A protection method based on mac shunting
A technology of MAC address and link protection, applied in the field of communication, can solve the problems of abnormal traffic, high network management requirements, loss of network service providers, etc., and achieve the effect of reducing workload
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.
[0035] The present invention will be described in detail below with reference to the accompanying drawings and examples.
[0036] A protection method based on MAC shunting, comprising the following content:
[0037] After the uplink port receives the message, it does not need to be modified, and the message is copied to the downlink port intact. The processing flow of the uplink port receiving the message is as follows: figure 1 shown;
[0038] Because the uplink port does not need IP protection to receive packets. The so-called IP protection protects the online behavior of intranet users. Therefore, the task of the uplink port is to copy the message to the downlink port intact and send it to the intranet user, which is equivalent to sending the message to the peer end in bridge mode, such as Figure 4 As...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


