Method for realizing network attack isolation
A network attack, practical technology, applied in the field of network security, can solve the problems of reduced forwarding performance, QOS rules not working properly, inconvenient to maintain the MAC address list, etc., to achieve the effect of convenient management and maintenance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] This embodiment adopts a single mode, that is, performs MAC address restriction based on a class of user identifiers, and the based user identifiers may be based on ports, or based on VLANs, or based on ports and VLANs. In this embodiment, taking the port-based MAC address restriction as an example, the MAC address restriction table is searched by using the port number + 0xFFF. The specific implementation process of MAC address restriction is as follows: figure 1 Shown:
[0044] Steps 101-102: When the message enters the network device, check whether the outgoing port and the source port are the same in the source MAC address table stored in the network device itself, if the outgoing port is the same as the source port, forward it directly, and end the current processing flow ; If not the same, go to step 103.
[0045] Step 103: Check whether the port corresponding to the source MAC address is configured with MAC address restriction in the port function table set by t...
Embodiment 2
[0061] This embodiment adopts a combined mode, that is, a mode based on two types of user identifier MAC address restriction methods. This embodiment uses port-based and VLAN-based MAC address restriction as an example, and adopts port MAC address restriction→VLAN MAC address restriction, that is, first performs port-based MAC address restriction, and then performs VLAN-based MAC address restriction to restrict the MAC address. address learning. The specific process is as figure 2 shown.
[0062] Steps 201-202: the same as steps 101-102 in the first embodiment.
[0063] Step 203: According to the source MAC address of the received message, check whether port-based MAC address restriction is configured, if port-based MAC address restriction is configured, then go to step 204, otherwise go to step 209.
[0064] Steps 204-205: Same as the method of searching the MAC address restriction table and judging whether the MAC address restriction range is exceeded in steps 104-105 of...
Embodiment 3
[0077] This embodiment adopts a multi-combination mode, that is, adopts a MAC address restriction mode based on three types of user identifiers. This embodiment adopts configuration based on port, based on VLAN, and port and VLAN MAC address restriction, use port MAC address restriction→VLAN MAC address restriction→port and VLAN MAC address restriction, that means: carry out based on port MAC address restriction first, then Based on VLAN MAC address restrictions, and finally based on port and VLAN MAC address restrictions, limit the learning of MAC addresses. The specific process is as image 3 shown.
[0078] Steps 301 to 314: Same as steps 201 to 214 and related descriptions in Embodiment 2, except that the MAC address restriction based on VLAN MAC is not enabled, the limit is not exceeded, and the packet is not discarded. The learning and forwarding of the address, instead, enters step 315, and performs the judgment of enabling the MAC address restriction of the next type...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 