WO2018019146A1 - 设备探测 - Google Patents

设备探测 Download PDF

Info

Publication number
WO2018019146A1
WO2018019146A1 PCT/CN2017/093173 CN2017093173W WO2018019146A1 WO 2018019146 A1 WO2018019146 A1 WO 2018019146A1 CN 2017093173 W CN2017093173 W CN 2017093173W WO 2018019146 A1 WO2018019146 A1 WO 2018019146A1
Authority
WO
WIPO (PCT)
Prior art keywords
switching device
packet
port
vlan
identifier
Prior art date
Application number
PCT/CN2017/093173
Other languages
English (en)
French (fr)
Inventor
王伟锋
Original Assignee
新华三技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新华三技术有限公司 filed Critical 新华三技术有限公司
Priority to JP2019504776A priority Critical patent/JP6865266B2/ja
Priority to EP17833449.6A priority patent/EP3493482B1/en
Priority to US16/303,955 priority patent/US11115285B2/en
Publication of WO2018019146A1 publication Critical patent/WO2018019146A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/25Routing or path finding in a switch fabric
    • H04L49/252Store and forward routing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Definitions

  • Vxlan Virtual Extensible LAN
  • SDN Software Defined Network
  • the host on the line sends an Address Resolution Protocol (ARP) packet to the host.
  • ARP Address Resolution Protocol
  • the switching device the ARP packet carries the identifier VlanID of the VLAN to which the host belongs.
  • the switching device sends the ARP packet to the SDN controller, so that the SDN controller sends the Permit Vlan and the Vlan to the designated port of the switching device according to the VlanID in the ARP packet. Mapping information of Vxlan.
  • FIG. 1 is a schematic flow chart of a device detecting method in an embodiment of the present disclosure.
  • FIG. 2 is a schematic diagram of an SDN applied to a method for detecting a silent device according to an embodiment of the present disclosure.
  • FIG. 3 is a schematic diagram showing the hardware structure of an SDN controller in an embodiment of the present disclosure.
  • FIG. 4 is a schematic structural diagram of a device detection logic in an embodiment of the present disclosure.
  • the SDN controller cannot sense the existence of the silent device because the silent device does not actively send the packet.
  • the forwarding configuration information (that is, the Permit Vlan and the mapping information between the Permit Vlan and the Vxlan) cannot be delivered to the switching device connected to the silent device.
  • the Vxlan between the other devices and the silent device cannot be established between the switching devices.
  • the tunnel forwards packets. Therefore, in this embodiment, the presence of the silent device is detected, and the forwarding configuration information is sent to the switching device connected to the silent device to achieve the purpose of communicating between the host and the silent device through the Vxlan tunnel.
  • FIG. 1 is a schematic diagram of a process flow of a device detection method provided by the present disclosure.
  • the device detection method can be applied to an SDN controller.
  • the device that initiates the probe is referred to as a first device
  • the object to be probed that is, the silent device
  • the switching device that accesses the first device is referred to as a first switching device
  • the switching device accessed by the second device is referred to as a second switching device.
  • the first device and the second device in this example all refer to a host, for example, may be a virtual machine, a server, or the like.
  • the method includes the following steps:
  • Step 101 The SDN controller receives the probe packet initiated by the first device reported by the first switching device.
  • the probe packet is a broadcast packet, such as an ARP request packet.
  • the probe packet is sent by the host that initiates the probe, that is, the first device, and the switch device (that is, the first switch device) that is accessed by the host sends the probe packet to the SDN controller after receiving the probe packet. .
  • the interaction between the switching device and the SDN controller is based on the SDN connection.
  • the SDN connection can be implemented by using the OpenFlow protocol.
  • the switching device sends the probe packet to the SDN controller, the probe packet needs to be encapsulated to be suitable for connection through SDN. The same is true for the transmitted packets.
  • the SDN controller also follows this principle when sending data to the switching device.
  • the switching device is conditional on whether the received message is to be sent to the SDN controller.
  • the switching device can query the outgoing port according to the destination MAC address of the received packet, for example, if the switching device is to be used. If the VXLAN tunnel is used to forward packets, the MAC address table can be queried to obtain the port information. The mapping between the MAC address, the VSI/VXLAN identifier, and the egress port is recorded.
  • the probe packet is a broadcast packet. That is, the destination MAC address in the Ethernet header of the probe packet is the broadcast address, and the MAC address recorded in the MAC address table is not the broadcast address. Therefore, the destination MAC address in the Ethernet header of the second probe packet cannot be found.
  • the switch device can forward the probe packet through the VXLAN tunnel, and the switch device can send the probe packet to the SDN controller.
  • Step 102 For each switching device that establishes an SDN connection with the SDN controller, the SDN controller sends the probe packet and information about all downlink ports of the switching device to the switching device, so that the switching device Will The probe message is sent out from the downlink port.
  • the SDN controller can encapsulate the information of the probe message and the downlink port in a message suitable for transmission over the SDN connection. For each switching device that establishes an SDN connection with the SDN controller, the SDN controller needs to construct such a message, and the information of the downlink port carried in the packet is different for different switching devices.
  • the information of the downlink port can be implemented by using a port list.
  • the port list includes information about all downlink ports of the switching device. However, for the switching device that sends the probe packet to the SDN controller, that is, the first switching device, the port list does not include the information of the port that the switching device receives the probe packet.
  • the port list is used to instruct the switching device to send the probe message from each downlink port.
  • the downlink port refers to a port connected to a host (virtual machine or server) on the switching device.
  • the probe packet carries the VLAN ID, which is the ID of the VLAN to which the host that initiated the probe belongs.
  • VLAN ID is the ID of the VLAN to which the host that initiated the probe belongs.
  • the policy is to enable the switching device to send the probe packet through the downlink port, but not to check whether the VLAN ID carried in the probe packet matches the identifier of the Permit VLAN configured on the port.
  • Step 103 The SDN controller receives the response message reported by the second switching device, where the response message is that the second device that matches the destination IP address of the probe packet with the IP address and the destination IP address of the probe packet receives the probe packet. Sent by the second switching device.
  • the qualified host that is, the silent device responds to the probe packet.
  • the matching condition here is that the IP address of the host is the same as the destination IP address carried in the probe packet.
  • the quiet device When the quiet device responds to the probe packet, it constructs a response packet to be sent to the switching device, that is, the second switching device.
  • the response packet is a unicast packet, and the second switching device can The destination MAC address carried in the unicast packet (the destination MAC address is the destination MAC address in the Ethernet header of the response packet, in this example, the MAC address of the host that initiated the probe), the port is queried in the MAC table, and the corresponding The VXLAN tunnel forwards the packet, and the second switching device sends the response packet to the SDN controller.
  • Step 104 The SDN controller sends the forwarding configuration information to the second switching device, so that the second switching device configures the port that receives the response packet according to the forwarding configuration information.
  • the forwarding configuration information includes: an identifier of the Permit VLAN and mapping information of the Permit VLAN and the virtual scalable local area network VXLAN.
  • the probe packet in this example carries the VLAN ID, which is the identifier of the VLAN to which the host that initiated the probe belongs.
  • the response packet also carries the VLAN ID.
  • the VLAN ID is the responding host (that is, the silent device). ID of the VLAN to which it belongs.
  • the two VLAN IDs may be the same or different, that is, the first device and the second device may belong to the same VLAN or belong to different VLANs.
  • the identifier of the Permit VLAN is the VLAN ID carried in the response packet.
  • the SDN controller searches for the VXLAN ID corresponding to the VLAN ID in the preset Permit VLAN and the VXLAN mapping entry according to the VLAN ID carried in the response packet, and then generates forwarding configuration information.
  • the SDN controller sends the forwarding configuration information to the second switching device.
  • the second switching device configures the port that receives the response packet according to the forwarding configuration information. In this way, the detection of the silent device is completed.
  • the probe packet in step 101 is the host that initiates the probe.
  • the gateway sends out, correspondingly, in step 103, the destination MAC address in the response header is the MAC address of the gateway.
  • FIG. 1 The flow shown in FIG. 1 is exemplarily described below with reference to FIG.
  • FIG. 2 is a schematic structural diagram of an application scenario of an embodiment provided by the present disclosure.
  • the SDN controller 100, the switching device VS 21, the VS 22, the host (Sever 31 and Sever 32), the VM 41 and the VM 42 running on the Sever 31 are all non-silent devices, and the Sever 32 is a silent device.
  • the Sever 31 is connected to the switching device VS 21, and the Sever 32 is connected to the switching device VS 22.
  • the VS 21 has a plurality of downlink ports Port 501-Port 510 (only Port 510 is shown in FIG. 2), and the VS 22 has multiple downlink ports Port 511-Port. 520 (only Port 520 is shown in Figure 2).
  • a Vxlan tunnel is established between the VS 21 and the VS 22.
  • the SDN controller 100 sends a forwarding to the port 41 510 of the VM 41 and the VM 42 on the VS 21 through the OpenFlow Channel after detecting that the VM 41 and the VM 42 are online.
  • Configuration information for example, is shown in Table 1:
  • This embodiment uses the VM 41 running in the Sever 31 to access the Sever 32 as an example:
  • the VM 41 sends an ARP request packet, and the destination IP address carried by the ARP request packet is the IP address Server 2-IP of the Sever 32.
  • the ARP request packet is a broadcast packet, and the destination MAC address in the Ethernet header is the broadcast address.
  • the ARP request packet carries the identifier of the Vlan to which the VM 41 belongs, which is assumed to be Vlan10.
  • the VS 21 After receiving the ARP request packet, the VS 21 searches the pre-stored MAC address according to the destination MAC address in the Ethernet header of the ARP request packet. Because the destination MAC address in the Ethernet header is the broadcast address, The corresponding outgoing port information cannot be found. Then, the VS 21 can send the ARP request message to the SDN controller 100 through the OpenFlow Channel.
  • the SDN controller 100 After receiving the ARP request packet, the SDN controller 100 generates a port list for each switching device. It is assumed that the downlink port of the VS 21 includes a Port 501-Port 509, not shown, in addition to the Port 510 shown in FIG. 2, and the downlink port of the VS 22 includes, in addition to the Port 520 shown in FIG. Port 511-Port 519, then the port list generated for VS 21 includes Port 501-Port 509 (Port 510 is the port that receives ARP request packets, so Port 510 is not included in the port list), and the port generated for VS 22 The list includes Port 511-Port 520.
  • the SDN controller 100 encapsulates the port list (Port 501-Port 509) and the ARP request message into one message, sends it to the VS 21 through the OpenFlow Channel, and encapsulates the port list (Port 511-Port 520) and the ARP request message. Go to a message and send it to VS 22 via OpenFlow Channel.
  • the VS 21 and the VS 22 After receiving the packet sent by the SDN controller through the OpenFlow Channel, the VS 21 and the VS 22 decapsulate the packet to obtain an ARP request packet and a port list. According to the pre-configured policy, the VS 21 and the VS 22 do not need to match the Vlan ID (Vlan10) carried in the ARP request packet with the identifier of the Permit Vlan configured on each downlink port, and the ARP request packet can be based on the port list. The corresponding downlink ports are sent out.
  • Vlan ID Vlan10
  • the destination IP address of the ARP request packet is Sever 32-IP. Therefore, after receiving the ARP request packet, the Sever 32 receives the ARP request packet.
  • the ARP response packet (which carries the identifier of the VLAN to which the Sever 32 belongs, assumed to be Vlan10) is sent to the VS 22. Since the port of the Sever 32 accessing the VS 22 is the port 520, the VS 22 receives the ARP response packet through the port 520.
  • the identifier of the port 520 can be carried in the ARP response packet and sent to the SDN controller 100 through the OpenFlow Channel.
  • the SDN controller 100 can detect that the Sever 32 is online, and the Vlan10 carried in the ARP response packet is used as the identifier of the Permit Vlan, and the mapping between the pre-stored Permit Vlan and Vxlan is Find the VxlanID corresponding to Vlan10. Assuming that the VxlanID corresponding to the Vlan10 is Vxlan100, the SDN controller 100 can generate forwarding configuration information, where the forwarding configuration information includes Vlan10 and a mapping relationship between Vlan10 and Vxlan100. Then, the SDN controller sends the forwarding configuration information to the VS 22, and the VS 22 configures the port Port 520 according to the forwarding configuration information.
  • the SDN controller informs the detection message and the downlink port information Change the device so that the switching device sends the probe packet from all its downlink ports (through the pre-policy configuration, without following the Permit Vlan check principle), as long as the silence exists in the host connected to the switch device.
  • the device then responds to the probe packet to further implement the configuration of the Permit Vlan on the access port of the silent device. In this way, the detection of the silent device is implemented, and each host in the SDN network can be ensured. Silent device communication.
  • FIG. 3 is a schematic diagram of a hardware structure of the SDN controller, and the SDN controller may include: a processor 301, and a machine readable storage machine executable instruction Storage medium 302. Processor 301 and machine readable storage medium 302 can communicate via system bus 303. And by reading and executing machine executable instructions in the machine read storage medium 302 corresponding to the device probe logic, the processor 301 can perform the device probe method described above.
  • the machine-readable storage medium 302 referred to herein can be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like.
  • the machine-readable storage medium may be: RAM (Radom Access Memory), volatile memory, non-volatile memory, flash memory, storage drive (such as a hard disk drive), solid state drive, any type of storage disk. (such as a disc, dvd, etc.), or a similar storage medium, or a combination thereof.
  • the device detection logic may include the following functional units:
  • the receiving unit 401 is configured to receive the probe packet initiated by the first device reported by the first switching device.
  • the sending unit 402 is configured to send, to the switching device, information about the detection packet and all downlink ports of the switching device, for each switching device that establishes an SDN connection with the SDN controller, so that the switching device will detect the The message is sent out from the downlink port;
  • the receiving unit 401 further receives a response message that is sent by the second switching device, where the response message is that the second device that matches the destination IP address of the probe packet with the IP address and the destination IP address of the probe packet receives the probe packet. Sent by the second switching device;
  • the sending unit 402 further sends forwarding configuration information to the second switching device, so that the second switching device receives the port of the response packet for configuration.
  • the probe packet carries an identifier of a virtual local area network VLAN to which the first device belongs.
  • the information about the downlink port that is sent to the first switching device does not include the information that the first switching device receives the port of the probe packet.
  • the response message carries an identifier of the VlAN to which the second device belongs.
  • the forwarding configuration information includes: an identifier of the licensed virtual local area network Permit V1AN and mapping information of the Permit V1AN and the virtual extensible local area network VXLAN, where the identifier of the Permit V1AN is the VlAN to which the second device belongs. logo.
  • the probe message is an ARP request message; the response message is an ARP response message.
  • the processing flow of the SDN controller in the present disclosure may be consistent with the processing flow of the foregoing device detection method, and details are not described herein again.
  • a machine readable storage medium storing machine executable instructions that, when invoked and executed by a processor, cause the processor to:
  • the probe packet carries an identifier of the virtual local area network V1AN to which the first device belongs.
  • the information about the downlink port that is sent to the first switching device does not include the information that the first switching device receives the port of the probe packet.
  • the response message carries an identifier of the VlAN to which the second device belongs.
  • the forwarding configuration information includes: an identifier of the licensed virtual local area network Permit V1AN and mapping information of the Permit V1AN and the virtual extensible local area network VXLAN, where the identifier of the Permit V1AN is the VlAN to which the second device belongs. logo.
  • the probe message is an ARP request message; and the response message is an ARP response message.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

软件定义网络SDN控制器接收第一交换设备上报的第一设备发起的探测报文;针对与所述SDN控制器建立SDN连接的每一交换设备,所述SDN控制器向该交换设备发送所述探测报文以及该交换设备的所有下行端口的信息,以使该交换设备将所述探测报文从所述下行端口发送出去;所述SDN控制器接收第二交换设备上报的应答报文,所述应答报文为IP地址与所述探测报文的目的IP地址匹配的第二设备接收到所述探测报文时向所述第二交换设备发送的;所述SDN控制器向所述第二交换设备发送转发配置信息,以使所述第二交换设备对接收所述应答报文的端口进行配置。

Description

设备探测
相关申请的交叉引用
本专利申请要求于2016年7月28日提交的、申请号为201610607515.7、发明名称为“静默设备探测方法及装置”的中国专利申请的优先权,该申请的全文以引用的方式并入本文中。
背景技术
当SDN(Software Defined Network,软件定义网络)中的交换设备之间建立Vxlan(Virtual Extensible Lan,虚拟可扩展局域网)隧道后,上线的主机主动发送地址解析协议(Address Resolution Protocol,ARP)报文给交换设备,该ARP报文携带有该主机所属的VLAN的标识VlanID。交换设备将该ARP报文发送给SDN控制器,以使SDN控制器得知该主机上线后,根据ARP报文中的VlanID为交换设备的指定端口下发Permit Vlan(许可虚拟局域网)以及Vlan与Vxlan的映射信息。
附图说明
图1是本公开实施例中一种设备探测方法流程示意图。
图2是本公开实施例提供的一种静默设备探测方法所应用的SDN示意图。
图3是本公开实施例中一种SDN控制器的硬件结构示意图。
图4是本公开实施例中一种设备探测逻辑的结构示意图。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
为使本公开的目的,技术方案及优点更加清楚明白,以下参照附图对本公开方案做进一步的详细说明。
结合背景技术中的描述,当SDN中的主机之间需要进行通信时,若目的主机为静默设备,由于静默设备不主动发送报文,因此,SDN控制器则无法感知到静默设备的存在,并无法为连接该静默设备的交换设备下发转发配置信息(即Permit Vlan以及Permit Vlan与Vxlan的映射信息),相应地,其他主机与该静默设备之间则无法通过交换设备之间已建立的Vxlan隧道进行报文转发。为此,本实施方式中,通过探测静默设备的存在,并为连接该静默设备的交换设备下发转发配置信息,以达到主机与静默设备通过Vxlan隧道通信的目的。
请参考图1,为本公开提供的设备探测方法的处理流程示意图,该设备探测方法可应用于SDN控制器。为了更清楚的说明该示例,将发起探测的设备称为第一设备;将探测的对象、即静默设备称为第二设备;将第一设备接入的交换设备称为第一交换设备;将第二设备接入的交换设备称为第二交换设备。本示例中的第一设备和第二设备均指主机,例如,可以是虚拟机、服务器等。
该方法包括以下步骤:
步骤101,SDN控制器接收第一交换设备上报的第一设备发起的探测报文。
探测报文为广播报文,例如ARP请求报文。该探测报文最初由发起探测的主机、即第一设备发出,该主机接入的交换设备(即上述的第一交换设备)接收到该探测报文后将该探测报文发送给SDN控制器。交换设备和SDN控制器之间的交互基于SDN连接,本示例中,SDN连接可以采用OpenFlow协议实现,交换设备向SDN控制器发送探测报文时,需要将该探测报文封装为适合通过SDN连接传输的报文,同理,SDN控制器向交换设备发送数据时也要遵循该原则。
交换设备对于接收到的报文是否要发送给SDN控制器是有条件的,在本示例中,交换设备可以根据接收到的报文的目的MAC地址来查询出端口,例如,如果要通过交换设备之间的VXLAN隧道进行报文的转发,那么可以查询MAC表来获取出端口信息,该表中记载了MAC地址、VSI/VXLAN标识、出端口的映射关系,由于探测报文为广播报文、即探测报文以太头中的目的MAC地址为广播地址,而MAC表中记录的MAC地址不会是广播地址,所以,根据该第二探测报文的以太头中的目的MAC地址无法查找到对应的出端口,交换设备就无法通过VXLAN隧道转发该探测报文,那么交换设备可以将该探测报文发送给SDN控制器。
步骤102,针对与所述SDN控制器建立SDN连接的每一交换设备,所述SDN控制器向该交换设备发送所述探测报文以及该交换设备的所有下行端口的信息,以使该交换设备将所 述探测报文从所述下行端口发送出去。
SDN控制器可以将探测报文和下行端口的信息封装在一个适用于通过SDN连接传输的报文中。针对每个与SDN控制器建立SDN连接的交换设备,SDN控制器均需要构造这样一个报文,针对不同的交换设备,该报文中携带的下行端口的信息不同。
该下行端口的信息可以通过一个端口列表实现,针对任一交换设备,该端口列表中包含该交换设备的所有下行端口的信息。但是,对于向SDN控制器发送探测报文的交换设备、即上述第一交换设备而言,该端口列表中不包含该交换设备接收探测报文的端口的信息。
该端口列表用于指示交换设备将探测报文从每一个下行端口发送出去。在本实施例中下行端口指交换设备上连接主机(虚拟机或服务器)的端口。
探测报文中携带有VLAN ID,该VLAN ID为发起探测的主机所属的VLAN的标识。一般交换设备的端口上必须先配置Permit VLAN,才能转发指定VLAN的报文(即报文携带的VLAN ID与端口上配置的Permit VLAN的标识匹配),在本示例中,可以在交换设备上配置策略,以实现交换设备在通过下行端口发送该探测报文时,不检查探测报文携带的VLAN ID是否与端口上配置的Permit VLAN的标识匹配,而是通过下行端口发送探测报文。
步骤103,SDN控制器接收第二交换设备上报的应答报文,所述应答报文为IP地址与所述探测报文的目的IP地址匹配的第二设备接收到所述探测报文时向所述第二交换设备发送的。
交换设备将探测报文从下行端口发送出去后,符合条件的主机(即静默设备)会对该探测报文进行应答。这里的符合条件是指:主机的IP地址与探测报文中携带的目的IP地址相同。
静默设备对探测报文进行应答时,会构造一个应答报文发送给其接入的交换设备、即第二交换设备,该应答报文是一个单播报文,一方面第二交换设备可以根据该单播报文中携带的目的MAC地址(该目的MAC地址是应答报文以太头中的目的MAC地址,在本示例中为发起探测的主机的MAC地址)在MAC表中查询出端口,并从相应的VXLAN隧道进行转发,另一方面,第二交换设备将该应答报文发送给SDN控制器。
步骤104,SDN控制器向所述第二交换设备发送转发配置信息,以使所述第二交换设备根据所述转发配置信息对接收所述应答报文的端口进行配置。
转发配置信息包括:Permit VLAN的标识以及所述Permit VLAN与虚拟可扩展局域网VXLAN的映射信息。
其中,本示例中的探测报文携带有VLAN ID,该VLAN ID为发起探测的主机所属的VLAN的标识;应答报文中也携带有VLAN ID,该VLAN ID为应答的主机(即静默设备)所属的VLAN的标识。两个VLAN ID可以相同,也可以不同,即第一设备和第二设备可以属于同一个VLAN,也可以属于不同的VLAN。上述的Permit VLAN的标识为应答报文携带的VLAN ID。
SDN控制器根据应答报文携带的VLAN ID在预设的Permit VLAN与VXLAN映射关系表项中查找与该VLAN ID对应的VXLAN ID,然后生成转发配置信息。
SDN控制器将该转发配置信息发送至第二交换设备。该第二交换设备根据该转发配置信息对接收到应答报文的端口进行配置。如此,完成对静默设备的探测。
需要说明的是,如果发起探测的主机和静默设备在不同的网段,那么根据现有跨网段ARP协议的实现,可以理解的是,步骤101中的探测报文是由发起探测的主机的网关发出的,相应的,步骤103中,应答报文以太头中的目的MAC地址为该网关的MAC地址。
以下结合图2对图1所示流程进行示例性描述。
参见图2,图2为本公开提供的实施例应用场景的结构示意图。在图2中包括SDN控制器100,交换设备VS 21、VS 22,主机(Sever 31以及Sever 32),Sever 31上运行有VM 41、VM 42,均为非静默设备,Sever 32为静默设备。Sever 31连接交换设备VS 21,Sever 32连接交换设备VS 22,VS 21具有多个下行端口Port 501-Port 510(图2中仅示出Port 510),VS 22具有多个下行端口Port 511-Port 520(图2中仅示出Port 520)。VS 21与VS 22之间建立有Vxlan隧道,并且SDN控制器100在检测到VM 41、VM 42上线后,通过OpenFlow Channel为VS 21上接入VM 41、VM 42的端口Port 510下发了转发配置信息,例如为表1所示:
Figure PCTCN2017093173-appb-000001
表1
本实施例以Sever 31中运行的VM 41访问Sever 32为例:
VM 41发送ARP请求报文,该ARP请求报文携带的目的IP地址为Sever 32的IP地址Server 2-IP,该ARP请求报文是个广播报文,其以太头中的目的MAC地址为广播地址,该ARP请求报文携带有VM 41所属的Vlan的标识,假设为Vlan10。
VS 21通过Port 510接收到该ARP请求报文后,根据该ARP请求报文的以太头中的目的MAC地址在预存的MAC表中进行查找,由于以太头中的目的MAC地址是广播地址,因此查找不到相应的出端口信息。那么,VS 21可以将该ARP请求报文通过OpenFlow Channel发送至SDN控制器100。
SDN控制器100接收到该ARP请求报文后,分别针对各交换设备生成一个端口列表。假设,VS 21的下行端口除了图2中示出的Port 510外,还包括未示出的Port 501-Port 509,VS 22的下行口除了图2中示出的Port 520外,还包括未示出的Port 511-Port 519,那么针对VS 21生成的端口列表包括Port 501-Port 509(Port 510为接收ARP请求报文的端口,因此端口列表中不包括Port 510),针对VS 22生成的端口列表包括Port 511-Port 520。
SDN控制器100将端口列表(Port 501-Port 509)和ARP请求报文封装到一个报文中,通过OpenFlow Channel发送至VS 21;将端口列表(Port 511-Port 520)和ARP请求报文封装到一个报文中,通过OpenFlow Channel发送至VS 22。
VS 21以及VS 22通过OpenFlow Channel接收到SDN控制器发送的报文后,解封装,得到ARP请求报文和端口列表。根据预先配置的策略,VS 21以及VS 22无需将ARP请求报文携带的Vlan ID(Vlan10)与各下行端口上配置的Permit Vlan的标识进行匹配,即可将该ARP请求报文根据该端口列表对应的各下行口发送出去。
由于该ARP请求报文的目的IP地址为Sever 32-IP,因此,除Sever 32外的其他主机接收到该ARP请求报文均将其丢弃,而Sever 32在收到该ARP请求报文后,生成ARP应答报文(携带Sever 32所属的VLAN的标识、假设为Vlan10)发送至VS 22,由于Sever 32接入VS 22的端口为Port 520,因此,VS 22通过Port 520接收到该ARP应答报文后,可以将Port 520的标识携带在该ARP应答报文中通过OpenFlow Channel发送至SDN控制器100。
SDN控制器100接收到该ARP应答报文后,即可感知到该Sever 32上线,并将该ARP应答报文中携带的Vlan10作为Permit Vlan的标识,并在预存的Permit Vlan与Vxlan映射关系表中查找与Vlan10对应的VxlanID。假设该Vlan10对应的VxlanID为Vxlan100,那么,SDN控制器100可以生成转发配置信息,该转发配置信息包括Vlan10以及Vlan10与Vxlan100之间的映射关系。然后,SDN控制器将该转发配置信息下发至VS 22,VS 22根据该转发配置信息对端口Port 520进行配置。
至此,完成对静默设备Sever 32的探测,并完成对VS 22上连接Sever 32的端口的配置。
由此可见,本公开提供的设备探测方法,SDN控制器将探测报文和下行端口信息告知交 换设备,以使交换设备将该探测报文从自身所有的下行端口发送出去(通过预先的策略配置,无需遵循Permit Vlan检查的原则),那么,只要该交换设备接入的主机中存在该静默设备,那么该静默设备就会对该探测报文进行应答,进一步实现对静默设备接入端口的Permit Vlan的相关配置,如此,就实现了静默设备的探测,可以保证SDN网络中的各主机与静默设备的通信。
本公开还提供一种可以应用上述设备探测方法的SDN控制器,图3为该SDN控制器的硬件结构示意图,该SDN控制器可以包括:处理器301、存储有机器可执行指令的机器可读存储介质302。处理器301与机器可读存储介质302可经由系统总线303通信。并且通过读取并执行机器读存储介质302中与设备探测逻辑对应的机器可执行指令,处理器301可执行上文描述的设备探测方法。
本文中提到的机器可读存储介质302可以是任何电子、磁性、光学或其它物理存储装置,可以包含或存储信息,如可执行指令、数据,等等。例如,机器可读存储介质可以是:RAM(Radom Access Memory,随机存取存储器)、易失存储器、非易失性存储器、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、任何类型的存储盘(如光盘、dvd等),或者类似的存储介质,或者它们的组合。
如图4所示,从功能上划分,上述设备探测逻辑可以包括如下功能单元:
接收单元401,用于接收第一交换设备上报的第一设备发起的探测报文;
发送单元402,用于针对与SDN控制器建立SDN连接的每一交换设备,向该交换设备发送所述探测报文以及该交换设备的所有下行端口的信息,以使该交换设备将所述探测报文从所述下行端口发送出去;
所述接收单元401还接收第二交换设备上报的应答报文,所述应答报文为IP地址与所述探测报文的目的IP地址匹配的第二设备接收到所述探测报文时向所述第二交换设备发送的;
所述发送单元402还向所述第二交换设备发送转发配置信息,以使所述第二交换设备接收所述应答报文的端口进行配置。
在一个示例中,所述探测报文携带所述第一设备所属虚拟局域网VLAN的标识。
在另一示例中,向所述第一交换设备发送的下行端口的信息中不包含所述第一交换设备接收所述探测报文的端口的信息。
在又一示例中,所述应答报文携带所述第二设备所属的VlAN的标识。
在又一示例中,所述转发配置信息包括:许可虚拟局域网Permit VlAN的标识以及所述Permit VlAN与虚拟可扩展局域网VXLAN的映射信息,所述Permit VlAN的标识为所述第二设备所属的VlAN的标识。
在又一示例中,所述探测报文为ARP请求报文;所述应答报文为ARP应答报文。
本公开中SDN控制器的处理流程中可以与上述设备探测方法的处理流程一致,在此不再赘述。
根据本公开的示例,还提供一种机器可读存储介质,存储有机器可执行指令,在被处理器调用和执行时,所述机器可执行指令促使所述处理器:
接收第一交换设备上报的第一设备发起的探测报文;
针对与所述SDN控制器建立SDN连接的每一交换设备,向该交换设备发送所述探测报文以及该交换设备的所有下行端口的信息,以使该交换设备将所述探测报文从所述下行端口发送出去;
接收第二交换设备上报的应答报文,所述应答报文为IP地址与所述探测报文的目的IP地址匹配的第二设备接收到所述探测报文时向所述第二交换设备发送的;
向所述第二交换设备发送转发配置信息,以使所述第二交换设备对接收所述应答报文的端口进行配置。
在一个示例中,所述探测报文携带所述第一设备所属虚拟局域网VlAN的标识。
在另一示例中,向所述第一交换设备发送的下行端口的信息中不包含所述第一交换设备接收所述探测报文的端口的信息。
在另一示例中,所述应答报文携带所述第二设备所属的VlAN的标识。
在另一示例中,所述转发配置信息包括:许可虚拟局域网Permit VlAN的标识以及所述Permit VlAN与虚拟可扩展局域网VXLAN的映射信息,所述Permit VlAN的标识为所述第二设备所属的VlAN的标识。
在另一示例中,所述探测报文为ARP请求报文;所述应答报文为ARP应答报文。
以上所述仅为本公开的较佳实施例而已,并不用以限制本公开,凡在本公开的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本公开保护的范围之内。

Claims (15)

  1. 一种设备探测方法,包括:
    软件定义网络SDN控制器接收第一交换设备上报的第一设备发起的探测报文;
    针对与所述SDN控制器建立SDN连接的每一交换设备,所述SDN控制器向该交换设备发送所述探测报文以及该交换设备的所有下行端口的信息,以使该交换设备将所述探测报文从所述下行端口发送出去;
    所述SDN控制器接收第二交换设备上报的应答报文,所述应答报文为IP地址与所述探测报文的目的IP地址匹配的第二设备接收到所述探测报文时向所述第二交换设备发送的;
    所述SDN控制器向所述第二交换设备发送转发配置信息,以使所述第二交换设备对接收所述应答报文的端口进行配置。
  2. 根据权利要求1所述的方法,其中,
    所述探测报文携带所述第一设备所属虚拟局域网VlAN的标识。
  3. 根据权利要求2所述的方法,其中,向所述第一交换设备发送的下行端口的信息中不包含所述第一交换设备接收所述探测报文的端口的信息。
  4. 根据权利要求1所述的方法,其中,
    所述应答报文携带所述第二设备所属的VlAN的标识。
  5. 根据权利要求4所述的方法,其中,
    所述转发配置信息包括:许可虚拟局域网Permit VlAN的标识以及所述Permit VlAN与虚拟可扩展局域网VXLAN的映射信息,
    所述Permit VlAN的标识为所述第二设备所属的VlAN的标识。
  6. 根据权利要求1所述的方法,其中,
    所述探测报文为ARP请求报文;
    所述应答报文为ARP应答报文。
  7. 一种软件定义网络SDN控制器,包括:
    处理器;以及
    存储有机器可执行指令的机器可读存储介质,所述处理器被所述机器可执行指令促使:
    接收第一交换设备上报的第一设备发起的探测报文;
    针对与所述SDN控制器建立SDN连接的每一交换设备,向该交换设备发送所述探测报文以及该交换设备的所有下行端口的信息,以使该交换设备将所述探测报文从所述下行端口发送出去;
    接收第二交换设备上报的应答报文,所述应答报文为IP地址与所述探测报文的目的IP地址匹配的第二设备接收到所述探测报文时向所述第二交换设备发送的;
    向所述第二交换设备发送转发配置信息,以使所述第二交换设备对接收所述应答报文的端口进行配置。
  8. 根据权利要求7所述的SDN控制器,其中,
    所述探测报文携带所述第一设备所属虚拟局域网VlAN的标识。
  9. 根据权利要求8所述的SDN控制器,其中,向所述第一交换设备发送的下行端口的信息中不包含所述第一交换设备接收所述探测报文的端口的信息。
  10. 根据权利要求7所述的SDN控制器,其中,
    所述应答报文携带所述第二设备所属的VLAN的标识。
  11. 根据权利要求10所述的SDN控制器,其中,所述转发配置信息包括:许可虚拟局域网Permit VlAN的标识以及所述Permit VlAN与虚拟可扩展局域网VXLAN的映射信息,所述Permit VlAN的标识为所述第二设备所属的VlAN的标识。
  12. 根据权利要求7所述的SDN控制器,其中,
    所述探测报文为ARP请求报文;所述应答报文为ARP应答报文。
  13. 一种机器可读存储介质,存储有机器可执行指令,在被处理器调用和执行时,所述机器可执行指令促使所述处理器:
    接收第一交换设备上报的第一设备发起的探测报文;
    针对与所述SDN控制器建立SDN连接的每一交换设备,向该交换设备发送所述探测报文以及该交换设备的所有下行端口的信息,以使该交换设备将所述探测报文从所述下行端口发送出去;
    接收第二交换设备上报的应答报文,所述应答报文为IP地址与所述探测报文的目的IP地址匹配的第二设备接收到所述探测报文时向所述第二交换设备发送的;
    向所述第二交换设备发送转发配置信息,以使所述第二交换设备对接收所述应答报文的端口进行配置。
  14. 根据权利要求13所述的机器可读存储介质,其中,
    所述探测报文携带所述第一设备所属虚拟局域网VlAN的标识;
    所述应答报文携带所述第二设备所属的VLAN的标识。
  15. 根据权利要求14所述的机器可读存储介质,其中,所述转发配置信息包括:许可虚拟局域网Permit VlAN的标识以及所述Permit VlAN与虚拟可扩展局域网VXLAN的映射信 息,所述Permit VlAN的标识为所述第二设备所属的VlAN的标识。
PCT/CN2017/093173 2016-07-28 2017-07-17 设备探测 WO2018019146A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2019504776A JP6865266B2 (ja) 2016-07-28 2017-07-17 機器検知方法、sdnコントローラ及び記憶媒体
EP17833449.6A EP3493482B1 (en) 2016-07-28 2017-07-17 Device detection
US16/303,955 US11115285B2 (en) 2016-07-28 2017-07-17 Device detection

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610607515.7 2016-07-28
CN201610607515.7A CN107666428B (zh) 2016-07-28 2016-07-28 静默设备探测方法以及装置

Publications (1)

Publication Number Publication Date
WO2018019146A1 true WO2018019146A1 (zh) 2018-02-01

Family

ID=61017344

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/093173 WO2018019146A1 (zh) 2016-07-28 2017-07-17 设备探测

Country Status (5)

Country Link
US (1) US11115285B2 (zh)
EP (1) EP3493482B1 (zh)
JP (1) JP6865266B2 (zh)
CN (1) CN107666428B (zh)
WO (1) WO2018019146A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666428B (zh) * 2016-07-28 2020-03-06 新华三技术有限公司 静默设备探测方法以及装置
US11070396B2 (en) * 2019-04-04 2021-07-20 Tata Communications Transformation Services (US) Inc. Virtual cloud exchange system and method
KR102079508B1 (ko) * 2019-07-16 2020-04-07 주식회사 파이오링크 사용자의 요구에 기반하여 효율적으로 네트워크를 관리하기 위한 트래픽 관리 방법 및 장치
CN112235148B (zh) * 2020-10-20 2023-10-10 平安证券股份有限公司 Vlan配置检测方法、装置、电子设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532858A (zh) * 2013-10-31 2014-01-22 福建星网锐捷网络有限公司 基于trill网络中的数据报文的处理方法和装置
CN103763146A (zh) * 2014-01-29 2014-04-30 杭州华三通信技术有限公司 一种软件定义网络控制器及其生成转发信息的方法
CN103905577A (zh) * 2012-12-28 2014-07-02 中兴通讯股份有限公司 一种地址解析协议报文的处理方法和系统
CN103944760A (zh) * 2014-04-17 2014-07-23 杭州华三通信技术有限公司 一种穿越nat的网络管理方法及装置
US20150071289A1 (en) * 2013-09-11 2015-03-12 Electronics And Telecommunications Research Institute System and method for address resolution

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7516487B1 (en) * 2003-05-21 2009-04-07 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US7693158B1 (en) * 2003-12-22 2010-04-06 Extreme Networks, Inc. Methods and systems for selectively processing virtual local area network (VLAN) traffic from different networks while allowing flexible VLAN identifier assignment
US7707312B2 (en) * 2003-12-31 2010-04-27 Alcatel Lucent Printer discovery protocol system and method
US8787388B1 (en) * 2011-08-29 2014-07-22 Big Switch Networks, Inc. System and methods for forwarding packets through a network
US10142160B1 (en) * 2011-10-04 2018-11-27 Big Switch Networks, Inc. System and methods for managing network hardware address requests with a controller
US8923149B2 (en) 2012-04-09 2014-12-30 Futurewei Technologies, Inc. L3 gateway for VXLAN
US9210180B2 (en) * 2012-04-18 2015-12-08 Radware Ltd. Techniques for separating the processing of clients' traffic to different zones in software defined networks
US9210079B2 (en) * 2012-08-14 2015-12-08 Vmware, Inc. Method and system for virtual and physical network integration
US9276877B1 (en) * 2012-09-20 2016-03-01 Wiretap Ventures, LLC Data model for software defined networks
EP2949093A4 (en) * 2013-01-24 2016-08-10 Hewlett Packard Entpr Dev Lp RESOLUTION OF ADDRESS IN NETWORKS DEFINED BY SOFTWARE
US9426060B2 (en) * 2013-08-07 2016-08-23 International Business Machines Corporation Software defined network (SDN) switch clusters having layer-3 distributed router functionality
US9612854B2 (en) * 2013-12-18 2017-04-04 Telefonaktiebolaget Lm Ericsson (Publ) System and method for virtualizing a remote device
CN103731353B (zh) * 2013-12-26 2017-07-14 华为技术有限公司 虚拟机的物理地址获取方法
WO2015100656A1 (zh) * 2013-12-31 2015-07-09 华为技术有限公司 一种实现虚拟机通信的方法和装置
JP6260285B2 (ja) * 2014-01-10 2018-01-17 富士通株式会社 制御装置および転送制御方法
CN104350714B (zh) * 2014-05-29 2018-06-05 华为技术有限公司 一种报文转发方法和VxLAN网关
JP2016048854A (ja) 2014-08-27 2016-04-07 横河電機株式会社 データ転送システム及び方法
CN105763512B (zh) 2014-12-17 2019-03-15 新华三技术有限公司 Sdn虚拟化网络的通信方法和装置
EP3633934A1 (en) * 2015-07-27 2020-04-08 Huawei Technologies Co., Ltd. Sdn-based arp implementation method and apparatus
US10432520B2 (en) * 2015-08-28 2019-10-01 Nicira, Inc. Traffic forwarding between geographically dispersed sites
EP3366020B1 (en) * 2015-10-20 2021-02-24 Hewlett-Packard Enterprise Development LP Sdn controller assisted intrusion prevention systems
WO2017118875A1 (en) * 2016-01-05 2017-07-13 Telefonaktiebolaget Lm Ericsson (Publ) Mechanism to detect control plane loops in a software defined networking (sdn) network
CN105763414B (zh) * 2016-01-27 2019-07-09 新华三技术有限公司 一种表项的学习方法和装置
CN107666428B (zh) * 2016-07-28 2020-03-06 新华三技术有限公司 静默设备探测方法以及装置
EP3713165B1 (en) * 2017-12-11 2023-05-31 Huawei Cloud Computing Technologies Co., Ltd. Network and network management method
US11876833B2 (en) * 2019-08-15 2024-01-16 Uchicago Argonne, Llc Software defined networking moving target defense honeypot

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905577A (zh) * 2012-12-28 2014-07-02 中兴通讯股份有限公司 一种地址解析协议报文的处理方法和系统
US20150071289A1 (en) * 2013-09-11 2015-03-12 Electronics And Telecommunications Research Institute System and method for address resolution
CN103532858A (zh) * 2013-10-31 2014-01-22 福建星网锐捷网络有限公司 基于trill网络中的数据报文的处理方法和装置
CN103763146A (zh) * 2014-01-29 2014-04-30 杭州华三通信技术有限公司 一种软件定义网络控制器及其生成转发信息的方法
CN103944760A (zh) * 2014-04-17 2014-07-23 杭州华三通信技术有限公司 一种穿越nat的网络管理方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3493482A4 *

Also Published As

Publication number Publication date
CN107666428B (zh) 2020-03-06
JP2019526208A (ja) 2019-09-12
EP3493482A4 (en) 2019-07-10
CN107666428A (zh) 2018-02-06
EP3493482A1 (en) 2019-06-05
US11115285B2 (en) 2021-09-07
JP6865266B2 (ja) 2021-04-28
US20200322223A1 (en) 2020-10-08
EP3493482B1 (en) 2021-01-27

Similar Documents

Publication Publication Date Title
US10439843B2 (en) Method and system for virtual and physical network integration
US10103998B2 (en) Overlay network priority inheritance
US9973420B2 (en) Heterogeneous overlay network translation for domain unification
US10171559B2 (en) VxLAN security implemented using VxLAN membership information at VTEPs
US9979711B2 (en) Authentication for VLAN tunnel endpoint (VTEP)
WO2017186181A1 (zh) 网络访问控制
WO2017114196A1 (zh) 一种报文处理方法、相关装置及nvo3网络系统
WO2018041152A1 (zh) 宽带远程接入服务器控制平面功能和转发平面功能的分离
WO2018019146A1 (zh) 设备探测
WO2017113306A1 (zh) 可扩展虚拟局域网报文发送方法、计算机设备和可读介质
WO2017143903A1 (zh) 接入控制方法、装置及系统
WO2018014803A1 (zh) 报文转发
WO2014154040A1 (zh) 访问控制方法及设备、系统
WO2016062169A1 (zh) 一种报文传输方法及装置
WO2020019958A1 (zh) Vxlan报文封装及策略执行方法、设备、系统
WO2020108531A1 (zh) 报文转发
WO2014166073A1 (zh) 报文转发方法和网络设备
WO2018219326A1 (zh) 报文转发
WO2018219319A1 (zh) 报文转发
WO2018171722A1 (zh) Mac地址同步
WO2016138845A1 (zh) 一种实现协议报文上送cpu的方法和装置
WO2018090980A1 (zh) 报文转发
WO2015188706A1 (zh) 数据帧的处理方法、装置与系统
CN115396259B (zh) 用于动态激活分布式隧道结构中的虚拟网络的方法和系统
CN105915471B (zh) 报文转发方法以及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17833449

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019504776

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017833449

Country of ref document: EP

Effective date: 20190228