Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for accessing private network through layer 2 tunneling protocol and server

A layer-2 tunneling protocol and server technology, applied in the field of methods and servers, to achieve the effect of convenient access

Active Publication Date: 2012-07-04
NEW H3C TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Both of the above two solutions have certain shortcomings. Users must master certain network knowledge. On the basis of not affecting public network users' access to the private network, the public network client needs to be manually configured to access the public network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accessing private network through layer 2 tunneling protocol and server
  • Method for accessing private network through layer 2 tunneling protocol and server
  • Method for accessing private network through layer 2 tunneling protocol and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the solutions of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0022] In the embodiment of the present invention, a method for accessing a private network through L2TP is proposed. After the LNS establishes a connection with the public network client, the public network client forwards all messages through the established connection, that is, after the connection is established, the public network The client will add a default route locally, and all packets sent by default will be forwarded through the established connection. The process of establishing a connection is the same as the existing implementation, and will not be repeated here.

[0023] see figure 2 , figure 2 It is a schematic flowchart of a method for accessing a private network through L2TP in an embodiment of the present inventi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for accessing a private network through a layer 2 tunneling protocol, which includes that: when receiving message sent by a public network client side and needing to be transmitted into the public network, a lonworks network server (LNS) sends a network segment where a target address carried by the message locates in and mask information to the public network client side, and the public network client side adds corresponding redirection route information in a route with an output interface as an interface of the public network, wherein network segment information and the mask information serve as redirection route information. Based on the same concept, the invention further provides a server. By aid of the server, on the basis of not affecting private network accessing of the public network client side, the public network client side can access the public network conveniently without performing any manual configuration.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and a server for accessing a private network through a two-layer tunnel protocol. Background technique [0002] With the popularization of IP networks and the increasing awareness of network security, various enterprises and small Internet service providers (ISPs) have established relatively isolated and exclusive corporate private networks, making use of public networks, such as Integrated Services Digital Network (ISDN) or The application of the dial-up function of the public switched telephone network (PSTN) to access the public network to realize the virtual private network is becoming more and more common. The Layer 2 Tunneling Protocol (L2TP) technology establishes a secure virtual private network for enterprises on the public network. Enterprises stationed abroad and personnel on business trips can remotely connect to the enterprise headquarters through the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L12/46H04L47/43
Inventor 蒋益群周迪
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products