Detection method of access control list ACL and network equipment

An access control list and network device technology, applied in the field of communications, can solve problems such as low ACL detection efficiency

Pending Publication Date: 2021-03-26
XFUSION DIGITAL TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a detection method and network equipment of an access control list ACL to solve the problem of relatively low ACL detection efficiency in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method of access control list ACL and network equipment
  • Detection method of access control list ACL and network equipment
  • Detection method of access control list ACL and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0035] In order to facilitate understanding, a description of concepts related to the present application is given for reference, as follows:

[0036] 1) Access control list (acces control list, ACL): The instruction list of the router and switch interface, including a series of matching rules, conditions and actions, used to control the data packets entering and leaving the port. The role of ACL includes restricting network traffic, providing control means for communication traffic, providing basic means for network security access, and improving network performance.

[0037]According to the application purpose of the ACL, the ACL can be divided into the following types: (1), basic ACL: formulate rules only according to the layer-3 source IP address. (2) Advanced ACL: Formulate rules based on the third and fourth layers of information s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An access control list (ACL) detection method and network equipment are applied to the network equipment, and the method comprises the steps: generating a first binary decision diagram (BDD) corresponding to a first ACL according to at least one piece of parameter information included in the first ACL, wherein the first BDD is generated for sub-BDDs respectively constructed for at least one pieceof parameter information included in the first ACL; according to at least one piece of parameter information included in a second ACL, generating a second BDD corresponding to the second ACL, and generating the second BDD for sub-BDDs constructed for at least one piece of parameter information included in the second ACL; and based on the first BDD and the second BDD, detecting the first ACL and the second ACL. According to the ACL detection method provided by the invention, the relationship between different ACLs can be rapidly detected, and the ACL detection efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a method for detecting an access control list (ACL) and a network device. Background technique [0002] With the expansion of network scale and the increase of traffic, the control of network security and the allocation of bandwidth become important contents of network management. By filtering data packets, it can effectively prevent illegal users from accessing the network, and can also control traffic and save network resources. [0003] At present, an access control list (acces control list, ACL) usually includes a series of ACL rules for controlling network devices (such as routers, switches, etc.) to classify and process data packets, so that network devices can A series of ACL rules perform corresponding filtering, classification processing, and forwarding processing on received data packets, so as to achieve the purpose of controlling traffic and savi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/101H04L61/2535H04L61/5046
Inventor 陈一峰陈颖
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products