WO2018219326A1 - 报文转发 - Google Patents

报文转发 Download PDF

Info

Publication number
WO2018219326A1
WO2018219326A1 PCT/CN2018/089249 CN2018089249W WO2018219326A1 WO 2018219326 A1 WO2018219326 A1 WO 2018219326A1 CN 2018089249 W CN2018089249 W CN 2018089249W WO 2018219326 A1 WO2018219326 A1 WO 2018219326A1
Authority
WO
WIPO (PCT)
Prior art keywords
address
data packet
uplink
mac address
destination
Prior art date
Application number
PCT/CN2018/089249
Other languages
English (en)
French (fr)
Inventor
张洋
Original Assignee
新华三技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新华三技术有限公司 filed Critical 新华三技术有限公司
Priority to JP2019566127A priority Critical patent/JP6825142B2/ja
Priority to US16/618,783 priority patent/US11283645B2/en
Priority to EP18809671.3A priority patent/EP3618365B1/en
Publication of WO2018219326A1 publication Critical patent/WO2018219326A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • H04L12/4666Operational details on the addition or the stripping of a tag in a frame, e.g. at a provider edge node
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Definitions

  • the present invention relates to message forwarding in network communications.
  • BRAS Broadband Remote Access Server
  • BRAS Broadband Remote Access Server
  • the protocol packet exchange and data packet interaction between the user side and the network side need to be forwarded through the vBRAS (Virtual BRAS) device, which causes the vBRAS device to be overloaded. Big.
  • vBRAS Virtual BRAS
  • FIG. 1 is a schematic flowchart of a packet forwarding method according to an embodiment of the present invention.
  • FIG. 2 is a schematic structural diagram of a specific application scenario according to an embodiment of the present invention.
  • FIG. 2B is a schematic structural diagram of a specific application scenario according to an embodiment of the present invention.
  • FIG. 2C is a schematic structural diagram of a specific application scenario according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of hardware of a message forwarding apparatus according to an embodiment of the present invention.
  • FIG. 4 is a functional structural diagram of a message forwarding control logic according to the present invention.
  • FIG. 1 is a schematic flowchart of a packet forwarding method according to an embodiment of the present invention.
  • the packet forwarding method may be applied to an ESGW (Edge Stream Gateway) device.
  • the packet forwarding method may include the following steps:
  • step 101 when the ESGW device receives the uplink Q-in-Q protocol packet through the port connected to the access device, the uplink Q is obtained through a VXLAN (Virtual eXtensible Local Area Network) tunnel between the ESGW device and the vBRAS device.
  • the -in-Q protocol packet is forwarded to the vBRAS device.
  • the ESGW device When receiving the uplink Q-in-Q data packet through the port connected to the access device, the ESGW device strips the Q-in-Q label of the uplink Q-in-Q data packet to determine that the Q-in-Q packet is stripped.
  • the destination MAC address of the upstream Ethernet data packet after the -in-Q tag is the MAC address of the ESGW device, and the destination IP address of the uplink Ethernet data packet (Internet Protocol, network) Protocol) address for Layer 3 forwarding.
  • the vBRAS device integrates the gateway device function, and the protocol packets and data packets that the user side interacts with the network side need to be forwarded through the vBRAS device, causing the vBRAS device to be overloaded. Therefore, in the present disclosure, in order to reduce the load of the vBRAS device, the gateway device function is separated from the vBRAS device, and the special gateway device is responsible for the data packet interaction between the user side and the network side.
  • the vBRAS device after stripping the gateway device function can be dedicated to the forwarding and processing of protocol packets, and the data packets are no longer forwarded through the vBRAS device.
  • an ESGW device may be deployed in a network for connecting an Edge Data Center (EDC) to an external network.
  • EDC Edge Data Center
  • the ESGW device when the ESGW device receives the uplink Q-in-Q protocol packet from the port connecting the access device, that is, the protocol packet of the user side, the ESGW device needs to uplink Q-in- The Q protocol message is forwarded to the vBRAS device and processed by the vBRAS device. At this time, the ESGW device can forward the uplink Q-in-Q protocol packet to the vBRAS device through the VXLAN tunnel between the ESGW device and the vBRAS device.
  • the ESGW device When the ESGW device receives the uplink Q-in-Q data packet, that is, the data packet on the user side, the ESGW device does not need to forward the uplink Q-in-Q data packet to the vBRAS device, but may directly Forward it locally. At this time, the ESGW device can strip the Q-in-Q label of the uplink Q-in-Q data packet, and determine whether the destination MAC address of the uplink Ethernet data packet after the Q-in-Q label is stripped is The MAC address of the ESGW device; if yes, the ESGW device can perform Layer 3 forwarding based on the destination IP address of the upstream Ethernet data packet after the Q-in-Q label is stripped.
  • FIG. 2A is a schematic structural diagram of a specific application scenario according to an embodiment of the present invention.
  • the vBRAS device 111, the APP server 112, and the ESGW device 113 are deployed in the edge data center 110.
  • a VXLAN tunnel is established between the vBRAS device 111 and the ESGW device 113, and between the APP server 112 and the ESGW device 113.
  • a three-layer interconnection between the ESGW device 113 and the Core Router (CR) 120 is available to enable access to the backbone network 130.
  • a PC (Personal Computer) 150 can access the ESGW device 113 through an OLT (Optical Line Terminal) 140.
  • OLT Optical Line Terminal
  • the implementation principle of the packet forwarding solution provided by the embodiment of the present invention is as follows:
  • the ESGW device 113 configures an ACL (Access Control List) entry for the protocol packet on the PC 150 side.
  • the priority of the ACL entry is higher than the priority of the MAC entry.
  • the protocol packet is a DHCP (Dynamic Host Configuration Protocol) packet and an ARP (Address Resolution Protocol) packet.
  • the format of the ACL entry can be as follows:
  • the inbound port of each ACL entry matches the port of the OLT that is the access device.
  • the match of each ACL entry contains a packet type identifier.
  • the virtual interface on the vBRAS device 111 and the virtual interface on the ESGW device 113 are configured with the same MAC address.
  • the manner in which the ESGW device 113 processes the Q-in-Q protocol packet as a gateway may be as follows:
  • the PC 150 When the PC 150 is online, the PC 150 first sends a DHCP Request message to request the DHCP server to assign an IP address.
  • the OLT 140 adds a Q-in-Q tag to the DHCP request message and broadcasts a DHCP request message with a Q-in-Q tag.
  • the ESGW device 113 can perform MAC address learning according to the source MAC address of the DHCP request message with the Q-in-Q tag, that is, the MAC address of the PC 150 and the receiving port, that is, the ESGW device 113 connects to the port of the OLT 140.
  • the ESGW device 113 receives the DHCP request packet with the Q-in-Q tag, and searches for the matched ACL entry according to the ingress port and the DCHP protocol feature field, and carries the Q according to the action item of the matched ACL entry.
  • the DHCP request message of the -in-Q tag is encapsulated in VXLAN.
  • the ESGW device 113 transmits the VXLAN encapsulated DHCP request message with the Q-in-Q tag to the vBRAS device 111 by connecting the VXLAN tunnel of the vBRAS device 111.
  • the vBRAS device 111 has enabled the DHCP server function.
  • the vBRAS device 111 releases the VXLAN encapsulation and performs MAC address learning according to the source MAC address and the VXLAN tunnel.
  • the PC 150 assigns an IP address and replies with a DHCP response message with a Q-in-Q tag.
  • the vBRAS device 111 encapsulates the DHCP response message with the Q-in-Q tag in the VXLAN tunnel and sends it to the ESGW device 113 according to the VXLAN tunnel corresponding to the destination MAC address of the DHCP response message with the Q-in-Q tag.
  • the ESGW device 113 may first release the VXLAN encapsulation and according to the destination MAC address of the DHCP response message with the Q-in-Q tag. Forwarded to the OLT 140 as an access device, the OLT 140 strips the Q-in-Q tag and forwards the DHCP response message to the PC 150.
  • the PC 150 can obtain an IP address assigned to itself according to the DHCP response message. Thereafter, the PC 150 can send an authentication message carrying its own IP address and MAC address to the OLT 140.
  • the OLT 140 may add a Q-in-Q tag to the authentication message and send the authentication message with the Q-in-Q tag to the ESGW device 113.
  • the ESGW device 113 After receiving the Q-in-Q label authentication packet, the ESGW device 113 searches for the matching ACL entry according to the inbound port and the protocol feature field of the authentication packet, and according to the action item of the matched ACL entry, Authentication packets with Q-in-Q labels are encapsulated in VXLAN.
  • the ESGW device 113 can transmit the VXLAN encapsulated authentication message with the Q-in-Q tag to the vBRAS device 111 through the VXLAN tunnel connecting the vBRAS device 111.
  • the vBRAS device 111 After receiving the authentication packet with the Q-in-Q label in the VXLAN package, the vBRAS device 111 releases the VXLAN package and strips the Q-in-Q label to obtain the authentication packet. The vBRAS device 111 can then send the authentication message to an AAA server (not shown) for the AAA server to authenticate the PC 150 based on the authentication message. After the AAA server confirms that the PC 150 has passed the authentication, it can generate and send an authentication pass message to the vBRAS device 111.
  • an AAA server not shown
  • the vBRAS device 111 may add a Q-in-Q tag to the authentication pass message and perform VXLAN encapsulation to obtain a VXLAN encapsulated authentication pass message with a Q-in-Q tag. Then, the vBRAS device 111 can send the VXLAN encapsulated authentication with the Q-in-Q label to the ESGW through the VXLAN tunnel corresponding to the destination MAC address of the packet, that is, the VXLAN tunnel connected to the ESGW device 113. Device 113.
  • the ESGW device 113 After receiving the authentication pass message with the Q-in-Q tag in the VXLAN package, the ESGW device 113 releases the VXLAN encapsulation and performs the second layer according to the destination MAC address of the packet according to the authentication with the Q-in-Q tag. Forward. Specifically, the ESGW device 113 may forward the Q-in-Q label to the OLT 140 according to the egress port corresponding to the destination MAC address of the packet, so that the OLT 140 strips the Q-in-Q label. The authentication is then forwarded to the PC 150 via the message.
  • the vBRAS device 111 can send the IP address of the PC 150 to the ESGW device 113, and the destination MAC address is the MAC address of the PC 150.
  • the egress port that reaches the IP address of the PC 150 is the port that the ESGW device connects to the OLT device, and the Q-in- of the PC.
  • the Q-tag, where the Q-in-Q tag can be a DHCP request message of the PC 150 and a Q-in-Q tag carried in the authentication request message, that is, two 802.1Q tags.
  • the ESGW device 113 receives the IP address of the PC 150 sent by the vBRAS device 111, the destination MAC address is the MAC address of the PC 150, the egress port that reaches the IP address of the PC 150, the port that the ESGW device connects to the OLT, and the Q-in of the PC 150.
  • the A-Q entry generates an ARP entry for the IP address of the PC 150.
  • the ARP entry of the IP address of the PC 150 records that the IP address of the PC 150 corresponds to the MAC address of the PC 150, and the egress port that reaches the PC 150 is the ESGW device. 113 links the port of the OLT 140 and the index information of the Q-in-Q tag of the PC 150.
  • an ARP request packet may be sent to request the IP address of the gateway device.
  • the destination IP address of the ARP request message sent by the PC 150 is the IP address of the vBRAS device 111.
  • the OLT 140 adds a Q-in-Q tag to the ARP request message and broadcasts an ARP request message with a Q-in-Q tag.
  • the ESGW device 113 receives the ARP request packet with the Q-in-Q label, and can query the matched ACL entry according to the ingress port and the ARP protocol feature field, and based on the action item of the matched ACL entry,
  • the ARP request packet with the Q-in-Q tag is encapsulated in the VXLAN to obtain the ARP request packet with the Q-in-Q tag encapsulated in the VXLAN.
  • the ESGW device 113 transmits the VXLAN encapsulated ARP request packet with the Q-in-Q tag to the vBRAS device 111 by connecting the VXLAN tunnel of the vBRAS device 111.
  • the vBRAS device 111 receives the ARP request packet with the Q-in-Q tag encapsulated in the VXLAN, and releases the VXLAN encapsulation.
  • the VBRAS device 111 may perform protocol processing according to the ARP request message with the Q-in-Q tag to generate an ARP response packet with a Q-in-Q tag for replying the ARP request message;
  • the sender IP address of the ARP response packet is the IP address of the vBRAS device 111
  • the sender MAC address is the MAC address of the virtual interface on the vBRAS device 111
  • the vBRAS device 111 is based on the ARP response packet with the Q-in-Q label.
  • the destination MAC address of the file is the VXLAN tunnel corresponding to the MAC address of the PC 150.
  • the ARP response packet with the Q-in-Q tag is encapsulated in the VXLAN to obtain the ARP response with the Q-in-Q tag in the VXLAN package.
  • the vBRAS device 113 transmits the VXLAN encapsulated ARP response message with the Q-in-Q tag to the ESGW device 111.
  • the ESGW device decapsulates the VXLAN to obtain an ARP response packet with a Q-in-Q tag. Then, the ESGW device 113 may send the ARP response packet with the Q-in-Q tag to the OLT 140 according to the egress port corresponding to the destination MAC address of the ARP response packet with the Q-in-Q tag, by the OLT. After the Q-in-Q tag is removed, the ARP response packet is forwarded to the PC 150. Therefore, the PC 150 can learn the virtual interface MAC address of the ESGW device 111 according to the sender MAC address of the ARP response packet.
  • the data packet interaction process between the PC 150 and the APP server 112 and between the PC 150 and the CR 120 can be as follows:
  • the PC sends a data packet to the APP server.
  • the ESGW device 113 can receive the uplink Q-in-Q data packet by using the port connected to the OLT 140, stripping the Q-in-Q label of the uplink Q-in-Q data packet, and determining to strip the Q-in-Q packet.
  • the destination MAC address of the upstream Ethernet data packet after the label is the MAC address of the ESGW device 113.
  • the ESGW device 113 can strip the destination MAC address and the source MAC address of the uplink Ethernet data packet.
  • the ESGW device 113 can find a matching ARP entry according to the destination IP address of the uplink Ethernet data packet, obtain the MAC address corresponding to the destination IP address, and the VXLAN tunnel is a VXLAN tunnel between the ESGW device 113 and the APP server 112.
  • the AGW entry is forwarded between the ESGW device 113 and the APP server 112 through the existing VXLAN tunnel, and the ARP entries are learned from each other.
  • the ESGW device 113 re-encapsulates the uplink Ethernet data packet with the MAC address of the virtual interface as the source MAC address and the MAC address corresponding to the inner destination IP address of the uplink Ethernet data packet, and the ESGW device 113 according to the The VXLAN tunnel corresponding to the inner destination IP address of the re-encapsulated upstream Ethernet packet encapsulates the re-encapsulated uplink Ethernet data packet into an Ethernet data packet encapsulated in the uplink VXLAN, and the uplink is transmitted through the outbound port of the VXLAN tunnel.
  • the Ethernet data packet encapsulated by the VXLAN is sent to the APP Server server 112.
  • the APP server 112 receives the Ethernet data packet encapsulated in the uplink VXLAN, and learns the MAC address entry based on the source MAC address of the inner layer and the VXLAN tunnel. The subsequent APP server 112 sends the data packet sent to the PC 150 to the ESGW device 113 for Layer 3 forwarding according to the learned MAC address entry.
  • the ESGW device 113 can receive the uplink Q-in-Q data packet by using the port connected to the OLT 140, stripping the Q-in-Q label of the uplink Q-in-Q data packet, and determining to strip the Q-in-Q packet.
  • the destination MAC address of the uplink Ethernet data packet after the label is the MAC address of the ESGW device 113.
  • the ESGW device 113 strips the destination MAC address and the source MAC address of the uplink Ethernet data packet to find the destination IP address.
  • the IP address of the hop is obtained, and the MAC address corresponding to the next hop IP address and the egress port are obtained according to the ARP entry matched by the next hop IP address, that is, the ESGW device 113 is connected to the port of the CR 120.
  • the MAC address of the virtual interface of the ESGW device 113 is the source MAC address, and the MAC address corresponding to the next hop IP address is used to re-encapsulate the uplink Ethernet data packet, which is the original uplink Ethernet packet inner layer IP packet.
  • the package encapsulates a new Ethernet header.
  • the ESGW device 113 sends the re-encapsulated uplink Ethernet data packet to the CR 120 through the egress port corresponding to the next hop IP address.
  • the CR 120 receives the uplink Ethernet data packet, learns the MAC address entry according to the source MAC address and the receiving port, and the subsequent CR 120 sends the data packet sent to the PC 150 to the ESGW according to the learned MAC address entry.
  • the device 113 performs three-layer forwarding.
  • the ESGW device 113 receives the Ethernet data packet of the downstream VXLAN package through the VXLAN tunnel with the APP server 112, and strips the VXLAN package.
  • the ESGW device 113 determines that the destination MAC address of the downlink Ethernet data packet that is stripped of the VXLAN encapsulation is the MAC address of the ESGW device 113, and decapsulates the downlink Ethernet data packet that is stripped of the VXLAN encapsulation into a downlink IP data packet.
  • the Ethernet header stripping of the downlink Ethernet data packet of the VXLAN encapsulation is removed.
  • the ESGW device 113 matches the ARP entry of the IP address of the PC 150 according to the destination IP address of the downlink IP data packet.
  • the ESGW device 113 encapsulates the decapsulated IP data packet into a downlink Q-in-Q data packet according to the ARP entry matched by the IP address of the PC 150.
  • the ESGW device 113 may determine the index information of the Q-in-Q tag according to the matched ARP entry, and determine the corresponding Q-in-Q tag according to the index information of the Q-in-Q tag, so that the Q can be used.
  • the -in-Q tag performs Q-in-Q encapsulation on the downlink IP data packet.
  • the ESGW device 113 sends a downlink Q-in-Q data packet to the OLT 140 through the egress port of the ARP entry of the IP address of the PC 150, that is, the ESGW device 113 connects to the port of the OLT 140.
  • the OLT 140 After the OLT 140 strips the Q-in-Q tag, it sends a downlink Ethernet data packet to the PC 150.
  • the ESGW device 113 can receive the downlink Ethernet data packet sent by the CR 120, determine the destination MAC address of the downlink Ethernet data packet as the MAC address of the ESGW device 113, and decapsulate the downlink Ethernet data packet into the downlink IP data. Message. The ESGW device 113 matches the destination IP address of the downlink IP data packet to the ARP entry of the IP address of the PC 150, and the egress port included in the matched ARP entry is the reachable PC of the ESGW device 113 connected to the OLT 140. Port. The ESGW device 113 encapsulates the downlink IP data packet into a downlink Q-in-Q data packet according to the ARP entry of the IP address of the PC 150. The egress port of the ARP entry of the IP address of the PC, that is, the ESGW device 113 is connected. The port of the OLT 140 sends a downlink Q-in-Q data message to the OLT 140.
  • the OLT 140 After the OLT 140 strips the Q-in-Q packet of the downlink Q-in-Q data packet, the OLT 140 sends a downlink Ethernet data packet to the PC 150.
  • the ESGW device when the ESGW device receives the uplink Q-in-Q protocol packet through the port connected to the access device, the VXLAN between the ESGW device and the vBRAS device is adopted. The tunnel forwards the uplink Q-in-Q protocol packet to the vBRAS device.
  • the ESGW device receives the uplink Q-in-Q data packet through the port connected to the access device, the uplink Q-in-Q data packet is stripped.
  • the Q-in-Q tag determines that the destination MAC address of the upstream Ethernet data packet after the Q-in-Q label is stripped is the MAC address of the ESGW device, and the Layer 3 layer is based on the destination IP address of the uplink Ethernet data packet. Forwarding implements the separation of protocol packets and data packets on the user side, reducing the load on the vBRAS device.
  • FIG. 3 is a schematic structural diagram of hardware of a packet forwarding apparatus according to an embodiment of the present invention.
  • the message forwarding device can be applied to an ESGW device.
  • the message forwarding device can include a processor 301, a machine readable storage medium 302 that stores machine executable instructions.
  • Processor 301 and machine readable storage medium 302 can communicate via system bus 303. And, by reading and executing the machine executable instructions in the machine readable storage medium 302 corresponding to the message forwarding control logic, the processor 301 can perform the message forwarding method described above.
  • the machine-readable storage medium 302 referred to herein can be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like.
  • a machine-readable storage medium can be volatile memory, nonvolatile memory, or other type of storage medium.
  • the machine-readable storage medium may be a RAM (Radom Access Memory), a flash memory, a storage drive (such as a hard disk drive), a solid state drive, a storage disk (such as an optical disk, a DVD, etc.), or a combination thereof.
  • the packet forwarding control logic may include a receiving unit 401, a sending unit 402, and a stripping unit 403. among them:
  • the receiving unit 401 is configured to receive an uplink Q-in-Q protocol packet and an uplink Q-in-Q data packet by using a port connected to the access device.
  • the sending unit 402 is configured to: when the receiving unit 401 receives the uplink Q-in-Q protocol packet by using the port connected to the access device, the uplink Q-in- is performed through the virtual scalable local area network VXLAN tunnel between the ESGW device and the vBRAS device. The Q protocol packet is forwarded to the vBRAS device.
  • the stripping unit 403 is configured to strip the Q-in-Q label of the uplink Q-in-Q data packet when the receiving unit 401 receives the uplink Q-in-Q data packet by using the port connected to the access device.
  • the sending unit 402 is further configured to perform, according to the destination IP address of the uplink Ethernet data packet, when the destination MAC address of the uplink Ethernet data packet after the Q-in-Q label is stripped is the MAC address of the ESGW device. Layer forwarding.
  • the sending unit 402 is configured to query an access control list ACL according to the uplink Q-in-Q protocol packet, where the access control list is configured with multiple ACL entries, and the ingress port of the matching entry of each ACL entry To match the port of the access device, the matching entry of each ACL entry contains a packet type identifier.
  • the action item of each ACL entry is sent through the tunnel interface of the VxLAN tunnel connected to the vBRAS device.
  • the priority is higher than the priority of the media access control MAC entry.
  • the sending unit 402 is further configured to encapsulate the uplink Q-in-Q protocol packet into the uplink VXLAN by using the VXLAN tunnel of the vBRAS device connected to the vBRAS device according to the action item of the ACL entry that matches the uplink Q-in-Q protocol packet.
  • the encapsulated Q-in-Q protocol packet is sent to the outbound port of the VXLAN tunnel of the vBRAS device through the ESGW device to send the Q-in-Q protocol packet of the uplink VXLAN encapsulation.
  • the stripping unit 403 is further configured to strip the destination MAC address and the source MAC address of the uplink Ethernet data message.
  • the sending unit 402 is further configured to: find an ARP entry matching the destination IP address, obtain the MAC address corresponding to the destination IP address, and the VXLAN tunnel; use the MAC address of the ESGW device as the source MAC address, and the MAC address corresponding to the destination IP address as The destination MAC address re-encapsulates the uplink Ethernet data packet, and encapsulates the re-encapsulated uplink Ethernet data packet into the uplink VXLAN encapsulated Ethernet data packet according to the VXLAN tunnel corresponding to the destination IP address, and encapsulates the Ethernet data packet encapsulated by the VXLAN.
  • the text is sent through the outbound port of the VXLAN tunnel corresponding to the destination IP address.
  • the stripping unit 403 is further configured to strip the destination MAC address and the source MAC address of the uplink Ethernet data message.
  • the sending unit 402 is further configured to: find a next hop IP address of the destination IP address; find an ARP entry matching the next hop IP address, and obtain a MAC address and an egress port corresponding to the next hop IP address.
  • the MAC address of the ESGW device is used as the source MAC address, and the MAC address corresponding to the IP address of the next hop is used to re-encapsulate the upstream Ethernet data packet and is sent through the egress port corresponding to the next hop IP address.
  • the receiving unit 401 is further configured to receive an IP address of the target user terminal sent by the vBRAS device, a MAC address of the target user terminal, an egress port reaching the target user terminal, a port connecting the access device, and a Q of the target user terminal. -in-Q tag.
  • the packet forwarding control logic may further include a generating unit 404, configured to generate an ARP entry of the IP address of the target user terminal, where the ARP entry of the IP address of the target user terminal records the target user terminal.
  • the IP address corresponds to the MAC address of the target user terminal, the port out port of the access device, and the index information of the Q-in-Q tag of the target user terminal.
  • the sending unit 402 is further configured to: when the receiving unit 401 receives the downlink Ethernet data packet, and determines that the destination MAC address of the received downlink Ethernet data packet is the MAC address of the ESGW device, the downlink Ethernet data is used.
  • the packet is decapsulated into a downlink IP data packet; the destination IP address of the downlink IP data packet matches the ARP entry of the IP address of the target user terminal; and the downlink IP datagram is sent according to the ARP entry of the IP address of the target user terminal.
  • the packet is encapsulated as a downlink Q-in-Q data packet; the encapsulated downlink Q-in-Q data packet is sent through the outbound port of the ARP entry of the IP address of the target user terminal.
  • the stripping unit 403 is further configured to strip the VXLAN package when the receiving unit 401 receives the Ethernet data packet of the downlink VXLAN package.
  • the sending unit 402 is further configured to: when the destination MAC address of the downlink Ethernet data packet that is stripped of the VXLAN encapsulation is the MAC address of the ESGW device, decapsulate the downlink Ethernet data packet into a downlink IP data packet, according to the downlink IP address.
  • the destination IP address of the data packet matches the ARP entry of the IP address of the target user terminal; the downlink IP data packet is encapsulated into the downlink Q-in-Q data packet according to the ARP entry of the IP address of the target user terminal;
  • the outbound port of the ARP entry of the IP address of the target user terminal sends the downlink Q-in-Q data packet.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

本发明提供一种报文转发方法及装置。根据该方法的一个示例,ESGW设备通过连接接入设备的端口接收到上行Q-in-Q协议报文时,通过所述ESGW设备与vBRAS设备之间的虚拟可扩展局域网VXLAN隧道将所述上行Q-in-Q协议报文转发至所述vBRAS设备;ESGW设备可通过连接所述接入设备的端口接收到上行Q-in-Q数据报文时,剥掉所述上行Q-in-Q数据报文的Q-in-Q标签,确定剥掉所述Q-in-Q标签后的上行以太网数据报文的目的MAC地址为所述ESGW设备的MAC地址,根据所述上行以太网数据报文的目的IP地址进行三层转发。

Description

报文转发
相关申请的交叉引用
本专利申请要求于2017年5月31日提交的、申请号为2017103983126、发明名称为“一种报文转发方法及装置”的中国专利申请的优先权,该申请的全文以引用的方式并入本文中。
背景技术
本发明涉及网络通信中的报文转发。
随着SDN(Software Defined Network,软件定义网络)技术和NFV(Network Function Virtualization,网络功能虚拟化)技术的发展,建设综合的多业务接入边缘,实现多业务的融合,是未来城域网、接入网改造的一个重点。作为接入边缘的核心:BRAS(Broadband Remote Access Server,宽带远程接入服务器)设备,是综合多业务接入边缘改造的一个重点。BRAS进行综合多业务接入边缘改造的方案之一就是实现BRAS的虚拟化。
然而实践发现,在现有的BRAS虚拟化实现方案中,用户侧与网络侧的协议报文交互和数据报文交互均需要通过vBRAS(Virtual BRAS,虚拟BRAS)设备转发,从而导致vBRAS设备负荷过大。
附图说明
图1是本发明实施例提供的一种报文转发方法的流程示意图。
图2A是本发明实施例提供的一种具体应用场景的结构示意图。
图2B是本发明实施例提供的一种具体应用场景的结构示意图。
图2C是本发明实施例提供的一种具体应用场景的结构示意图。
图3是本发明实施例提供的一种报文转发装置的硬件结构示意图。
图4是本发明提供一种报文转发控制逻辑的功能结构图。
具体实施方式
为了使本技术领域的人员更好地理解本发明实施例中的技术方案,并使本发明实施例的上述目的、特征和优点能够更加明显易懂,下面结合附图对本发明实施例中技术方案作进一步详细的说明。
请参见图1,为本发明实施例提供的一种报文转发方法的流程示意图,其中,该报文转发方法可以应用于ESGW(Edge Stream Gateway,边缘流量网关)设备。如图1所示,该报文转发方法可以包括以下步骤:
在步骤101、ESGW设备通过连接接入设备的端口接收上行Q-in-Q协议报文时,通过ESGW设备与vBRAS设备之间的VXLAN(Virtual eXtensible Local Area Network,虚拟扩展局域网)隧道将上行Q-in-Q协议报文转发至vBRAS设备。
在步骤102、通过连接该接入设备的端口接收到上行Q-in-Q数据报文时,ESGW设备剥掉上行Q-in-Q数据报文的Q-in-Q标签,确定剥掉Q-in-Q标签后的上行以太网数据报文的目的MAC(Media Access Control,媒体接入控制)地址为该ESGW设备的MAC地址,根据上行以太网数据报文的目的IP(Internet Protocol,网络协议)地址进行三层转发。
考虑到现有BRAS虚拟化实现方案中,vBRAS设备集成网关设备功能,用户侧与网络侧交互的协议报文和数据报文均需要通过vBRAS设备转发,导致vBRAS设备负荷过大。因而,本公开中,为了降低vBRAS设备的负荷,将网关设备功能从vBRAS设备中剥离出来,而通过专门的网关设备负责用户侧与网络侧的数据报文交互。剥离网关设备功能之后的vBRAS设备可以专用于协议报文的转发和处理,而数据报文不再通过vBRAS设备转发。
为了达到上述目的,在本发明实施例中,可以在组网中部署ESGW设备,用于连接边缘数据中心(Edge Data Center,简称EDC)与外部网络。
相应地,在本发明实施例中,当ESGW设备从连接接入设备的端口接收到上行Q-in-Q协议报文,即用户侧的协议报文时,ESGW设备需要将上行Q-in-Q协议报文转发至vBRAS设备,由vBRAS设备进行处理。此时,该ESGW设备可以通过该ESGW 设备与vBRAS设备之间的VXLAN隧道将该上行Q-in-Q协议报文转发至vBRAS设备。
当ESGW设备接收到上行Q-in-Q数据报文,即用户侧的数据报文时,该ESGW设备不需要将该上行Q-in-Q数据报文转发至vBRAS设备,而是可以直接在本地对其进行转发处理。此时,ESGW设备可以剥掉该上行Q-in-Q数据报文的Q-in-Q标签,并判断剥掉Q-in-Q标签后的上行以太网数据报文的目的MAC地址是否为ESGW设备的MAC地址;若是,则ESGW设备可以根据剥掉Q-in-Q标签后的上行以太网数据报文的目的IP地址进行三层转发。
为了使本领域技术人员更好地理解本发明实施例提供的技术方案,下面结合具体应用场景对本发明实施例提供的技术方案进行说明。
请参见图2A,为本发明实施例提供的一种具体应用场景的架构示意图。如图2A所示,在该应用场景中,边缘数据中心110中部署有vBRAS设备111、APP服务器112以及ESGW设备113。其中,vBRAS设备111与ESGW设备113之间,以及APP服务器112与ESGW设备113之间均建立有VXLAN隧道。ESGW设备113与核心路由器(Core Router,CR)120之间三层互联可通,以能够接入骨干网130。PC(Personal Computer,个人计算机)150可通过OLT(Optical Line Terminal,光线路终端)140接入ESGW设备113。
基于图2A所示的应用场景,本发明实施例提供的报文转发方案的实现原理如下:
一、配置阶段
ESGW设备113配置针对PC 150侧的协议报文的ACL(Access Control List,访问控制列表)表项;其中,该ACL表项的优先级高于MAC表项的优先级。
其中,以协议报文为DHCP(Dynamic Host Configuration Protocol,动态主机配置协议)报文和ARP(Address Resolution Protocol,地址解析协议)报文为例,该ACL表项的格式可以如下表1所示:
Figure PCTCN2018089249-appb-000001
表1
表1中,每个ACL表项的匹配项的入端口为连接作为接入设备的OLT的端口,每个ACL表项的匹配项包含一种报文类型标识。
将vBRAS设备111上虚接口与ESGW设备113上虚接口配置相同的MAC地址。
二、协议报文交互
请参见图2B,在该实施例中,ESGW设备113作为网关处理Q-in-Q协议报文的方式可如下:
当PC 150上线时,PC 150首先发送DHCP请求报文,以请求DHCP服务器分配IP地址。OLT 140为DHCP请求报文添加Q-in-Q标签,广播带有Q-in-Q标签的DHCP请求报文。ESGW设备113可以根据带有Q-in-Q标签的DHCP请求报文的源MAC地址即PC 150的MAC地址以及接收端口,即ESGW设备113连接OLT 140的端口进行MAC地址学习。
ESGW设备113接收到带有Q-in-Q标签的DHCP请求报文,根据入端口以及DCHP协议特征字段查询到匹配的ACL表项,并根据匹配的ACL表项的动作项,将带有Q-in-Q标签的DHCP请求报文进行VXLAN封装。ESGW设备113通过连接vBRAS设备111的VXLAN隧道,将VXLAN封装的带有Q-in-Q标签的DHCP请求报文发送给vBRAS设备111。
vBRAS设备111已使能DHCP服务器功能,vBRAS设备111接收到VXLAN封装的带有Q-in-Q标签的DHCP请求报文时,解除VXLAN封装,根据源MAC地址和VXLAN隧道进行MAC地址学习,为PC 150分配IP地址,并回复带有Q-in-Q标签的 DHCP响应报文。vBRAS设备111根据带有Q-in-Q标签的DHCP响应报文的目的MAC地址对应的VXLAN隧道,将带有Q-in-Q标签的DHCP响应报文进行VXLAN封装,发送到ESGW设备113。
ESGW设备113在接收到VXLAN封装的带有Q-in-Q标签的DHCP响应报文时,可首先解除VXLAN封装,根据带有Q-in-Q标签的DHCP响应报文的目的MAC地址将其转发给作为接入设备的OLT 140,由OLT 140剥除Q-in-Q标签后将DHCP响应报文转发给PC 150。
PC 150可根据该DHCP响应报文获取分配给自身的IP地址。之后,PC 150可以发送携带有自身IP地址和MAC地址的认证报文至OLT 140。OLT 140可为认证报文添加Q-in-Q标签,并将带有Q-in-Q标签的认证报文发送给ESGW设备113。ESGW设备113接收到带有Q-in-Q标签认证报文之后,根据入端口以及认证报文的协议特征字段查询到匹配的ACL表项,并根据匹配的ACL表项的动作项,将带有Q-in-Q标签的认证报文进行VXLAN封装。ESGW设备113可通过连接vBRAS设备111的VXLAN隧道,将VXLAN封装的带有Q-in-Q标签的认证报文发送给vBRAS设备111。
vBRAS设备111接收VXLAN封装的带有Q-in-Q标签的认证报文后,解除VXLAN封装,剥掉Q-in-Q标签,以获得认证报文。然后,vBRAS设备111可将该认证报文发送给AAA服务器(未示出),以由AAA服务器根据该认证报文对PC 150进行认证。AAA服务器确认PC 150通过认证后,可生成并发送认证通过报文给vBRAS设备111。
vBRAS设备111收到认证通过报文后,可为该认证通过报文添加Q-in-Q标签,并进行VXLAN封装,以得到VXLAN封装的带有Q-in-Q标签的认证通过报文。然后,vBRAS设备111可通过该报文的目的MAC地址对应的VXLAN隧道,即,连接ESGW设备113的VXLAN隧道,将该VXLAN封装的带有Q-in-Q标签的认证通过报文发送给ESGW设备113。
ESGW设备113接收到该VXLAN封装的带有Q-in-Q标签的认证通过报文后,解除VXLAN封装,并根据带有Q-in-Q标签的认证通过报文的目的MAC地址执行二层转发。具体地,ESGW设备113可根据该带有Q-in-Q标签的认证通过报文的目的MAC地址对应的出端口将其转发给OLT 140,以由OLT 140在剥除Q-in-Q标签后将该认证通过报文转发给PC 150。
至此,PC150认证通过后,开始使用分配的IP地址进行网络通信。vBRAS设备111 可以向ESGW设备113发送PC 150的IP地址、目的MAC地址为PC 150的MAC地址,到达PC 150的IP地址的出端口是ESGW设备连接OLT设备的端口,以及PC的Q-in-Q标签,其中,该Q-in-Q标签可以为PC 150的DHCP请求报文和认证请求报文中携带的Q-in-Q标签,即两个802.1Q标签。
ESGW设备113接收到vBRAS设备111发送的PC 150的IP地址、目的MAC地址为PC 150的MAC地址、到达PC 150的IP地址的出端口是ESGW设备连接OLT的端口,以及PC 150的Q-in-Q标签,生成PC 150的IP地址的ARP表项,其中,PC 150的IP地址的ARP表项记录了PC 150的IP地址对应于PC 150的MAC地址、到达PC 150的出端口为ESGW设备113连接OLT 140的端口以及PC 150的Q-in-Q标签的索引信息。
当PC 150存在跨网关数据访问需求时,可以发送ARP请求报文,以请求网关设备的IP地址。PC 150发送的ARP请求报文的目标端IP地址为vBRAS设备111的IP地址。OLT 140为ARP请求报文添加Q-in-Q标签,广播带有Q-in-Q标签的ARP请求报文。ESGW设备113接收到该带有Q-in-Q标签的ARP请求报文,可根据入端口以及ARP协议特征字段查询到匹配的ACL表项,并基于匹配的ACL表项的动作项,将带有Q-in-Q标签的ARP请求报文进行VXLAN封装,以得到VXLAN封装的带有Q-in-Q标签的ARP请求报文。ESGW设备113通过连接vBRAS设备111的VXLAN隧道,将VXLAN封装的带有Q-in-Q标签的ARP请求报文发送给vBRAS设备111。
vBRAS设备111接收VXLAN封装的带有Q-in-Q标签的ARP请求报文,解除VXLAN封装。vBRAS设备111可根据该带有Q-in-Q标签的ARP请求报文进行协议处理,以生成用以回复该ARP请求报文的带有Q-in-Q标签的ARP响应报文;其中,该ARP响应报文的发送端IP地址为vBRAS设备111的IP地址,发送端MAC地址为vBRAS设备111上的虚接口的MAC地址;vBRAS设备111根据带有Q-in-Q标签的ARP响应报文的目的MAC地址即,PC 150的MAC地址对应的VXLAN隧道,将带有Q-in-Q标签的ARP响应报文进行VXLAN封装,得到VXLAN封装的带有Q-in-Q标签的ARP响应报文。vBRAS设备113将该VXLAN封装的带有Q-in-Q标签的ARP响应报文发送到ESGW设备111。
ESGW设备解除VXLAN封装,以得到带有Q-in-Q标签的ARP响应报文。然后,ESGW设备113可根据带有Q-in-Q标签的ARP响应报文的目的MAC地址对应的出端口,将带有Q-in-Q标签的ARP响应报文发送到OLT 140,由OLT 140剥除Q-in-Q标 签后,将ARP响应报文转发给PC 150。从而PC 150可以根据该ARP响应报文的发送端MAC地址学习到ESGW设备111的虚接口MAC地址。
三、数据报文交互
请参见图2C,在该实施例中,PC 150与APP服务器112以及PC 150与CR 120之间的数据报文交互流程可如下:
PC发送数据报文到APP服务器
ESGW设备113可通过连接OLT 140的端口接收到上行Q-in-Q数据报文,剥掉该上行Q-in-Q数据报文的Q-in-Q标签,确定剥掉Q-in-Q标签后的上行以太网数据报文的目的MAC地址为ESGW设备113的MAC地址。此时,ESGW设备113可剥除该上行以太网数据报文的目的MAC地址和源MAC地址。
ESGW设备113可根据上行以太网数据报文的目的IP地址查找到匹配的ARP表项,获取该目的IP地址对应的MAC地址以及VXLAN隧道为ESGW设备113与APP服务器112之间的VXLAN隧道。ESGW设备113与APP服务器112之间通过已有的VXLAN隧道转发ARP协议报文,相互学习ARP表项,本文不再赘述。
ESGW设备113以虚接口的MAC地址为源MAC地址,以上述上行以太网数据报文的内层目的IP地址对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,ESGW设备113根据该重新封装的上行以太网报文的内层目的IP地址对应的VXLAN隧道将重新封装的上行以太网数据报文封装为上行VXLAN封装的以太网数据报文,通过VXLAN隧道的出端口,将该上行VXLAN封装的以太网数据报文发送给APP Server服务器112。
APP服务器112收到上行VXLAN封装的以太网数据报文,基于内层的源MAC地址和VXLAN隧道学习MAC地址表项。后续APP服务器112根据这个学习的MAC地址表项将发往PC 150的数据报文发往ESGW设备113进行三层转发。
PC发送数据报文到CR
ESGW设备113可通过连接OLT 140的端口接收到上行Q-in-Q数据报文,剥掉该上行Q-in-Q数据报文的Q-in-Q标签,确定剥掉Q-in-Q标签后的上行以太网数据报文的目的MAC地址为ESGW设备113的MAC地址,此时,ESGW设备113剥除上行以太网数据报文的目的MAC地址和源MAC地址,查找目的IP地址的下一跳IP地址,并根据下一跳IP地址匹配的ARP表项,获取该下一跳IP地址对应的MAC地址和出端口 即,ESGW设备113连接CR 120的端口。
以ESGW设备113的虚接口的MAC地址为源MAC地址,以下一跳IP地址对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,即为原始的上行以太网报文内层IP报文封装新的以太网头。ESGW设备113通过该下一跳IP地址对应的出端口将重新封装的上行以太网数据报文发送给CR 120。
这样,CR 120收到上行的以太网数据报文,根据源MAC地址和接收端口学习MAC地址表项,后续CR 120根据这个学习的MAC地址表项将发往PC 150的数据报文发往ESGW设备113进行三层转发。
APP服务器发送数据报文到PC
ESGW设备113通过与APP服务器112之间的VXLAN隧道接收到下行VXLAN封装的以太网数据报文,剥除VXLAN封装。ESGW设备113确定剥除VXLAN封装的该下行以太网数据报文的目的MAC地址为ESGW设备113的MAC地址,将剥除VXLAN封装的下行以太网数据报文解封装为下行IP数据报文,即将解除了VXLAN封装的下行以太网数据报文的以太网头剥除。
ESGW设备113根据下行IP数据报文的目的IP地址匹配到PC 150的IP地址的ARP表项。ESGW设备113根据PC 150的IP地址匹配的ARP表项将解封装后的IP数据报文封装为下行Q-in-Q数据报文。例如,ESGW设备113可根据匹配的ARP表项确定Q-in-Q标签的索引信息,并根据该Q-in-Q标签的索引信息确定对应的Q-in-Q标签,从而可使用该Q-in-Q标签对该下行IP数据报文进行Q-in-Q封装。
ESGW设备113通过PC 150的IP地址的ARP表项的出端口、即ESGW设备113连接OLT 140的端口发送下行Q-in-Q数据报文到OLT 140。
OLT 140剥除Q-in-Q标签后,发送下行以太网数据报文给PC 150。
CR发送数据报文到PC
ESGW设备113可接收CR 120发送的下行以太网数据报文,确定该下行以太网数据报文的目的MAC地址为ESGW设备113的MAC地址,将该下行以太网数据报文解封装为下行IP数据报文。ESGW设备113根据该下行IP数据报文的目的IP地址匹配到PC 150的IP地址的ARP表项,并且该匹配的ARP表项中包括的出端口为ESGW设备113连接OLT 140的能够到达PC 150的端口。ESGW设备113根据PC150的IP地址的ARP表项将该下行IP数据报文封装为下行Q-in-Q数据报文;通过PC的IP地址的ARP 表项的出端口,即,ESGW设备113连接OLT 140的端口,发送下行Q-in-Q数据报文到OLT 140。
这样,OLT 140剥除下行Q-in-Q数据报文Q-in-Q封装后,发送下行以太网数据报文给PC 150。
通过以上描述可以看出,在本发明实施例提供的技术方案中,当ESGW设备通过连接接入设备的端口接收上行Q-in-Q协议报文时,通过ESGW设备与vBRAS设备之间的VXLAN隧道将上行Q-in-Q协议报文转发至vBRAS设备;当ESGW设备通过连接接入设备的端口接收到上行Q-in-Q数据报文时,剥掉上行Q-in-Q数据报文的Q-in-Q标签,确定剥掉Q-in-Q标签后的上行以太网数据报文的目的MAC地址为ESGW设备的MAC地址,根据上行以太网数据报文的目的IP地址进行三层转发,实现了用户侧的协议报文和数据报文的分离,降低了vBRAS设备的负荷。
以上对本发明提供的方法进行了描述。下面对本发明提供的装置进行描述:
图3为本发明实施例提供的一种报文转发装置的硬件结构示意图。该报文转发装置可应用于ESGW设备。如图3所示,该报文转发装置可包括处理器301、存储有机器可执行指令的机器可读存储介质302。处理器301与机器可读存储介质302可经由系统总线303通信。并且,通过读取并执行机器可读存储介质302中与报文转发控制逻辑对应的机器可执行指令,处理器301可执行上文描述的报文转发方法。
本文中提到的机器可读存储介质302可以是任何电子、磁性、光学或其它物理存储装置,可以包含或存储信息,如可执行指令、数据,等等。例如,机器可读存储介质可以是易失存储器、非易失性存储器或其它类型的存储介质。例如,机器可读存储介质可以是RAM(Radom Access Memory,随机存取存储器)、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、存储盘(如光盘、DVD等)或者它们的组合。
如图4所示,从功能上划分,上述报文转发控制逻辑可以包括接收单元401、发送单元402以及剥除单元403。其中:
接收单元401,用于通过连接接入设备的端口接收上行Q-in-Q协议报文以及上行Q-in-Q数据报文。
发送单元402,用于当接收单元401通过连接接入设备的端口接收上行Q-in-Q协议报文时,通过ESGW设备与vBRAS设备之间的虚拟可扩展局域网VXLAN隧道将上行Q-in-Q协议报文转发至vBRAS设备。
剥除单元403,用于当接收单元401通过连接接入设备的端口接收到上行Q-in-Q数据报文时,剥掉上行Q-in-Q数据报文的Q-in-Q标签。
发送单元402,还用于当确定剥掉Q-in-Q标签后的上行以太网数据报文的目的MAC地址为ESGW设备的MAC地址时,根据上行以太网数据报文的目的IP地址进行三层转发。
根据一个示例,发送单元402,用于根据上行Q-in-Q协议报文查询访问控制列表ACL;其中,访问控制列表设置有多个ACL表项,每个ACL表项的匹配项的入端口为连接接入设备的端口,每个ACL表项的匹配项包含一种报文类型标识;每个ACL表项的动作项为通过连接vBRAS设备的VxLAN隧道的隧道口发送,多个ACL表项的优先级高于媒体访问控制MAC表项的优先级。
发送单元402,还用于根据与上行Q-in-Q协议报文匹配的ACL表项的动作项,利用ESGW设备连接vBRAS设备的VXLAN隧道将上行Q-in-Q协议报文封装为上行VXLAN封装的Q-in-Q协议报文,通过ESGW设备连接vBRAS设备的VXLAN隧道的出端口发送上行VXLAN封装的Q-in-Q协议报文。
根据另一个示例,剥除单元403,还用于剥除上行以太网数据报文的目的MAC地址和源MAC地址。
发送单元402,还用于查找到目的IP地址匹配的ARP表项,获取目的IP地址对应的MAC地址以及VXLAN隧道;以ESGW设备的MAC地址为源MAC地址,以目的IP地址对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,根据目的IP地址对应的VXLAN隧道将重新封装的上行以太网数据报文封装为上行VXLAN封装的以太网数据报文,将VXLAN封装的以太网数据报文通过目的IP地址对应的VXLAN隧道的出端口发送。
根据另一个示例,剥除单元403,还用于剥除上行以太网数据报文的目的MAC地址和源MAC地址。
根据又一个示例,发送单元402,还用于查找到目的IP地址的下一跳IP地址;查找到下一跳IP地址匹配的ARP表项,获取下一跳IP地址对应的MAC地址和出端口;以ESGW设备的MAC地址为源MAC地址,以下一跳IP地对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,通过下一跳IP地址对应的出端口发送。
根据一个示例,接收单元401还可用于接收vBRAS设备发送的目标用户终端的IP 地址、目标用户终端的MAC地址、到达目标用户终端的出端口为连接接入设备的端口、以及目标用户终端的Q-in-Q标签。
在这种情况下,上述报文转发控制逻辑还可以包括生成单元404,用于生成目标用户终端的IP地址的ARP表项;其中,目标用户终端的IP地址的ARP表项记录了目标用户终端的IP地址对应于目标用户终端的MAC地址、接入设备的端口出端口以及目标用户终端的Q-in-Q标签的索引信息。
相应地,发送单元402,还用于当接收单元401收到下行以太网数据报文,且确定接收的下行以太网数据报文的目的MAC地址为ESGW设备的MAC地址时,将下行以太网数据报文解封装为下行IP数据报文;根据下行IP数据报文的目的IP地址匹配到目标用户终端的IP地址的ARP表项;根据目标用户终端的IP地址的ARP表项将下行IP数据报文封装为下行Q-in-Q数据报文;通过目标用户终端的IP地址的ARP表项的出端口发送封装后的下行Q-in-Q数据报文。
根据又一个示例,剥除单元403,还用于当接收单元401收到下行VXLAN封装的以太网数据报文时,剥除VXLAN封装。
发送单元402,还用于确定剥除VXLAN封装的下行以太网数据报文的目的MAC地址为ESGW设备的MAC地址时,将下行以太网数据报文解封装为下行IP数据报文,根据下行IP数据报文的目的IP地址匹配到目标用户终端的IP地址的ARP表项;根据目标用户终端的IP地址的ARP表项将下行IP数据报文封装为下行Q-in-Q数据报文;通过目标用户终端的IP地址的ARP表项的出端口发送下行Q-in-Q数据报文。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明保护的范围之内。

Claims (14)

  1. 一种报文转发方法,应用于边缘流量网关ESGW设备包括:
    当通过连接接入设备的端口接收上行Q-in-Q协议报文时,通过所述ESGW设备与虚拟宽带远程接入服务器vBRAS设备之间的虚拟可扩展局域网VXLAN隧道将所述上行Q-in-Q协议报文转发至所述vBRAS设备;
    当通过连接所述接入设备的端口接收到上行Q-in-Q数据报文时,剥掉所述上行Q-in-Q数据报文的Q-in-Q标签,确定剥掉所述Q-in-Q标签后的上行以太网数据报文的目的媒体访问控制MAC地址为所述ESGW设备的MAC地址,根据剥掉所述Q-in-Q标签的所述上行以太网数据报文的目的IP地址进行三层转发。
  2. 根据权利要求1所述的方法,其特征在于,包括:
    根据所述上行Q-in-Q协议报文查询访问控制列表ACL;其中,所述访问控制列表设置有多个ACL表项,每个所述ACL表项的匹配项的入端口为连接所述接入设备的端口,每个ACL表项的匹配项包含一种报文类型标识;每个ACL表项的动作项为通过连接vBRAS设备的VXLAN隧道的隧道口发送报文;所述多个ACL表项的优先级高于媒体访问控制MAC表项的优先级;
    基于与所述上行Q-in-Q协议报文匹配的ACL表项的动作项,利用所述ESGW设备连接vBRAS设备的VXLAN隧道将所述上行Q-in-Q协议报文封装为上行VXLAN封装的Q-in-Q协议报文,通过所述ESGW设备连接vBRAS设备的VXLAN隧道的出端口发送所述上行VXLAN封装的Q-in-Q协议报文。
  3. 根据权利要求1所述的方法,其特征在于,根据所述上行以太网数据报文的目的IP地址进行三层转发,包括:
    剥除所述上行以太网数据报文的目的MAC地址和源MAC地址;
    查找到所述目的IP地址匹配的ARP表项,获取所述目的IP地址对应的MAC地址以及VXLAN隧道;
    以所述ESGW设备的MAC地址为源MAC地址,以所述目的IP地址对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,根据所述目的IP地址对应的VXLAN隧道将所述重新封装的上行以太网数据报文封装为上行VXLAN封装的以太网数据报文;
    将所述上行VXLAN封装的以太网数据报文通过所述目的IP地址对应的VXLAN隧道的出端口发送。
  4. 根据权利要求1所述的方法,其特征在于,根据所述上行以太网数据报文的目 的IP地址进行三层转发包括:
    剥除所述上行以太网数据报文的目的MAC地址和源MAC地址;
    查找到所述目的IP地址的下一跳IP地址;
    查找到所述下一跳IP地址匹配的ARP表项,获取所述下一跳IP地址对应的MAC地址和出端口;
    以所述ESGW设备的MAC地址为源MAC地址,以所述下一跳IP地址对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,通过所述下一跳IP地址对应的出端口发送。
  5. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    接收所述vBRAS设备发送的目标用户终端的IP地址、目标用户终端的MAC地址、到达所述目标用户终端的出端口为连接所述接入设备的端口、以及所述目标用户终端的Q-in-Q标签;
    生成所述目标用户终端的IP地址的ARP表项;其中,所述目标用户终端的IP地址的ARP表项记录了所述目标用户终端的IP地址对应于目标用户终端的MAC地址、连接所述接入设备的端口以及所述目标用户终端的Q-in-Q标签的索引信息。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    收到下行以太网数据报文;
    确定接收的下行以太网数据报文的目的MAC地址为所述ESGW设备的MAC地址时,将所述下行以太网数据报文解封装为下行IP数据报文;
    根据所述下行IP数据报文的目的IP地址匹配到所述目标用户终端的IP地址的ARP表项;
    根据所述目标用户终端的IP地址的ARP表项将所述下行IP数据报文封装为下行Q-in-Q数据报文;
    通过所述目标用户终端的IP地址的ARP表项的出端口发送封装后的下行Q-in-Q数据报文。
  7. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    接收到下行VXLAN封装的以太网数据报文,剥除VXLAN封装;
    确定剥除VXLAN封装的下行以太网数据报文的目的MAC地址为所述ESGW设备的MAC地址时,将所述下行以太网数据报文解封装为下行IP数据报文,根据所述下行IP数据报文的目的IP地址匹配到所述目标用户终端的IP地址的ARP表项;
    根据所述目标用户终端的IP地址的ARP表项将所述下行IP数据报文封装为下行 Q-in-Q数据报文;
    通过所述目标用户终端的IP地址的ARP表项的出端口发送所述下行Q-in-Q数据报文。
  8. 一种报文转发装置,应用于边缘流量网关ESGW设备,包括:
    接收单元,用于通过连接接入设备的端口接收上行Q-in-Q协议报文以及上行Q-in-Q数据报文;
    剥除单元,用于当所述接收单元通过连接所述接入设备的端口接收到上行Q-in-Q数据报文时,剥掉所述上行Q-in-Q数据报文的Q-in-Q标签;
    发送单元,用于当所述接收单元通过连接所述接入设备的端口接收到上行Q-in-Q协议报文时,通过所述ESGW设备与vBRAS设备之间的虚拟可扩展局域网VXLAN隧道将所述上行Q-in-Q协议报文转发至所述vBRAS设备;还用于当确定剥掉所述Q-in-Q标签后的上行以太网数据报文的目的MAC地址为所述ESGW设备的MAC地址时,根据所述上行以太网数据报文的目的IP地址进行三层转发。
  9. 根据权利要求8所述的装置,其特征在于,
    所述发送单元,具体用于根据所述上行Q-in-Q协议报文查询访问控制列表ACL;其中,所述访问控制列表设置有多个ACL表项,每个所述ACL表项的匹配项的入端口为连接所述接入设备的端口,每个ACL表项的匹配项包含一种报文类型标识;每个ACL表项的动作项为通过连接vBRAS设备的VxLAN隧道的隧道口发送报文,所述多个ACL表项的优先级高于媒体访问控制MAC表项的优先级;
    所述发送单元,还用于根据与所述上行Q-in-Q协议报文匹配的ACL表项的动作项,利用所述ESGW设备连接vBRAS设备的VXLAN隧道将所述上行Q-in-Q协议报文封装为上行VXLAN封装的Q-in-Q协议报文,通过所述ESGW设备连接vBRAS设备的VXLAN隧道的出端口发送所述上行VXLAN封装的Q-in-Q协议报文。
  10. 根据权利要求8所述的装置,其特征在于,
    所述剥除单元,还用于剥除所述上行以太网数据报文的目的MAC地址和源MAC地址;
    所述发送单元,还用于查找到所述目的IP地址匹配的ARP表项,获取所述目的IP地址对应的MAC地址以及VXLAN隧道;以所述ESGW设备的MAC地址为源MAC地址,以所述目的IP地址对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,根据所述目的IP地址对应的VXLAN隧道将所述重新封装的上行以太网数据报文封装为上行VXLAN封装的以太网数据报文,将所述上行VXLAN封装的以太网数据 报文通过所述目的IP地址对应的VXLAN隧道的出端口发送。
  11. 根据权利要求8所述的装置,其特征在于,
    所述剥除单元,还用于剥除所述上行以太网数据报文的目的MAC地址和源MAC地址;
    所述发送单元,还用于查找到所述目的IP地址的下一跳IP地址;查找到所述下一跳IP地址匹配的ARP表项,获取所述下一跳IP地址对应的MAC地址和出端口;以所述ESGW设备的MAC地址为源MAC地址,以所述下一跳IP地址对应的MAC地址为目的MAC地址重新封装上行以太网数据报文,通过所述下一跳IP地址对应的出端口发送。
  12. 根据权利要求8所述的装置,其特征在于,
    所述接收单元,具体用于接收所述vBRAS设备发送的目标用户终端的IP地址、目标用户终端的MAC地址、到达所述目标用户终端的出端口为连接所述接入设备的端口、以及所述目标用户终端的Q-in-Q标签;
    所述装置还包括:
    生成单元,用于生成所述目标用户终端的IP地址的ARP表项;其中,所述目标用户终端的IP地址的ARP表项记录了所述目标用户终端的IP地址对应于目标用户终端的MAC地址、连接所述接入设备的端口以及所述目标用户终端的Q-in-Q标签的索引信息。
  13. 根据权利要求12所述的装置,其特征在于,
    所述发送单元,还用于当所述接收单元收到下行以太网数据报文,且确定接收的下行以太网数据报文的目的MAC地址为所述ESGW设备的MAC地址时,将所述下行以太网数据报文解封装为下行IP数据报文;根据所述下行IP数据报文的目的IP地址匹配到所述目标用户终端的IP地址的ARP表项;根据所述目标用户终端的IP地址的ARP表项将所述下行IP数据报文封装为下行Q-in-Q数据报文;通过所述目标用户终端的IP地址的ARP表项的出端口发送封装后的下行Q-in-Q数据报文。
  14. 根据权利要求12所述的装置,其特征在于,
    所述剥除单元,还用于当所述接收单元收到下行VXLAN封装的以太网数据报文时,剥除VXLAN封装;
    所述发送单元,还用于确定剥除VXLAN封装的下行以太网数据报文的目的MAC地址为所述ESGW设备的MAC地址时,将所述下行以太网数据报文解封装为下行IP数据报文,根据所述下行IP数据报文的目的IP地址匹配到所述目标用户终端的IP地址的ARP表项;根据所述目标用户终端的IP地址的ARP表项将所述下行IP数据报文封 装为下行Q-in-Q数据报文;通过所述目标用户终端的IP地址的ARP表项的出端口发送所述下行Q-in-Q数据报文。
PCT/CN2018/089249 2017-05-31 2018-05-31 报文转发 WO2018219326A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2019566127A JP6825142B2 (ja) 2017-05-31 2018-05-31 パケット転送
US16/618,783 US11283645B2 (en) 2017-05-31 2018-05-31 Forwarding packet
EP18809671.3A EP3618365B1 (en) 2017-05-31 2018-05-31 Packet forwarding

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710398312.6A CN108259298B (zh) 2017-05-31 2017-05-31 一种报文转发方法及装置
CN201710398312.6 2017-05-31

Publications (1)

Publication Number Publication Date
WO2018219326A1 true WO2018219326A1 (zh) 2018-12-06

Family

ID=62721936

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/089249 WO2018219326A1 (zh) 2017-05-31 2018-05-31 报文转发

Country Status (5)

Country Link
US (1) US11283645B2 (zh)
EP (1) EP3618365B1 (zh)
JP (1) JP6825142B2 (zh)
CN (1) CN108259298B (zh)
WO (1) WO2018219326A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259298B (zh) * 2017-05-31 2020-12-29 新华三技术有限公司 一种报文转发方法及装置
US11082259B1 (en) * 2020-03-31 2021-08-03 Arista Networks, Inc. System and method for centralized policy enforcement for network segmentation
CN111917624B (zh) * 2020-07-13 2022-02-01 烽火通信科技股份有限公司 一种在vxlan传输中控制信息的传送方法及系统
CN113794615B (zh) * 2021-08-05 2023-04-25 新华三信息安全技术有限公司 一种报文转发方法及设备
CN116980247B (zh) * 2023-09-22 2024-01-16 广州市成格信息技术有限公司 一种基于软件定义局域网实现ip随行的方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040186878A1 (en) * 2003-02-21 2004-09-23 Shu Yamamoto Internet service provider facilitating IPv6 connectivity across a customer's network containing IPv4 components
CN101110764A (zh) * 2007-08-13 2008-01-23 中兴通讯股份有限公司 一种以太网交换机数据帧划分虚拟局域网并转发的方法
CN106559292A (zh) * 2015-09-29 2017-04-05 杭州华三通信技术有限公司 一种宽带接入方法和装置
CN108259298A (zh) * 2017-05-31 2018-07-06 新华三技术有限公司 一种报文转发方法及装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1328890C (zh) * 2004-02-10 2007-07-25 中兴通讯股份有限公司 一种用网络处理器实现分组控制功能的方法
CN1866919B (zh) * 2005-12-06 2012-11-14 华为技术有限公司 基于虚拟局域网堆叠的业务交换方法
CN101005437B (zh) * 2007-01-16 2011-04-20 中兴通讯股份有限公司 一种实现堆叠虚拟局域网的方法及系统
CN101257420A (zh) * 2007-03-02 2008-09-03 华为技术有限公司 一种点对点协议接入方法、系统及接入节点设备
CN101110745A (zh) 2007-08-14 2008-01-23 华为技术有限公司 衔接二层网络和三层网络的方法、装置和系统
CN102404720B (zh) * 2010-09-19 2014-10-08 华为技术有限公司 无线局域网中密钥的发送方法及装置
US9549317B2 (en) * 2011-10-17 2017-01-17 Mitel Mobility Inc. Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network
CN103166864B (zh) * 2013-03-26 2016-01-20 杭州华三通信技术有限公司 一种私网vlan信息管理方法和设备
CN103997460B (zh) * 2014-06-04 2017-05-17 福建星网锐捷网络有限公司 实现QinQ路由终结的方法、交换芯片和交换机
CN106533946B (zh) * 2016-11-29 2020-07-07 新华三技术有限公司 报文转发方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040186878A1 (en) * 2003-02-21 2004-09-23 Shu Yamamoto Internet service provider facilitating IPv6 connectivity across a customer's network containing IPv4 components
CN101110764A (zh) * 2007-08-13 2008-01-23 中兴通讯股份有限公司 一种以太网交换机数据帧划分虚拟局域网并转发的方法
CN106559292A (zh) * 2015-09-29 2017-04-05 杭州华三通信技术有限公司 一种宽带接入方法和装置
CN108259298A (zh) * 2017-05-31 2018-07-06 新华三技术有限公司 一种报文转发方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3618365A4 *

Also Published As

Publication number Publication date
JP2020522190A (ja) 2020-07-27
US20200136849A1 (en) 2020-04-30
EP3618365B1 (en) 2024-05-01
EP3618365A1 (en) 2020-03-04
CN108259298A (zh) 2018-07-06
CN108259298B (zh) 2020-12-29
JP6825142B2 (ja) 2021-02-03
EP3618365A4 (en) 2020-06-03
US11283645B2 (en) 2022-03-22

Similar Documents

Publication Publication Date Title
WO2018219326A1 (zh) 报文转发
US11240065B2 (en) NSH encapsulation for traffic steering
WO2017054757A1 (zh) 宽带接入
EP2224645B1 (en) A method and equipment for transmitting a message based on the layer-2 tunnel protocol
US9705706B2 (en) Multiple prefix connections with translated virtual local area network
WO2015123987A1 (zh) 报文转发方法和装置
WO2018219319A1 (zh) 报文转发
CN107547338B (zh) 一种报文转发方法及装置
WO2007009349A1 (fr) Méthode et appareil de transmission de message
WO2014205784A1 (zh) 一种在nvo3网络中处理组播报文的方法、装置和nvo3网络
WO2009111977A1 (zh) 一种映射信息的发送方法、系统和装置
US11296985B2 (en) Normalized lookup and forwarding for diverse virtual private networks
WO2018014803A1 (zh) 报文转发
WO2014166073A1 (zh) 报文转发方法和网络设备
WO2015180120A1 (zh) 报文转发方法、转发表项下发方法及网络设备
KR101140453B1 (ko) Ip 인터워킹 vll을 통한 회로 에뮬레이션 방법 및 시스템
WO2018090980A1 (zh) 报文转发
WO2018019146A1 (zh) 设备探测
CN110752989A (zh) 一种东西向流量转发方法与装置
CN108471374B (zh) 数据报文的转发方法及装置
CN107547691B (zh) 地址解析协议报文代理方法和装置
WO2016074354A1 (zh) 共享wifi的方法及系统、家庭网关和无线局域网关
WO2018233632A1 (zh) 视频点播流的转发
CN113794616B (zh) 一种报文转发方法及设备
Dunbar et al. Directory-Assisted Transparent Interconnection of Lots of Links (TRILL) Encapsulation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18809671

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019566127

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018809671

Country of ref document: EP

Effective date: 20191128