Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for preventing network intermedium from accessing into control address

A medium access control and address configuration technology, applied in the field of network communication, can solve the problems of lack of flexibility and scalability, MAC address spoofing security, and inability to realize automatic MAC address configuration.

Inactive Publication Date: 2008-01-23
ZTE CORP
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and device for preventing MAC address spoofing in the network, to solve the problem that the prior art can not realize the automatic configuration of MAC address while solving the security problem of MAC address spoofing, and does not have good flexibility Technical Issues of Sex and Scalability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing network intermedium from accessing into control address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the present invention clearer, the preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0026] Fig. 1 is a network structure diagram according to an embodiment of the present invention.

[0027] As shown in FIG. 1 , the network is composed of users 102 , illegal users 104 , access nodes 106 , and broadband network gateways 108 . Among them, the user 102 is connected to the access node 106 through the user-side link 2 of the access node 106, the illegal user 104 is connected to the access node 106 through the user-side link 3 of the access node 106, and the access node 106 is connected to the access node 106 through the network side Link 1 is connected to broadb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and a device for preventing the medium access control address to be deceived. The present invention comprises: Step one, the access node of the network automatically acquires the medium access control address of the broadband network gateway; Step two, the access node configures the medium access control address acquired from the broadband network gateway into the static medium access control address table of the access node or the visit control list. The present invention solves the security problem of the broadband network gateway MAC address deceit, and guarantees the automatic configuration of the broadband network gateway MAC address, and the security, the flexibility and the extendibility of the broadband access network can be enhanced.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a method and device for preventing MAC (Media Access Control, Media Access Control) address spoofing in a network. Background technique [0002] At present, the broadband access network is developing towards the broadband access network based on Ethernet aggregation, and its architecture includes the following parts: user network, access node (Access Node (AN)), Ethernet aggregation network and broadband network gateway ( Broadband Network Gateway (BNG)). Among them, the access node completes the multi-form access of users, such as DSLAM (Digital Subscriber Line Access Multiplexer), etc.; the broadband network gateway refers to the IP (Internet Protocol Internet Protocol) that can apply bandwidth and QoS (quality of service, quality of service) strategies. ) edge routers, such as BRAS (Broadband Remote Access Server, Broadband Remote Access Server) and serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L12/56H04L12/66H04L29/06H04L29/12H04L12/911
Inventor 曹文利
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products