Entry management method and device

A technology for table entry management and equipment, applied in digital transmission systems, electrical components, transmission systems, etc., it can solve problems such as incorrect changes to neighbor entries, changes in security requirements, and the inability of equipment to serve users, so as to ensure reliability.

Active Publication Date: 2012-05-02
NEW H3C TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. Abnormal update of table entries: The accessor sends a message with a non-local IP address, including responding to NS, NA, RS, RA or redirection messages, thereby impersonating other devices, resulting in incorrect neighbor entries on normal devices. Change
[0008] 2. Too many entries: The accessor makes the device learn too many entries by forging other people's NS or NA messages. Since the number of entries that the device can store is limited, the device will not be able to serve more many users
[0015] It can be seen that in the prior art, only a single method is used to ensure the security of neighbor entries, but in practical applications, there are usually different security requirements for neighbor entries of different devices; for the same neighbor entry, when the application environment occurs When it changes, its security requirements may also change, and there is currently no solution for this aspect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entry management method and device
  • Entry management method and device
  • Entry management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] The core idea of ​​the present invention is: to define the security level of neighbor entries in advance according to the different ways of generating neighbor entries; after a device generates a neighbor entry for a neighbor device, if it is found entry, and the security level of the newly generated neighbor entry is higher than the security level of the existing security entry, then update the existing neighbor entry with the newly generated neighbor entry, and use the security level of the newly generated neighbor entry Update the security level of an existing neighbor entry.

[0081] figure 1 The flow chart of the entry management method provided by the embodiment of the present invention, such as figure 1 As shown, the specific steps are as follows:

[0082] Step 100: Define the security level of the neighbor entry in advance according to the different ways of generating the neighbor entry.

[0083] Step 101: Device A generates a first neighbor entry for device ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an entry management method and a device; the method comprises the following steps of: defining security level of neighbor entries in advance according to difference of generation modes of neighbor entries; when a first device generates new neighbor entries to a second device, finding that the first device is in neighbor entries to the second device, judging whether the security level of the neighbor entries generated newly is higher than the security level of the existing neighbor entries, if so, updating the existing neighbor entries by the neighbor entries generated newly and updating the security level of the existing neighbor entries by the security level of the neighbor entries generated newly. The entry management method and the device can update the securitylevel of the neighbor entries generated newly according to the application needs between the neighbor devices, thus adapting the security requirements of entries in different application environments.

Description

technical field [0001] The invention relates to the technical field of table item security, and in particular to a table item management method and equipment. Background technique [0002] The IPv6 Neighbor Discovery (ND, Neighbor Discovery) protocol uses five types of sixth-generation Internet Control Message Protocol (ICMPv6, Internet Control Message Protocol version6) messages, which are used to implement: address resolution, verifying whether neighbors are reachable, and duplicate address detection , router discovery / prefix discovery, address auto-configuration and redirection, as shown in Table 1: [0003] [0004] [0005] Table 1 Types and functions of ICMPv6 messages used by ND protocol [0006] After the device exchanges ICMPv6 messages with a neighbor device, it generates a neighbor entry for the neighbor device. However, since ND protocol packets are transmitted in plain text, the following attacks on neighbor entries may exist in the same LAN: [0007] 1...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/56H04L12/24H04L45/74
Inventor 林涛
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products