Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A protection method and system for l2tp network

A network and network equipment technology, applied in the protection method and system field of L2TP network, can solve problems such as inability to guarantee the normal progress of L2TP sessions, and does not support L2TP user backup, so as to achieve the effect of improving service reliability and user experience

Active Publication Date: 2016-03-30
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the main purpose of the present invention is to provide an L2TP network protection method and system to solve the problems that the existing L2TP technology does not support L2TP user backup and cannot guarantee the normal progress of the current L2TP session when the current network fails

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A protection method and system for l2tp network
  • A protection method and system for l2tp network
  • A protection method and system for l2tp network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] In this embodiment, the L2TP network topology is as follows image 3 As shown, it includes LNS_1, LNS_2, and LAC devices, wherein the link state detection is performed between LNS_1 and LNS_2 through the BFD protocol, and the LNS device state switching is performed through VRRP.

[0061] In this embodiment, to realize the process of troubleshooting in the L2TP network, refer to Figure 4 As shown, it specifically includes the following steps:

[0062] Step 401, performing active and standby configurations on LNS_1 and LNS_2 respectively;

[0063] Specifically, run the VRRP protocol between LNS_1 and LNS_2, configure their respective VRRP addresses on LNS_1 and LNS_2, and configure priority information on LNS_1 and LNS_2 respectively, where the priority of LNS_1 is greater than that of LNS_2, In this way, LNS_1 is configured as the active state, LNS_3 is in the standby state, and LNS_3 is designated as the backup device of LNS_1. LNS_1 receives the online request of th...

Embodiment 2

[0083] In this embodiment, the L2TP network topology is as follows Figure 5As shown, it includes three LNS devices, LNS_1, LNS_2, and LNS_3, and two LAC devices, LAC_1 and LAC_2. Among them, LAC_1 corresponds to LNS_1, LAC_2 corresponds to LNS_2, LNS_1 and LNS_2 are active devices, LNS_3 is a backup device, and the connection between LNS_1 and LNS_3 Run the BFD protocol between LNS_2 and LNS_3 to detect the link status, and run VRRP to switch between the active and standby states, realizing the function of using one LNS to back up L2TP users for multiple LNSs.

[0084] In this embodiment, to realize the process of troubleshooting in the L2TP network, refer to Image 6 As shown, it specifically includes the following steps:

[0085] Step 601, performing active and standby configurations on LNS_1, LNS_2, and LNS_3 respectively;

[0086] Specifically, run the VRRP protocol between LNS_1 and LNS_3, and between LNS_2 and LNS_3, configure LNS_1 and LNS_2 as active LNSs, and LNS_3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting an L2TP network. The method includes: standby L2TP? The LNS backs up the information of the current online L2TP user on the active LNS, the information of the L2TP tunnel corresponding to the L2TP user, and the information of the L2TP session; when the active LNS itself or the link where the active LNS is located fails, the backup The LNS and the active LNS perform active / standby switchover; the standby LNS refreshes routes and forwards user traffic according to the information of the backed up L2TP tunnel and L2TP session. The invention also discloses a protection system of the L2TP network, which ensures that the failure of the LNS device and its link does not affect the normal business of the L2TP user, and that the L2TP user and the LAC cannot perceive the occurrence and recovery of the failure, and realizes the protection of the L2TP network. Troubleshooting can effectively improve the user experience of the L2TP network.

Description

technical field [0001] The present invention relates to virtual private network (VPN, Virtual Private Network) technology, in particular to a method and system for protecting an L2TP network. Background technique [0002] In VPN, the existing trouble-shooting technology used, the main process is as follows: firstly perform user backup, so that the access point (AN, AccessNode) adopts dual uplinks to access dual service nodes SN (SN, ServiceNode), wherein one SN It is the primary device, and the other SN is the backup device. The access port of the primary SN corresponds to the backup port of the backup SN. , BidirectionalForwardingDetection) technology to switch states. The active SN synchronizes the accessed user information to the standby SN. When the standby SN receives the user information transmitted by the active SN, the standby SN immediately sends the user information to the interface module in the form of a user table. When the link connecting users to the access ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/70H04L12/24H04L12/46
CPCH04L12/4633H04L41/0663H04L45/00
Inventor 范亮袁博冷通
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products