Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for preventing MAC address cheat

A technology of MAC address and forwarding table entry, applied in the field of data communication, can solve the problems of complex configuration, MAC address site does not notify CPU processing, etc., to achieve the effect of solving complex configuration

Inactive Publication Date: 2007-09-26
HUAWEI TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0023] In view of the above, the method and device for preventing MAC address spoofing provided by the present invention solve the problem in the prior art that the MAC address of the uplink device needs to be known when configuring a static MAC address on the uplink port, and the configuration is complicated; The problem of not notifying the CPU for processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing MAC address cheat
  • Method for preventing MAC address cheat
  • Method for preventing MAC address cheat

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The invention sets the dynamic MAC address forwarding entry of the uplink port as static through the CPU system, and simulates the aging mechanism of the MAC address of the chip to perform aging processing on the MAC address forwarding entry whose port is the uplink port.

[0043] Since there is usually a HIT bit in each MAC address forwarding entry, it is used to indicate whether the entry is hit, that is, when the source MAC address and VLAN ID in the packet are the same as a MAC address forwarding entry , the HIT bit of the entry will be set.

[0044] The network switching chip will check the dynamic MAC address entry in the MAC address forwarding table according to the set aging time. If the HIT bit in the entry is set, the HIT bit will be cleared. After the HIT bit is cleared, if the When a packet with the same source MAC address and VLAN ID as the MAC address and VLAN ID of the table entry enters, the HIT bit of the table entry is reset; if the HIT bit has been re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed method for preventing the cheat of MAC address comprises: CPU system sets the dynamic MAC address transmission list item on up port as static state, and simulates the aging mechanism of chip MAC address for former up port list item to prevent cheating MAC address. This invention can record user port suffered malevolent attack and the attack time to notify user through CPU system man-machine interface and network management system in time.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a method for preventing MAC address spoofing. Background technique [0002] The IEEE802.3 standard stipulates that in a standard Ethernet MAC frame, there are destination MAC address and source MAC address, and the length is 6 bytes. Figure 1 shows the standard Ethernet MAC frame format, where: [0003] Destination Address: destination MAC address, 6Bytes [0004] Source Address: source MAC address, 6Bytes [0005] Length / type: data length or message type, 2Bytes [0006] DATA: the data field carried by the Ethernet frame [0007] FCS: Frame Check Sequence [0008] The destination MAC address is used to identify which physical device the Ethernet frame is sent to, and the source MAC address is used to identify which physical device the Ethernet frame is sent from. The first bit of the destination MAC address (the lowest bit of the first byte) indicates whether the destinati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/56H04L29/06H04L9/00
Inventor 马书雷潘晶
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products