Method and device for establishing access control list, and data routing method and device

An access control list and access control table entry technology, applied in the field of communications, can solve the problems of increasing the number of searches, reducing the efficiency of searching, and wasting storage resources, so as to reduce the number of matching searches, improve the efficiency of searching, and save storage resources. Effect

Inactive Publication Date: 2011-01-05
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the network, there are many types of attributes, and the number of values ​​of attributes is even greater. For example, there may be tens of thousands of values ​​for the source address alone. The amount of information stored by ACE is very large, which greatly wastes storage resources and often exceeds the capacity limit requirements of ACL
[0008] Moreover, when data routing is performed based on the ACL established in the prior art, due to the huge amount of information stored in the ACE in the ACL, it is necessary to search for the ACE that matches the extracted attribute among the huge number of ACEs, which will greatly increase the search time. times, greatly reducing the search efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for establishing access control list, and data routing method and device
  • Method and device for establishing access control list, and data routing method and device
  • Method and device for establishing access control list, and data routing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the objectives, technical solutions, and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0037] The embodiment of the present invention proposes a method for establishing an ACL, see figure 1 , The method includes:

[0038] Step 101: Set corresponding ACLs for each attribute in the matching rule.

[0039] Through the processing of this step, different attributes in the matching rule correspond to different ACLs.

[0040] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for establishing an access control list, a data routing method and a data routing device. The method for establishing an access control list comprises the following steps: respectively setting a corresponding access control list for each attribute in a matching rule; storing all values of the attribute (corresponding to the access control list) in each access control list; and interrelating the access control lists corresponding to the attributes in the matching rule. The device for establishing the access control list comprises a setting module, a storage module and an interrelating module. The invention can save storage resources and improve searching efficiency.

Description

Technical field [0001] The embodiments of the present invention relate to communication technology, and in particular to a method and device for establishing an access control list and a data routing method and device. Background technique [0002] Policy-Based Routing (PBR) provides a more flexible data packet routing and forwarding mechanism than routing and forwarding based only on the destination address. Policy routing can flexibly perform routing selection based on multiple attributes of data, such as source address, destination address, source and destination port, protocol number, Type of Service (TOS) field, and whether it is a fragmented message. [0003] In order to implement policy routing on the routing device, an Access Control List (ACL) needs to be established on the routing device, and all matching rules of the policy routing are saved in the ACL. When subsequent data is received, it is saved according to the ACL. Various matching rules for routing selection. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L45/74
Inventor 李凯
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products