Tunnel connection request distribution method and device

A connection request and tunnel connection technology, applied in the field of data communication, can solve the problems of incompatibility with standard methods and unfavorable large-scale commercial applications

Active Publication Date: 2013-02-06
ZHEJIANG UNIVIEW TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the RFC2661 standard document issued by the IETF (Internet Engineering Task Force) stipulates that the L2TP destination port number can only be 1701. If the above changes are made, it means that it cannot be compatible with the standard method, and a privatized protocol transformation is required, which is not conducive to large-scale business application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tunnel connection request distribution method and device
  • Tunnel connection request distribution method and device
  • Tunnel connection request distribution method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention performs special processing in the authentication stage of the L2TP connection request, and under the premise of basically guaranteeing the user experience, intelligently identifies the user's L2TP connection request, and distributes the user's L2TP connection request to different service network front-end LNS servers for processing . The detailed implementation in the preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0018] Please refer to figure 2 , image 3 as well as Figure 4 , The present invention provides a device for distributing tunnel connection requests. In a preferred embodiment, the present invention is realized by using a computer program, the device runs on the NAT gateway, and includes a pre-matching unit and an LNS service unit. The following describes the processing flow of the device running on the NAT gateway and cooperating with the existing functions o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a tunnel connection request distribution method which is applied to an NAT (Network Address Translation) gateway to dispatch an L2TP connection request from a user outside the NAT gateway. The method comprises the steps of judging whether an L2TP connection request message from the user requires local authentication according to a preset policy, conducting local processing if required, otherwise returning an authentication failure message to the user, storing session characteristics of the authentication failure message in a session table when the authentication failure message is received, acquiring the session characteristics of a request message when the request message is received subsequently, and searching whether the preposed session table contains a corresponding table entry according to the session characteristics, and forwarding the message to an LNS (Lonworks Network Service) server in the NAT gateway if the table contains the entry, otherwise locally processing the L2TP connection request message. A service network served by the LNS server is different from a local service network. According to the tunnel connection request distribution method, the objective LNS server to which the user is intended to access can be identified intelligently while the existing standard protocol is followed.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a method and device for distributing tunnel connection requests in an enterprise network environment. Background technique [0002] With the continuous development of standardized and easily expandable network technology, especially IP technology, intelligent video surveillance technology based on IP network has developed rapidly, and IP surveillance has become the mainstream of current surveillance. For security and cost reasons, most surveillance networks are deployed in private networks. Many mobile users or public network users use the decoding client (such as VC) to access the monitoring resources in the private network (such as the live resources on the encoder EC). private network access, figure 1 It is such a typical application scenario. For related technologies of using tunnels to traverse the monitoring network NAT, reference may be made to related patent applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 王军周迪
Owner ZHEJIANG UNIVIEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products