Method and device for restricting remote access of switcher

A remote access and switch technology, applied in the field of network data communication, can solve problems such as waste of computing resources, achieve fast search speed, flexible implementation, and reduce CPU traffic

Active Publication Date: 2010-09-01
NANJING ZHONGXING SOFTWARE
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Causes a certain waste o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for restricting remote access of switcher
  • Method and device for restricting remote access of switcher
  • Method and device for restricting remote access of switcher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] figure 1 The device for restricting the remote access of the switch by the global ACL of the present invention is shown, including:

[0034] The matching processing module is used to use the first ACL of the switch to perform matching processing on the data packet message received by the predetermined port of the switch;

[0035] The matching data packet message processing module is used to hand over the matching data packet message whose content of the data packet message is exactly the same as the field configured in the first ACL to be processed by the switch CPU;

[0036] Mismatched data packet message processing module, used to send the mismatched data packet message whose content of the data packet message is different from the field configured in the first ACL to the global ACL effective on all ports of the switch for discarding or send it to the switch CPU processing.

[0037] The first ACL and the global ACL are saved in the Hash storage table of the switch, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for restricting remote access of a switcher. The method of the invention comprises the following steps: carrying out matching treatment on data packet messages received by the preset port of the switcher by utilizing the first access control list (ACL) of the switcher; transferring the matched data packet messages data packet message contents of which are fully identical with fields configured in the first ACL to the CPU of the switcher for processing; or transferring the mismatched data packet messages data packet message contents of which are different from the fields configured in the first ACL to the global ACL taking effect at all ports of the switcher for processing. In the invention, the ACL used on the switcher or other network equipment is used for preventing the flow of the CPU from being illegally accessed, thereby reducing the occupancy rate of CPU resources and reducing the requirement for the CPU processing capacity of network equipment.

Description

technical field [0001] The invention relates to network data communication, in particular to a method and device for restricting remote access of switches based on global ACL (access control list) realized by ASIC chips. Background technique [0002] With the development of data communication networks, Ethernet switches are used more and more widely. However, due to the large number of Ethernet switch devices (especially low-end devices at the access layer), how to conveniently and safely manage devices remotely has become a difficult problem. . Commonly used remote access technologies, including telnet, snmp, web and other technologies, have security control over remote access only limited to user names and password mechanisms, while traditional technologies for restricting remote access are usually filtered based on trusted IPv4 address lists. There are certain limitations. If the source address is forged, it is also possible to gain access to the switch. And the ACL im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/12H04L12/931
Inventor 陈旭明
Owner NANJING ZHONGXING SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products