Fast encoding method of access control list (ACL) behavior set

An access control list and fast coding technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve problems such as multi-time, affecting hash table query table compilation time, and experience degradation

Inactive Publication Date: 2014-03-19
北京中创腾锐技术有限公司
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, the RFC algorithm is used. When the number of rules is large, the generation of the output value eqcID will consume more time due to traversing all the access control list entries, thus affecting the compilation time of the entire hash table, that is, the query table.
This leads to a significant decline in the user experience of configuring network devices and taking effect in a timely manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fast encoding method of access control list (ACL) behavior set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0018] The encoding method of the present invention mainly imports the ACL entries configured by the user through the user configuration interface, and obtains a query table after compiling data and processing, and provides it to the ACL query system for use.

[0019] Compiled data processing includes three steps: input data processing, endpoint sorting processing, and rule pool iteration processing, among which:

[0020] Input data processing extracts the matching range of each keyword in each ACL entry configured by the user, including the upper limit and lower limit of the range, and divides the longer part of the keyword data into different keywords according to the specific situation , that is,

[0021] Input data processing transforms the access control list entries into an independent endpoint information str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a rapid method to accelerate the calculation of an output value eqcID corresponding to each chunk of phase 0. The method comprises the steps of input data processing, endpoint sorting processing and rule pool iteration processing. Through employing the sorting and using a mode of rule pool iteration, the query result eqcID corresponding to the chunk of phase 0 is evaluated. According to the above method, the characteristics of access control entries are fully utilized, the related information is dug deeply, the steps of eqcID calculation and compilation time of index are greatly reduced, the come into effect of a configuration access control list rule is accelerated, and the function of network equipment is protected well.

Description

technical field [0001] The invention relates to a method for fast coding of an access control list (ACL) behavior set, more specifically, relates to a fast and effective coding technique for a fast lookup table in the access control list. Background technique [0002] In the Internet, data packet classification technology is the basis of diversified services in modern networks, and the access control list technology has become the most critical technology in some network core devices such as firewalls and routers. It will directly affect the control, performance and security of the network. Impact. [0003] The RFC algorithm is a multi-dimensional data packet classification algorithm with strong versatility and high speed. It has good scalability for the width and dimension of the rules; when performing classification search, the search performance is not affected by the number of rules and the characteristics of the rules. [0004] The RFC algorithm is divided into P phas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/741H04L45/74
Inventor 曾小明
Owner 北京中创腾锐技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products