Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for preventing MAC address cheat

A MAC address and illegal technology, applied in the field of data communication, can solve the problems of complex configuration, MAC address site not notifying CPU processing, etc.

Inactive Publication Date: 2009-05-13
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0023] In view of the above, the method and device for preventing MAC address spoofing provided by the present invention solve the problem in the prior art that the MAC address of the uplink device needs to be known when configuring a static MAC address on the uplink port, and the configuration is complicated; The problem of not notifying the CPU for processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing MAC address cheat
  • Method for preventing MAC address cheat
  • Method for preventing MAC address cheat

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The core idea of ​​the present invention is to set the user port in the device to the state of not automatically learning the MAC address, that is, to set the state of learning controlled. When the Ethernet frame enters from the uplink port and learns the MAC address, no check is performed, and the MAC address can be learned normally to the uplink port or site transfer (transferred from the user port to the uplink port); but when the Ethernet frame enters from the user port , first check whether the source MAC address in the Ethernet frame exists on this port, if not, the hardware does not forward the Ethernet frame, but sends it to the CPU system for processing.

[0042] Below in conjunction with illustration, utilize example to carry out concrete description to the processing procedure when Ethernet frame of the present invention enters from user port, as Figure 7 Shown:

[0043] Step 1: Ethernet frame enters from user port USER_PORT1;

[0044] Step 2: Search the M...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed method for preventing the cheat of MAC address comprises: setting user port into learning-controlled state; when coming Ethernet frame, checking whether there is list item same as the original MAC address and VLAN ID in the MAC address transmission list, if yes, sending the frame to CPU to process and decide further whether the port in item is up port. This invention can record user port suffered malevolent attack and the attack time to notify user through CPU system man-machine interface and network management system in time, and finds out the attacking user.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a method for preventing MAC address spoofing. Background technique [0002] The IEEE802.3 standard stipulates that in a standard Ethernet MAC frame, there are destination MAC address and source MAC address, and the length is 6 bytes. figure 1 It is a standard Ethernet MAC frame format, where: [0003] Destination Address: destination MAC address, 6Bytes [0004] Source Address: source MAC address, 6Bytes [0005] Length / type: data length or message type, 2Bytes [0006] DATA: the data field carried by the Ethernet frame [0007] FCS: Frame Check Sequence [0008] The destination MAC address is used to identify which physical device the Ethernet frame is sent to, and the source MAC address is used to identify which physical device the Ethernet frame is sent from. The first bit of the destination MAC address (the lowest bit of the first byte) indicates whether the destinatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/56H04L29/06H04L9/00
Inventor 马书雷潘晶
Owner HUAWEI TECH CO LTD