Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Generation method and apparatus for neighbor table items

A technology of neighbor tables and messages, which is applied in the field of network communication, can solve the problems of high complexity in use, and achieve the effects of preventing security attacks, simple function feature settings, and simple configuration

Active Publication Date: 2012-09-05
NEW H3C TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This requires the relevant configuration of encryption and decryption for each network node during networking, which is more complicated to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method and apparatus for neighbor table items
  • Generation method and apparatus for neighbor table items
  • Generation method and apparatus for neighbor table items

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0019] The method provided by the present invention mainly includes: after the switching device receives the message confirming whether the IP address is valid, if it does not receive the reply message that the IP address requested by the message has been used within the set time, then Store the source MAC address, inbound port information, and IP address of the packet as a static neighbor entry.

[0020] Wherein, the aforementioned switching device may be a Layer 3 forwarding device such as a switch or a router.

[0021] The foregoing message for confirming whether the IP address is valid may be an ND address detection message, a Dynamic Host Configuration Protocol detection protocol version 6 (DHCPv6) message, and the like.

[0022] The above m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides generation method and apparatus for neighbor table items, exchange equipment receives message of affirming the IP address whether effective or not, judging whether receive reversion message of indicating the requested affirming IP address is used or not in setting time, if not, restore the source medium access control (MAC) address, ingress port message of the message and the requested affirming IP address as static neighbor table item. The invention can prevent the IP address from copy and modification at the same time of assuring the requested IP address effective, effectively preventing security attack.

Description

Technical field [0001] The invention involves the field of network communication technology, and specially involves the generation method and device of a neighbor's table item. Background technique [0002] IPv6 is the next -generation network protocol of IPv4, which solves the problem of lack of IPv4 address. Compared with IPv4, there is a simple news head and built -in security with a fixed length.EssenceAs a basic protocol for IPv6, the neighbor found (ND) protocol provides functions such as address analysis, router discovery, neighbors' unable to detect, and repeated address detection. [0003] However, the ND protocol packet is easy to be called a fake object of an attacker and is used for network attacks.like figure 1 In the network architecture shown, the switch can receive the ND protocol packet sent by all the direct hosts. When the host needs to use an IP address, bring the IP address in the ND protocol message to the switch. The switch willThe host's IP address, MAC ad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L29/12H04L45/74
Inventor 周立萍
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products