WO2018014803A1 - 报文转发 - Google Patents

报文转发 Download PDF

Info

Publication number
WO2018014803A1
WO2018014803A1 PCT/CN2017/093100 CN2017093100W WO2018014803A1 WO 2018014803 A1 WO2018014803 A1 WO 2018014803A1 CN 2017093100 W CN2017093100 W CN 2017093100W WO 2018014803 A1 WO2018014803 A1 WO 2018014803A1
Authority
WO
WIPO (PCT)
Prior art keywords
vxlan
packet
tunnel
gateway device
bras
Prior art date
Application number
PCT/CN2017/093100
Other languages
English (en)
French (fr)
Inventor
刘建锋
Original Assignee
新华三技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新华三技术有限公司 filed Critical 新华三技术有限公司
Priority to US16/318,118 priority Critical patent/US10924299B2/en
Priority to EP17830437.4A priority patent/EP3490197B1/en
Priority to JP2019502732A priority patent/JP6722816B2/ja
Publication of WO2018014803A1 publication Critical patent/WO2018014803A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • H04L12/4625Single bridge functionality, e.g. connection of two networks over a single bridge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2592Translation of Internet protocol [IP] addresses using tunnelling or encapsulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L2012/4629LAN interconnection over a backbone network, e.g. Internet, Frame Relay using multilayer switching, e.g. layer 3 switching

Definitions

  • the Broadband Remote Access Server is an access gateway for broadband network applications. It is located at the edge layer of the backbone network and can complete the user's bandwidth IP (Internet Protocol)/ATM (Asynchronous Transfer Mode). , Asynchronous Transfer Mode) Data access to the network to achieve broadband access to commercial buildings and residential households.
  • IP Internet Protocol
  • ATM Asynchronous Transfer Mode
  • the BRAS In the metropolitan area network (MAN) networking model, the BRAS is deployed in the aggregation room of the metropolitan area network, and the broadband user terminal is connected to the aggregation switch (HJSW) by an OLT (Optical Line Terminal). HJSW is connected to the BRAS.
  • HJSW aggregation switch
  • FIG. 1 is a schematic diagram of a networking architecture of a metropolitan area network according to an exemplary embodiment of the present disclosure.
  • FIG. 2 is a flowchart of a process performed after a gateway device receives a VXLAN message through a first VXLAN tunnel according to an exemplary embodiment of the present disclosure.
  • FIG. 3 is a flowchart of a process performed after a gateway device receives a VXLAN message through a second VXLAN tunnel according to an exemplary embodiment of the present disclosure.
  • FIG. 4 is a schematic diagram of a hardware structure of a gateway device according to an exemplary embodiment of the present disclosure.
  • FIG. 5 is a schematic structural diagram of a gateway device according to an exemplary embodiment of the present disclosure.
  • FIG. 6 is another schematic structural diagram of a gateway device according to an exemplary embodiment of the present disclosure.
  • the following embodiments of the present disclosure provide a packet forwarding method, and a gateway device to which the method can be applied.
  • the controller may maintain a resource pool that includes multiple BRAS network elements, all BRAS network elements function peer-to-peer, and may back up each other; the controller may access the BRAS network in the resource pool.
  • the elements are grouped, and at least two BRAS network elements are divided into the same group.
  • the BRAS network element can be a physical BRAS device or a BRAS virtualization software (vBRAS) based on an x86 server platform.
  • controller 100 groups BRAS network elements, where packet 1 includes BRAS network elements 101-103.
  • the controller 100 assigns the packet 1 to the aggregation switch (HJSW) 105.
  • a gateway device 104 is added between the aggregation switch (HJSW) 105 and its corresponding BRAS network elements 101 to 103.
  • the gateway device 104 may be a switch or a router.
  • a VXLAN (Virtual EXtensible LAN) tunnel is established between the aggregation switch 105 and the gateway device 104; a VXLAN tunnel is established between the gateway device 104 and the BRAS network elements 101 to 103; and the user terminal accesses through the OLT 106.
  • Aggregation switch 105 A QinQ (two-layer label) tunnel is established between the OLT 106 and the aggregation switch 105.
  • a VXLAN tunnel is configured on the aggregation switch 105.
  • the source IP address of the VXLAN tunnel is the IP address of the aggregation switch 105, and the destination IP address is the IP address of the gateway device 104.
  • the VSI is created on the aggregation switch 105. Create a VXLAN inside; associate the AC (access circuit) interface, the VSI, and the VXLAN tunnel. Thus, on the aggregation switch 105, the AC interface, the VSI, the VXLAN tunnel, and the VXLAN form a correspondence.
  • the VXLAN tunnel for the aggregation switch 105 is configured on the gateway device 104, and is referred to as a first VXLAN tunnel.
  • the source IP address of the first VXLAN tunnel is the IP address of the gateway device 104
  • the destination IP address is the IP address of the aggregation switch 105.
  • a VXLAN tunnel is configured on the gateway device 104, which is called a second VXLAN tunnel.
  • the source IP address of the second VXLAN tunnel is the IP address of the gateway device 104
  • the destination IP address is the BRAS.
  • the VSI, the second VXLAN tunnel, the first VXLAN tunnel, and the VXLAN form a correspondence.
  • a VXLAN tunnel is configured on each BRAS network element in the packet 1.
  • the source IP address of the VXLAN tunnel is the IP address of the BRAS network element, and the destination IP address is the IP address of the gateway device 104.
  • the BRAS network element is created on the BRAS network element.
  • VSI creating a VXLAN within the VSI; binding the VSI to the VXLAN tunnel.
  • the VSI, VXLAN tunnel, and VXLAN form a corresponding relationship.
  • the controller 100 establishes a VXLAN tunnel between the aggregation switch 105 and the gateway device 104; and establishes a VXLAN tunnel between the gateway device 104 and each BRAS network element in the packet 1 to obtain a set of VXLAN tunnels.
  • the user terminal can access the BRAS network element through the aggregation switch 105.
  • the process of MAC address learning and packet forwarding in the uplink direction of the user terminal ⁇ BRAS network element is as follows:
  • the user terminal sends a unicast user message.
  • the aggregation switch 105 After receiving the unicast user packet from the AC interface, the aggregation switch 105 determines the VXLAN to which the unicast user packet belongs, and learns the source MAC address of the unicast user packet, that is, the MAC address corresponding to the VXLAN. Adding a MAC entry containing the mapping between the source MAC address and the AC interface in the address table; searching for the corresponding VXLAN tunnel in the MAC address table according to the destination MAC address of the unicast user packet, according to the VXLAN tunnel pair After the unicast user packet is encapsulated in the VXLAN, the encapsulated VXLAN packet is forwarded to the gateway device 104.
  • the gateway device 104 After receiving the VXLAN message through the first VXLAN tunnel, the gateway device 104 decapsulates the VXLAN packet to obtain a unicast user packet, and determines the VXLAN to which the VXLAN packet belongs, and the source MAC address of the unicast user packet. An address is learned, that is, a MAC entry containing a correspondence between the source MAC address and the first VXLAN tunnel is added to the MAC address table corresponding to the VXLAN; and the MAC address is based on the destination MAC address of the unicast user packet. After the unicast user packet is VXLAN encapsulated, the encapsulated VXLAN packet is forwarded to the BRAS network element through the second VXLAN tunnel.
  • the BRAS network element After receiving the VXLAN packet, the BRAS network element decapsulates the VXLAN packet to obtain a unicast user packet, and determines the VXLAN to which the VXLAN packet belongs, and learns the source MAC address of the unicast user packet. Adding a MAC entry containing the mapping between the source MAC address and the VXLAN tunnel of the VXLAN packet in the MAC address table corresponding to the VXLAN, and processing the unicast user packet accordingly, for example, The encapsulated protocol packet is sent to the protocol stack, and the decapsulated data packet is forwarded to the public network.
  • the process of processing MAC address learning and packet forwarding in the downlink direction of the BRAS network element ⁇ user terminal is as follows:
  • the BRAS network element determines the VXLAN to which the unicast user message belongs, and searches for the VXLAN corresponding MAC address table according to the destination MAC address corresponding to the unicast user message. After the VXLAN encapsulation is performed on the VXLAN tunnel, the encapsulated VXLAN packet is forwarded to the gateway device 104 through the VXLAN tunnel.
  • the unicast user message to be sent may be, for example, a unicast user message generated by the BRAS network element itself, or a unicast user message received by the BRAS network element from the public network; the unicast user message
  • the destination MAC address may be the destination MAC address of the unicast user packet, or the MAC address corresponding to the destination IP address carried in the unicast user packet.
  • the gateway device 104 After receiving the VXLAN message through the second VXLAN tunnel, the gateway device 104 decapsulates the VXLAN packet to obtain a unicast user packet, and determines the VXLAN to which the VXLAN packet belongs, and the source MAC address of the unicast user packet. An address is learned, that is, a MAC entry containing a correspondence between the source MAC address and the second VXLAN tunnel is added to the MAC address table corresponding to the VXLAN; and the MAC address is based on the destination MAC address of the unicast user packet. After the unicast user packet is VXLAN encapsulated, the encapsulated VXLAN packet is sent to the aggregation switch 105 through the first VXLAN tunnel.
  • the aggregation switch 105 After receiving the VXLAN packet, the aggregation switch 105 decapsulates the VXLAN packet to obtain a unicast user packet, and determines the VXLAN to which the VXLAN packet belongs, and learns the source MAC address of the unicast user packet. That is, a MAC entry containing a correspondence between the source MAC address and the VXLAN tunnel receiving the VXLAN message is added to the MAC address table corresponding to the VXLAN; and the MAC address is based on the destination MAC address of the unicast user packet. The corresponding AC interface is searched in the address table, and the unicast user packet is forwarded to the user terminal through the AC interface.
  • the gateway device 104 needs to learn the MAC address of the user terminal, and also learns the MAC address of the BRAS network element, which may result in insufficient MAC entry resources.
  • the gateway device 104 in the embodiment of the present disclosure The MAC address learning has been improved, and based on this, the message forwarding processing flow of the gateway device 104 has been improved.
  • the first VXLAN tunnel and the second VXLAN tunnel corresponding to the same VXLAN are grouped on the gateway device 104, that is, the first VXLAN tunnel is divided into a group, which is called a first tunnel group, and the second VXLAN tunnel is divided.
  • the other group is called the second tunnel group.
  • the specific grouping method can be:
  • the controller 100 When the first VXLAN tunnel is configured on the gateway device 104, the controller 100 also specifies that the attribute of the first VXLAN tunnel is the first attribute, and when the second VXLAN tunnel is configured on the gateway device 104, the attribute of the second VXLAN tunnel is also specified.
  • the first VXLAN tunnel corresponding to the first attribute of the same VXLAN constitutes the first tunnel group
  • the second VXLAN tunnel of the second attribute constitutes the second tunnel group.
  • the first VXLAN tunnel is added to the first tunnel group
  • the second VXLAN tunnel is added to the second tunnel group.
  • other grouping manners may also be adopted, which are not limited by the embodiments of the present disclosure.
  • the process of processing MAC address learning and packet forwarding in the uplink direction of the user terminal ⁇ BRAS network element is as follows.
  • the user terminal sends a unicast user message.
  • the aggregation switch 105 does not change the MAC address learning and packet forwarding processing when the unicast user packet is received.
  • the unicast user packet is encapsulated into a VXLAN packet and sent to the gateway device 104.
  • the gateway device 104 receives the VXLAN message through the first VXLAN tunnel, the following steps are performed:
  • Step S201 decapsulating the VXLAN packet to obtain a unicast user packet.
  • Step S202 The source MAC address of the unicast user packet is prohibited from being learned.
  • the gateway device 104 does not learn the MAC address of the user terminal.
  • Step S203 determining a VXLAN to which the VXLAN message belongs, and searching for a corresponding second VXLAN tunnel in the MAC address table corresponding to the VXLAN according to the destination MAC address of the unicast user packet;
  • Step S204 it is determined whether the corresponding second VXLAN tunnel is found, and if so, step S205 is performed, otherwise, step S206 is performed;
  • Step S205 performing VXLAN encapsulation on the unicast user packet, and forwarding the encapsulated VXLAN packet to the BRAS network element through the second VXLAN tunnel;
  • step S206 the second VXLAN tunnel corresponding to the VXLAN is searched, and the unicast user packet is VXLAN encapsulated, and then forwarded to each BRAS network element in the packet 1 through the second VXLAN tunnel.
  • the VXLAN ID in the VXLAN header of the VXLAN packet, the source IP address in the outer IP header, and the destination IP address can be used to determine that the first VXLAN tunnel that receives the VXLAN packet belongs to the first A tunnel group. Therefore, each of the second VXLAN tunnels in the second tunnel group corresponding to the determined first tunnel group may be determined as the second VXLAN tunnel corresponding to the VXLAN to which the VXLAN message belongs.
  • the encapsulated VXLAN packet is forwarded to the BRAS network element through the second VXLAN tunnel, and thus can be broadcast to the packet 1 in the second VXLAN tunnel. All BRAS network elements.
  • step S201 if the decapsulation in step S201 is a broadcast user message, the forwarding process of step S206 is also performed, thereby broadcasting to all BRAS network elements in packet 1.
  • the process of MAC address learning and packet forwarding processing after the BRAS network element receives the VXLAN message does not change.
  • the process of processing MAC address learning and packet forwarding in the downlink direction of the BRAS network element ⁇ user terminal is as follows:
  • the BRAS network element When the BRAS network element needs to send the unicast user packet, the BRAS network element performs the VXLAN encapsulation on the unicast user packet, and then sends the encapsulated VXLAN packet to the gateway device 104.
  • the gateway device 104 receives the VXLAN message through the second VXLAN tunnel, the following steps are performed.
  • step S301 the VXLAN packet is decapsulated to obtain a unicast user packet.
  • step S302 the VXLAN to which the VXLAN packet belongs is determined, and the first VXLAN tunnel corresponding to the VXLAN is searched for, and the unicast user packet is VXLAN encapsulated, and then sent to the aggregation switch 105 through the first VXLAN tunnel.
  • the VXLAN ID in the VXLAN header of the VXLAN packet, the source IP address in the outer IP header, and the destination IP address may be used to determine that the second VXLAN tunnel that receives the VXLAN packet belongs to The second tunnel group. Therefore, the first VXLAN tunnel in the first tunnel group corresponding to the determined second tunnel group may be determined as the first VXLAN tunnel corresponding to the VXLAN to which the VXLAN message belongs. After the unicast user packet is VXLAN encapsulated, the encapsulated VXLAN packet is forwarded to the aggregation switch 105 through the first VXLAN tunnel.
  • step S303 the source MAC address of the unicast user packet is learned, that is, a MAC entry containing the correspondence between the source MAC address and the second VXLAN tunnel is added to the MAC address table corresponding to the VXLAN.
  • step S301 if the decapsulation in step S301 is a broadcast user message, the forwarding process of step S302 is also performed, and the packet is forwarded to the aggregation switch 105.
  • the aggregation switch 105 After the aggregation switch 105 receives the VXLAN packet, the MAC address learning process and the packet forwarding process are unchanged. Therefore, the unicast user packet obtained by the decapsulation is forwarded to the user terminal through the AC interface.
  • a gateway device 104 is added between the aggregation switch 105 and its corresponding at least one BRAS network element, and a VXLAN tunnel is established between the gateway device 104 and the aggregation switch 105, and the gateway device 104 and the at least A VXLAN tunnel is established between the BRAS network elements.
  • the gateway device 104 After receiving the first VXLAN packet sent by the aggregation switch 105 through the VXLAN tunnel, the gateway device 104 decapsulates the first VXLAN packet to obtain the first user packet. After the VXLAN encapsulation is performed, the first user packet is forwarded to the BRAS network element through the VXLAN tunnel.
  • the gateway device 104 After receiving the second VXLAN packet sent by the BRAS network element through the VXLAN tunnel, the gateway device 104 decapsulates the second VXLAN packet. The second user packet is obtained, and the second user packet is VXLAN encapsulated and then forwarded to the aggregation switch 105 through the VXLAN tunnel, thereby implementing packet exchange between the BRAS network element and the user terminal.
  • VXLAN tunnel between the aggregation switch 105 and the at least one BRAS network element is segmented by the gateway device 104, the VXLAN tunnel between the aggregation switch 105 and the gateway device 104, and the gateway device 104 and the at least one BRAS are divided. VXLAN tunnel between network elements, therefore, when the number of at least one BRAS network element occurs Changes, for example, when adding or subtracting, only need to modify the relevant configuration of the VXLAN tunnel on the gateway device 104, reducing the modification work on the aggregation switch.
  • the gateway device 104 after receiving the user packet sent by the aggregation switch 105 through the VXLAN tunnel, the gateway device 104 does not need to learn the source MAC address of the user packet, that is, the MAC address of the user terminal does not need to be learned, because the number of user terminals is compared. Therefore, the number of MAC addresses that the gateway device 104 needs to learn can be effectively reduced, thereby saving the MAC entry resources of the gateway device 104.
  • the gateway device 104 does not need to learn the MAC address of the user terminal, and after receiving the user packet sent by the BRAS network element through the VXLAN tunnel, the gateway device 104 forwards the packet to the aggregation through the VXLAN tunnel between the local device and the aggregation switch 105 corresponding to the VXLAN.
  • the switch 105 does not cause a flood of packets because the VXLAN only corresponds to a VXLAN tunnel between the local device and the aggregation switch 105.
  • the gateway device 104 is connected to the aggregation switch HJSW 105, and the BRAS network element 101 to the BRAS network element 103.
  • the BRAS network element 101 to the BRAS network element 103 are divided into the same packet, which is called packet 1.
  • the user terminal 1 (not shown in FIG. 1) is connected to the AC interface AC1 of the HJSW 105 through the OLT 106.
  • the controller 100 configures the VXLAN tunnel Tunnel1 on the HJSW 105, specifies the source IP address of the tunnel 1 as the IP address HJSW 105-IP of the HJSW 105, and the destination IP address as the IP address GW-IP of the gateway device 104, and configures the VSI A in the VSI A. Create VXLAN1 and associate AC1, VSI A, and Tunnel1.
  • the controller 100 configures the first VXLAN tunnel Tunnel1 for the HJSW 105 on the gateway device 104, and specifies that the source IP address of the tunnel 1 is GW-IP and the destination IP address is HJSW 105-IP; for the BRAS network element 101 to the BRAS network element 103 For each BRAS network element, configure the second VXLAN tunnels Tunnel2, Tunnel3, and Tunnel4.
  • the source IP addresses of Tunnel2, Tunnel3, and Tunnel4 are both GW-IP and the destination IP address is the IP address of the BRAS NE1 BRAS 101-IP.
  • BRAS network element 2 IP address BRAS 102-IP and BRAS network element 3 IP address BRAS103-IP; configure VSI A, create VXLAN1 in VSI A, associate VSI A, Tunnel1, Tunnel2, Tunnel3, and Tunnel4; Tunnel 1 is divided into the first tunnel group, and Tunnel 2, Tunnel 3, and Tunnel 4 are divided into the second tunnel group.
  • the controller 100 configures the VXLAN tunnel Tunnel2 on the BRAS network element 101, specifies the source IP address of the tunnel 2 as the BRAS 101-IP, the destination IP address as the GW-IP, configures the VSI A, creates the VXLAN1 in the VSI A, and sets the VSI A and the tunnel 2 Association.
  • the controller 100 configures the VXLAN tunnel Tunnel3 on the BRAS network element 102, specifies the source IP address of the tunnel 3 as the BRAS 102-IP, the destination IP address as the GW-IP, configures the VSI A, and creates the VXLAN1 in the VSI A. Associate VSI A with Tunnel3.
  • the controller 100 configures the VXLAN tunnel Tunnel4 on the BRAS network element 103, specifies the source IP address of the tunnel 4 as the BRAS 103-IP, the destination IP address as the GW-IP, configures the VSI A, creates the VXLAN1 in the VSI A, and connects the VSI A and the tunnel 4 Association.
  • the MAC address of the BRAS network element 101 is BRAS 101-MAC
  • the MAC address of the BRAS network element 102 is BRAS102-MAC
  • the BRAS network element 3 The MAC address is BRAS 103-MAC
  • the MAC address of user terminal 1 is USER1.
  • the user terminal 1 sends a first packet, where the source MAC address of the first packet is USER1 and the destination MAC address is a broadcast MAC address.
  • the HJSW 105 determines that the VXLAN to which the first packet belongs is VXLAN1.
  • the MAC address table corresponding to VXLAN1 add a MAC entry containing the mapping between USER1 and AC1, as shown in the second row of Table 1-1, and determine that the VXLAN tunnel corresponding to VXLAN1 is Tunnel1, and the first packet is sent.
  • the encapsulated VXLAN packet is sent to the gateway device 104 through Tunnel1.
  • the gateway device 104 After receiving the VXLAN packet, the gateway device 104 decapsulates the VXLAN packet to obtain the first packet, and determines that the VXLAN to which the VXLAN packet belongs is VXLAN1, and finds Tunnel 2, Tunnel 3, and Tunnel 4 in the second tunnel group corresponding to VXLAN1. After the VXLAN encapsulation is performed on the VXLAN tunnel, the encapsulated VXLAN packet is forwarded to the corresponding BRAS network element through the VXLAN tunnel, so that the first packet can be broadcast to the BRAS network. Element 101, BRAS network element 102 and BRAS network element 103.
  • the BRAS network element 101 After receiving the VXLAN packet, the BRAS network element 101 performs decapsulation to obtain the first packet, and determines that the VXLAN to which the VXLAN packet belongs is VXLAN1, and adds the USER1 and the received VXLAN packet in the MAC address table corresponding to the VXLAN1.
  • the MAC address entry of the corresponding relationship of the text is as shown in the second row of Table 2, and the first packet is reported to the controller 100.
  • the BRAS network element 102 and the BRAS network element 103 also perform the foregoing operations, thereby adding the MAC entry corresponding to the USER1, and reporting the first packet to the controller 100.
  • the controller 100 After receiving the first message reported by the BRAS network element 101, the BRAS network element 102, and the BRAS network element 103, the controller 100 selects the BRAS network element 101 with the smallest load to send a response notification; after receiving the response notification, the BRAS network element 101 receives the response notification. And generating a response packet for the first packet, where the source MAC address of the response packet is BRAS 101-MAC, and the destination MAC address is USER1, and then, according to USER1, the corresponding Tunnel2 is found in the MAC address table shown in Table 2. After the VXLAN encapsulation is performed on the response packet, the encapsulated VXLAN packet is sent to the gateway device 104 through the tunnel 2.
  • the gateway device 104 After receiving the VXLAN message through the tunnel 2, the gateway device 104 decapsulates the response packet, determines that the VXLAN to which the VXLAN message belongs is VXLAN1, and adds a correspondence between the BRAS 101-MAC and the Tunnel 2 in the MAC address table corresponding to the VXLAN1. The MAC address entry of the relationship is as shown in the second line of Table 3, and the Tunnel1 in the first tunnel group corresponding to VXLAN1 is searched. After the VXLAN encapsulation is performed on the response packet, the encapsulated VXLAN packet is forwarded through Tunnel1. HJSW 105.
  • the HJSW 105 After receiving the VXLAN message, the HJSW 105 decapsulates the response message, determines that the VXLAN to which the VXLAN message belongs is VXLAN1, adds the BRAS 101-MAC to the MAC address table corresponding to the VXLAN1, and receives the VXLAN report.
  • the MAC entry of the correspondence of the tunnel 1 is as shown in the third row of Table 1-2.
  • Table 1-1 is updated to Table 1-2; and the HJSW 105 is based on the destination MAC address of the response packet USER1.
  • the corresponding AC1 is searched in the MAC address table as shown in Table 1-2, and the response packet is forwarded to the user terminal 1 through AC1.
  • the subsequent packet sent by the user terminal 1 is a unicast packet, which is called packet 2, and the destination MAC address of the packet 2
  • the address is the BRAS 101-MAC; the HJSW 105 searches for the corresponding Tunnel1 in the MAC address table as shown in Table 1-2 according to the destination MAC address BRAS 101-MAC of the packet 2, and performs VXLAN encapsulation on the packet 2.
  • the encapsulated VXLAN packet is forwarded to the gateway device 104 through Tunnel1.
  • the gateway device 104 After receiving the VXLAN packet through the tunnel 1, the gateway device 104 performs decapsulation to obtain the packet 2, and searches for the corresponding MAC address table in the MAC address table as shown in Table 3 according to the destination MAC address BRAS 101-MAC of the packet 2. After the VXLAN encapsulation is performed on the packet 2, the encapsulated VXLAN packet is forwarded to the BRAS network element 101 through Tunnel 2.
  • the BRAS network element 101 After receiving the VXLAN packet, the BRAS network element 101 decapsulates the packet 2 and performs corresponding processing on the packet 2.
  • the BRAS network element 101 When the BRAS network element 101 wants to send the message 3 to the user terminal 1, it searches for the corresponding Tunnel 2 in the MAC address table as shown in Table 2 according to the destination MAC address USER1 of the packet 3, and performs VXLAN on the packet 3. After the encapsulation, the encapsulated VXLAN packet is forwarded to the gateway device 104 through the tunnel 2.
  • the gateway device 104 After receiving the VXLAN packet, the gateway device 104 decapsulates the packet to obtain the packet 3, and determines that the VXLAN to which the VXLAN packet belongs is VXLAN1, and finds Tunnel1 in the first tunnel group corresponding to VXLAN1, and the packet 3 After the VXLAN encapsulation is performed, the encapsulated VXLAN packet is forwarded to the HJSW 105 through Tunnel1.
  • the HJSW 105 After receiving the VXLAN packet, the HJSW 105 performs decapsulation to obtain the packet 3, and searches for the corresponding AC1 in the MAC address table as shown in Table 1-2 according to the destination MAC address USER1 of the packet 3. The message 3 is sent to the user terminal 1 through AC1.
  • the present disclosure also provides an embodiment of a gateway device to which the packet forwarding method is applied.
  • FIG. 4 is a schematic structural diagram of hardware of a gateway device according to an example of the present disclosure.
  • the gateway device can include a processor 10, a machine readable storage medium 20 that stores machine executable instructions.
  • Processor 10 and machine readable storage medium 20 are communicable via system bus 30. And, by reading and executing the machine executable instructions in the machine readable storage medium 20 corresponding to the message forwarding control logic 60, the processor 10 can perform the message forwarding method described above.
  • the machine readable storage medium 20, and the system bus 30 shown in FIG. 4 other hardware may be included according to the actual function of the gateway device, and details are not described herein again.
  • the machine-readable storage medium 20 referred to herein can be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like.
  • the machine-readable storage medium may be: RAM (Radom Access Memory), volatile memory, non-volatile memory, flash memory, storage drive (such as a hard disk drive), solid state drive, any type of storage disk. (such as CD, dvd, etc.), or similar Storage medium, or a combination thereof.
  • the packet forwarding control logic 60 may include: a receiving module 601, a decapsulation module 602, and a package sending module 603, where:
  • the receiving module 601 is configured to receive, by using the first VXLAN tunnel established between the gateway device and the aggregation switch, the first VXLAN packet sent by the aggregation switch, and the second VXLAN tunnel established between the gateway device and the BRAS network element to receive the BRAS.
  • the decapsulation module 602 is configured to: after receiving the first VXLAN packet, the receiving module 601 decapsulates the first VXLAN packet to obtain the first user packet; and is further configured to receive the second VXLAN packet in the receiving module 601. Afterwards, the second VXLAN packet is decapsulated to obtain a second user packet.
  • the encapsulation transmitting module 603 is configured to perform VXLAN encapsulation on the first user packet decapsulated by the decapsulation module 602, and then send the packet to the BRAS network element through the second VXLAN tunnel. After the two user packets are encapsulated in VXLAN, they are forwarded to the aggregation switch through the first VXLAN tunnel.
  • the packet forwarding control logic 60 further includes an association module 604 and a grouping module 606.
  • the association module 604 is configured to associate the first VXLAN tunnel and the multiple second VXLAN tunnels to the same VXLAN.
  • the grouping module 606 divides the first VXLAN tunnel into the first tunnel group and divides the plurality of second VXLAN tunnels into the second tunnel group.
  • the message forwarding control logic 60 further includes: a learning module 605, configured to disable the first user after the decapsulation module 602 decapsulates the first VXLAN message to obtain the first user message.
  • the source MAC address of the packet is learned.
  • the encapsulating and sending module 602 performs VXLAN encapsulation on the first user packet by using the following steps: if the first user packet is an unknown unicast packet or a broadcast packet, determining the VXLAN to which the first VXLAN packet belongs, and acquiring the VXLAN The corresponding at least one second VXLAN tunnel performs VXLAN encapsulation on the first user packet according to each of the acquired second VXLAN tunnels.
  • the encapsulating and sending module 602 performs VXLAN encapsulation on the second user packet by determining the VXLAN to which the second VXLAN packet belongs, acquiring the first VXLAN tunnel corresponding to the VXLAN, and the second user according to the obtained first VXLAN tunnel.
  • the message is encapsulated in VXLAN.
  • the encapsulating and sending module 602 is configured to obtain a second VXLAN tunnel corresponding to the VXLAN by determining that the first VXLAN tunnel that receives the first VXLAN packet belongs to the first tunnel group, and the second tunnel that corresponds to the determined first tunnel group. Each second VXLAN tunnel in the tunnel group is determined to correspond to the VXLAN to which the first VXLAN packet belongs. The second VXLAN tunnel.
  • the encapsulating and transmitting module 602 is configured to obtain the first VXLAN tunnel corresponding to the VXLAN by determining that the second VXLAN tunnel that receives the second VXLAN packet belongs to the second tunnel group; and the first tunnel group corresponding to the determined second tunnel group The first VXLAN tunnel is determined to be the first VXLAN tunnel corresponding to the VXLAN to which the second VXLAN message belongs.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
  • first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as second information without departing from the scope of the present disclosure.
  • second information may also be referred to as first information.
  • word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination.”

Abstract

网关设备和汇聚交换机之间建立有第一VXLAN隧道。该汇聚交换机对应于一个BRAS分组,该BRAS分组中包括多个BRAS网元。该网关设备和该BRAS分组中的每个BRAS网元之间分别建立有第二VXLAN隧道。根据该方法的示例,网关设备通过所述第一VXLAN隧道接收到汇聚交换机发来的第一VXLAN报文;对第一VXLAN报文进行解封装,得到第一用户报文。所述网关设备对所述第一用户报文进行VXLAN封装,通过该第二VXLAN隧道转发给所述BRAS网元。所述网关设备通过第二VXLAN隧道接收BRAS网元发来的第二VXLAN报文,并对第二VXLAN报文进行解封装,得到第二用户报文。所述网关设备对第二用户报文进行VXLAN封装后,通过所述第一VXLAN隧道转发给所述汇聚交换机。

Description

报文转发
相关申请的交叉引用
本专利申请要求于2016年7月20日提交的、专利号为201610573471.0、发明名称为“报文转发方法及装置”的中国专利申请的优先权,其全部内容通过引用并入本文。
背景技术
宽带远程接入服务器(Broadband Remote Access Server,BRAS)是面向宽带网络应用的接入网关,它位于骨干网的边缘层,可以完成用户带宽的IP(Internet Protocol,因特网协议)/ATM(Asynchronous Transfer Mode,异步传输模式)网的数据接入,实现商业楼宇及小区住户的宽带上网。
在城域网(Metropolitan Area Network,MAN)组网模型中,BRAS部署在城域网的汇聚机房,宽带用户终端由OLT(Optical Line Terminal,光线路终端)接入汇聚交换机(HJSW),再通过HJSW连接至BRAS。
附图说明
图1是本公开一示例性实施例示出的城域网的组网架构示意图。
图2是本公开一示例性实施例示出的网关设备通过第一VXLAN隧道接收到VXLAN报文后执行的处理流程图。
图3是本公开一示例性实施例示出的网关设备通过第二VXLAN隧道接收到VXLAN报文后执行的处理流程图。
图4是本公开一示例性实施例示出的网关设备的硬件结构示意图。
图5是本公开一示例性实施例示出的网关设备的一种结构示意图。
图6是本公开一示例性实施例示出的网关设备的另一种结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述 的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
本公开以下实施例中提供了一种报文转发方法,以及一种可以应用该方法的网关设备。
在本公开的示例中,控制器可以维护一个资源池,该资源池中包含有多个BRAS网元,所有的BRAS网元功能对等,可以相互备份;控制器可以对资源池中的BRAS网元进行分组,将至少两个BRAS网元分为同一个分组。BRAS网元可以是物理BRAS设备,也可以是基于x86服务器平台的BRAS虚拟化软件(vBRAS)。
如图1所示,控制器100对BRAS网元进行分组,其中分组1包括BRAS网元101至103。控制器100将分组1指定给汇聚交换机(HJSW)105。本公开实施例中,汇聚交换机(HJSW)105及其对应的BRAS网元101至103之间增加了一个网关设备104,网关设备104可以是交换机或路由器等。汇聚交换机105与网关设备104之间建立有VXLAN(Virtual eXtensible LAN,可扩展虚拟局域网络)隧道;网关设备104与BRAS网元101至103之间分别建立有VXLAN隧道;用户终端经由OLT 106接入汇聚交换机105。OLT106与汇聚交换机105之间建立QinQ(双层标签)隧道。
建立VXLAN隧道时进行如下的配置:
在汇聚交换机105上配置VXLAN隧道(Tunnel),指定该VXLAN隧道的源IP地址为汇聚交换机105的IP地址,目的IP地址为网关设备104的IP地址;在汇聚交换机105上创建VSI,在该VSI内创建VXLAN;将AC(接入电路)接口、该VSI、以及该VXLAN隧道关联。从而,在汇聚交换机105上,AC接口、VSI、VXLAN隧道、以及VXLAN形成了对应关系。
在网关设备104上配置针对汇聚交换机105的VXLAN隧道,称为第一VXLAN隧道,该第一VXLAN隧道的源IP地址为网关设备104的IP地址、目的IP地址为汇聚交换机105的IP地址。针对分组1内的每一个BRAS网元,在网关设备104上配置VXLAN隧道,称为第二VXLAN隧道,该第二VXLAN隧道的源IP地址为网关设备104的IP地址、目的IP地址为该BRAS网元的IP地址;在网关设备104上创建VSI,在该VSI内创建VXLAN;将该VSI、配置的所有第二VXLAN隧道、以及配置的第一VXLAN隧道绑定。从而,在网关设备上,VSI、第二VXLAN隧道、第一VXLAN隧道、以及VXLAN形成了对应关系。
在分组1内的每一个BRAS网元上配置VXLAN隧道,指定该VXLAN隧道的源IP地址为该BRAS网元的IP地址、目的IP地址为网关设备104的IP地址;在该BRAS网元上创建 VSI,在该VSI内创建VXLAN;将该VSI和该VXLAN隧道绑定。从而,在分组1内的每一个BRAS网元上,VSI、VXLAN隧道、以及VXLAN形成了对应关系。
通过上述配置过程,控制器100在汇聚交换机105与网关设备104之间建立VXLAN隧道;并且,在网关设备104与分组1内的每一个BRAS网元之间建立VXLAN隧道得到一组VXLAN隧道。在配置完成之后,用户终端就可以通过汇聚交换机105接入BRAS网元了。
用户终端→BRAS网元的上行方向的MAC地址学习和报文转发处理流程如下:
用户终端发出单播用户报文。
汇聚交换机105从AC接口上接收到该单播用户报文之后,确定该单播用户报文所属的VXLAN,对该单播用户报文的源MAC地址进行学习,即,在该VXLAN对应的MAC地址表中添加包含该源MAC地址与该AC接口的对应关系的MAC表项;根据该单播用户报文的目的MAC地址,在该MAC地址表中查找对应的VXLAN隧道,根据该VXLAN隧道对该单播用户报文进行VXLAN封装后,将封装得到的VXLAN报文转发给网关设备104。
网关设备104通过第一VXLAN隧道接收到该VXLAN报文之后,对该VXLAN报文进行解封装得到单播用户报文,确定该VXLAN报文所属的VXLAN,对该单播用户报文的源MAC地址进行学习,即,在该VXLAN对应的MAC地址表中添加包含该源MAC地址与该第一VXLAN隧道的对应关系的MAC表项;根据该单播用户报文的目的MAC地址,在该MAC地址表中查找对应的第二VXLAN隧道,对该单播用户报文进行VXLAN封装后,将封装得到的VXLAN报文通过该第二VXLAN隧道转发给BRAS网元。
BRAS网元接收到该VXLAN报文之后,对该VXLAN报文进行解封装得到单播用户报文,确定该VXLAN报文所属的VXLAN,对该单播用户报文的源MAC地址进行学习,即,在该VXLAN对应的MAC地址表中添加包含该源MAC地址与收到该VXLAN报文的VXLAN隧道的对应关系的MAC表项,并对该单播用户报文进行相应处理,例如,将解封装得到的协议报文上送协议栈,将解封装得到的数据报文转发至公网等。
BRAS网元→用户终端的下行方向的MAC地址学习和报文转发处理流程如下:
当BRAS网元需要发送单播用户报文时,BRAS网元确定该单播用户报文所属的VXLAN,根据该单播用户报文对应的目的MAC地址,在该VXLAN对应的MAC地址表中查找对应的VXLAN隧道,对该单播用户报文进行VXLAN封装后,将封装得到的VXLAN报文通过该VXLAN隧道转发给网关设备104。其中,要发送的单播用户报文例如可以是,BRAS网元自身生成的单播用户报文,或者BRAS网元从公网中收到的单播用户报文等;该单播用户报文 对应的目的MAC地址可以是,该单播用户报文中携带的目的MAC地址,也可以是该单播用户报文中携带的目的IP地址对应的MAC地址。
网关设备104通过第二VXLAN隧道接收到该VXLAN报文之后,对该VXLAN报文进行解封装得到单播用户报文,确定该VXLAN报文所属的VXLAN,对该单播用户报文的源MAC地址进行学习,即,在该VXLAN对应的MAC地址表中添加包含该源MAC地址与该第二VXLAN隧道的对应关系的MAC表项;根据该单播用户报文的目的MAC地址,在该MAC地址表中查找对应的第一VXLAN隧道,对该单播用户报文进行VXLAN封装后,将封装得到的VXLAN报文通过该第一VXLAN隧道发送给汇聚交换机105。
汇聚交换机105在接收到该VXLAN报文之后,对该VXLAN报文进行解封装得到单播用户报文,确定该VXLAN报文所属的VXLAN,对该单播用户报文的源MAC地址进行学习,即,在该VXLAN对应的MAC地址表中添加包含该源MAC地址与收到该VXLAN报文的VXLAN隧道的对应关系的MAC表项;根据该单播用户报文的目的MAC地址,在该MAC地址表中查找对应的AC接口,将该单播用户报文通过该AC接口转发给用户终端。
通过上述处理流程,网关设备104需要学习用户终端的MAC地址,也要学习BRAS网元的MAC地址,这样可能会导致MAC表项资源不足,为了解决该问题,本公开实施例中对网关设备104的MAC地址学习进行了改进,并基于此,对网关设备104的报文转发处理流程进行了改进。
首先,在网关设备104上对同一VXLAN对应的第一VXLAN隧道和第二VXLAN隧道进行分组,即,将该第一VXLAN隧道分成一组,称为第一隧道组,并将第二VXLAN隧道分成另一组,称为第二隧道组。具体的分组方式可以是:
控制器100在网关设备104上配置第一VXLAN隧道时,还指定该第一VXLAN隧道的属性为第一属性,在网关设备104上配置第二VXLAN隧道时,还指定该第二VXLAN隧道的属性为第二属性,则对应于同一VXLAN的第一属性的第一VXLAN隧道构成第一隧道组,第二属性的第二VXLAN隧道构成第二隧道组。或者,创建第一隧道组和第二隧道组,将第一VXLAN隧道加入到第一隧道组中,将第二VXLAN隧道加入第二隧道组中。显然,还可以采用其它分组方式,本公开实施例对此不做限定。
基于上述分组,用户终端→BRAS网元的上行方向的MAC地址学习和报文转发处理流程如下。
用户终端发出单播用户报文。
汇聚交换机105在接收到该单播用户报文时的MAC地址学习和报文转发处理不变,从而,将该单播用户报文封装为VXLAN报文并发送给网关设备104。
如图2所示,网关设备104通过第一VXLAN隧道接收到该VXLAN报文之后,会执行以下步骤:
步骤S201,对该VXLAN报文进行解封装得到单播用户报文;
步骤S202,禁止对该单播用户报文的源MAC地址进行学习;
即,网关设备104不会学习用户终端的MAC地址。
步骤S203,确定该VXLAN报文所属的VXLAN,根据该单播用户报文的目的MAC地址,在该VXLAN对应的MAC地址表中,查找对应的第二VXLAN隧道;
步骤S204,判断是否查找到了对应的第二VXLAN隧道,若是,则执行步骤S205,否则,执行步骤S206;
步骤S205,对该单播用户报文进行VXLAN封装,将封装得到的VXLAN报文通过该第二VXLAN隧道转发给BRAS网元;
步骤S206,查找该VXLAN对应的第二VXLAN隧道,对该单播用户报文进行VXLAN封装后,通过该第二VXLAN隧道转发给分组1内的每一个BRAS网元。
其中,在步骤S206中,通过该VXLAN报文的VXLAN头中的VXLAN ID、外层IP头中的源IP地址和目的IP地址,可以确定出接收到该VXLAN报文的第一VXLAN隧道属于第一隧道组。从而可以将所确定的第一隧道组对应的第二隧道组中的各第二VXLAN隧道确定为该VXLAN报文所属的VXLAN对应的第二VXLAN隧道。针对确定的每一个第二VXLAN隧道,对该单播用户报文进行VXLAN封装后,将封装得到的VXLAN报文通过该第二VXLAN隧道转发给BRAS网元,从而,能够广播给分组1内的所有BRAS网元。
同样,若步骤S201中解封装得到的是广播用户报文,则也会执行步骤S206的转发流程,从而,广播给分组1内的所有BRAS网元。
BRAS网元在接收到该VXLAN报文之后的MAC地址学习和报文转发处理流程不变。
BRAS网元→用户终端的下行方向的MAC地址学习和报文转发处理流程如下:
当BRAS网元需要发送单播用户报文时,BRAS网元对该单播用户报文进行VXLAN封装后,将封装得到的VXLAN报文发送给网关设备104。
如图3所示,网关设备104通过第二VXLAN隧道接收到该VXLAN报文之后,会执行以下步骤。
步骤S301,对该VXLAN报文进行解封装得到单播用户报文。
步骤S302,确定该VXLAN报文所属的VXLAN,查找该VXLAN对应的第一VXLAN隧道,对该单播用户报文进行VXLAN封装后,通过该第一VXLAN隧道发送给汇聚交换机105。
具体的,在步骤S302中,通过该VXLAN报文的VXLAN头中的VXLAN ID、外层IP头中的源IP地址和目的IP地址,可以确定出接收到该VXLAN报文的第二VXLAN隧道属于第二隧道组。从而可以将所确定的第二隧道组对应的第一隧道组中的第一VXLAN隧道,确定为该VXLAN报文所属的VXLAN对应的第一VXLAN隧道。由于第一隧道组中只有一个第一VXLAN隧道,因此,对该单播用户报文进行VXLAN封装后,将封装得到的VXLAN报文通过该第一VXLAN隧道转发给汇聚交换机105。
步骤S303,对该单播用户报文的源MAC地址进行学习,即,在该VXLAN对应的MAC地址表中添加包含该源MAC地址与该第二VXLAN隧道的对应关系的MAC表项。
同样,若步骤S301中解封装得到的是广播用户报文,也会执行步骤S302的转发流程,从而转发给汇聚交换机105。
汇聚交换机105接收到该VXLAN报文之后的MAC地址学习和报文转发处理流程不变,从而,最终将解封装得到的单播用户报文通过AC接口转发给用户终端。
本公开上述实施例的方法中,在汇聚交换机105及其对应的至少一个BRAS网元之间增加了网关设备104,网关设备104和汇聚交换机105之间建立有VXLAN隧道,网关设备104和该至少一个BRAS网元之间建立有VXLAN隧道;在通过VXLAN隧道接收到汇聚交换机105发来的第一VXLAN报文之后,网关设备104对第一VXLAN报文进行解封装得到第一用户报文,对该第一用户报文进行VXLAN封装后通过VXLAN隧道转发给BRAS网元;在通过VXLAN隧道接收到BRAS网元发来的第二VXLAN报文之后,网关设备104对第二VXLAN报文进行解封装得到第二用户报文,对第二用户报文进行VXLAN封装后通过VXLAN隧道转发给汇聚交换机105,从而实现了BRAS网元与用户终端之间的报文交互。
由于通过网关设备104将汇聚交换机105与该至少一个BRAS网元之间的VXLAN隧道进行了分段,分为了汇聚交换机105与网关设备104之间的VXLAN隧道、以及网关设备104与该至少一个BRAS网元之间的VXLAN隧道,因此,当该至少一个BRAS网元的数量发生 了变化,例如,增加或减少时,只需修改网关设备104上的VXLAN隧道的相关配置即可,减少了对汇聚交换机的修改工作。
另外,网关设备104在通过VXLAN隧道接收到汇聚交换机105发来的用户报文之后,无需学习该用户报文的源MAC地址,即无需对用户终端的MAC地址进行学习,由于用户终端的数量比较大,因此,可以有效减少网关设备104需要学习的MAC地址的数量,从而节约了网关设备104的MAC表项资源。
网关设备104无需对用户终端的MAC地址进行学习,在通过VXLAN隧道接收到BRAS网元发来的用户报文之后,会通过所属VXLAN对应的本设备与汇聚交换机105之间的VXLAN隧道转发给汇聚交换机105,由于该VXLAN仅对应一个本设备与汇聚交换机105之间的VXLAN隧道,因此,不会导致报文的泛洪。
以图1所示的实际网络为例,对上述实施例的方法进行详细说明。在如图1所示的城域网中,网关设备104连接汇聚交换机HJSW 105,以及BRAS网元101~BRAS网元103。BRAS网元101~BRAS网元103划分为同一分组,称为分组1。用户终端1(图1中未示出)通过OLT 106连接至HJSW 105的AC接口AC1。
控制器100在HJSW 105上配置VXLAN隧道Tunnel1,指定Tunnel1的源IP地址为HJSW105的IP地址HJSW 105-IP、目的IP地址为网关设备104的IP地址GW-IP,配置VSI A,在VSI A内创建VXLAN1,将AC1、VSI A、以及Tunnel1关联。
控制器100在网关设备104上针对HJSW 105配置第一VXLAN隧道Tunnel1,指定Tunnel1的源IP地址为GW-IP、目的IP地址为HJSW 105-IP;针对BRAS网元101~BRAS网元103中的每一个BRAS网元,分别配置第二VXLAN隧道Tunnel2、Tunnel3和Tunnel4,指定Tunnel2、Tunnel3和Tunnel4的源IP地址均为GW-IP、目的IP地址分别为BRAS网元1的IP地址BRAS 101-IP、BRAS网元2的IP地址BRAS 102-IP和BRAS网元3的IP地址BRAS103-IP;配置VSI A,在VSI A内创建VXLAN1,将VSI A、Tunnel1、Tunnel2、Tunnel3、以及Tunnel4关联;将Tunnel1划分到第一隧道组中,将Tunnel2、Tunnel3、Tunnel4划分到第二隧道组中。
控制器100在BRAS网元101上配置VXLAN隧道Tunnel2,指定Tunnel2的源IP地址为BRAS 101-IP、目的IP地址为GW-IP,配置VSI A,在VSI A内创建VXLAN1,将VSI A和Tunnel2关联。控制器100在BRAS网元102上配置VXLAN隧道Tunnel3,指定Tunnel3的源IP地址为BRAS 102-IP、目的IP地址为GW-IP,配置VSI A,在VSI A内创建VXLAN1, 将VSI A和Tunnel3关联。控制器100在BRAS网元103上配置VXLAN隧道Tunnel4,指定Tunnel4的源IP地址为BRAS 103-IP、目的IP地址为GW-IP,配置VSI A,在VSI A内创建VXLAN1,将VSI A和Tunnel4关联。
在PPPoE(Point to Point Protocol over Ethernet,基于以太网的点对点协议)应用场景中,BRAS网元101的MAC地址为BRAS 101-MAC,BRAS网元102的MAC地址为BRAS102-MAC,BRAS网元3的MAC地址为BRAS 103-MAC,用户终端1的MAC地址为USER1。在该场景中的处理流程如下:
用户终端1发出首报文,该首报文的源MAC地址为USER1、目的MAC地址是广播MAC地址;HJSW 105通过AC1接收到该首报文之后,确定该首报文所属的VXLAN为VXLAN1,在VXLAN1对应的MAC地址表中,添加包含USER1和AC1的对应关系的MAC表项,如表1-1第2行所示,并且,确定VXLAN1对应的VXLAN隧道为Tunnel1,对该首报文进行VXLAN封装后,将封装得到的VXLAN报文通过Tunnel1发送给网关设备104。
表1-1
MAC地址 VSI/VXLAN ID 出接口
USER1 VSI A/VXLAN1 AC1
网关设备104通过Tunnel1接收到该VXLAN报文之后,进行解封装得到该首报文,确定该VXLAN报文所属的VXLAN为VXLAN1,查找VXLAN1对应的第二隧道组中的Tunnel2、Tunnel3、Tunnel4,针对查找到的每一个VXLAN隧道,对该首报文进行VXLAN封装后,将封装得到的VXLAN报文通过该VXLAN隧道转发给相对应的BRAS网元,从而,可以将该首报文广播给BRAS网元101、BRAS网元102和BRAS网元103。
BRAS网元101收到该VXLAN报文之后,进行解封装得到该首报文,确定该VXLAN报文所属的VXLAN为VXLAN1,在VXLAN1对应的MAC地址表中,添加包含USER1和收到该VXLAN报文的Tunnel2的对应关系的MAC表项,如表2第2行所示,并且,将该首报文上报给控制器100。
同样,BRAS网元102和BRAS网元103也会执行上述操作,从而添加USER1对应的MAC表项,并将该首报文上报给控制器100。
表2
MAC地址 VSI/VXLAN ID 出接口
USER1 VSI A/VXLAN1 Tunnel2
控制器100在收到BRAS网元101、BRAS网元102和BRAS网元103上报的首报文之后,选择负载最小的BRAS网元101发送回应通知;BRAS网元101收到该回应通知之后,针对该首报文生成回应报文,该回应报文的源MAC地址是BRAS 101-MAC、目的MAC地址是USER1,然后,根据USER1在如表2所示的MAC地址表中查找到对应的Tunnel2,对该回应报文进行VXLAN封装后,将封装得到的VXLAN报文通过Tunnel2发送给网关设备104。
网关设备104通过Tunnel2接收到该VXLAN报文之后,进行解封装得到回应报文,确定该VXLAN报文所属的VXLAN为VXLAN1,在VXLAN1对应的MAC地址表中添加包含BRAS 101-MAC和Tunnel2的对应关系的MAC表项,如表3第2行所示,并且,查找VXLAN1对应的第一隧道组中的Tunnel1,对该回应报文进行VXLAN封装后,将封装得到的VXLAN报文通过Tunnel1转发给HJSW 105。
表3
MAC地址 VSI/VXLAN ID 出接口
BRAS 101-MAC VSI A/VXLAN1 Tunnel2
HJSW 105接收到该VXLAN报文之后,进行解封装得到该回应报文,确定该VXLAN报文所属的VXLAN为VXLAN1,在VXLAN1对应的MAC地址表中添加包含BRAS 101-MAC和收到该VXLAN报文的Tunnel1的对应关系的MAC表项,如表1-2第3行所示,此时,表1-1更新为表1-2;并且,HJSW 105根据该回应报文的目的MAC地址USER1,在如表1-2所示的MAC地址表中查找对应的AC1,通过AC1将该回应报文转发给用户终端1。
表1-2
MAC地址 VSI/VXLAN ID 出接口
USER1 VSI A/VXLAN1 AC1
BRAS 101-MAC VSI A/VXLAN1 Tunnel1
后续,用户终端1发出的后续报文即为单播报文,称为报文2,该报文2的目的MAC地 址为BRAS 101-MAC;HJSW 105根据报文2的目的MAC地址BRAS 101-MAC,在如表1-2所示的MAC地址表中查找对应的Tunnel1,对该报文2进行VXLAN封装后,将封装得到的VXLAN报文通过Tunnel1转发给网关设备104。
网关设备104在通过Tunnel1接收到该VXLAN报文后,进行解封装得到报文2,根据该报文2的目的MAC地址BRAS 101-MAC,在如表3所示的MAC地址表中查找对应的Tunnel2,对报文2进行VXLAN封装后,将封装得到的VXLAN报文通过Tunnel2转发给BRAS网元101。
BRAS网元101接收到该VXLAN报文后,解封装得到报文2,对该报文2进行相应处理。
当BRAS网元101想要向用户终端1发送报文3时,根据该报文3的目的MAC地址USER1,在如表2所示的MAC地址表中查找对应的Tunnel2,对报文3进行VXLAN封装后,将封装得到的VXLAN报文通过Tunnel2转发给网关设备104。
网关设备104通过Tunnel2接收到该VXLAN报文之后,进行解封装得到该报文3,确定该VXLAN报文所属的VXLAN为VXLAN1,查找VXLAN1对应的第一隧道组中的Tunnel1,对该报文3进行VXLAN封装后,将封装得到的VXLAN报文通过Tunnel1转发给HJSW 105。
HJSW 105接收到该VXLAN报文之后,进行解封装得到报文3,根据该报文3的目的MAC地址USER1,在如表1-2所示的MAC地址表中查找对应的AC1,从而将该报文3通过AC1发送给用户终端1。
与前述报文转发方法的实施例相对应,本公开还提供了应用该报文转发方法的网关设备的实施例。
图4为本公开示例提供的一种网关设备的硬件结构示意图。该网关设备可包括处理器10、存储有机器可执行指令的机器可读存储介质20。处理器10和机器可读存储介质20可经由系统总线30通信。并且,通过读取并执行机器可读存储介质20中与报文转发控制逻辑60对应的机器可执行指令,处理器10可执行上文描述的报文转发方法。除了图4所示的处理器10、机器可读存储介质20、系统总线30,根据该网关设备的实际功能,还可以包括其他硬件,对此不再赘述。
本文中提到的机器可读存储介质20可以是任何电子、磁性、光学或其它物理存储装置,可以包含或存储信息,如可执行指令、数据,等等。例如,机器可读存储介质可以是:RAM(Radom Access Memory,随机存取存储器)、易失存储器、非易失性存储器、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、任何类型的存储盘(如光盘、dvd等),或者类似的 存储介质,或者它们的组合。
请参考图5,从功能上划分,上述报文转发控制逻辑60可以包括:接收模块601、解封装模块602和封装发送模块603,其中:
接收模块601,用于通过网关设备与汇聚交换机之间建立的第一VXLAN隧道接收汇聚交换机发来的第一VXLAN报文,以及通过网关设备与BRAS网元之间建立的第二VXLAN隧道接收BRAS网元发来的第二VXLAN报文;
解封装模块602,用于在接收模块601接收到第一VXLAN报文之后,对第一VXLAN报文进行解封装得到第一用户报文;还用于在接收模块601接收到第二VXLAN报文之后,对第二VXLAN报文进行解封装得到第二用户报文;
封装发送模块603,用于对解封装模块602解封装得到的第一用户报文进行VXLAN封装后,通过第二VXLAN隧道发送给BRAS网元;还用于对解封装模块602解封装得到的第二用户报文进行VXLAN封装后,通过第一VXLAN隧道转发给汇聚交换机。
其中,如图6所示,上述报文转发控制逻辑60中还包括:关联模块604和分组模块606。关联模块604,用于将第一VXLAN隧道和多个第二VXLAN隧道,关联到同一个VXLAN。分组模块606,将第一VXLAN隧道划分到第一隧道组,将多个第二VXLAN隧道划分到第二隧道组。
如图6所示,上述报文转发控制逻辑60中还包括:学习模块605,用于在解封装模块602对第一VXLAN报文进行解封装得到第一用户报文之后,禁止对第一用户报文的源MAC地址进行学习。
其中,封装发送模块602通过以下步骤实现对第一用户报文进行VXLAN封装:若第一用户报文是未知单播报文或广播报文,则确定第一VXLAN报文所属的VXLAN,获取该VXLAN对应的至少一个第二VXLAN隧道,根据获取到的每个第二VXLAN隧道分别对第一用户报文进行VXLAN封装。
封装发送模块602通过以下步骤实现对第二用户报文进行VXLAN封装:确定第二VXLAN报文所属的VXLAN,获取该VXLAN对应的第一VXLAN隧道,根据获取到的第一VXLAN隧道对第二用户报文进行VXLAN封装。
其中,封装发送模块602通过以下步骤实现获取该VXLAN对应的第二VXLAN隧道:确定接收第一VXLAN报文的第一VXLAN隧道属于第一隧道组;将所确定的第一隧道组对应的第二隧道组中的各第二VXLAN隧道确定为该第一VXLAN报文所属的VXLAN对应的 第二VXLAN隧道。
封装发送模块602通过以下步骤实现获取该VXLAN对应的第一VXLAN隧道:确定接收第二VXLAN报文的第二VXLAN隧道属于第二隧道组;将所确定的第二隧道组对应的第一隧道组中的第一VXLAN隧道确定为所述第二VXLAN报文所属的VXLAN对应的第一VXLAN隧道。
上述装置中各个单元的功能和作用的实现过程具体详见上述方法中对应步骤的实现过程,在此不再赘述。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
以上所述仅为本公开的较佳实施例而已,并不用以限制本公开,凡在本公开的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本公开保护的范围之内。

Claims (14)

  1. 一种报文转发方法,网关设备和汇聚交换机之间建立有第一可扩展虚拟局域网络VXLAN隧道,所述汇聚交换机对应一个远程宽带接入服务器BRAS分组,所述BRAS分组中包括多个BRAS网元,所述网关设备和所述BRAS分组中的每个BRAS网元之间分别建立有第二VXLAN隧道,所述方法包括:
    所述网关设备通过所述第一VXLAN隧道接收所述汇聚交换机发来的第一VXLAN报文;
    所述网关设备对所述第一VXLAN报文进行解封装,得到第一用户报文;
    所述网关设备对所述第一用户报文进行VXLAN封装后,通过所述第二VXLAN隧道转发给BRAS网元;
    所述网关设备通过第二VXLAN隧道接收到BRAS网元发来的第二VXLAN报文;
    所述网关设备对所述第二VXLAN报文进行解封装得到第二用户报文;
    所述网关设备对所述第二用户报文进行VXLAN封装后,通过所述第一VXLAN隧道转发给所述汇聚交换机。
  2. 根据权利要求1所述的方法,其中,
    所述第一VXLAN隧道和多个所述第二VXLAN隧道关联同一个VXLAN;
    所述第一VXLAN隧道属于第一隧道组;
    多个所述第二VXLAN隧道属于第二隧道组。
  3. 根据权利要求2所述的方法,其中,所述方法还包括:所述网关设备禁止对所述第一用户报文的源媒体接入控制MAC地址进行学习。
  4. 根据权利要求3所述的方法,其中,所述网关设备对所述第一用户报文进行VXLAN封装,包括:
    若所述第一用户报文是未知单播报文或广播报文,则所述网关设备确定所述第一VXLAN报文所属的VXLAN,获取该VXLAN对应的第二VXLAN隧道;
    所述网关设备根据获取到的每个第二VXLAN隧道分别对所述第一用户报文进行VXLAN封装。
  5. 根据权利要求3所述的方法,其中,所述网关设备对所述第二用户报文进行VXLAN封装,包括:
    所述网关设备确定所述第二VXLAN报文所属的VXLAN,获取该VXLAN对应的第一VXLAN隧道;
    所述网关设备根据获取到的所述第一VXLAN隧道对所述第二用户报文进行VXLAN封 装。
  6. 根据权利要求4所述的方法,其中,所述获取该VXLAN对应的第二VXLAN隧道,包括:
    所述网关设备确定接收所述第一VXLAN报文的所述第一VXLAN隧道所属的第一隧道组,
    所述网关设备将所确定的第一隧道组对应的第二隧道组中的各所述第二VXLAN隧道确定为所述第一VXLAN报文所属的VXLAN对应的所述第二VXLAN隧道。
  7. 根据权利要求5所述的方法,其中,所述获取该VXLAN对应的第一VXLAN隧道,包括:
    所述网关设备确定接收所述第二VXLAN报文的所述第二VXLAN隧道所属的第二隧道组,
    所述网关设备将所确定的第二隧道组对应的第一隧道组中的第一VXLAN隧道确定为所述第二VXLAN报文所属的VXLAN对应的所述第一VXLAN隧道。
  8. 一种网关设备,所述网关设备和汇聚交换机之间建立有第一可扩展虚拟局域网络VXLAN隧道,所述汇聚交换机对应一个宽带远程接入服务器BRAS分组,所述BRAS分组中包括多个BRAS网元,所述网关设备和所述BRAS分组中的每个BRAS网元之间分别建立有第二VXLAN隧道,所述网关设备包括:
    处理器;以及
    机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,
    其中,所述处理器被所述机器可执行指令促使:
    通过所述第一VXLAN隧道接收到所述汇聚交换机发来的第一VXLAN报文;
    对所述第一VXLAN报文进行解封装得到第一用户报文,
    对所述第一用户报文进行VXLAN封装后,通过该第二VXLAN隧道转发给BRAS网元;
    通过所述第二VXLAN隧道接收BRAS网元发来的第二VXLAN报文;
    对所述第二VXLAN报文进行解封装,得到第二用户报文;
    对所述第二用户报文进行VXLAN封装后,通过所述第一VXLAN隧道转发给所述汇聚交换机。
  9. 根据权利要求8所述的网关设备,其中,
    所述第一VXLAN隧道和多个所述第二VXLAN隧道关联同一个VXLAN;
    所述第一VXLAN隧道属于第一隧道组;
    多个所述第二VXLAN隧道属于第二隧道组。
  10. 根据权利要求9所述的网关设备,其中,所述处理器还被所述机器可执行指令促使:
    禁止对所述第一用户报文的源媒体接入控制(MAC)地址进行学习。
  11. 根据权利要求10所述的网关设备,其中,在对所述第一用户报文进行VXLAN封装时,所述处理器还被所述机器可执行指令促使:
    若所述第一用户报文是未知单播报文或广播报文,则确定所述第一VXLAN报文所属的VXLAN,获取该VXLAN对应的第二VXLAN隧道;
    根据获取到的每个第二VXLAN隧道分别对所述第一用户报文进行VXLAN封装。
  12. 根据权利要求10所述的网关设备,其中,在对所述第二用户报文进行VXLAN封装时,所述处理器还被所述机器可执行指令促使:
    确定所述第二VXLAN报文所属的VXLAN,获取该VXLAN对应的第一VXLAN隧道;
    根据获取到的所述第一VXLAN隧道对所述第二用户报文进行VXLAN封装。
  13. 根据权利要求11所述的网络设备,其中,在获取该VXLAN对应的第二VXLAN隧道时,所述处理器还被所述机器可执行指令促使:
    确定接收所述第一VXLAN报文的所述第一VXLAN隧道所属的第一隧道组,
    将所确定的第一隧道组对应的第二隧道组中的各所述第二VXLAN隧道确定为所述第一VXLAN报文所属的VXLAN对应的所述第二VXLAN隧道。
  14. 根据权利要求12所述的网络设备,其中,在获取该VXLAN对应的第一VXLAN隧道时,所述处理器还被所述机器可执行指令促使:
    确定接收所述第二VXLAN报文的所述第二VXLAN隧道所属的第二隧道组,
    将所确定的第二隧道组对应的第一隧道组中的第一VXLAN隧道确定为所述第二VXLAN报文所属的VXLAN对应的所述第一VXLAN隧道。
PCT/CN2017/093100 2016-07-20 2017-07-17 报文转发 WO2018014803A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US16/318,118 US10924299B2 (en) 2016-07-20 2017-07-17 Packet forwarding
EP17830437.4A EP3490197B1 (en) 2016-07-20 2017-07-17 Message forwarding
JP2019502732A JP6722816B2 (ja) 2016-07-20 2017-07-17 パケット転送

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610573471.0A CN107645431B (zh) 2016-07-20 2016-07-20 报文转发方法及装置
CN201610573471.0 2016-07-20

Publications (1)

Publication Number Publication Date
WO2018014803A1 true WO2018014803A1 (zh) 2018-01-25

Family

ID=60991985

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/093100 WO2018014803A1 (zh) 2016-07-20 2017-07-17 报文转发

Country Status (5)

Country Link
US (1) US10924299B2 (zh)
EP (1) EP3490197B1 (zh)
JP (1) JP6722816B2 (zh)
CN (1) CN107645431B (zh)
WO (1) WO2018014803A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712344A (zh) * 2018-03-22 2018-10-26 新华三信息安全技术有限公司 一种报文转发方法和网络设备

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109412922B (zh) * 2017-08-15 2021-07-20 华为技术有限公司 一种传输报文的方法、转发设备、控制器及系统
US11252192B1 (en) * 2018-09-28 2022-02-15 Palo Alto Networks, Inc. Dynamic security scaling
CN112188301B (zh) * 2019-07-04 2022-07-22 中国电信股份有限公司 通信方法、装置、系统、终端以及计算机可读存储介质
CN113141291B (zh) * 2020-01-17 2022-07-26 华为技术有限公司 一种数据传输方法及相关的设备和系统
CN112511400B (zh) * 2020-11-17 2022-07-01 新华三技术有限公司 报文处理方法及装置
CN112422398B (zh) * 2020-12-08 2022-04-15 中国联合网络通信集团有限公司 消息传输方法及通信装置
CN114338507B (zh) * 2021-12-23 2022-11-22 武汉绿色网络信息服务有限责任公司 一种实现改变云网关系统中流量转发路径的方法和装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725731A (zh) * 2005-05-19 2006-01-25 杭州华为三康技术有限公司 控制二层以太环网设备mac地址学习数目的方法
WO2016018410A1 (en) * 2014-07-31 2016-02-04 Hewlett-Packard Development Company, Lp Encapsulation packet with class of service encoding
CN105763416A (zh) * 2016-04-27 2016-07-13 杭州华三通信技术有限公司 一种数据传输方法及控制器
CN105763385A (zh) * 2016-04-27 2016-07-13 杭州华三通信技术有限公司 流量调度方法及装置

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4593484B2 (ja) * 2006-02-03 2010-12-08 アラクサラネットワークス株式会社 データ通信システムおよびその方法
US8059549B2 (en) 2009-02-17 2011-11-15 Tellabs Operations, Inc. Method and apparatus for supporting network communications using point-to-point and point-to-multipoint protocols
US9106508B2 (en) * 2012-04-30 2015-08-11 International Business Machines Corporation Providing services to virtual overlay network traffic
CN104272668B (zh) * 2012-05-23 2018-05-22 博科通讯系统有限公司 层3覆盖网关
JPWO2014208538A1 (ja) * 2013-06-25 2017-02-23 日本電気株式会社 通信システムと装置と方法とプログラム
US9374323B2 (en) * 2013-07-08 2016-06-21 Futurewei Technologies, Inc. Communication between endpoints in different VXLAN networks
WO2015180084A1 (zh) 2014-05-29 2015-12-03 华为技术有限公司 一种报文转发方法和VxLAN网关
CN104243318B (zh) * 2014-09-29 2018-10-09 新华三技术有限公司 Vxlan网络中的mac地址学习方法及装置
CN105591834B (zh) * 2015-07-10 2018-12-11 新华三技术有限公司 Vxlan中的流量监控方法和装置
US9912614B2 (en) * 2015-12-07 2018-03-06 Brocade Communications Systems LLC Interconnection of switches based on hierarchical overlay tunneling
CN107317768B (zh) 2016-04-27 2020-01-03 新华三技术有限公司 流量调度方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725731A (zh) * 2005-05-19 2006-01-25 杭州华为三康技术有限公司 控制二层以太环网设备mac地址学习数目的方法
WO2016018410A1 (en) * 2014-07-31 2016-02-04 Hewlett-Packard Development Company, Lp Encapsulation packet with class of service encoding
CN105763416A (zh) * 2016-04-27 2016-07-13 杭州华三通信技术有限公司 一种数据传输方法及控制器
CN105763385A (zh) * 2016-04-27 2016-07-13 杭州华三通信技术有限公司 流量调度方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3490197A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712344A (zh) * 2018-03-22 2018-10-26 新华三信息安全技术有限公司 一种报文转发方法和网络设备

Also Published As

Publication number Publication date
US10924299B2 (en) 2021-02-16
EP3490197A1 (en) 2019-05-29
EP3490197A4 (en) 2019-05-29
JP6722816B2 (ja) 2020-07-15
JP2019521619A (ja) 2019-07-25
CN107645431A (zh) 2018-01-30
CN107645431B (zh) 2020-08-04
EP3490197B1 (en) 2021-10-13
US20190305985A1 (en) 2019-10-03

Similar Documents

Publication Publication Date Title
US11765000B2 (en) Method and system for virtual and physical network integration
WO2018014803A1 (zh) 报文转发
US10778464B2 (en) NSH encapsulation for traffic steering establishing a tunnel between virtual extensible local area network (VxLAN) tunnel end points (VTEPS) using a NSH encapsulation header comprising a VxLAN header whose VNI field has been replaced by an NSH shim
US10193707B2 (en) Packet transmission method and apparatus
CN105099848B (zh) 网络扩展群组
EP2874359A1 (en) Extended ethernet fabric switches
US20150172190A1 (en) Packet forwarding
US10523464B2 (en) Multi-homed access
WO2019137355A1 (zh) 传输数据的方法、设备和网络系统
WO2015074394A1 (zh) 一种报文转发方法及装置
JPWO2013145167A1 (ja) Lan多重化装置
WO2017186122A1 (zh) 流量调度
CN107659484B (zh) 从vlan网络接入vxlan网络的方法、装置及系统
US11296985B2 (en) Normalized lookup and forwarding for diverse virtual private networks
WO2018171722A1 (zh) Mac地址同步
CN107547404A (zh) 流表生成方法及装置以及报文转发方法及装置
CN107547691B (zh) 地址解析协议报文代理方法和装置
WO2014110729A1 (zh) 一种trill oam报文实现方法,rb和trill网络

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17830437

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019502732

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017830437

Country of ref document: EP

Effective date: 20190220