Hardware implementation method for matching IP address with IP range strategy
An IP address and hardware-implemented technology, applied in the field of network security, can solve problems such as reduced efficiency and high system overhead, and achieve the effects of improving efficiency, reducing system overhead, and simple subtraction operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0017] The advantages and design content of the hardware implementation method of the IP address matching IP range policy of the present invention will be described in detail below through an embodiment.
[0018] The hardware implementation method of the IP address matching IP range strategy described in this embodiment, the (IP range) strategy includes two forms, namely: IP start address and IP end address form, such as 192.168.0.1-
[0019] 192.168.0.100; and the IP address and mask form, such as 192.168.1.0 / 255.255.255.0. The IP address and mask form will be converted by hardware into the first form, namely the start address and end address form, such as 192.168.1.0-192.168.1.255.
[0020] attached figure 1 A block diagram of the hardware implementation method for matching the IP range strategy for the IP address, as attached figure 1 As shown, the IP address of the extracted IP packet is assumed to be X, the starting IP address of the policy is assumed to be Y, and the I...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
