WO2019024844A1 - Bras转控分离架构下的用户认证 - Google Patents

Bras转控分离架构下的用户认证 Download PDF

Info

Publication number
WO2019024844A1
WO2019024844A1 PCT/CN2018/097777 CN2018097777W WO2019024844A1 WO 2019024844 A1 WO2019024844 A1 WO 2019024844A1 CN 2018097777 W CN2018097777 W CN 2018097777W WO 2019024844 A1 WO2019024844 A1 WO 2019024844A1
Authority
WO
WIPO (PCT)
Prior art keywords
bras
vxlan
user
port
user access
Prior art date
Application number
PCT/CN2018/097777
Other languages
English (en)
French (fr)
Inventor
孟丹
Original Assignee
新华三技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新华三技术有限公司 filed Critical 新华三技术有限公司
Priority to JP2020505861A priority Critical patent/JP6920537B2/ja
Priority to EP18841672.1A priority patent/EP3664403B1/en
Publication of WO2019024844A1 publication Critical patent/WO2019024844A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • H04L12/2872Termination of subscriber connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • H04L12/2876Handling of subscriber policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L2012/4629LAN interconnection over a backbone network, e.g. Internet, Frame Relay using multilayer switching, e.g. layer 3 switching

Definitions

  • the present application relates to authentication of a broadband remote access server (BRAS) in a framework in which a forwarding function and a control function are separated from each other.
  • BRAS broadband remote access server
  • the forwarding and control functions of the BRAS are separated from each other (hereinafter referred to as “transfer separation”) to achieve high resource utilization and dynamics.
  • transfer separation A new metropolitan area network with standardization of telescopic and interface.
  • the BRAS control plane (CP: Control Plane) device and the BRAS data plane (DP: Data Plane) device are mainly included in the BRAS transfer control separation architecture.
  • the BRAS CP device is mainly responsible for the processing of control functions, such as user session management, control packet processing, interaction with external service systems such as authentication servers, address pool management and allocation.
  • the BRAS DP device is mainly responsible for the processing of the forwarding function, for example, distinguishing between control messages and data packets, sending control messages to BRAS CP devices, scalable virtual local area network (VXLAN: Virtual eXtensible LAN), and data packet forwarding. Based on the user's quality of service (QoS: Quality of Service) policy processing.
  • QoS Quality of Service
  • FIG. 2 is a schematic structural diagram of a control message for adding a private header to carry port information of a user access port.
  • FIG. 3 is a schematic flowchart of a method for performing user authentication on a BRAS DP device side provided by the present application.
  • FIG. 3A is a schematic flow chart of step 302 in the method shown in FIG.
  • FIG. 3B is a schematic flow chart of creating a VXLAN tunnel and a VSI for a BRAS DP device.
  • FIG. 4 is a schematic flowchart of a method for performing user authentication on a BRAS CP device side provided by the present application.
  • 4A is a schematic flow chart of creating a VXLAN tunnel and a VSI by a BRAS CP device.
  • FIG. 5 is a schematic diagram of an embodiment provided by the present application.
  • FIG. 6 is a schematic structural diagram of a device provided by the present application.
  • FIG. 7 is a schematic structural diagram of hardware of the apparatus shown in FIG. 6 provided by the present application.
  • FIG. 8 is a schematic structural diagram of another device provided by the present application.
  • FIG. 1 shows a simplified diagram of the BRAS transfer separation architecture.
  • FIG. 1 simply illustrates a BRAS DP device 110 and a BRAS CP device 120 as an example to illustrate how the BRAS DP device 110 and the BRAS CP device 120 interact to complete user authentication.
  • the BRAS DP device 110 receives the authentication request message from the user equipment. If the authentication request message is identified as the control message, the BRAS DP device 110 sends the authentication request message to the corresponding BRAS CP device 120.
  • the authentication request packet carries information about the user identity, such as a username and password.
  • the BRAS CP device 120 sends the user identity related information, such as the username and password, carried in the authentication request packet to the authentication server 200.
  • the authentication server 200 compares the received user identity related information with the locally pre-configured user identity related information of the user equipment, and if it is met, the authentication is considered to pass.
  • the authentication server 200 returns a control response message indicating the passing of the authentication to the BRAS CP device 120, and the BRAS CP device 120 returns a control response message to the BRAS DP device 110, and the final control response message is forwarded by the BRAS DP device 110 to User equipment.
  • the BRAS CP device 120 delivers the user flow table to the BRAS DP device 110.
  • the data message sent by the subsequent user equipment is forwarded by the BRAS DP device 110 according to the received user flow table, and no longer passes through the BRAS CP device 120.
  • the port information of the port for accessing the user equipment (hereinafter referred to as "user access port”) on the BRAS DP device is often authenticated.
  • user access restrictions To allow users to access only the specified users accessing the designated ports on the BRAS DP device (hereinafter also referred to as "user access restrictions"), thereby preventing users from accessing the network in unregistered locations.
  • the BRAS CP device 120 is responsible for interacting with the authentication server 200, and the port information of the user access port is located on the BRAS DP device 110, not in the BRAS CP device 120.
  • the BRAS CP device 120 cannot obtain the port information of the user access port, and the access restriction of the user cannot be implemented.
  • a private header may be added to the control message sent to the BRAS CP device on the BRAS DP device.
  • FIG. 2 exemplifies the structure of the control message to add a private header.
  • the private header carries port information of the user access port.
  • the BRAS CP device can also send the port information of the user access port carried by the private header of the received control packet to the authentication server for authentication, so as to implement the access restriction of the user.
  • the present application also provides another method for implementing user access restriction.
  • FIG. 3 is a flowchart of a method provided by the present application. This process applies to BRAS DP devices and includes:
  • Step 301 The BRAS DP device receives, by using a local user access port, a control packet sent by the user equipment for authenticating the user.
  • the BRAS DP device when the BRAS DP device receives the packet from the user equipment through the local user access port, the BRAS DP device determines whether the packet is a control message or a data message based on the message type field in the message. When it is determined that the message is a control message, it means that the message is used to authenticate the user, and step 302 is performed.
  • the data packet is determined to be a data packet, the data packet forwarding process is performed according to a data packet forwarding process that is well known to those skilled in the art. The present application is not specifically limited.
  • Step 302 The BRAS DP device determines a VXLAN identification ID corresponding to the user access port.
  • Step 304 The BRAS DP device sends the control packet encapsulated by the VXLAN to the BRAS CP device through the VXLAN tunnel.
  • the BRAS DP device determines that the VXLAN ID corresponding to the user access port may include the following steps 302a1 and 302a2:
  • step 302a1 the BRAS DP device determines a virtual interface (VSI: Virtual Switch Interface) bound to the user access port.
  • VSI Virtual Switch Interface
  • the VSI bound to the user access port is dynamically created by the BRAS DP device, and one VSI uniquely corresponds to one VXLAN ID.
  • Step 302a2 The BRAS DP device determines the VXLAN ID corresponding to the VSI as the VXLAN ID corresponding to the user access port.
  • VXLAN ID corresponding to the user access port can be determined through step 302a1 and step 302a2.
  • the BRAS DP device receives the VXLAN tunnel configuration and the first VSI creation instruction delivered by the UCM (User Control Management) network element when receiving the command to configure the user access port to enable the BRAS service.
  • the first VSI creation instruction is used to instruct the BRAS DP device to create a VSI that is bound to the user access port and corresponds to the VXLAN ID.
  • step 300b2 the BRAS DP device creates the VXLAN tunnel according to the VXLAN tunnel configuration.
  • Step 300b3 the BRAS DP device creates the VSI according to the first VSI creation instruction.
  • FIG. 3B shows that the VXLAN tunnel configuration is sent with the first VSI creation instruction in step 300b1, those skilled in the art should understand that the VXLAN tunnel configuration may also be sent separately from the first VSI creation instruction, for example, sending a VXLAN tunnel first. Configure, resend the first VSI creation command, or send the first VSI creation command first, and then send the VXLAN tunnel configuration.
  • one VXLAN tunnel can simultaneously bind multiple different VXLAN IDs, and one VXLAN ID is uniquely bound to one VXLAN tunnel. If the VXLAN tunnel bound to the VXLAN ID is bound to multiple VXLAN IDs at the same time, the VXLAN encapsulation is performed when the control packet is VXLAN encapsulated according to the VXLAN ID and the VXLAN tunnel bound to the VXLAN ID in the foregoing step 303.
  • the VNI field carries the VXLAN ID.
  • the tunnel source address in the VXLAN encapsulation is the IP address of the BRAS DP device, and the tunnel destination address is the IP address of the BRAS CP device.
  • the UCM network element is used to configure and manage the BRAS CP device and the BRAS DP device in the BRAS transfer control separation architecture.
  • the UCM network element configures and manages the BRAS CP device and the BRAS DP device in the BRAS transfer control separation architecture in a unified user interface (UI: User Interface).
  • UI User Interface
  • the networking shown in FIG. 5 shows the UCM network element and the BRAS. Connection structure of CP devices and BRAS DP devices.
  • the BRAS DP device may further report the port information of the user access port to the UCM network element, so that the UCM network element sends the BMC CP device to the BSON CP device.
  • the port information of the user access port includes: a sub-slot number where the user access port is located, a slot number to which the sub-slot number belongs, a port number, and a port type. The following describes how the BRAS CP device obtains and sends the port information of the user access port to the authentication server for authentication.
  • the BRAS CP device After the BRAS DP device forwards the control packet of the VXLAN encapsulation through the VXLAN tunnel, the BRAS CP device that has established the VXLAN tunnel with the BRAS DP device receives the control packet of the VXLAN encapsulation through the VXLAN tunnel, and executes the control packet. 4 shows the process.
  • FIG. 4 is a flowchart of another method provided by the present application, which is applied to a BRAS CP device. As shown in FIG. 4, the process may include the following steps:
  • Step 401 The BRAS CP device receives the VXLAN encapsulated control message through a VXLAN tunnel with the BRAS DP device.
  • Step 402 The BRAS CP device determines whether the control packet is a packet used for authenticating the user. If it is checked that the control packet is a packet for authenticating the user, proceed to step 403.
  • control packet is a packet for authenticating the user may be checked according to the message attribute field.
  • Step 403 The BRAS CP device locally searches for the port information of the user access port on the BRAS DP device corresponding to the VXLAN ID in the VXLAN package.
  • Step 404 The BRAS CP device sends the port information of the user access port and the user identity information carried by the control packet to the authentication server for authentication.
  • the port information here, that is, the port information of the port for accessing the user equipment on the BRAS DP device reported by the BRAS DP device described above, is dynamically configured by the UCM network element on the BRAS CP device.
  • the foregoing port information may be combined into a character string according to a specified format, which is referred to as an authentication string.
  • the specified format here is a format that is easy for the authentication server to recognize.
  • the port information includes the sub-slot number of the specified port, the slot number to which the sub-slot number belongs, the port number, and the port type.
  • the authentication string of the port information in the specified format can be as follows:
  • the character "/" indicates a connector.
  • the BRAS CP device locally searches for the port information of the user access port on the BRAS DP device corresponding to the VXLAN ID in the VXLAN package, as shown in FIG. 4A. Perform the following steps as shown:
  • the BRAS CP device receives the port information delivered by the UCM network element, and configures the port information on the locally created VSI corresponding to the VXLAN ID.
  • the BRAS CP device locally searches for the port information of the user access port on the BRAS DP device corresponding to the VXLAN ID in the VXLAN package, including: searching for the VXLAN in all local VSIs.
  • the VSI corresponding to the ID; the port information that is determined to be configured by the found VSI is the port information of the user access port on the BRAS DP device corresponding to the VXLAN ID.
  • the BRAS CP device may perform the following steps as shown in FIG. 4A:
  • the BRAS CP device receives the VXLAN tunnel configuration delivered by the UCM network element when receiving the command to configure the BRAS service on the user access port of the BRAS DP device.
  • step 400d2 the BRAS CP device creates the VXLAN tunnel according to the VXLAN tunnel configuration.
  • the BRAS CP device receives the second VSI creation instruction delivered by the UCM network element.
  • the second VSI creation instruction is an instruction for instructing the BRAS CP device to create a VSI corresponding to the VXLAN ID.
  • Step 400d4 the BRAS CP device creates the VSI according to the second VSI creation instruction.
  • step 400d1 to step 400d2 the VSI corresponding to the VXLAN ID and the VXLAN tunnel of the BRAS CP device to the BRAS DP device are created on the BRAS CP device, and the created VXLAN tunnel is bound to the VXLAN ID.
  • FIG. 4A shows that the VXLAN tunnel configuration is sent in step 400d1 and the second VSI creation command is sent in step 400d3, those skilled in the art should understand that the second VSI creation command may be sent first, then the VXLAN tunnel configuration may be sent, and even It is also possible to send the VXLAN tunnel configuration with the second VSI creation command.
  • the port information of the user access port on the BRAS DP device is implicitly identified by the VXLAN ID, so that the port information of the user access port can be related to the user identity.
  • the information participates in the authentication of the user, and the access restriction of the user is realized.
  • the message transmission between the BRAS CP device and the BRAS DP device uses a standard VXLAN encapsulation, and does not need to additionally add a private header to carry port information of the user access port, so that the BRAS DP device can The use of a relatively simple, but inexpensive switching chip to achieve user access restrictions.
  • the port information of the user access port on the BRAS DP device is authenticated, and no improvement is required to the authentication server such as the AAA server, which is relatively simple to implement.
  • FIG. 3 and FIG. 4 The flow shown in FIG. 3 and FIG. 4 is described below in conjunction with an embodiment:
  • FIG. 5 is a networking diagram of an application provided by an embodiment of the present application.
  • FIG. 5 exemplifies two BRAS CP devices 521, 522.
  • Figure 5 also shows three BRAS DP devices 531, 532, 533.
  • the BRAS DP device 531, the BRAS DP device 532, and the BRAS DP device 533 report the port information of the local user access port to the UCM network element 100 shown in FIG. 5, respectively.
  • FIG. 5 only shows the port information reported by the BRAS DP device 531 to the UCM network element 100 for reporting the local user access port.
  • the UCM network element 100 provides a UI.
  • the UI has configuration options for the BRAS CP device 521, the BRAS CP device 522, and configuration options for the BRAS DP device 531, the BRAS DP device 532, and the BRAS DP device 533.
  • the BRAS DP device 531 Taking the BRAS DP device 531 as an example, the BRAS DP device 532 and the BRAS DP device 533 are similar, and the user configures the service access port of the BRAS DP device 531 in the configuration option of the BRAS DP device 531 shown by the UI based on the service requirement. If the user configures the BRAS service on the user access port g1/0/1 of the BRAS DP device 531 on the UI provided by the UCM network element 100 based on the service requirement, the UCM network element 100 allocates a global VXLAN ID (denoted as VXLAN400).
  • VXLAN400 a global VXLAN ID
  • the user accesses the BRAS service of port g1/0/1, and selects one of the BRAS CP device 521 and the BRAS CP device 522 for establishing a VXLAN tunnel with the BRAS DP device 531.
  • select a BRAS CP device such as selecting the lightest load, selecting a bandwidth redundancy, and the like, which is not specifically bound in this embodiment.
  • the UCM network element 100 issues a VXLAN tunnel configuration to the BRAS DP device 531 and the BRAS CP device 521 to establish a VXLAN tunnel between the BRAS DP device 531 and the BRAS CP device 521.
  • the manner of establishing a VXLAN tunnel between the BRAS DP device 531 and the BRAS CP device 521 can be any one of the techniques well known to those skilled in the art, and will not be described herein.
  • the established VXLAN tunnel is bound to the VXLAN ID "VXLAN400".
  • VXLAN tunnel is established between the BRAS DP device 531 and the BRAS CP device 521, the above steps of selecting the BRAS CP and the delivery tunnel configuration may be omitted, and the existing VXLAN tunnel may be directly bound to the VXLAN ID "VXLAN400".
  • VXLAN tunnel a the VXLAN tunnel bound to the VXLAN ID "VXLAN400" is referred to as a VXLAN tunnel a.
  • the UCM network element 100 sends a first VSI creation command to the BRAS DP device 531.
  • the BRAS DP device 531 receives the first VSI creation instruction, creates a virtual interface 551 corresponding to the VXLAN ID "VXLAN400" according to the first VSI creation instruction, and binds the created virtual interface 551 to the user access port g1/0/1. .
  • the virtual interface 551 of the BRAS DP device 531 uniquely binds the VXLAN ID "VXLAN400".
  • the UCM network element 100 sends a second VSI creation command to the BRAS CP device 521.
  • the BRAS CP device 521 receives the second VSI creation instruction, and creates a virtual interface 552 corresponding to the VXLAN ID "VXLAN400" according to the second VSI creation instruction.
  • the virtual interface 552 of the BRAS CP device 521 is uniquely bound to the VXLAN ID "VXLAN400".
  • the UMX network element 100 sends the VXLAN tunnel configuration, the first VSI creation instruction, and the second VSI creation instruction without a fixed chronological order.
  • the UCM network element 100 finds the port information of the user access port g1/0/1 in the port information of all the user access ports reported by the BRAS DP device 531.
  • the port information of the user access port g1/0/1 can include the sub-slot number of the port, the slot number to which the sub-slot number belongs, the port number, and the port type.
  • the UCM network element 100 arranges the port information of the user access port g1/0/1 that is found to be accurately bound to the user 610 that is accessed through the user access port g1/0/1.
  • Authentication string Suppose the constructed authentication string is: eth 1/0/1.
  • the UCM network element 100 configures the constructed authentication string on the virtual interface 552 of the BRAS CP device 521.
  • the user 610 goes online and sends an authentication request message for requesting authentication.
  • the authentication request message is a message for authenticating the user 610, and carries the identity related information of the user 610, such as a username and a password.
  • the BRAS DP device 531 receives the authentication request packet through the local user access port g1/0/1, and finds that the authentication request packet belongs to the control packet, and searches for the local user access port g1/0/1.
  • the bound virtual interface is the bound virtual interface.
  • the BRAS DP device 531 finds that the virtual interface bound to the local user access port g1/0/1 is the virtual interface 551, and the VXLAN ID corresponding to the virtual interface 551 is VXLAN400, according to the VXLAN ID "VXLAN400" and the VXLAN ID "VXLAN400".
  • the bound VXLAN tunnel a encapsulates the authentication request packet in VXLAN and forwards the VXLAN encapsulated authentication request packet through the VXLAN tunnel a.
  • the VNI field in the VXLAN package carries the VXLAN ID "VXLAN400".
  • the BRAS CP device 521 After receiving the VXLAN encapsulated authentication request packet, the BRAS CP device 521 searches for a virtual interface corresponding to the VXLAN ID "VXLAN400" carried in the VNI field in the VXLAN package.
  • the BRAS CP device 521 finds the virtual interface 552, obtains the authentication string eth 1/0/1 configured by the virtual interface 552, and associates the authentication string eth 1/0/1 with the identity information of the user 610 carried in the authentication request message.
  • the agreed format is sent to the authentication server (using the AAA server 200 as an example) for authentication.
  • the BRAS CP device 521 generates a new Radius packet, and carries the authentication string eth 1/0/1 and the identity related information of the user 610 carried in the authentication request packet in the RADIUS format to the AAA server. 200.
  • the AAA server 200 authenticates the received authentication string eth 1/0/1 and the identity related information of the user 610.
  • For a specific authentication process refer to any authentication technology well known to those skilled in the art, and details are not described herein again.
  • the port information of the user access port on the BRAS DP device is implicitly identified by the VXLAN ID.
  • the VXLAN ID is indirectly implemented.
  • the control packet carries the port information of the user access port on the BRAS DP device, so that the port information of the user access port can also participate in the user authentication, thereby realizing accurate authentication of the user.
  • the packet transmission between the BRAS CP device and the BRAS DP device uses a standard VXLAN encapsulation, and does not need to additionally add a private header to carry authentication information for restricting access of the user, such as access restriction information of the user access port.
  • the BRAS DP device can use a relatively simple, but inexpensive, switching chip to achieve user access restrictions.
  • the authentication server authenticates the port information of the user access port, and does not need to perform any improvement on the authentication server such as the AAA server, and is relatively simple to implement.
  • FIG. 6 is a functional structural diagram of an authentication apparatus provided by the present application.
  • the device is applied to BRAS CP devices in the BRAS transfer control separation architecture, including:
  • the receiving module 601 is configured to receive, by using a VXLAN tunnel between the BRAS DP device in the BRAS forwarding separation architecture, a control packet of the VXLAN encapsulation;
  • the processing module 602 is configured to: if the control packet is a packet for authenticating the user, search for the user access port corresponding to the VXLAN ID in the VXLAN package on the BRAS CP device.
  • the port information wherein the user access port is on the BRAS DP device; the port information and the identity information of the user carried in the control packet are sent to an authentication server for authentication.
  • the processing module 602 is further configured to: receive the port information that is sent by the UCM network element, and configure the port information on a VSI that is created by the BRAS CP device and that corresponds to the VXLAN ID.
  • the processing module 602 searching for the port information of the user access port corresponding to the VXLAN ID on the BRAS CP device includes: searching for the VXLAN in all VSIs of the BRAS CP device.
  • the VSI corresponding to the ID; the port information that is determined to be configured by the VSI is the port information of the user access port corresponding to the VXLAN ID.
  • the receiving module 601 further receives a VXLAN tunnel configuration and the UCM network element delivered by the UCM network element when receiving the command to configure the user access port to enable the BRAS service on the BRAS DP device.
  • the processing module 602 creates the VXLAN tunnel according to the VXLAN tunnel configuration; and creates the VSI according to the second VSI creation instruction.
  • the port information of the user access port includes: a sub-slot number where the user access port is located, a slot number to which the sub-slot number belongs, and a port number of the user access port.
  • the type of the user access port includes: a sub-slot number where the user access port is located, a slot number to which the sub-slot number belongs, and a port number of the user access port. The type of the user access port.
  • the present application also provides a hardware structure diagram corresponding to the apparatus shown in FIG. 6. As shown in FIG. 7, it can include a machine readable storage medium 701, a processor 702, a machine readable storage medium 701, and a processor 702 can communicate via a system bus.
  • the machine readable storage medium 701 is configured to store the machine executable instructions corresponding to the operations performed by the receiving module 601 and the processing module 602, and the processor 702 is configured to load and execute the machine executable instructions to implement the foregoing authentication. method.
  • machine-readable storage medium 701 can be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like.
  • a machine-readable storage medium can be a volatile memory, a non-volatile memory, or similar storage medium.
  • the machine-readable storage medium 410 may be a RAM (Radom Access Memory), a flash memory, a storage drive (such as a hard disk drive), a solid state drive, any type of storage disk (such as a compact disc, a DVD, etc.) or The combination.
  • FIG. 8 is a structural diagram of another device provided by the present application. As shown in Figure 8, the device is applied to the BRAS DP device in the BRAS transfer separation architecture, including:
  • the user port module 801 is configured to receive, by using a user access port on the BRAS DP device, a control packet that is sent by the user equipment to authenticate the user, and determine a VXLAN ID corresponding to the user access port.
  • the sending module 802 is configured to perform VXLAN encapsulation on the control packet according to the VXLAN ID and the VXLAN tunnel bound by the VXLAN ID, and send the control packet of the VXLAN encapsulation to the VXLAN tunnel through the VXLAN tunnel.
  • the BRAS CP device at the opposite end of the VXLAN tunnel.
  • the VXLAN encapsulation carries the VXLAN ID, so that the BRAS CP device locally searches for port information of the user access port corresponding to the VXLAN ID, and the port information and the control.
  • the identity information of the user carried in the packet is sent to the authentication server for authentication.
  • the user port module 801 when determining the VXLAN ID corresponding to the user access port, specifically includes: determining a virtual interface VSI bound to the user access port; and setting a VXLAN ID corresponding to the virtual interface. It is determined as the VXLAN ID corresponding to the user access port.
  • the apparatus further includes a creation module 803.
  • the creating module 803 is configured to receive a VXLAN tunnel configuration sent by the user control management UCM network element when the command to configure the user access port to enable the BRAS service, and to create a binding with the user access port. And a first VSI creation instruction of the VSI corresponding to the VXLAN ID; creating the VXLAN tunnel according to the VXLAN tunnel configuration; and creating the VSI according to the first VSI creation instruction.
  • the sending module 802 further reports the port information of the user access port to the UCM network element, so that the UCM network element sends the user corresponding to the VXLAN ID to the BRAS CP device.
  • Port information of the access port includes: a sub-slot number where the user access port is located, a slot number to which the sub-slot number belongs, a port number of the user access port, and the user The type of access port.
  • the present application also provides a hardware structure diagram corresponding to the apparatus shown in FIG.
  • the hardware structure may include: a machine readable storage medium, a processor, and the specific structure is similar to the hardware structure diagram shown in FIG.
  • the machine readable storage medium, the processor can communicate via a system bus.
  • the machine readable storage medium is configured to store the above-mentioned user port module, the sending module, and the machine executable instructions corresponding to the operations performed by the creating module; and the processor, configured to load and execute the machine executable instructions to implement the above authentication method.
  • a machine-readable storage medium can be any electronic, magnetic, optical, or other physical storage device that can contain or store information, such as executable instructions, data, and so forth.
  • a machine-readable storage medium can be a volatile memory, a non-volatile memory, or similar storage medium.
  • the machine-readable storage medium 410 may be a RAM (Radom Access Memory), a flash memory, a storage drive (such as a hard disk drive), a solid state drive, any type of storage disk (such as a compact disc, a DVD, etc.) or The combination.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

本申请提供了BRAS转控分离架构下对用户进行认证的方法和装置。根据所述方法的一个示例,通过VXLAN ID隐性标识了BRAS DP设备上的用户接入端口的信息,以使得BRAS CP设备能够将用户接入端口的信息与认证报文携带的用户身份信息一起发送至认证服务器进行认证。这样,由于用户接入端口的信息也参与到用户的认证中,实现了用户的访问限制。

Description

BRAS转控分离架构下的用户认证
相关申请的交叉引用
本专利申请要求于2017年8月3日提交的、申请号为201710655491.7、发明名称为“认证方法和装置”的中国专利申请的优先权,该申请的全文以引用的方式并入本文中。
背景技术
本申请涉及宽带远程接入服务器(BRAS:Broadband Remote Access Server)在转发功能与控制功能相互分离的架构下的认证。
按照“控制聚集、转发高效、交互简单,弹性可扩”的原则,将BRAS的转发功能和控制功能相互分离(以下又可简称为“转控分离”),以实现资源利用率高、可动态伸缩、接口标准化的新型城域网。
在BRAS转控分离的架构中主要包含BRAS控制平面(CP:Control Plane)设备和BRAS数据平面(DP:Data Plane)设备。其中,BRAS CP设备主要负责控制功能的处理,比如,用户会话管理、控制报文处理、与外部业务系统比如认证服务器交互、地址池管理及分配等。BRAS DP设备主要负责转发功能的处理,比如,区分控制报文与数据报文、将控制报文上送BRAS CP设备、可扩展虚拟局域网(VXLAN:Virtual eXtensible LAN)加解封装、数据报文转发、基于用户的服务质量(QoS:Quality of Service)策略处理等。
附图说明
图1为示出了BRAS转控分离架构的示意图。
图2为增加私有头以携带用户接入端口的端口信息的控制报文的结构示意图。
图3为本申请提供的在BRAS DP设备侧进行用户认证的方法的示意性流程图。
图3A为图3所示方法中步骤302的示意性流程图。
图3B为BRAS DP设备创建VXLAN隧道和VSI的示意性流程图。
图4为本申请提供的在BRAS CP设备侧进行用户认证的方法的示意性流程图。
图4A为BRAS CP设备创建VXLAN隧道和VSI的示意性流程图。
图5为本申请提供的实施例示意图。
图6为本申请提供的装置结构示意图。
图7为本申请提供的图6所示装置的硬件结构示意图。
图8为本申请提供的另一装置结构示意图。
具体实施方式
图1简单示出了BRAS转控分离架构的示意图。在具体应用时,BRAS转控分离架构中可有多个BRAS DP设备和多个BRAS CP设备。图1仅简单以一个BRAS DP设备110和一个BRAS CP设备120为例,示意介绍BRAS DP设备110和BRAS CP设备120如何交互完成用户认证。
如图1所示,BRAS DP设备110接收来自用户设备的认证请求报文,若识别出该认证请求报文为控制报文,则上送该认证请求报文至对应的BRAS CP设备120。认证请求报文携带用户身份相关信息,比如用户名、密码。
BRAS CP设备120将认证请求报文携带的用户身份相关信息,比如用户名和密码,发送给认证服务器200。认证服务器200将接收到的用户身份相关信息和本地预先配置的所述用户设备的用户身份相关信息相对照,如果符合就认为认证通过。相应地,认证服务器200返回用于指示认证通过的控制响应报文给BRAS CP设备120,BRAS CP设备120返回控制响应报文给BRAS DP设备110,最终控制响应报文由BRAS DP设备110转发给用户设备。当认证通过后,BRAS CP设备120下发用户流表给BRAS DP设备110。后续用户设备发送的数据报文由BRAS DP设备110依据接收到的用户流表进行转发,不再经由BRAS CP设备120。
在用户认证过程中,除了对用户身份相关信息进行认证外,还经常会对BRAS DP设备上用于接入用户设备的端口(以下可简称为“用户接入端口”)的端口信息进行认证,以实现只有从BRAS DP设备上指定端口接入的指定用户才允许上线(以下也可称为“用户的接入限制”),从而避免用户在非登记位置接入网络。但是,在图1所示的BRAS转控分离架构中,BRAS CP设备120负责和认证服务器200交互,而上述用户接入端口的端口信息位于BRAS DP设备110上,并不在BRAS CP设备120中,也不会携带在用户设备发送的认证请求报文中,这就导致BRAS CP设备120不能获取到上述用 户接入端口的端口信息,从而无法做到用户的接入限制。
为了实现用户的接入限制,作为一个实施例,可在BRAS DP设备上送至BRAS CP设备的控制报文中增加一个私有头,图2举例示出控制报文增加私有头的结构。该私有头携带上述用户接入端口的端口信息。如此,BRAS CP设备可将收到的控制报文的私有头携带的用户接入端口的端口信息也发送给认证服务器进行认证,以实现用户的接入限制。
但是,采用私有头并不标准,并且当BRAS DP设备采用交换芯片作为转发关键器件时,由于无法用硬件自动完成私有头增删,只能采用CPU处理,将极大影响处理效率,从而可能导致用户上线速度明显下降。
作为本申请另一实施例,本申请还提供了实现用户接入限制的另外一种方法。
参见图3,图3为本申请提供的方法流程图。该流程应用于BRAS DP设备,包括:
步骤301,BRAS DP设备通过本地用户接入端口接收用户设备发送的用于对用户进行认证的控制报文。
在本申请中,BRAS DP设备通过本地用户接入端口接收到来自用户设备的报文时,基于该报文中的报文类型字段确定该报文为控制报文还是数据报文。当确定该报文为控制报文时,则意味着该报文用于对用户进行认证,执行步骤302。而当确定该报文为数据报文时,则可按照本领域技术人员熟知的数据报文转发流程执行,本申请并不具体限定。
步骤302,BRAS DP设备确定用户接入端口对应的VXLAN标识ID。
步骤303,BRAS DP设备按照所述VXLAN ID、以及所述VXLAN ID绑定的本BRAS DP设备与BRAS CP设备之间的VXLAN隧道对所述控制报文进行VXLAN封装。其中,所述VXLAN封装中携带所述VXLAN ID。
步骤304,BRAS DP设备通过所述VXLAN隧道将VXLAN封装的所述控制报文发送至所述BRAS CP设备。
作为一个实施例,如图3A所示,BRAS DP设备确定用户接入端口对应的VXLAN ID可包括下述步骤302a1和步骤302a2:
步骤302a1,BRAS DP设备确定与所述用户接入端口绑定的虚接口(VSI:Virtual Switch Interface)。
在本申请中,与用户接入端口绑定的VSI是BRAS DP设备动态创建的,一个VSI唯一对应一个VXLAN ID。
步骤302a2,BRAS DP设备将所述VSI对应的VXLAN ID确定为所述用户接入端口对应的VXLAN ID。
至此,通过步骤302a1和步骤302a2即可确定用户接入端口对应的VXLAN ID。
作为一个实施例,在执行图3所示流程之前,还可如图3B所示包括以下步骤:
步骤300b1,BRAS DP设备接收用户控制管理(UCM:User Control Management)网元在接收到配置所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置和第一VSI创建指令。其中,所述第一VSI创建指令用于指示所述BRAS DP设备创建与所述用户接入端口绑定的且与所述VXLAN ID对应的VSI。
步骤300b2,BRAS DP设备根据所述VXLAN隧道配置创建所述VXLAN隧道。
步骤300b3,BRAS DP设备根据所述第一VSI创建指令创建所述VSI。
通过步骤300b1至步骤300b3即实现了上述VSI、VXLAN隧道的建立。尽管图3B示出在步骤300b1将VXLAN隧道配置与第一VSI创建指令一起发送,但本领域技术人员应能理解,也可以将VXLAN隧道配置与第一VSI创建指令分开发送,例如先发送VXLAN隧道配置、再发送第一VSI创建指令,或者先发送第一VSI创建指令、再发送VXLAN隧道配置。
在本申请实施例应用中,一个VXLAN隧道可同时绑定多个不同的VXLAN ID,而一个VXLAN ID唯一绑定一个VXLAN隧道。假如上述VXLAN ID绑定的VXLAN隧道同时绑定多个VXLAN ID,则在上述步骤303中按照VXLAN ID、以及所述VXLAN ID绑定的VXLAN隧道对所述控制报文进行VXLAN封装时,VXLAN封装中的VNI字段携带所述VXLAN ID,VXLAN封装中的隧道源地址为BRAS DP设备的IP地址,隧道目的地址为BRAS CP设备的IP地址。
其中,UCM网元用于配置和管理BRAS转控分离架构中的BRAS CP设备、BRAS DP设备。比如,UCM网元在统一的用户界面(UI:User Interface)配置和管理BRAS转控分离架构中的BRAS CP设备、BRAS DP设备,图5所示的组网举例示出了UCM网元、BRAS CP设备、BRAS DP设备的连接结构。
至此,完成图3所示流程。
在本申请一个示例中,BRAS DP设备还可进一步向UCM网元上报上述用户接入端口的端口信息,以使所述UCM网元向所述BRAS CP设备发送与所述VXLAN ID对应的所述用户接入端口的端口信息。所述用户接入端口的端口信息包括:所述用户接入端口所在的子槽位号、所述子槽位号所属的槽位号、端口号、端口类型。下文会描述BRAS CP设备如何获取并将该用户接入端口的端口信息发送给认证服务器进行认证。
当BRAS DP设备通过VXLAN隧道转发VXLAN封装的控制报文后,与该BRAS DP设备建立了所述VXLAN隧道的BRAS CP设备会通过所述VXLAN隧道收到该VXLAN封装的控制报文,并执行图4所示流程。
参见图4,图4为本申请提供的另一方法流程图,该流程应用于BRAS CP设备。如图4所示,该流程可包括以下步骤:
步骤401,BRAS CP设备通过与BRAS DP设备之间的VXLAN隧道接收VXLAN封装的控制报文。
步骤402,BRAS CP设备判断所述控制报文是否为用于对用户进行认证的报文。若检查出所述控制报文为用于对用户进行认证的报文,则继续执行步骤403。
作为一个实施例,可依据报文属性字段检查控制报文是否为用于对用户进行认证的报文。
步骤403,BRAS CP设备在本地查找所述VXLAN封装中VXLAN ID对应的在所述BRAS DP设备上的用户接入端口的端口信息。
步骤404,BRAS CP设备将所述用户接入端口的端口信息和所述控制报文携带的用户身份信息发送给认证服务器进行认证。
这里的端口信息,即为上面描述的BRAS DP设备上报的BRAS DP设备上用于接入上述用户设备的端口的端口信息,是由UCM网元动态配置在BRAS CP设备的。作为一个实施例,上述端口信息可按照指定格式组合成字符串,简称认证字符串。这里的指定格式是便于认证服务器识别的格式。以端口信息包括:指定端口所在的子槽位号、所述子槽位号所属的槽位号、端口号、端口类型为例,则端口信息按照指定格式组合成的认证字符串可举例为:
用户接入端口所在的子槽位号/子槽位号所属的槽位号/用户接入端口的端口号/端口类型。
其中,字符“/”表示连接符。
至此,完成图4所示的流程。
在图4所示流程中,上述步骤403中,BRAS CP设备在本地查找所述VXLAN封装中VXLAN ID对应的在所述BRAS DP设备上的用户接入端口的端口信息之前,还可如图4A所示执行以下步骤:
步骤400c1,BRAS CP设备接收UCM网元下发的所述端口信息,将所述端口信息配置在本地创建的与所述VXLAN ID对应的VSI上。
基于步骤400c1,步骤403中,BRAS CP设备在本地查找所述VXLAN封装中VXLAN ID对应的在所述BRAS DP设备上的用户接入端口的端口信息包括:在本地所有VSI中查找与所述VXLAN ID对应的VSI;确定该查找到的VSI被配置的所述端口信息为所述VXLAN ID对应的在所述BRAS DP设备上的用户接入端口的端口信息。
作为一个实施例,本申请中,BRAS CP设备在步骤400c1之前,如图4A所示还可执行以下步骤:
步骤400d1,BRAS CP设备接收所述UCM网元在接收到配置所述BRAS DP设备上的所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置。
步骤400d2,BRAS CP设备根据所述VXLAN隧道配置创建所述VXLAN隧道。
步骤400d3,BRAS CP设备接收所述UCM网元下发的第二VSI创建指令。其中,所述第二VSI创建指令是用于指示BRAS CP设备创建与所述VXLAN ID对应的VSI的指令。
步骤400d4,BRAS CP设备根据所述第二VSI创建指令创建所述VSI。
通过步骤400d1至步骤400d2,即可实现在BRAS CP设备上创建所述VXLAN ID对应的VSI、以及BRAS CP设备至BRAS DP设备的VXLAN隧道,并且所创建的VXLAN隧道绑定上述VXLAN ID。尽管图4A示出先在步骤400d1发送VXLAN隧道配置、再在步骤400d3发送第二VSI创建指令,但本领域技术人员应能理解,也可以先发送第二VSI创建指令、再发送VXLAN隧道配置,甚至还可以将VXLAN隧道配置与第二VSI创建指令也可以一起发送。
通过图3、图4所示流程可以看出,在本申请中,是由VXLAN ID隐性标识BRAS DP设备上的用户接入端口的端口信息,使得用户接入端口的端口信息能与用户身份信息参 与到用户的认证中,实现了用户的接入限制。
另外,在本申请中,BRAS CP设备和BRAS DP设备之间的报文传递使用的是标准VXLAN封装,不需要通过额外增加私有头来携带用户接入端口的端口信息,这样,BRAS DP设备可以使用功能相对简单、但价格低廉的交换芯片来实现用户的接入限制。
还有,在本申请中,实现了对BRAS DP设备上的用户接入端口的端口信息进行认证,并且不需要对认证服务器比如AAA服务器进行任何改进,实施起来相对简单。
下面结合一个实施例对图3、图4所示流程进行描述:
参见图5,图5为本申请提供的实施例应用组网图。图5举例示出了两个BRAS CP设备521、522。图5还举例示出了三个BRAS DP设备531、532、533。
在图5中,BRAS DP设备531、BRAS DP设备532、BRAS DP设备533分别向图5所示的UCM网元100上报本地用户接入端口的端口信息。图5仅示出BRAS DP设备531向UCM网元100上报本地用户接入端口的端口信息。
在图5中,UCM网元100提供了UI。该UI中有BRAS CP设备521、BRAS CP设备522的配置选项,也有BRAS DP设备531、BRAS DP设备532、BRAS DP设备533的配置选项。
以BRAS DP设备531为例,BRAS DP设备532、BRAS DP设备533类似,用户基于业务需求在UI所示的BRAS DP设备531的配置选项中对BRAS DP设备531的用户接入端口进行业务配置。假如用户基于业务需求在UCM网元100提供的UI上配置BRAS DP设备531的用户接入端口g1/0/1使能BRAS业务,则UCM网元100分配一个全局VXLAN ID(记为VXLAN400)用于用户接入端口g1/0/1的BRAS业务,并从BRAS CP设备521、BRAS CP设备522中选择一个用于与BRAS DP设备531建立VXLAN隧道。这里选择BRAS CP设备的方式有多种,比如选择负载最轻的、选择带宽冗余多的等,本实施例并不具体绑定。
假如UCM网元100选择BRAS CP设备521,则UCM网元100下发VXLAN隧道配置给BRAS DP设备531和BRAS CP设备521,以使BRAS DP设备531和BRAS CP设备521之间建立VXLAN隧道。BRAS DP设备531和BRAS CP设备521之间建立VXLAN隧道的方式可为本领域技术人员熟知的任意一种技术,本文不再赘述。建立的VXLAN隧道绑定VXLAN ID“VXLAN400”。假如BRAS DP设备531和BRAS CP设备521之间已建立有VXLAN隧道,则上述选择BRAS CP、下发隧道配置的步骤可省 略,直接将已有的VXLAN隧道绑定VXLAN ID“VXLAN400”即可。为便于描述,将绑定VXLAN ID“VXLAN400”的VXLAN隧道记为VXLAN隧道a。
UCM网元100下发第一VSI创建指令给BRAS DP设备531。BRAS DP设备531接收第一VSI创建指令,依据该第一VSI创建指令创建与VXLAN ID“VXLAN400”对应的虚接口551,并将创建的虚接口551绑定至用户接入端口g1/0/1。在应用中,BRAS DP设备531的虚接口551唯一绑定VXLAN ID“VXLAN400”。
UCM网元100下发第二VSI创建指令给BRAS CP设备521。BRAS CP设备521接收第二VSI创建指令,依据该第二VSI创建指令创建与VXLAN ID“VXLAN400”对应的虚接口552。在应用中,BRAS CP设备521的虚接口552唯一绑定VXLAN ID“VXLAN400”。在本实施例中,UCM网元100下发VXLAN隧道配置、第一VSI创建指令、第二VSI创建指令并没有固定的时间先后顺序。
UCM网元100在之前BRAS DP设备531上报的所有用户接入端口的端口信息中找到用户接入端口g1/0/1的端口信息。用户接入端口g1/0/1的端口信息可包括端口所在的子槽位号、子槽位号所属的槽位号、端口号、端口类型。
UCM网元100将找到的用户接入端口g1/0/1的端口信息按照指定格式进行排列,构造出用于对通过用户接入端口g1/0/1接入的用户610进行精确绑定的认证字符串。假如构造的认证字符串为:eth 1/0/1。
UCM网元100将构造的认证字符串配置在BRAS CP设备521的虚接口552。
以上描述了UCM网元100对BRAS DP设备531、BRAS CP设备521的配置。
用户610上线,发送用于请求认证的认证请求报文。认证请求报文是用于对用户610进行认证的报文,携带用户610的身份相关信息、比如用户名和密码。
BRAS DP设备531通过本地用户接入端口g1/0/1收到该认证请求报文,并在识别出该认证请求报文属于控制报文后,查找与本地用户接入端口g1/0/1绑定的虚接口。
BRAS DP设备531发现与本地用户接入端口g1/0/1绑定的虚接口为虚接口551,该虚接口551对应的VXLAN ID为VXLAN400,则按照VXLAN ID“VXLAN400”以及VXLAN ID“VXLAN400”绑定的VXLAN隧道a对该认证请求报文进行VXLAN封装,并通过VXLAN隧道a转发VXLAN封装的认证请求报文。其中,VXLAN封装中的VNI字段携带VXLAN ID“VXLAN400”。
BRAS CP设备521通过VXLAN隧道a接收到VXLAN封装的认证请求报文后,在本地所有虚接口中查找与VXLAN封装中VNI字段携带的VXLAN ID“VXLAN400”对应的虚接口。
BRAS CP设备521找到虚接口552,获取虚接口552被配置的认证字符串eth 1/0/1,将认证字符串eth 1/0/1和认证请求报文携带的用户610的身份相关信息按照约定格式发送给认证服务器(以AAA服务器200为例)进行认证。具体地,BRAS CP设备521生成新的Radius报文,将认证字符串eth 1/0/1和认证请求报文携带的用户610的身份相关信息按照约定格式携带在Radius报文中发送给AAA服务器200。
AAA服务器200对收到的认证字符串eth 1/0/1和用户610的身份相关信息进行认证。具体认证过程可参考本领域技术人员熟知的任意认证技术,这里不再赘述。
可以看出,在本实施例中,通过VXLAN ID隐性标识了BRAS DP设备上用户接入端口的端口信息,在由BRAS DP设备向BRAS CP设备传递控制报文时,通过VXLAN ID间接实现了控制报文携带BRAS DP设备上的用户接入端口的端口信息,使得用户接入端口的端口信息也能参与到用户的认证中,实现了用户的精确认证。
另外,BRAS CP设备和BRAS DP设备之间的报文传递使用的是标准VXLAN封装,不需要通过额外增加私有头来携带对用户进行接入限制的认证信息比如用户接入端口的接入限制信息,这样,BRAS DP设备可以使用功能相对简单、但价格低廉的交换芯片来实现用户的接入限制。
还有,在本实施例中,认证服务器在对用户接入端口的端口信息进行认证,并不需要对认证服务器比如AAA服务器进行任何改进,实施起来相对简单。
以上对本申请提供的方法进行了描述。下面对本申请提供的装置进行描述:
参见图6,图6为本申请提供的认证装置的功能结构图。该装置应用于BRAS转控分离架构中的BRAS CP设备,包括:
接收模块601,用于通过与所述BRAS转控分离架构中的BRAS DP设备之间的VXLAN隧道接收VXLAN封装的控制报文;
处理模块602,用于若检查出所述控制报文为用于对用户进行认证的报文,则在所述BRAS CP设备上查找与所述VXLAN封装中的VXLAN ID对应的用户接入端口的端口信息,其中,所述用户接入端口在所述BRAS DP设备上;将所述端口信息和所述控制报文携带的所述用户的身份信息发送给认证服务器进行认证。
作为一个实施例,所述处理模块602进一步用于,接收UCM网元下发的所述端口信息,将所述端口信息配置在所述BRAS CP设备创建的与所述VXLAN ID对应的VSI上。在这种情况下,所述处理模块602在所述BRAS CP设备上查找与所述VXLAN ID对应的用户接入端口的端口信息包括:在所述BRAS CP设备的所有VSI中查找与所述VXLAN ID对应的VSI;确定该查找到的VSI被配置的所述端口信息为所述VXLAN ID对应的用户接入端口的端口信息。
作为一个实施例,接收模块601还接收所述UCM网元在接收到配置所述BRAS DP设备上的所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置以及所述UCM网元下发的用于创建与所述VXLAN ID对应的VSI的第二VSI创建指令。相应地,所述处理模块602根据所述VXLAN隧道配置创建所述VXLAN隧道;以及,根据所述第二VSI创建指令创建所述VSI。
作为一个实施例,所述用户接入端口的端口信息包括:所述用户接入端口所在的子槽位号、所述子槽位号所属的槽位号、所述用户接入端口的端口号、所述用户接入端口的类型。
至此,完成图6所示装置的结构描述。
相应地,本申请还提供了对应图6所示装置的硬件结构图。如图7所示,其可包括:机器可读存储介质701、处理器702;机器可读存储介质701、处理器702可经由系统总线通信。其中,机器可读存储介质701,用于存储上述接收模块601、处理模块602所执行的操作对应的机器可执行指令;处理器702,用于加载并执行机器可执行指令,以实现上述的认证方法。
作为一个实施例,机器可读存储介质701可以是任何电子、磁性、光学或其它物理存储装置,可以包含或存储信息,如可执行指令、数据,等等。例如,机器可读存储介质可以是易失存储器、非易失性存储器或者类似的存储介质。具体地,机器可读存储介质410可以是RAM(Radom Access Memory,随机存取存储器)、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、任何类型的存储盘(如光盘、DVD等)或者它们的组合。
至此,完成图7所示的硬件结构描述。
参见图8,图8为本申请提供的另一装置结构图。如图8所示,该装置应用于BRAS转控分离架构中的BRAS DP设备,包括:
用户端口模块801,用于通过所述BRAS DP设备上的用户接入端口接收用户设备发 送的用于对用户进行认证的控制报文,并确定所述用户接入端口对应的VXLAN ID;
发送模块802,用于按照所述VXLAN ID、以及所述VXLAN ID绑定的VXLAN隧道对所述控制报文进行VXLAN封装,并通过所述VXLAN隧道将VXLAN封装的所述控制报文发送至位于所述VXLAN隧道对端的BRAS CP设备。其中,所述VXLAN封装中携带所述VXLAN ID,以使所述BRAS CP设备在本地查找与所述VXLAN ID对应的所述用户接入端口的端口信息,并将所述端口信息和所述控制报文携带的所述用户的身份信息发送给认证服务器进行认证。
作为一个实施例,用户端口模块801在确定所述用户接入端口对应的VXLAN ID时,具体包括:确定与所述用户接入端口绑定的虚接口VSI;将所述虚接口对应的VXLAN ID确定为所述用户接入端口对应的VXLAN ID。
作为一个实施例,如图8所示,该装置进一步包括创建模块803。所述创建模块803,用于接收用户控制管理UCM网元在接收到配置所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置和用于创建与所述用户接入端口绑定且与所述VXLAN ID对应的VSI的第一VSI创建指令;根据所述VXLAN隧道配置创建所述VXLAN隧道;根据所述第一VSI创建指令创建所述VSI。
作为一个实施例,所述发送模块802进一步向UCM网元上报所述用户接入端口的端口信息,以使所述UCM网元向所述BRAS CP设备发送与所述VXLAN ID对应的所述用户接入端口的端口信息。其中,所述用户接入端口的信息包括:所述用户接入端口所在的子槽位号、所述子槽位号所属的槽位号、所述用户接入端口的端口号、所述用户接入端口的类型。
至此,完成图8所示装置的结构描述。
相应地,本申请还提供了对应图8所示装置的硬件结构图。该硬件结构可包括:机器可读存储介质、处理器,具体结构类似图7所示的硬件结构图。其中,机器可读存储介质、处理器可经由系统总线通信。机器可读存储介质,用于存储上述用户端口模块、发送模块、创建模块所执行的操作对应的机器可执行指令;处理器,用于加载并执行机器可执行指令,以实现上述的认证方法。
作为一个实施例,机器可读存储介质可以是任何电子、磁性、光学或其它物理存储装置,可以包含或存储信息,如可执行指令、数据,等等。例如,机器可读存储介质可以是易失存储器、非易失性存储器或者类似的存储介质。具体地,机器可读存储介 质410可以是RAM(Radom Access Memory,随机存取存储器)、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、任何类型的存储盘(如光盘、DVD等)或者它们的组合。
以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。

Claims (24)

  1. 一种认证方法,包括:
    宽带远程接入服务器BRAS转控分离架构中的BRAS控制平面CP设备,通过与所述BRAS转控分离架构中的BRAS数据平面DP设备之间的VXLAN隧道接收VXLAN封装的控制报文;
    若所述控制报文为用于对用户进行认证的报文,则所述BRAS CP设备在本地查找所述VXLAN封装中VXLAN ID对应的用户接入端口的端口信息,其中,所述用户接入端口在所述BRAS DP设备上;
    所述BRAS CP设备将所述端口信息和所述控制报文携带的所述用户的身份信息发送给认证服务器进行认证。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述BRAS CP设备接收用户控制管理UCM网元下发的所述端口信息;以及
    所述BRAS CP设备将所述端口信息配置在本地创建的与所述VXLAN ID对应的虚接口VSI上。
  3. 根据权利要求2所述的方法,其特征在于,在本地查找所述VXLAN ID对应的用户接入端口的端口信息包括:
    所述BRAS CP设备在本地所有虚接口中查找与所述VXLAN ID对应的VSI;
    所述BRAS CP设备将查找到的VSI被配置的所述端口信息确定为所述VXLAN ID对应的用户接入端口的端口信息。
  4. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    所述BRAS CP设备接收所述UCM网元在接收到配置所述BRAS DP设备上的所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置,
    所述BRAS CP设备根据所述VXLAN隧道配置创建所述VXLAN隧道;
    所述BRAS CP设备接收所述UCM网元下发的第二VSI创建指令,其中所述第二VSI创建指令用于指示所述BRAS CP设备创建与所述VXLAN ID对应的VSI,
    所述BRAS CP设备根据所述第二VSI创建指令在本地创建与所述VXLAN ID对应的VSI。
  5. 根据权利要求1所述的方法,其特征在于,所述端口信息包括:
    所述用户接入端口所在的子槽位号、
    所述子槽位号所属的槽位号、
    所述用户接入端口的端口号、
    所述用户接入端口的类型。
  6. 一种认证方法,包括:
    宽带远程接入服务器BRAS转控分离架构中的BRAS数据平面DP设备,通过本地的用户接入端口接收用户设备发送的用于对用户进行认证的控制报文;
    所述BRAS DP设备确定所述用户接入端口对应的VXLAN ID;
    所述BRAS DP设备按照所述VXLAN ID、以及所述VXLAN ID绑定的VXLAN隧道对所述控制报文进行VXLAN封装,其中,所述VXLAN封装中携带所述VXLAN ID;并
    所述BRAS DP设备通过所述VXLAN隧道将VXLAN封装的所述控制报文发送至位于所述VXLAN隧道对端的BRAS控制平面CP设备。
  7. 根据权利要求6所述的方法,其特征在于,确定所述用户接入端口对应的VXLAN ID包括:
    所述BRAS DP设备确定与所述用户接入端口绑定的虚接口VSI;
    所述BRAS DP设备将所述VSI对应的VXLAN ID确定为所述用户接入端口对应的VXLAN ID。
  8. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    所述BRAS DP设备接收用户控制管理UCM网元在接收到配置所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置和第一VSI创建指令,其中,所述第一VSI创建指令用于指示所述BRAS DP设备创建与所述用户接入端口绑定的且与所述VXLAN ID对应的VSI;
    所述BRAS DP设备根据所述VXLAN隧道配置创建所述VXLAN隧道;
    所述BRAS DP设备根据所述第一VSI创建指令创建所述VSI。
  9. 根据权利要求6所述的方法,其特征在于,所述方法,还包括:
    所述BRAS DP设备向用户控制管理UCM网元上报所述用户接入端口的端口信息,以使所述UCM网元向所述BRAS CP设备发送与所述VXLAN ID对应的所述用户接入端口的端口信息。
  10. 根据权利要求9所述的方法,其特征在于,所述用户接入端口的端口信息包括:
    所述用户接入端口所在的子槽位号、
    所述子槽位号所属的槽位号、
    所述用户接入端口的端口号、
    所述用户接入端口的类型。
  11. 一种认证装置,该装置应用于宽带远程接入服务器BRAS转控分离架构中的BRAS控制平面CP设备,包括:
    接收模块,用于通过与所述BRAS转控分离架构中的BRAS数据平面DP设备之间的VXLAN隧道接收VXLAN封装的控制报文;
    处理模块,用于若检查出所述控制报文为用于对用户进行认证的报文,则
    在所述BRAS CP设备上查找与所述VXLAN封装中的VXLAN ID对应的用户接入端口的端口信息,其中所述用户接入端口在所述BRAS DP设备上;
    将所述端口信息和所述控制报文携带的所述用户的身份信息发送给认证服务器进行认证。
  12. 根据权利要求11所述的装置,其特征在于,所述处理模块进一步用于:
    接收用户控制管理UCM网元下发的所述端口信息,
    将所述端口信息配置在所述BRAS CP设备创建的与所述VXLAN ID对应的虚接口VSI上。
  13. 根据权利要求12所述的装置,其特征在于,所述处理模块在所述BRAS CP设备上查找与所述VXLAN ID对应的端口信息,具体包括:
    在所述BRAS CP设备的所有VSI中查找与所述VXLAN ID对应的VSI;
    确定该查找到的VSI被配置的所述端口信息为所述VXLAN ID对应的端口信息。
  14. 一种认证装置,该装置应用于宽带远程接入服务器BRAS转控分离架构中的BRAS数据平面DP设备,包括:
    用户端口模块,用于通过所述BRAS DP设备上的用户接入端口接收用户设备发送的用于对用户进行认证的控制报文,并确定所述用户接入端口对应的VXLAN ID;
    发送模块,用于按照所述VXLAN ID、以及所述VXLAN ID绑定的VXLAN隧道对所述控制报文进行VXLAN封装,并通过所述VXLAN隧道将VXLAN封装的所述控制报文发送至位于所述VXLAN隧道对端的BRAS控制平面CP设备,其中,所述VXLAN封装中携带所述VXLAN ID。
  15. 根据权利要求14所述的装置,其特征在于,所述用户端口模块在确定所述用户接入端口对应的VXLAN ID时,包括:
    确定与所述用户接入端口绑定的虚接口VSI;
    将所述VSI对应的VXLAN ID确定为所述用户接入端口对应的VXLAN ID。
  16. 根据权利要求14所述的装置,其特征在于,该装置进一步包括创建模块,所述创建模块用于:
    接收用户控制管理UCM网元在接收到配置所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置和第一VSI创建指令,其中,所述第一VSI创建指令用于指示所述BRAS DP设备创建与所述用户接入端口绑定且与所述VXLAN ID对应的VSI;
    根据所述VXLAN隧道配置创建所述VXLAN隧道;
    根据所述第一VSI创建指令创建所述VSI。
  17. 根据权利要求14所述的装置,其特征在于,
    所述发送模块进一步向用户控制管理UCM网元上报所述用户接入端口的端口信息,以使所述UCM网元向所述BRAS CP设备发送与所述VXLAN ID对应的所述用户接入端口的端口信息;
    所述用户接入端口的端口信息包括:所述用户接入端口所在的子槽位号、所述子槽位号所属的槽位号、所述用户接入端口的端口号、所述用户接入端口的类型。
  18. 一种认证装置,该装置应用于宽带远程接入服务器BRAS转控分离架构中的BRAS控制平面CP设备,包括:
    非暂时性机器可读存储介质,存储有机器可执行指令;
    处理器,用于执行所述机器可执行指令,以
    通过与所述BRAS转控分离架构中的BRAS数据平面DP设备之间的VXLAN隧道接收VXLAN封装的控制报文;
    若所述控制报文为用于对用户进行认证的报文,则在所述BRAS CP设备上查找所述VXLAN封装中VXLAN ID对应的用户接入端口的端口信息,其中,所述用户接入端口在所述BRAS DP设备上;
    将所述端口信息和所述控制报文携带的所述用户的身份信息发送给认证服务器进行认证。
  19. 根据权利要求18所述的装置,其特征在于,所述机器可执行指令还促使所述处理器:
    接收用户控制管理UCM网元下发的所述端口信息,
    将所述端口信息配置在所述BRAS CP设备创建的与所述VXLAN ID对应的虚接口VSI上。
  20. 根据权利要求19所述的装置,其特征在于,在所述BRAS CP设备上查找与所述VXLAN ID对应的端口信息时,所述机器可执行指令促使所述处理器:
    在所述BRAS CP设备的所有虚接口中查找与所述VXLAN ID对应的VSI;
    确定该查找到的VSI被配置的所述端口信息为所述VXLAN ID对应的端口信息。
  21. 一种认证装置,该装置应用于宽带远程接入服务器BRAS转控分离架构中的BRAS数据平面DP设备,包括:
    非暂时性机器可读存储介质,存储有机器可执行指令;
    处理器,用于执行所述机器可执行指令,以
    通过所述BRAS DP设备上的用户接入端口接收用户设备发送的用于对用户进行认证的控制报文,并确定所述用户接入端口对应的VXLAN ID;
    按照所述VXLAN ID、以及所述VXLAN ID绑定的VXLAN隧道对所述控制报文进行VXLAN封装,并通过所述VXLAN隧道将VXLAN封装的所述控制报文发送至位于所述VXLAN隧道对端的BRAS控制平面CP设备,其中,所述VXLAN封装中携带所述VXLAN ID。
  22. 根据权利要求21所述的装置,其特征在于,在确定所述用户接入端口对应的VXLAN ID时,所述机器可执行指令促使所述处理器:
    确定与所述用户接入端口绑定的虚接口VSI;
    将所述VSI对应的VXLAN ID确定为所述用户接入端口对应的VXLAN ID。
  23. 根据权利要求21所述的装置,其特征在于,所述机器可执行指令还促使所述处理器:
    接收用户控制管理UCM网元在接收到配置所述用户接入端口使能BRAS业务的命令时下发的VXLAN隧道配置和第一VSI创建指令,其中,所述第一VSI创建指令用于指示所述BRAS DP设备创建与所述用户接入端口绑定且与所述VXLAN ID对应的VSI;
    根据所述VXLAN隧道配置创建所述VXLAN隧道;
    根据所述第一VSI创建指令创建所述VSI。
  24. 根据权利要求21所述的装置,其特征在于,所述机器可执行指令还促使所述处理器:
    向用户控制管理UCM网元上报所述用户接入端口的端口信息,以使所述UCM网元向所述BRAS CP设备发送与所述VXLAN ID对应的所述用户接入端口的端口信息;
    所述用户接入端口的端口信息包括:所述用户接入端口所在的子槽位号、所述子槽位号所属的槽位号、所述用户接入端口的端口号、所述用户接入端口的类型。
PCT/CN2018/097777 2017-08-03 2018-07-31 Bras转控分离架构下的用户认证 WO2019024844A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2020505861A JP6920537B2 (ja) 2017-08-03 2018-07-31 Bras転送・制御分離アーキテクチャにおけるユーザ認証
EP18841672.1A EP3664403B1 (en) 2017-08-03 2018-07-31 User authentication of bras under architecture of mutually separated forwarding and control

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710655491.7 2017-08-03
CN201710655491.7A CN108462683B (zh) 2017-08-03 2017-08-03 认证方法和装置

Publications (1)

Publication Number Publication Date
WO2019024844A1 true WO2019024844A1 (zh) 2019-02-07

Family

ID=63220272

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/097777 WO2019024844A1 (zh) 2017-08-03 2018-07-31 Bras转控分离架构下的用户认证

Country Status (4)

Country Link
EP (1) EP3664403B1 (zh)
JP (1) JP6920537B2 (zh)
CN (1) CN108462683B (zh)
WO (1) WO2019024844A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012084A (zh) * 2019-03-26 2019-07-12 新华三技术有限公司 设备识别方法、装置、系统及存储介质
CN114244709A (zh) * 2021-11-11 2022-03-25 新华三大数据技术有限公司 Up设备关联控制方法及装置
EP4131884A4 (en) * 2020-04-27 2023-03-22 Huawei Technologies Co., Ltd. VXLAN ACCESS AUTHENTICATION PROCEDURE AND VTEP DEVICE

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150673B (zh) * 2017-06-16 2020-04-03 华为技术有限公司 基于bras系统的报文封装方法、装置及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076607A1 (en) * 2005-09-14 2007-04-05 Cisco Technology, Inc. Quality of service based on logical port identifier for broadband aggregation networks
CN101123549A (zh) * 2006-08-11 2008-02-13 华为技术有限公司 控制与承载分离的接入网系统及其实现通信的方法
CN102055762A (zh) * 2010-12-03 2011-05-11 中国联合网络通信集团有限公司 宽带网络接入方法和系统、dslam及bras
CN102970227A (zh) * 2012-11-12 2013-03-13 盛科网络(苏州)有限公司 在asic中实现vxlan报文转发的方法和装置
US20160142474A1 (en) * 2013-06-25 2016-05-19 Nec Corporation Communication system, apparatus, method and program

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200973108Y (zh) * 2006-06-29 2007-11-07 中兴通讯股份有限公司 实现安全访问的接入设备
US8339959B1 (en) * 2008-05-20 2012-12-25 Juniper Networks, Inc. Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US9577927B2 (en) * 2014-06-30 2017-02-21 Nicira, Inc. Encoding control plane information in transport protocol source port field and applications thereof in network virtualization
US9906560B2 (en) * 2015-08-28 2018-02-27 Nicira, Inc. Distributing remote device management attributes to service nodes for service rule processing
CN106685847B (zh) * 2015-11-06 2020-01-17 华为技术有限公司 一种报文处理方法、装置及设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076607A1 (en) * 2005-09-14 2007-04-05 Cisco Technology, Inc. Quality of service based on logical port identifier for broadband aggregation networks
CN101123549A (zh) * 2006-08-11 2008-02-13 华为技术有限公司 控制与承载分离的接入网系统及其实现通信的方法
CN102055762A (zh) * 2010-12-03 2011-05-11 中国联合网络通信集团有限公司 宽带网络接入方法和系统、dslam及bras
CN102970227A (zh) * 2012-11-12 2013-03-13 盛科网络(苏州)有限公司 在asic中实现vxlan报文转发的方法和装置
US20160142474A1 (en) * 2013-06-25 2016-05-19 Nec Corporation Communication system, apparatus, method and program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3664403A4 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012084A (zh) * 2019-03-26 2019-07-12 新华三技术有限公司 设备识别方法、装置、系统及存储介质
CN110012084B (zh) * 2019-03-26 2021-10-01 新华三技术有限公司 设备识别方法、装置、系统及存储介质
EP4131884A4 (en) * 2020-04-27 2023-03-22 Huawei Technologies Co., Ltd. VXLAN ACCESS AUTHENTICATION PROCEDURE AND VTEP DEVICE
CN114244709A (zh) * 2021-11-11 2022-03-25 新华三大数据技术有限公司 Up设备关联控制方法及装置
CN114244709B (zh) * 2021-11-11 2023-12-26 新华三大数据技术有限公司 Up设备关联控制方法及装置

Also Published As

Publication number Publication date
JP6920537B2 (ja) 2021-08-18
JP2020529085A (ja) 2020-10-01
EP3664403A4 (en) 2020-08-05
CN108462683A (zh) 2018-08-28
CN108462683B (zh) 2020-04-03
EP3664403A1 (en) 2020-06-10
EP3664403B1 (en) 2022-10-12

Similar Documents

Publication Publication Date Title
US11159528B2 (en) Authentication to network-services using hosted authentication information
US11190609B2 (en) Connection pooling for scalable network services
US11115404B2 (en) Facilitating service connections in serverless code executions
US10594699B2 (en) Providing access to remote networks via external endpoints
US10681131B2 (en) Source network address translation detection and dynamic tunnel creation
JP6722820B2 (ja) ブロードバンドリモートアクセスサーバの制御プレーン機能と転送プレーン機能の分離
US9094400B2 (en) Authentication in virtual private networks
US20220070095A1 (en) Data transmission method and apparatus, network adapter, and storage medium
WO2019024844A1 (zh) Bras转控分离架构下的用户认证
WO2020264431A1 (en) Connection pooling for scalable network services
US8737388B2 (en) Method, apparatus and system for processing packets
JP6884818B2 (ja) Vxlan実装方法、ネットワークデバイス、および通信システム
WO2017198163A1 (zh) 接入控制
JP5466723B2 (ja) ホスト提供システム及び通信制御方法
WO2014173277A1 (zh) 网络中开展业务的方法、装置及系统
US11302451B2 (en) Internet of things connectivity device and method
WO2021218886A1 (zh) Vxlan接入认证方法以及vtep设备
US10637777B2 (en) Address converting device, information processing system, and method of providing service
US11924182B2 (en) ISO layer-two connectivity using ISO layer-three tunneling
KR101387228B1 (ko) 멀티 호밍 통신 방법 및 멀티 호밍 통신이 가능한 디바이스
WO2024081835A1 (en) Architecture and services provided by a multi-cloud infrastructure

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18841672

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020505861

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018841672

Country of ref document: EP

Effective date: 20200302