Unlock instant, AI-driven research and patent intelligence for your innovation.

A protection method based on mac shunting

A technology of MAC address and link protection, applied in the field of communication, can solve the problems of abnormal traffic, high network management requirements, loss of network service providers, etc., and achieve the effect of reducing workload

Active Publication Date: 2020-10-27
TIANJIN ZANPU TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, when network service providers provide external services, some malicious users will use the source IP address provided by the network service provider to access software that does not meet the requirements, resulting in the existence of abnormal traffic. If no measures are taken, then these malicious users will use The source IP will be blocked. For such a tight and precious resource of IP addresses, this will undoubtedly cause great losses to network service providers.
Previously, there was a technology for splitting traffic through VLANID. This technology required complex deployment and configuration of switches, and the requirements for network management were too high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A protection method based on mac shunting
  • A protection method based on mac shunting
  • A protection method based on mac shunting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0035] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0036] A protection method based on MAC shunting, comprising the following content:

[0037] After the uplink port receives the message, it does not need to be modified, and the message is copied to the downlink port intact. The processing flow of the uplink port receiving the message is as follows: figure 1 shown;

[0038] Because the uplink port does not need IP protection to receive packets. The so-called IP protection protects the online behavior of intranet users. Therefore, the task of the uplink port is to copy the message to the downlink port intact and send it to the intranet user, which is equivalent to sending the message to the peer end in bridge mode, such as Figure 4 As...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a protection method based on MAC splitting, which includes the following content: after the uplink port receives the message, copy the message intact to the downlink port; after the downlink port receives the message, analyze the protocol type of the message, If there is an exception, modify the destination MAC address of the message to the MAC address of the protection link device, send the message to the protection link, and send it out; if there is no exception, modify the destination MAC address in the message to the default link MAC address, the packet is sent out through the default link. The present invention has the following advantages: while the present invention guarantees the service quality of the user's normal Internet access, it can reduce the workload of the network management, and when the user who borrows the source IP address accesses the software that does not meet the requirements, the IP address can be automatically detected. abnormal, and under the premise of not blocking the source IP of the user, modify the destination MAC address of the message to the MAC of the protection link device, and automatically switch the abnormal traffic to the protection link for processing.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a protection method based on MAC shunting. Background technique [0002] At present, when network service providers provide external services, some malicious users will use the source IP address provided by the network service provider to access software that does not meet the requirements, resulting in the existence of abnormal traffic. If no measures are taken, then these malicious users will use The source IP will be blocked. For such a tight and precious resource of IP addresses, this will undoubtedly cause great losses to network service providers. Previously, there was a technology of distributing traffic through VLANID. This technology required complex deployment and configuration of switches, and the requirements for network management were too high. Contents of the invention [0003] In view of this, the present invention aims to propose a protection...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/101H04L63/1425H04L2101/622
Inventor 张寿权杨国栋张冬梅
Owner TIANJIN ZANPU TECH