Internet protocol security (IPSEC)-based tunnel switching method and device, and gateway

A tunnel and gateway technology, applied in the network field, can solve problems such as establishing IPSec tunnels, achieve the effect of reducing switching consumption and avoiding network shocks

Inactive Publication Date: 2018-05-11
BEIJING ANBOTONG TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if there is a problem with the egress of the IPSec tunnel establi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet protocol security (IPSEC)-based tunnel switching method and device, and gateway
  • Internet protocol security (IPSEC)-based tunnel switching method and device, and gateway
  • Internet protocol security (IPSEC)-based tunnel switching method and device, and gateway

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0065] The exemplary embodiments will be described in detail here, and examples thereof are shown in the accompanying drawings. When the following description refers to the accompanying drawings, unless otherwise indicated, the same numbers in different drawings represent the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present application. Rather, they are merely examples of devices and methods consistent with some aspects of the application as detailed in the appended claims.

[0066] In order to fully understand this application, many specific details are mentioned in the following detailed description, but those skilled in the art should understand that this application can be implemented without these specific details. In other embodiments, well-known methods, procedures, components, and circuits are not described in detail, so as not to unnecessarily obs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose an Internet protocol security (IPSEC)-based tunnel switching method and device, and a gateway. The method comprises the steps that the gateway detects a state ofa main tunnel, if the main tunnel is in an abnormal state, the gateway waits for a preset time period; then the gateway detects a state of the main tunnel again; and if the main tunnel is in the abnormal state, the main tunnel is switched to a standby tunnel. Through adoption of the tunnel switching method, false switching caused by network shock and other states can be prevented, main tunnel-based communication is continued as much as possible, unnecessary switching consumption is reduced, and adaptive adjustment and other problems caused by switching are solved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to an IPSEC-based tunnel switching method, device and gateway. Background technique [0002] IPSec (Internet Protocol Security, Internet Protocol Security) is an open standard framework that uses encrypted security services to ensure confidential and secure communications on IP (Internet Protocol, a protocol for interconnecting networks) networks . In the actual networking, gateway A and gateway B establish a tunnel (channel for communication) through the operator, and the gateway negotiation process based on IPSec through this tunnel is as follows: figure 1 As shown, it includes the following steps: (1) between gateway A and gateway B, any party initiates a negotiation based on the IKE protocol (Internet Key Exchange Protocol, Internet Key Exchange Protocol), and the opposite end responds after receiving it; (2) both parties Negotiate according to configuration parameters, respe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/14H04L12/46H04L69/40
CPCH04L12/4633H04L63/0485H04L69/40
Inventor 李洪宇
Owner BEIJING ANBOTONG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products