Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and equipment for establishing tunnel

A technology for establishing tunnels and tunnels, which is applied in the field of communication and can solve problems such as limitation and inability to increase IKE negotiation performance.

Active Publication Date: 2009-05-27
CHENGDU HUAWEI TECH
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the performance of IKE negotiation cannot increase with the number of interface boards. Since the negotiation is completed on the main control board, the IKE negotiation performance of the whole machine is limited by the main control board.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for establishing tunnel
  • Method, system and equipment for establishing tunnel
  • Method, system and equipment for establishing tunnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] The embodiment of the present invention provides a method for realizing IKE negotiation, including:

[0028] Step S101. Receive a message that needs to be encrypted, and the message that needs to be encrypted is a message that is sent to a designated central processing unit CPU according to a distribution rule.

[0029] Wherein, the distribution rule is specifically: according to the CPU number obtained from the interface board, the messag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, a system and equipment for establishing a tunnel. The method comprises the following steps: receiving a message needing to be encrypted, wherein the message needing to be encrypted is a message sent to a designated central processing unit (CPU) according to the distribution rule; and touching tunnel negotiation when the designated CPU detects that the tunnel where the message needing to be encrypted is positioned is not established sending an internet key to an interface board to exchange IKE message; and receiving the IKE message sent by the interface board according to the distribution rule, and establishing the tunnel where the message needing to be encrypted is positioned. The embodiment of the invention can achieve that each of service boards is capable of independently processing Ipsec service and carrying out IKE negotiation, and achieve IKE negotiation balance on different service boards, thereby improving whole power capacity and processing capabilities of the system on Ipsec service and the IKE negotiation.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a method, system and equipment for establishing a tunnel. Background technique [0002] IPSec (Security Architecture for IP network, IP layer protocol security structure) protocol, as the current mainstream security protocol, provides a complete set of architecture for network data security on the IP layer, including AH (Authentication Header, authentication protocol header) protocol, ESP (Encapsulating Security Payload) protocol, IKE (Internet Key Exchange, Internet Key Exchange) protocol and some algorithms for network authentication and encryption are widely used. Most commercial VPN (Virtual Private Network, virtual private network) gateways provide support for the IPSec protocol. [0003] The IKE protocol has a set of self-protection mechanisms that can safely distribute keys, verify identities, and establish IPSec security associations on insecure networks. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/46H04L12/56H04L29/06
Inventor 马擘
Owner CHENGDU HUAWEI TECH