WO2017114128A1 - 一种报文处理方法及装置 - Google Patents

一种报文处理方法及装置 Download PDF

Info

Publication number
WO2017114128A1
WO2017114128A1 PCT/CN2016/109074 CN2016109074W WO2017114128A1 WO 2017114128 A1 WO2017114128 A1 WO 2017114128A1 CN 2016109074 W CN2016109074 W CN 2016109074W WO 2017114128 A1 WO2017114128 A1 WO 2017114128A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
network
address
gateway
common
Prior art date
Application number
PCT/CN2016/109074
Other languages
English (en)
French (fr)
Inventor
尹朕昊
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017114128A1 publication Critical patent/WO2017114128A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Definitions

  • the embodiments of the present invention relate to the field of communications technologies, and in particular, to a message processing method and apparatus for a data communication network.
  • a Data Communication Network (DCN) system is used to provide network devices with communication functions for managing access and managing control information, so that remote deployment and management of each device can be completed in the network management system.
  • the related gateway network element implements the NAT forwarding function of the TCP packet based on the network protocol layer.
  • the gateway network element assigns a special port number to the common network element, and the port number corresponds to the internal network IP address of the common network element.
  • the network management system calculates the destination port number of the common network element in the TCP three-way handshake process.
  • the gateway network element receives the TCP of the NMS and the common network element.
  • the protocol link request is calculated according to the destination port number included in the command issued by the NMS, and the special port number is calculated according to the rules for assigning a special port.
  • the destination port of the TCP protocol is changed to the special port number of the common network element, and the destination IP address is a common network element. The IP address, so as to achieve the forwarding of TCP protocol packets.
  • a related gateway network element implements NAT forwarding of TCP packets, it takes two port numbers to manage one common network element. If multiple common network elements are managed, a large number of port resources are occupied, causing ports. Waste of resources.
  • the embodiment of the present invention is to provide a packet processing method and apparatus, which overcomes the problem of a large number of occupied port resources caused by the gateway network element being sent to the ordinary network element packet under the forwarding network management.
  • the embodiment of the invention provides a packet forwarding method, and the gateway network element is based on the received network management
  • the ordinary network element ID in the delivered TCP packet reads the internal network IP address corresponding to the common network element network element ID from the database, and the destination IP address in the TCP packet according to the internal network IP address. And modifying the internal network IP address of the common network element, and forwarding the TCP packet to the common network element.
  • the network element is configured to:
  • the method includes the following steps: the TCP packet sent by the network management system received by the gateway network element is encrypted by using an SSL protocol.
  • the gateway network element before receiving the TCP packet sent by the network management system, the gateway network element further includes the following steps: configuring, by the network management system, a working mode of the gateway network element as a gateway network element mode, and setting the gateway network element to be managed.
  • the internal network IP address and the network element ID of the common network element; the gateway network element will store the internal network IP address and the network element ID of the common network element delivered by the network management system in the database through the TCP packet.
  • the method further includes the following steps: if the working mode of the gateway network element is configured in the normal network element mode, the gateway network element normally responds to the network management.
  • a computer storage medium is further provided, and the computer storage medium may store an execution instruction, where the execution instruction is used to execute the message processing method in the foregoing embodiment.
  • the gateway network element is directly configured by the network management system, and the network element ID field is added in the data part of the TCP protocol packet, and the gateway network element is used for the network management by using the correspondence between the internal network IP address of the common network element and the network element ID.
  • the forwarding of the packets sent to the common network element overcomes the problem that the related gateway network element performs NAT packet forwarding and occupies a large amount of port resources, thereby saving port resources.
  • the present invention utilizes the SSL protocol for the network management and gateway network elements.
  • the packets transmitted between the gateways are encrypted, which improves the reliability of packet transmission between the gateway NE and the NMS, that is, the security of the application layer in the gateway NE mode.
  • FIG. 1 is a schematic structural diagram of a DCN system according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a packet forwarding process according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a specific process of a packet forwarding instance according to an embodiment of the present invention.
  • the DCN network system architecture shown in FIG. 1 relates to an network management system (EMS), a gateway network element (GNE), and a common network element (NE), and the network management system, the gateway network element, and the common network element and a connection line between them or
  • the network constitutes a DCN system, wherein the network management system and the gateway network element are connected and directly accessible to each other; the gateway network element and a plurality of ordinary network elements directly or indirectly connected thereto form an administrative domain, so the gateway network element is The packet forwarding between the common NE and the NMS is implemented during the communication.
  • the network management system provides a human-computer interaction interface, and configures and manages the gateway network element and the common network element.
  • the network management system is used as a TCP/IP client and all common network elements are built. After the network element is connected to the network element, the network management system configures the gateway network element. The network management system selects any common network element, and the working mode of the common network element is modified into a gateway network element.
  • the gateway network element Entering an IP address, setting an intranet IP address and an NE ID of all common network elements to be managed by the gateway network element, and then the network management system works the access mode and access IP address of the gateway network element, and the gateway network element
  • the intranet IP address and the NE ID of all the common NEs to be managed are sent to the gateway NE through TCP packets. After receiving the above information, the gateway NE saves the information to the database.
  • a common network element as a server of TCP/IP, can be built with a network management or gateway network element.
  • the gateway network element can be built with the network management system or the common network element as a TCP/IP server and a network management link to establish an SSL session to encrypt the packets transmitted between the network management and the network.
  • a TCP/IP client As a TCP/IP client. Establish a chain with an ordinary network element to establish an SSL session.
  • the gateway network element reads from the database and the common network according to the common network element ID in the received TCP packet sent by the network management system.
  • the internal network IP address corresponding to the network element ID of the network element, and the TCP packet sent by the network management system is forwarded to the common network element according to the internal network IP address.
  • the TCP packet includes a TCP packet header and data.
  • the present invention adds a field, a 4-byte network element ID, and a 4-byte network management ID to the data portion of the TCP packet.
  • FIG. 2 is a flowchart of a method in which a gateway network element forwards a packet sent by a network management to a common network element according to an embodiment of the present invention.
  • the network management system is used as a TCP/IP client to establish a chain with all common network elements.
  • the NMS performs information configuration on the gateway network element.
  • the information configuration includes the following steps: the network management system selects any common network element, and the working mode of the common network element is modified into a gateway network element, and the access IP address of the gateway network element is configured, and the gateway network element needs to be added.
  • the internal network IP address and NE ID of the managed common NE is configured, and the gateway network element needs to be added.
  • the network management device sends the working mode, the access IP address, the internal network IP address of the common network element, and the network element ID of the gateway network element to the gateway network element by using the TCP packet, where the gateway network element receives the foregoing The information is saved to the database.
  • the network management system uses the SSL protocol to encrypt the TCP packets sent to the common network element.
  • the gateway network element decrypts the received TCP packet by using an SSL protocol.
  • the gateway network element reads the configuration information in the database to obtain the working mode. If the network element mode is normal, the network management mode is normal. In the case of the gateway network element mode, it is determined whether the network element ID in the received TCP packet is current. The network element ID of the network element, if yes, the gateway network element processes the TCP packet, if not, the network element ID is the network element ID of the common network element, and searches for the corresponding in the database according to the network element ID.
  • the internal network IP address of the common network element is used to modify the destination IP address in the TCP packet to the internal network IP address of the common network element, and forward the TCP packet to the common network element.
  • the ordinary network element After receiving the TCP packet, the ordinary network element changes the destination IP address of the packet to the IP address of the gateway network element, and sends the packet to the gateway network element.
  • the gateway network element receives the TCP packet reported by the common network element, and uses the destination IP address in the packet. Change the address to the IP address of the NMS and return the packet to the NMS.
  • the IP address of the U2000 is set to 10.1.1.1.
  • the network management ID is set to 1.
  • the IP address of the gateway NE is set to 10.1.1.2, the NE ID is set to 2, and the IP address of the common NE is set to 2.2. 2.2, the NE ID is set to 3.
  • the network management system sends a TCP packet encrypted by the SSL protocol to the gateway network element.
  • the gateway network element decrypts the received TCP packet, and obtains the source IP address of the packet as the IP address of the network management system (10.1.1.1).
  • the address is the IP address of the gateway NE (10.1.1.2), the NE ID is 3, and the network management ID is 1. It is determined that the NE ID in the received TCP packet is not the ID of the current gateway NE, and the gateway NE receives it.
  • the source IP address of the TCP packet is the IP address of the network management system (10.1.1.1)
  • the destination IP address is the IP address of the common network element (2.2.2.2)
  • the NE ID is 3.
  • the network management system ID is 1.
  • the gateway network element forwards the TCP packet to an ordinary network element.
  • the ordinary network element processes the TCP packet.
  • the source IP address of the TCP packet is the IP address of the common network element (2.2.2.2), and the destination IP address is the IP address of the gateway NE. (10.1.1.2), the network element ID is 3, the network management ID is 1, and the TCP packet is sent to the gateway network element, and the gateway network element processes the TCP packet, and the source IP address of the TCP packet is The IP address of the common network element (2.2.2.2), the destination IP address is the IP address of the network management system (10.1.1.1), the network element ID is 3, and the network management ID is 1.
  • the TCP packet is forwarded to the NMS.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the gateway network element reads the intranet IP address corresponding to the common network element network element ID from the database according to the common network element ID in the received TCP packet, and sends the TCP report according to the internal network IP address.
  • the destination IP address in the text is changed to the internal network IP address of the common network element, and the TCP packet is forwarded to the common network element.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the gateway network element is directly configured by the network management system, and the network element ID field is added in the data part of the TCP protocol packet, and the gateway network is implemented by using the correspondence between the internal network IP address of the common network element and the network element ID.
  • the packet is forwarded to the common network element by the network management device, which overcomes the problem that the related gateway network element performs NAT packet forwarding and occupies a large number of port resources, thereby saving port resources.
  • the present invention utilizes the SSL protocol for the network management system and the gateway.
  • the packets transmitted between the NEs are encrypted, which improves the reliability of packet transmission between the gateway NE and the NMS, that is, the security of the application layer in the gateway NE mode.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明实施例提出一种报文转发方法,网关网元根据接收到的网管下发的TCP报文中的普通网元ID从其数据库中读取与所述普通网元网元ID对应的内网IP地址,根据所述内网IP地址将TCP报文中的目的IP地址将TCP报文中的目的IP地址修改为所述普通网元的内网IP地址,将所述TCP报文转发给所述普通网元。实现网管与普通网元之间的报文转发,克服了相关的网关网元进行NAT报文转发大量占用端口资源的问题。

Description

一种报文处理方法及装置 技术领域
本发明实施例涉及通讯技术领域,尤其涉及一种数据通讯网络的报文处理方法及装置。
背景技术
目前采用数据通信网络(Data Communication Network,DCN)系统来为网络设备提供管理接入、管理控制信息的通信功能,从而可以在网管中完成对各个设备的远程部署和管理。相关的网关网元基于网络协议层实现TCP报文NAT转发功能,网关网元分配特殊端口号给普通网元,该端口号与该普通网元的内网IP地址对应。在管理普通网元时,在TCP三次握手过程中,网管按照网关网元分配特殊端口号规则进行计算,获取普通网元的目的端口号,此时网关网元接收到网管和普通网元的TCP协议链接请求,根据网管下发命令中包含的目的端口号按照分配特殊端口的规则计算获得特殊端口号,重新更改TCP协议的目的端口为该普通网元特殊端口号,目的IP地址为普通网元的IP地址,从而达到TCP协议报文的转发。
通过上述描述可以发现,相关的网关网元在实现TCP报文NAT转发时,管理一个普通网元需要占用两个端口号,若管理多个普通网元时,会占用大量的端口资源,造成端口资源浪费。
发明内容
有鉴于此,本发明的实施例期望通过提出一种报文处理方法及装置,以克服网关网元在转发网管下发给普通网元报文时造成的大量占用端口资源的问题。
为了实现上述发明目的,本发明的技术方案是这样实现的:
本发明的实施例提出一种报文转发方法,网关网元根据接收到的网管 下发的TCP报文中的普通网元ID从其数据库中读取与所述普通网元网元ID对应的内网IP地址,根据所述内网IP地址将TCP报文中的目的IP地址修改为所述普通网元的内网IP地址,将所述TCP报文转发给所述普通网元。
可选地包括如下步骤:所述网关网元将接收到的所述普通网元发送的TCP报文中的目的IP地址修改为网管的IP地址,将报文返回给所述网管。
可选地包括如下步骤:所述网关网元接收到的网管下发的TCP报文采用SSL协议进行加密。
可选地的,所述网关网元在接收网管下发的TCP报文之前,还包括如下步骤:通过网管配置网关网元的工作模式为网关网元模式,设置所述网关网元需要管理的普通网元的内网IP地址和网元ID;所述网关网元将通过TCP报文接收网管下发的普通网元的内网IP地址和网元ID存入数据库中。
可选地的,还包括如下步骤:若通过网管配置网关网元的工作模式为普通网元模式,则所述网关网元正常应答网管。
在本发明实施例中,还提供了一种计算机存储介质,该计算机存储介质可以存储有执行指令,该执行指令用于执行上述实施例中的报文处理方法。
本发明实施例通过网管直接配置网关网元,并在TCP协议报文的数据部分增加网元ID字段,利用普通网元的内网IP地址和网元ID的对应关系,实现网关网元对网管下发给普通网元报文的转发,克服了相关的网关网元进行NAT报文转发大量占用端口资源的问题,节省了端口资源,同时,本发明利用SSL协议对在网管和网关网元之间传输的报文进行加密,提高了网关网元和网管之间报文传输的可靠性,即网关网元模式下应用层的安全性。
附图说明
图1为本发明实施例提供的DCN系统架构图;
图2为本发明实施例提供的报文转发流程示意图;
图3为本发明实施例提供的一种报文转发实例的具体过程示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。
如图1所示的DCN网络系统架构,涉及网管(EMS),网关网元(GNE)和普通网元(NE),所述网管、网关网元和普通网元及它们之间的连接线路或网络构成DCN系统,其中,所述网管与网关网元实现连接且互相之间可以直接访问;网关网元与多个与之直接或者间接连接的普通网元构成一个管理域,因此网关网元在通讯过程中实现普通网元与网管之间的报文转发。
在所述DCN系统中,所述网管,提供人机交互界面,对网关网元和普通网元进行配置和管理,网管作为TCP/IP的客户端和所有普通网元进行建链。在完成和普通网元的建链后,网管进行网关网元的配置,网管选择任一普通网元,将所述普通网元的工作模式修改为网关网元,配置所述网关网元的接入IP地址,设置所述网关网元需要管理的所有普通网元的内网IP地址和网元ID,然后网管将所述网关网元的工作模式和接入IP地址,以及所述网关网元需要管理的所有普通网元的内网IP地址和网元ID通过TCP报文发给网关网元,网关网元接收到上述信息后,将所述信息保存到数据库中。
普通网元,作为TCP/IP的服务端可以与网管或网关网元进行建链。
网关网元,可以与网管或普通网元进行建链,作为TCP/IP的服务端和网管建链,建立SSL会话,对与网管之间传输的报文进行加密;作为TCP/IP的客户端和普通网元建链,建立SSL会话。所述网关网元根据接收到的网管下发的TCP报文中的普通网元ID从数据库中读取与所述普通 网元网元ID对应的内网IP地址,根据所述内网IP地址将所述网管下发TCP报文转发给所述普通网元。
通常TCP报文包括TCP报文头和数据两部分,本发明在TCP报文的数据部分增加了一字段,4字节的网元ID和4字节的网管ID。
如图2所示为本发明实施例,网关网元将网管下发的报文转发给普通网元的流程图。
S1,网管作为TCP/IP的客户端和所有普通网元进行建链。
S2,网管对网关网元进行信息配置。
所述信息配置包括如下步骤:网管选取任一普通网元,将所述普通网元的工作模式修改为网关网元,配置所述网关网元的接入IP地址,添加所述网关网元需要管理的普通网元的内网IP地址和网元ID。
S3,网管通过TCP报文将所述网关网元的工作模式、接入IP地址、普通网元的内网IP地址和网元ID发送给网关网元,所述网关网元将接收到的前述信息保存到数据库中。
S4,网管利用SSL协议对下发给普通网元的TCP报文进行加密。
S5,网关网元对接收到的TCP报文利用SSL协议进行解密。
S6,网关网元读取数据库中的配置信息,获取工作模式,若是普通网元模式,则正常应答网管,若是网关网元模式,则判断接收到的TCP报文中的网元ID是否为当前网元的网元ID,若是,网关网元对所述TCP报文进行处理,若不是,则该网元ID为普通网元的网元ID,根据所述网元ID在数据库中查找对应的普通网元的内网IP地址,将TCP报文中的目的IP地址修改为所述普通网元的内网IP地址,并将所述TCP报文转发给所述普通网元。
S7,普通网元接收到TCP报文后,将报文中目的IP地址修改为网关网元的IP地址,将报文发送给网关网元。
S8,网关网元收到普通网元上报的TCP报文,将报文中的目的IP地 址修改为网管的IP地址,将报文返回给网管。
如图3所示,网管的IP地址设置为10.1.1.1网管ID设置为1,网关网元的IP地址设置为10.1.1.2,网元ID设置为2,普通网元的IP地址设置为2.2.2.2,网元ID设置为3。
网管下发利用SSL协议加密的TCP报文给网关网元,网关网元对接收到TCP报文进行解密处理,获得该报文的源IP地址是网管的IP地址(10.1.1.1),目的IP地址是网关网元的IP地址(10.1.1.2),网元ID是3,网管ID是1,判断接收到的TCP报文中的网元ID不是当前网关网元的ID,网关网元接收到所述TCP报文后进行处理,此时TCP报文的源IP地址是网管的IP地址(10.1.1.1),目的IP地址是普通网元的IP地址(2.2.2.2),网元ID是3,网管ID是1,所述网关网元将所述TCP报文转发给普通网元。接收到TCP报文后,普通网元对所述TCP报文处理,此时TCP报文的源IP地址是普通网元的IP地址(2.2.2.2),目的IP地址是网关网元的IP地址(10.1.1.2),网元ID是3,网管ID是1,将所述TCP报文发给网关网元,所述网关网元对TCP报文处理,此时TCP报文的源IP地址是普通网元的IP地址(2.2.2.2),目的IP地址是网管的IP地址(10.1.1.1),网元ID是3,网管ID是1,将所述TCP报文转发给网管。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,网关网元根据接收到的网管下发的TCP报文中的普通网元ID从其数据库中读取与普通网元网元ID对应的内网IP地址,根据内网IP地址将TCP报文中的目的IP地址修改为普通网元的内网IP地址,将TCP报文转发给普通网元。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。
工业实用性
在本发明实施例中,通过网管直接配置网关网元,并在TCP协议报文的数据部分增加网元ID字段,利用普通网元的内网IP地址和网元ID的对应关系,实现网关网元对网管下发给普通网元报文的转发,克服了相关的网关网元进行NAT报文转发大量占用端口资源的问题,节省了端口资源,同时,本发明利用SSL协议对在网管和网关网元之间传输的报文进行加密,提高了网关网元和网管之间报文传输的可靠性,即网关网元模式下应用层的安全性。

Claims (5)

  1. 一种报文转发方法,
    网关网元根据接收到的网管下发的TCP报文中的普通网元ID从其数据库中读取与所述普通网元网元ID对应的内网IP地址,根据所述内网IP地址将TCP报文中的目的IP地址修改为所述普通网元的内网IP地址,将所述TCP报文转发给所述普通网元。
  2. 如权利要求1所述的方法,其中,还进一步包括如下步骤:
    所述网关网元将接收到的所述普通网元发送的TCP报文中的目的IP地址修改为网管的IP地址,将报文返回给所述网管。
  3. 如权利要求1或2所述的方法,其中:
    所述网关网元接收到的网管下发的TCP报文采用SSL协议进行加密。
  4. 如权利要求1或2所述的方法,其中,所述网关网元在接收网管下发的TCP报文之前,还包括如下步骤:
    通过网管配置网关网元的工作模式为网关网元模式,设置所述网关网元需要管理的普通网元的内网IP地址和网元ID;
    所述网关网元将通过TCP报文接收网管下发的普通网元的内网IP地址和网元ID存入数据库中。
  5. 如权利要求4所述方法,其中:
    若通过网管配置网关网元的工作模式为普通网元模式,则所述网关网元正常应答网管。
PCT/CN2016/109074 2015-12-31 2016-12-08 一种报文处理方法及装置 WO2017114128A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201511030374.9 2015-12-31
CN201511030374.9A CN106936615A (zh) 2015-12-31 2015-12-31 一种报文处理方法及装置

Publications (1)

Publication Number Publication Date
WO2017114128A1 true WO2017114128A1 (zh) 2017-07-06

Family

ID=59224461

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/109074 WO2017114128A1 (zh) 2015-12-31 2016-12-08 一种报文处理方法及装置

Country Status (2)

Country Link
CN (1) CN106936615A (zh)
WO (1) WO2017114128A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917621B (zh) * 2019-05-10 2021-09-07 烽火通信科技股份有限公司 通信设备的网管服务器与网元的通信方法及系统
CN110445770B (zh) * 2019-07-18 2022-07-22 平安科技(深圳)有限公司 网络攻击源定位及防护方法、电子设备及计算机存储介质
CN112637068B (zh) * 2020-12-04 2021-09-21 广州爱浦路网络技术有限公司 网络数据转发方法、计算机装置、计算机网络和存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094104A (zh) * 2007-07-30 2007-12-26 中兴通讯股份有限公司 一种通过安全网管代理进行设备管理的方法及其装置
CN101141281A (zh) * 2006-09-06 2008-03-12 中兴通讯股份有限公司 一种网管和非网关网元通讯的方法
US20090201832A1 (en) * 2008-02-07 2009-08-13 Frederick Brown Methods and systems for preventing the misconfiguration of osrp and osi/isis networks using a network management system
CN101834742A (zh) * 2010-05-06 2010-09-15 烽火通信科技股份有限公司 通过网管服务器远程配置网元的方法
CN102308523A (zh) * 2011-07-27 2012-01-04 华为技术有限公司 数据通信网络配置方法、网关网元及数据通信系统
CN103379187A (zh) * 2012-04-28 2013-10-30 中兴通讯股份有限公司 一种数据处理方法及网关网元

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141281A (zh) * 2006-09-06 2008-03-12 中兴通讯股份有限公司 一种网管和非网关网元通讯的方法
CN101094104A (zh) * 2007-07-30 2007-12-26 中兴通讯股份有限公司 一种通过安全网管代理进行设备管理的方法及其装置
US20090201832A1 (en) * 2008-02-07 2009-08-13 Frederick Brown Methods and systems for preventing the misconfiguration of osrp and osi/isis networks using a network management system
CN101834742A (zh) * 2010-05-06 2010-09-15 烽火通信科技股份有限公司 通过网管服务器远程配置网元的方法
CN102308523A (zh) * 2011-07-27 2012-01-04 华为技术有限公司 数据通信网络配置方法、网关网元及数据通信系统
CN103379187A (zh) * 2012-04-28 2013-10-30 中兴通讯股份有限公司 一种数据处理方法及网关网元

Also Published As

Publication number Publication date
CN106936615A (zh) 2017-07-07

Similar Documents

Publication Publication Date Title
EP3471375B1 (en) Method and apparatus for managing field device based on cloud server
US10686568B2 (en) Active flow diagnostics for cloud-hosted networks
JP5948362B2 (ja) コンピュータネットワークの動的な移行
US8713305B2 (en) Packet transmission method, apparatus, and network system
US9819511B2 (en) Bidirectional forwarding detection over a virtual extensible local area network
EP3313025B1 (en) Data packet forwarding
EP2996287B1 (en) Method for notifying information of pe device and pe device
US11558247B2 (en) Method and apparatus for implementing composed virtual private network VPN
EP2946534B1 (en) Automated control plane for limited user destruction
CN104852840B (zh) 一种控制虚拟机之间互访的方法及装置
WO2018053686A1 (zh) 安全策略部署方法与装置
EP3245768B1 (en) Bidirectional forwarding detection over network virtualization using generic routing encapsulation
CN108390937B (zh) 远程监控方法、装置及存储介质
WO2017114128A1 (zh) 一种报文处理方法及装置
CN109257392B (zh) 一种命令处理方法、装置、服务器和存储介质
CN107078946A (zh) 业务流处理策略的处理方法、装置和系统
CN109743316B (zh) 数据传输方法、出口路由器、防火墙及双台防火墙系统
US9912592B2 (en) Troubleshooting openflow networks
TWI510956B (zh) 交換器及用於在將複數個裝置連接至動態電腦網路之交換器中使用之方法
US20140075541A1 (en) Systems and methods for accessing resources through a firewall
Pawar et al. Segmented proactive flow rule injection for service chaining using SDN
KR20140122171A (ko) 네트워크 모니터링 및 패킷 검사 장치 및 방법
WO2016082363A1 (zh) 用户数据管理方法及装置
US10742480B2 (en) Network management as a service (MaaS) using reverse session-origination (RSO) tunnel
CN105791458A (zh) 地址配置方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16880918

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16880918

Country of ref document: EP

Kind code of ref document: A1