Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Business access method and device based on Layer 2 Tunneling Protocol (L2TP)

A layer-2 tunneling protocol and service access technology, which is applied in the field of service access methods and devices based on the layer-2 tunneling protocol, can solve problems such as increasing the burden on LNS, increasing access delay, and occupying the egress bandwidth of the enterprise network, so as to improve the online experience , Improve utilization and reduce delay

Inactive Publication Date: 2014-04-23
NEW H3C TECH CO LTD
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, because the traffic to access the Internet (Internet) circles around the LNS of the enterprise network, the access delay is greatly increased.
Moreover, when the remote device accesses the Internet, it enters through the public network interface of the LNS of the enterprise network, and then routes out through the public network interface after decapsulation, occupying the limited egress bandwidth of the enterprise network and increasing the burden on the LNS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business access method and device based on Layer 2 Tunneling Protocol (L2TP)
  • Business access method and device based on Layer 2 Tunneling Protocol (L2TP)
  • Business access method and device based on Layer 2 Tunneling Protocol (L2TP)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the object, technical solution and advantages of the present invention clearer, the solutions of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0017] The main purpose of the present invention is to realize the distribution of user access Internet traffic on the LAC device of the public network, so the setting is mainly based on the LAC device. When processing the data packets of the remote device on the LAC device, before entering the L2TP tunnel, the destination IP address of the data packets is pre-judged, and the different IP addresses are differentiated and processed. In this way, the data packets whose destination IP address is the public network address are directly forwarded to the public network server on the public network outbound interface, and the data packets whose destination IP address is the private network address of the enterprise network are still forwarded t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a business access method based on a Layer 2 Tunneling Protocol (L2TP). The method comprises the steps that an L2TP Access Concentrator (LAC) serving as a gateway receives a data message sent by far-end equipment, and judges whether the target IP address of the data message is an enterprise network address or a public network address, if the target IP address is the enterprise network address, forwarding the data message to an L2TP Network Server (LNS) for accessing through an L2TP tunnel, and if the target IP address is the public network address, routing the data message to a public network outcoming interface of the LAC according to a public network routing table entry corresponding to the public network address. The invention also discloses the LAC. After the business access method and the LAC are adopted, the burden of enterprise network LNS equipment is reduced, and the Internet bandwidth utilization rate of an enterprise network is improved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a service access method and device based on a Layer 2 tunnel protocol. Background technique [0002] Virtual Private Network (VPN) provides a private network connection between the public network and the internal network of the enterprise for mobile employees on business trips, remote office workers and remote small offices to realize remote office. VPDN (Virtual Private Dial-up Network) refers to using the dial-up function of a public network (such as ISDN or PSTN) to access a public network to realize a virtual private network, thereby providing services for enterprises, small ISPs, and mobile office workers. access service. That is, VPDN provides an economical and effective point-to-point connection between remote users and private enterprise networks. VPDN uses tunneling protocols to establish a secure virtual private network for enterprises on the public netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L12/46H04L12/741H04L45/74
Inventor 施鸿殊
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products