Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Visiting traffic control method and device

A technology of access flow and control method, which is applied in the field of access flow control device and access flow control, can solve the problems of low collection efficiency and achieve the effect of improving collection efficiency and reducing collection workload

Inactive Publication Date: 2017-03-15
NEW H3C TECH CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] An embodiment of the present invention provides a method for controlling access traffic and a corresponding device for controlling access traffic, so as to solve the problem that existing BRAS equipment collects intranet IP addresses to distinguish between intranet and extranet services, and the collection efficiency is low The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visiting traffic control method and device
  • Visiting traffic control method and device
  • Visiting traffic control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0026] After the user (User) goes online, if figure 1 As shown, the existing BRAS usually determines the network corresponding to the destination IP (Dip) of the access traffic according to the access control list (Access Control Lists, ACL) rules configured on the interface (Interface) when the user's access traffic enters the incoming interface. Level (Level), which is to determine whether the user's access traffic is accessing the internal network or the external network. Level can be used to identify the internal and external network. For example, the access traffic accessing dip1 is marked as level1, and the access traffic accessing dip2 is marked as level2, level1 It can be used to identify the internal network, and level2 c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a visiting traffic control method and a visiting traffic control device. Visiting traffic is used for visiting an intranet or an extranet. The method comprises the steps of extracting a target address from the received visiting traffic; querying interface information corresponding to the target address from a preset hardware transfer table, and using the found interface information to serve as outgoing interface information; identifying a network type corresponding to the visiting traffic according to the outgoing interface information; and controlling the transfer of the visiting traffic according to the network type. According to the method and the device provided by the embodiment of the invention, which target IPs belong to the intranet and which IPs belong to the extranet do not need to be distinguished, the trouble of collecting a lots of intranet IP address is avoided, workload is reduced, and collection efficiency is improved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for controlling access traffic and a device for controlling access traffic. Background technique [0002] In a broadband remote access server (Broadband Remote Access Server, BRAS) networking, when a user accesses network resources, usually the BRAS controls the user's access authority to the network. [0003] For users who access network resources, the network they access can be divided into intranet and extranet. The authority to access the external network is usually different from the authority to access the internal network. This requires the BRAS device to issue different policies for control according to whether the user accesses the internal network or the external network. Therefore, before issuing policies, the BRAS device needs to screen out whether the user's access action is to access the internal network or access the external network. [0004] At prese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L12/801
CPCH04L12/2876H04L47/10
Inventor 王阳廖以顺戴陈云
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products