Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method based on MAC distribution

A MAC address and link protection technology, applied in the field of communication, can solve problems such as abnormal traffic, high requirements for network management, and loss of network service providers, and achieve the effect of reducing workload

Active Publication Date: 2017-12-29
TIANJIN ZANPU TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, when network service providers provide external services, some malicious users will use the source IP address provided by the network service provider to access software that does not meet the requirements, resulting in the existence of abnormal traffic. If no measures are taken, then these malicious users will use The source IP will be blocked. For such a tight and precious resource of IP addresses, this will undoubtedly cause great losses to network service providers.
Previously, there was a technology for splitting traffic through VLANID. This technology required complex deployment and configuration of switches, and the requirements for network management were too high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method based on MAC distribution
  • Protection method based on MAC distribution
  • Protection method based on MAC distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0035] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0036] A protection method based on MAC shunting, comprising the following content:

[0037] After the uplink port receives the message, it does not need to be modified, and the message is copied to the downlink port intact. The processing flow of the uplink port receiving the message is as follows: figure 1 shown;

[0038] Because the uplink port does not need IP protection to receive packets. The so-called IP protection protects the online behavior of intranet users. Therefore, the task of the uplink port is to copy the message to the downlink port intact and send it to the intranet user, which is equivalent to sending the message to the peer end in bridge mode, such as Figure 4 As...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a protection method based on MAC distribution. The method comprises the following content of copying an intact message to a downlink port after an uplink port receives a message; analyzing a message protocol type after the downlink port receives the message, modifying a destination MAC address in the message as an MAC address of a protection link device if an abnormity exists, sending the message to the protection link, and sending out the message; and if the abnormity does not exist, modifying the destination MAC in the message as the MAC address of the default link, thereby sending out the message from the default link. The method has the following advantages that the normal Internet surfing quality of service of a user is ensured, moreover, a workload of a network manager is reduced; when user access borrowing a source IP address is inconsistent with a stated software behavior, the abnormity of the IP can be automatically detected; and on the premise of not banning the source IP of the user, the MAC address of the message is modified as the MAC of the protection link device, and the abnormal traffic is automatically switched to the protection link for processing.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a protection method based on MAC shunting. Background technique [0002] At present, when network service providers provide external services, some malicious users will use the source IP address provided by the network service provider to access software that does not meet the requirements, resulting in the existence of abnormal traffic. If no measures are taken, then these malicious users will use The source IP will be blocked. For such a tight and precious resource of IP addresses, this will undoubtedly cause great losses to network service providers. Previously, there was a technology of distributing traffic through VLANID. This technology required complex deployment and configuration of switches, and the requirements for network management were too high. Contents of the invention [0003] In view of this, the present invention aims to propose a protection...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/101H04L63/1425H04L2101/622
Inventor 张寿权杨国栋张冬梅
Owner TIANJIN ZANPU TECH