Solution method of address conflict in point-to-network tunnel mode

A technology for address conflicts and solutions, applied in the field of address conflicts in point-to-network tunnels, can solve problems such as unsatisfactory access, and achieve the effect of broadening the scope of use

Active Publication Date: 2011-02-02
北京神州数码云科信息技术有限公司
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, the IP address of the virtual network card assig

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Solution method of address conflict in point-to-network tunnel mode
  • Solution method of address conflict in point-to-network tunnel mode
  • Solution method of address conflict in point-to-network tunnel mode

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0051] The specific implementation example is as follows:

[0052] The IP address of the real network card on the user side is 192.168.1.100, and it is ready to access server 1 through a tunnel, but server 1 requires that only users whose source address is 192.168.1.100 can access, that is, the IP address of the virtual network card on the user side should be 192.168.1.100 . Based on this, SSLVPN assigns a virtual IP address to the client: 192.168.1.100. However, this IP address conflicts with the real network card IP address of the client, and the tunnel cannot be used, so the client notifies SSLVPN of the conflict. SSLVPN generates a shadow IP 192.168.2.100 for the client according to the algorithm, and sends it to the client. At the same time, the SSLVPN records Association of these two IP addresses. Since there is no conflict between 192.168.2.100 and the client, the tunnel is established successfully. The user side initiates a resource request to server 1 through this tun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a solution method of an address conflict in a point-to-network tunnel mode. In the solution method, a client side starts to launch a tunnel establishing request to an SSLVPN (Secure Sockets Layer/Virtual Private Network); the client side launches an IP address request to the SSLVPN; the SSLVPN generates a shadow IP, and the shadow IP is associated with an original IP address through Hashing; the SSLVPN sends the shadow IP to the client side; the client side judges whether the shadow IP has a conflict with the local network environment or not; if the conflict exists, the SSLVPN regenerates a shadow IP; and if the conflict does not exist, then the shadow IP is used as the IP address of a virtual network card. The solution method can be used for successfully solving the problem that the virtual network card of the client side is required to use a specific IP address in certain circumstances and the IP address of the virtual network card allocated by the SSLVPN has a conflict with the specific IP address. Thus, a point-to-network tunnel can meet various network topology requirements, and the use range of the application is widened.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for solving address conflicts in a point-to-network tunnel mode. Background technique [0002] VPN (Virtual Private Network Virtual Private Network) can establish a dedicated communication line between two or more intranets located in different places connected to the Internet through a special encrypted communication protocol, and can use the public network to establish a dedicated communication line. Virtual private networks are widely used in enterprises; among them, SSLVPN is gradually replacing traditional IPSecVPN with its simple client configuration, fine-grained ACL control and rich functions. [0003] In SSLVPN, an important usage method is point-to-network tunnel, and users can access services by establishing an encrypted tunnel with SSLVPN. On both the client side and the SSLVPN side, the tunnel needs to use a virtual network card, and the SSLVP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12H04L29/06H04L12/46
Inventor 徐岩
Owner 北京神州数码云科信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products