Method and device for issuing ACL (access control list) items

An access control list and table entry technology, applied in the field of network communication, can solve problems such as data packet loss and ACL entry mismatch, and achieve the effect of avoiding data packet loss

Active Publication Date: 2013-01-02
NEW H3C TECH CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after the slice is updated, the action policy table corresponding to the slice may not be updated, as shown in Figure 4b As shown, in this way, the action policy corresponding to Entry3 is policy1 in the action policy table, and the action policy corresponding to Entry1 becomes policy2 in the action policy table. Data packet loss caused by instantaneous mismatch of table entries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for issuing ACL (access control list) items
  • Method and device for issuing ACL (access control list) items
  • Method and device for issuing ACL (access control list) items

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] In the method provided by this application, when sending ACL entries to a slice, the Shadow mechanism is not used, but the ACL entries in the slice are operated one by one, so as to ensure that when the ACL entries are sent, the ACL entries are avoided. Mis-match to avoid packet loss.

[0037] The method provided by the invention is described below:

[0038] see Figure 5 , Figure 5 The flow chart of the method provided by the embodiment of the present invention. Such as Figure 5 As shown, the process may include the following steps:

[0039] Step 501, determine the target location of the slice to which the ACL entry to be delivered should be delivered.

[0040] The slice here is the slice that should be delivered actually for the A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for issuing ACL (access control list) items. The method includes determining target positions of slice where ACL items to be issued; identifying the target positions which are not idled, and looking for idle item positions nearest the target positions in the slice; transferring in a manner of copying action policy items corresponding to the ACL items from an action policy list, then copying the ACL items and deleting original policy items and original ACL items; sequentially transferring the ACL items and the correspondingly policy items one by one from the ACL item nearest the idle item position to the nearest positions of the idle item positions in the above transferring manner until the target positions are idled; and issuing the ACL items to be issued to the target positions.

Description

technical field [0001] The present application relates to network communication technology, in particular to a method and device for issuing an Access Control List (ACL) entry. Background technique [0002] Data centers have grown at an unprecedented rate in recent years, and current data centers typically run at least two separate networks: an Ethernet network (LAN) and a Fiber Channel storage area network (SAN), where the LAN is used for client computers to server and server-to-server communication; SAN is used for server and storage device communication. [0003] In order to support the LAN and SAN running in the data center, the servers in the data center need to be configured with separate interfaces for the LAN and the SAN, for example, the server is configured with an Ethernet network interface card (NIC) for the LAN and a Fiber Channel host bus adapter (HBA) for the SAN. In addition, in order to provide services for the LAN and complete the storage function through ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/823H04L47/32
Inventor 陈佳莹胡海
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products