应的用户设备通过动态主机配置协议 DHCP协议上线,获取接入设备上接收来自对应的用户设备的 DHCP请求报 文的端口信息,捕获来自网络侧表征对应的用户设备成功上线的 DHCP响应 报文, 从 DHCP响应报文中获取对应的用户设备的互联网协议 IP地址, 将 获取的 IP地址和端口信息对应起来形成认证信息。 作的指令:
设定的时期不小于用户设备的用户租期。
这样, 在开启网络安全功能之后, 不会因为设定的时期太短, 导致在过 渡时段内没有侦听到用户设备与网络侧设备之间传输的控制报文,从而不能 生成该用户设备对应的认证信息。 在经过设定的时期后, 接入设备认定该用 户设备为非法用户, 禁止该用户设备与网络侧设备之间传输报文。 因此, 提 高了接入设备管理网络安全的性能, 同时提升了用户体验。 作的指令:
如果侦听到的报文表征用户设备通过以太网点对点 PPPoE协议上线,接 入设备获取接入设备上接收来自用户设备的 PPPoE请求报文的端口信息,在 用户设备成功上线后, 从 PPPoE请求报文中获取用户设备的媒体接入控制 MAC地址, 将获取的 MAC地址和端口信息对应起来形成认证信息。 作的指令:
设定的时期不小于用户设备进行重新拨号的时间间隔。
这样, 在开启网络安全功能之后, 不会因为设定的时期太短, 导致在过 渡时段内没有侦听到用户设备与网络侧设备之间传输的控制报文,从而不能 生成该用户设备对应的认证信息。 在经过设定的时期后, 接入设备认定该用 户设备为非法用户, 禁止该用户设备与网络侧设备之间传输报文。 因此, 提 高了接入设备管理网络安全的性能, 同时提升了用户体验。 作的指令:
经过设定的时期后, 丟弃未通过认证的报文。 作的指令:
在接入设备对控制报文进行侦听之前, 根据配置命令开启网络安全功 能。 作的指令:
在进行全局维护时,接入设备根据侦听到的用户设备与网络侧设备之间 传输的控制报文, 维护认证信息, 不禁止用户设备与网络侧设备之间进行报 文传输; 在停止全局维护时, 接入设备恢复到禁止未通过认证的用户设备与 网络设备之间进行报文传输。
这样, 接入设备进行全局维护的过程中, 暂停网络安全功能, 不再禁止 用户设备与网络侧设备之间传输报文,避免了合法用户不能正常访问网络的 问题, 提升了用户体验。 同时, 在全局维护期间接入设备正常维护认证信息 (例如, 创建、 修改或删除认证信息), 以便在停止全局维护时, 可以快速 恢复到正常的网络安全管理状态, 而不必先经历一个过渡时段。 作的指令:
若进行虚拟局域网 VLAN维护,接入设备根据侦听到的用户设备与网络 侧设备之间传输的控制报文,维护认证信息,不禁止 VLAN内的用户设备与 网络侧设备之间进行报文传输;在停止 VLAN维护时,接入设备恢复到禁止 未通过认证的用户设备与网络设备之间进行报文传输。
这样, 接入设备进行 VLAN维护的过程中, 暂停接入设备在该 VLAN 内的网络安全功能,不再禁止该 VLAN内的用户设备与网络侧设备之间传输 报文, 避免了合法用户不能正常访问网络的问题, 提升了用户体验。 同时, 在 VLAN维护期间接入设备正常维护认证信息(例如, 创建、修改或删除认 证信息), 以便在停止 VLAN维护时, 可以快速恢复到正常的网络安全管理 状态, 而不必先经历一个过渡时段。 作的指令:
在预设的过渡时段期满时, 若对用户设备对应的通信端口进行维护, 接 入设备根据侦听到的用户设备与网络侧设备之间传输的控制报文, 维护认证 信息, 不禁止维护中的用户设备与网络侧设备之间进行报文传输; 在停止维 护用户设备对应的通信端口时,接入设备恢复到禁止未通过认证的用户设备 与网络设备之间进行报文传输。
这样, 接入设备对其中一个用户设备对应的端口进行维护时, 暂停对该 用户设备的网络安全功能, 不再禁止该用户设备与网络侧设备之间传输报 文, 避免了合法用户不能正常访问网络的问题, 提升了用户体验。 同时, 在 维护期间接入设备正常维护认证信息(例如, 创建、 修改或删除认证信息), 以便在停止全局维护时, 可以快速恢复到正常的网络安全管理状态, 而不必 先经历一个过渡时段。
应理解, 在本发明的各种实施例中, 上述各过程的序号的大小并不意味 着执行顺序的先后, 各过程的执行顺序应以其功能和内在逻辑确定, 而不应 对本发明实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到, 结合本文中所公开的实施例描述的各 示例的单元及算法步骤, 能够以电子硬件、 计算机软件或者二者的结合来实 现, 为了清楚地说明硬件和软件的可互换性, 在上述说明中已经按照功能一 般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执 行, 取决于技术方案的特定应用和设计约束条件。 专业技术人员可以对每个 特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超 出本发明的范围。
所属领域的技术人员可以清楚地了解到, 为了描述的方便和筒洁, 上述 描述的系统、 装置和单元的具体工作过程, 可以参考前述方法实施例中的对 应过程, 在此不再赘述。
在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统、 装置和 方法, 可以通过其它的方式实现。 例如, 以上所描述的装置实施例仅仅是示 意性的, 例如, 所述单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可 以有另外的划分方式, 例如多个单元或组件可以结合或者可以集成到另一个 系统, 或一些特征可以忽略, 或不执行。 另外, 所显示或讨论的相互之间的 耦合或直接耦合或通信连接可以是通过一些接口、装置或单元的间接耦合或 通信连接, 也可以是电的, 机械的或其它的形式连接。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作 为单元显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或 者全部单元来实现本发明实施例方案的目的。
另外, 在本发明各个实施例中的各功能单元可以集成在一个处理单元 中, 也可以是各个单元单独物理存在, 也可以是两个或两个以上单元集成在 一个单元中。 上述集成的单元既可以采用硬件的形式实现, 也可以采用软件 功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销 售或使用时, 可以存储在一个计算机可读取存储介质中。 基于这样的理解, 本发明的技术方案本质上或者说对现有技术做出贡献的部分, 或者该技术方 案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在 一个存储介质中, 包括若干指令用以使得一台计算机设备(可以是个人计算 机, 服务器, 或者网络设备等)执行本发明各个实施例所述方法的全部或部 分步骤。 而前述的存储介质包括: U盘、 移动硬盘、 只读存储器(ROM, Read-Only Memory )、 随机存取存储器 ( RAM, Random Access Memory )、 磁碟或者光盘等各种可以存储程序代码的介质。
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不局限 于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易 想到各种等效的修改或替换, 这些修改或替换都应涵盖在本发明的保护范围 之内。 因此, 本发明的保护范围应以权利要求的保护范围为准。

Claims

权利要求
1、 一种管理网络安全的方法, 其特征在于, 包括:
在设定的时期内, 接入设备对控制报文进行侦听;
如果侦听到的控制报文表征对应的用户设备处于上线过程, 则转发所述 用户设备的数据报文, 在所述用户设备成功上线后, 利用所述用户设备的上 线请求报文或者来自网络侧表征所述用户设备上线成功的响应报文生成认 证信息;
经过所述设定的时期后,所述接入设备利用生成的认证信息对发往网络 侧的数据报文进行认证, 将通过认证的数据报文转发到网络侧。
2、 根据权利要求 1所述的方法, 其特征在于, 如果所述侦听到的控制 报文表征对应的用户设备通过动态主机配置协议 DHCP协议上线,所述接入 设备获取所述接入设备上接收来自所述对应的用户设备的 DHCP请求报文 的端口信息,捕获来自网络侧表征所述对应的用户设备成功上线的 DHCP响 应报文,从所述 DHCP响应报文中获取所述对应的用户设备的互联网协议 IP 地址, 将获取的 IP地址和端口信息对应起来形成认证信息。
3、 根据权利要求 2所述的方法, 其特征在于, 所述设定的时期不小于 所述用户设备的用户租期。
4、 根据权利要求 1所述的方法, 其特征在于, 如果所述侦听到的报文 表征所述用户设备通过以太网点对点 PPPoE协议上线,所述接入设备获取所 述接入设备上接收来自所述用户设备的 PPPoE请求报文的端口信息,在所述 用户设备成功上线后,从所述 PPPoE请求报文中获取所述用户设备的媒体接 入控制 MAC地址,将获取的 MAC地址和端口信息对应起来形成认证信息。
5、 根据权利要求 4所述的方法, 其特征在于, 所述设定的时期不小于 所述用户设备进行重新拨号的时间间隔。
6、 根据权利要求 1至 5中任一项所述的方法, 其特征在于, 经过所述 设定的时期后, 所述方法还包括:
所述接入设备丟弃未通过认证的报文。
7、 根据权利要求 1至 6中任一项所述的方法, 其特征在于, 在所述接 入设备对控制报文进行侦听之前, 所述方法还包括:
所述接入设备根据配置命令开启网络安全功能。
8、 一种管理网络安全的接入设备, 其特征在于, 包括侦听单元和控制 单元, 其中,
在设定的时期内, 所述侦听单元用于侦听控制报文;
如果侦听到的控制报文表征对应的用户设备处于上线过程, 所述控制单 元用于, 转发所述用户设备的数据报文, 在所述用户设备成功上线后, 利用 所述用户设备的上线请求报文或者来自网络侧表征所述用户设备上线成功 的响应 艮文生成认证信息;
经过所述设定的时期后, 所述控制单元用于, 利用生成的认证信息对发 往网络侧的数据报文进行认证, 将通过认证的数据报文转发到网络侧。
9、 根据权利要求 8所述的接入设备, 其特征在于, 如果所述侦听到的 控制 文表征对应的用户设备通过动态主机配置协议 DHCP协议上线,所述 控制单元具体用于, 获取所述接入设备上接收来自所述对应的用户设备的 DHCP请求报文的端口信息, 捕获来自网络侧表征所述对应的用户设备成功 上线的 DHCP响应报文, 从所述 DHCP响应报文中获取所述对应的用户设 备的互联网协议 IP地址, 将获取的 IP地址和端口信息对应起来形成认证信 息。
10、 根据权利要求 9所述的接入设备, 其特征在于, 所述设定的时期不 小于所述用户设备的用户租期。
11、 根据权利要求 8所述的接入设备, 其特征在于, 如果所述侦听到的 报文表征所述用户设备通过以太网点对点 PPPoE协议上线,所述控制单元具 体用于,获取所述接入设备上接收来自所述用户设备的 PPPoE请求报文的端 口信息,在所述用户设备成功上线后,从所述 PPPoE请求报文中获取所述用 户设备的媒体接入控制 MAC地址, 将获取的 MAC地址和端口信息对应起 来形成认证信息。
12、 根据权利要求 11所述的接入设备, 其特征在于, 所述设定的时期 不小于所述用户设备进行重新拨号的时间间隔。
13、 根据权利要求 8至 12中任一项所述的接入设备, 其特征在于, 经 过所述设定的时期后, 所述控制单元还用于, 丟弃未通过认证的报文。
14、 根据权利要求 8至 13中任一项所述的接入设备, 其特征在于, 所 述控制单元还用于, 根据配置命令开启网络安全功能。
PCT/CN2013/091178 2013-12-31 2013-12-31 管理网络安全的方法及接入设备 WO2015100645A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201380002558.7A CN104982004B (zh) 2013-12-31 2013-12-31 管理网络安全的方法及接入设备
PCT/CN2013/091178 WO2015100645A1 (zh) 2013-12-31 2013-12-31 管理网络安全的方法及接入设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/091178 WO2015100645A1 (zh) 2013-12-31 2013-12-31 管理网络安全的方法及接入设备

Publications (1)

Publication Number Publication Date
WO2015100645A1 true WO2015100645A1 (zh) 2015-07-09

Family

ID=53492988

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/091178 WO2015100645A1 (zh) 2013-12-31 2013-12-31 管理网络安全的方法及接入设备

Country Status (2)

Country Link
CN (1) CN104982004B (zh)
WO (1) WO2015100645A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109451497A (zh) * 2018-11-23 2019-03-08 Oppo广东移动通信有限公司 无线网络连接方法及装置、电子设备、存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070121617A1 (en) * 2005-11-29 2007-05-31 Cisco Technology, Inc. Extending sso for DHCP snooping to two box redundancy
CN101098290A (zh) * 2006-06-29 2008-01-02 中兴通讯股份有限公司 一种在an上实现ip地址防欺骗的装置及其方法
CN101179583A (zh) * 2007-12-17 2008-05-14 杭州华三通信技术有限公司 一种防止用户假冒上网的方法及设备
CN101567883A (zh) * 2005-04-25 2009-10-28 华为技术有限公司 防止mac地址仿冒的实现方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1233135C (zh) * 2002-06-22 2005-12-21 华为技术有限公司 一种动态地址分配中防止ip地址欺骗的方法
CN1855812B (zh) * 2005-04-25 2010-04-28 华为技术有限公司 防止mac地址仿冒的实现方法和设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101567883A (zh) * 2005-04-25 2009-10-28 华为技术有限公司 防止mac地址仿冒的实现方法
US20070121617A1 (en) * 2005-11-29 2007-05-31 Cisco Technology, Inc. Extending sso for DHCP snooping to two box redundancy
CN101098290A (zh) * 2006-06-29 2008-01-02 中兴通讯股份有限公司 一种在an上实现ip地址防欺骗的装置及其方法
CN101179583A (zh) * 2007-12-17 2008-05-14 杭州华三通信技术有限公司 一种防止用户假冒上网的方法及设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109451497A (zh) * 2018-11-23 2019-03-08 Oppo广东移动通信有限公司 无线网络连接方法及装置、电子设备、存储介质
CN109451497B (zh) * 2018-11-23 2021-07-06 Oppo广东移动通信有限公司 无线网络连接方法及装置、电子设备、存储介质

Also Published As

Publication number Publication date
CN104982004B (zh) 2018-08-14
CN104982004A (zh) 2015-10-14

Similar Documents

Publication Publication Date Title
US9628441B2 (en) Attack defense method and device
US8886934B2 (en) Authorizing physical access-links for secure network connections
JP5111618B2 (ja) Macテーブルのオーバーフロー攻撃に対する防御を容易にすること
JP5921460B2 (ja) 認証方法、転送装置及び認証サーバ
CN105635084B (zh) 终端认证装置及方法
US20080092213A1 (en) Method, system and server for realizing secure assignment of dhcp address
JP5239341B2 (ja) ゲートウェイ、中継方法及びプログラム
CN104426837B (zh) Ftp的应用层报文过滤方法及装置
WO2010048865A1 (zh) 一种防止网络攻击的方法及装置
WO2011140795A1 (zh) 一种防止介质访问控制地址欺骗攻击的方法和交换设备
CN110266678B (zh) 安全攻击检测方法、装置、计算机设备及存储介质
WO2006114053A1 (fr) Procede, systeme et appareil visant a empecher la contrefacon d’une adresse mac
JP5864598B2 (ja) ユーザにサービスアクセスを提供する方法およびシステム
WO2008131658A1 (fr) Procédé et dispositif pour fureter le dhcp
WO2010022574A1 (zh) 单一地址反向传输路径转发的实现方法及装置
WO2008151548A1 (fr) Procédé et appareil pour empêcher l'usurpation de l'adresse de commande d'accès au support (mac) côté réseau
WO2023174143A1 (zh) 数据传输方法、设备、介质及产品
WO2010000157A1 (zh) 接入设备的配置方法、装置及系统
WO2012126335A1 (zh) 一种访问控制方法、接入设备及系统
JP2001326696A (ja) アクセス制御方法
CN101146103A (zh) 一种可实现宽带接入设备安全防护稳定性的方法
CN110035082B (zh) 一种交换机准入认证方法、交换机及系统
JP2005122695A (ja) 認証方法、サーバ計算機、クライアント計算機、および、プログラム
KR20170038568A (ko) Sdn 컨트롤러 및 sdn 컨트롤러에서의 스위치 식별 방법
WO2015100645A1 (zh) 管理网络安全的方法及接入设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13900630

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13900630

Country of ref document: EP

Kind code of ref document: A1