Maintenance method for terminal list item of network equipment and network equipment

A network device and terminal table technology, applied in the network field, can solve problems such as ARP spoofing

Active Publication Date: 2009-07-29
NEW H3C TECH CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this case, since ARP packet forwarding and learning are allowed, the Layer 2 switch or gateway device with the ARP spoofing defense function enabled will learn the forwarding of ARP spoofing packets, making ARP spoofing successful.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Maintenance method for terminal list item of network equipment and network equipment
  • Maintenance method for terminal list item of network equipment and network equipment
  • Maintenance method for terminal list item of network equipment and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0049] The present invention provides a method for maintaining terminal entries on network equipment, which is applied to network equipment with ARP spoofing defense functions enabled, such as figure 2 shown, including:

[0050] In step s201, the network device periodically stores terminal entries and related information in the memory into a non-volatile storage medium. Wherein, the terminal entry includes the binding relationship of the terminal's IP address, MA...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a maintaining method of terminal table entries on network equipment and network equipment applying the method. The method is applied to the network equipment starting the defense function for ARP spoofing and comprises the following steps: the network equipment stores the terminal table entries and relevant information in a memory into a non-volatile storage medium; the terminal table entries comprise an IP address and an MAC address of the terminal and binding relation of port numbers; the relevant information comprises the residual survival time of the terminal table entries and the timestamp of the current time; after the network equipment is restarted, the effective terminal table entries are obtained from the terminal table entries of the non-volatile storage medium; the network equipment detects the survival terminal table entries in the effective terminal table entries; and the network equipment restores the detected survival terminal table entries into the memory. By using the invention, the network equipment avoids the process of releasing the IP address and then obtaining again while guaranteeing the normal operation of the defense function for ARP spoofing.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for maintaining terminal entries on a network device and a network device. Background technique [0002] With the continuous expansion of network scale, many networks often suffer from ARP (Address Resolution Protocol, Address Resolution Protocol) attacks, and ARP spoofing is one of the main ways of ARP attacks. For example, an IP (Internet Protocol, Internet Protocol) address on the gateway should correspond to MAC (Medium Access Control, Media Access Control) address A, and the attacker sends an ARP spoofing message to inform the gateway that the IP address corresponds to MAC address B, so that the gateway When sending a packet to this IP address, the packet will be sent to the terminal corresponding to MAC address B, causing the user to be unable to access the network normally; based on a similar principle, the attacker can not only deceive the gateway, but also dece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/56H04L29/06H04L29/12
Inventor 王守唐王君菠
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products