Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and routing equipment for generating access control list

An access control list and routing technology, applied in the communication field, can solve the problems of ACL heavy workload, inconvenient configuration, ACL cannot be dynamically configured, etc., and achieve the effect of preventing forged messages

Active Publication Date: 2011-08-24
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Manually configuring ACLs requires a lot of work and is inconvenient, and ACLs cannot be dynamically configured after the network topology changes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and routing equipment for generating access control list
  • Method and routing equipment for generating access control list
  • Method and routing equipment for generating access control list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] In the embodiment of the present invention, the border router may be a user border router or an ABR (area border router) or a Level-1-2 router (layer-1-2 router). The situation when the router is a user border router BR or an area border router ABR or a Level-1-2 router is introduced in detail, as follows:

[0027] Such as figure 1 As shown in the network, the network includes router 110 , router 120 , router 130 and user equipment 140 .

[0028] Wherein, the router 110, the router 120 and the router 130 are located in the same area, the router 110 and the router 120 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to communication filed, and discloses a method and routing equipment for generating an access control list. First routers (130,330,350) receive internal gateway protocol (IGP) message from second routers (120,320,360); and the IGP message carries the address identification of the second routers, acquires the address identification of the second routers (120,320,360) and generates a forbidden table entry of the access control list which utilizes the address identification as a destination address according to the address identification. By utilizing the method disclosed in the invention, the technical effect of dynamically configuring ACL to prevent forging messages is achieved.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for generating an access control list and a routing device. Background technique [0002] In the current network, the operator's equipment generally only forwards the user's data traffic, and the user does not have the authority to access the operator's router. However, the IP address of the carrier router is currently transparent to the outside world. Users can easily obtain the IP address of the carrier router through Tracert or other means. Using this IP address, the user can easily attack the carrier router. For example: the user can A large number of forged packets are sent to the IP address. Since the operator's router needs to process a large number of such forged packets, the processing resources of the operator's router are consumed, and even the router cannot work normally. [0003] In the prior art, the above problem can be solved by manually configuring an access c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L29/06
CPCH04L63/101
Inventor 张潇潇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products