Anti-attack method and device for IRF system
A technology for preventing attacks and attacking equipment, applied in the field of communications, can solve the problems of threatening manipulation of the IRF system, misconfiguration of the network administrator, affecting the stability of the IRF system, etc., so as to increase the ability of anti-interference and anti-attack, and improve the security. and stability effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0026] refer to figure 2 , shows a flow chart of steps of a method for implementing IRF system attack defense according to one embodiment of the present application. In the embodiment of this application, the method is applied to the first device, and the method may include:
[0027] Step 201, receiving the IRF Hello message sent by the second device through the Layer 2 network;
[0028] Step 202, judging whether the MAC address of the second device carried in the IRF Hello message exists in the pre-saved MAC address table;
[0029] Step 203. If not, determine that the second device is an attacking device, and discard the IRF Hello packet.
[0030] In this embodiment of the present application, the f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 