Traffic cleaning method and device and first boundary routing equipment

A traffic cleaning and routing technology, applied in the information field, can solve the problem that the user terminal 104 cannot receive traffic correctly, and achieve the effect of avoiding loops

Active Publication Date: 2021-01-01
NEW H3C SECURITY TECH CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the cleaned traffic sent by the cleaning server 103 hits the flow specification rule, so the border routing device will resend the cleaned traffic sent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic cleaning method and device and first boundary routing equipment
  • Traffic cleaning method and device and first boundary routing equipment
  • Traffic cleaning method and device and first boundary routing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] see figure 2 , figure 2 Shown is a schematic flow chart of the flow cleaning method provided by the embodiment of the present invention, which may include:

[0057] S201. Establish a tunnel with a first interface as a source node and a second interface as an end node, where the first interface is an interface learned through BGP and used to send packets to a second border routing device.

[0058] S202. Forward the traffic received by the interface f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a flow cleaning method and device and first boundary routing equipment. The method comprises the steps that a tunnel with a first interface as a source node and a second interface as a tail node is established, wherein the first interface is an interface learned through a BGP and used for sending a message to a second boundary routing device; and forwardingthe traffic received by the interface which does not establish a BGP neighbor to a cleaning server through the tunnel to perform traffic cleaning. A tunnel can be established between a first boundaryrouting device and a second boundary routing device, so that two different routes, namely a route learned through a BGP and the established tunnel, are arranged between the first boundary routing device and the second boundary routing device, and the flow received by different types of interfaces is transmitted by different routes, the boundary routing boundary devices can transmit the cleaned flow and the flow which is not cleaned by different routes, and a loop is prevented from being formed in the BGP network.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a flow cleaning method, device and first border routing equipment. Background technique [0002] Flow specification (Flow Specification, Flowspec) technology can be used to filter and inspect illegal traffic in the BGP (Border Gateway Protocol, Border Gateway Protocol) network, thereby reducing DOS (Denial of Service, denial of service) attacks, DDOS (Distributed Denial of Service) The impact of illegal attacks such as attacks on the BGP network. [0003] Exemplarily, it can be as figure 1 As shown, the BGP network may include a flow specification controller (hereinafter referred to as the controller) 101 and a plurality of flow specification border routing devices (hereinafter referred to as the border routing device). For the convenience of description, figure 1 The four border routing devices are respectively recorded as border routing device 1, border routing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/705H04L12/715H04L12/721H04L12/741H04L45/18H04L45/74
CPCH04L45/04H04L45/18H04L45/38H04L45/74
Inventor 王阳廖以顺
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products