Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message transmission method and message transmission device

A technology for message transmission and message encapsulation, applied in the field of communications, can solve the problems of wasting IPsec tunnel resources and occupying large public network address resources, and achieve the effect of saving resources and saving public network address resources.

Active Publication Date: 2017-06-20
NEW H3C TECH CO LTD
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When there are a large number of VPNs in the distributed data center network, since IPsec tunnels need to be established individually for each VPN, a large number of IPsec tunnels need to be established, which wastes the resources of IPsec tunnels
Moreover, the public network address needs to be used when establishing an IPsec tunnel, so a large amount of public network address resources will be occupied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message transmission method and message transmission device
  • Message transmission method and message transmission device
  • Message transmission method and message transmission device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The terminology used in this application is for the purpose of describing specific embodiments only, not to limit the application. As used in this application and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0021] It should be understood that although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second information may also be called first information. Dependin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a message transmission method and a message transmission device. The method comprises the following steps: after receiving a first message, determining VPN (Virtual Private Network) information corresponding to the first message, and querying a forwarding table corresponding to the VPN information according to the destination IP address of the first message to get an outbound interface corresponding to the destination IP address; if the outbound interface is a GRE (Generic Routing Encapsulation) tunnel, packaging a first GRE tunnel header corresponding to the GRE tunnel for the first message to get a first GRE tunnel message, wherein the first GRE tunnel header contains the VPN information; acquiring an IPsec (IP Security) tunnel corresponding to the GRE tunnel, and packaging a first IPsec tunnel header corresponding to the IPsec tunnel for the first GRE tunnel message to get a first IPsec tunnel message; and sending the first IPsec tunnel message through the IPsec tunnel so that opposite-end equipment receiving the first IPsec tunnel message can send the first message according to the VPN information. Through the technical scheme of the application, the resources of the IPsec tunnel can be saved, and the public network address resources can be saved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a message transmission method and device. Background technique [0002] IPsec (IP Security, IP Security) is a three-layer tunnel encryption protocol. IPsec provides high-quality, cryptography-based security guarantees for data transmitted on the Internet. It is a traditional implementation of three-layer VPN (Virtual Private Network, virtual private network) security technology. IPsec protects user data that needs to be transmitted by establishing a "channel" between specific communicating parties. This channel is called an IPsec tunnel. [0003] In the distributed data center network, IPsec+VPN technology is used between different data centers to transmit user data. Specifically, an IPsec tunnel is established between gateway devices in different data centers, and an IPsec tunnel is independently established for each VPN. For example, between gateway devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/46
Inventor 宋小恒
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products